WEBVTT
1
00:00:04.440 --> 00:00:06.970
As commercial drone technology evolves,
2
00:00:06.970 --> 00:00:09.750
the Unmanned Aircraft System or UAS
3
00:00:09.750 --> 00:00:12.760
threat landscape advances exponentially.
4
00:00:12.760 --> 00:00:17.280 line:15%
There are more than 1.7 million registered
5
00:00:17.280 --> 00:00:20.100 line:15%
Unmanned Aerial Systems in the United States,
6
00:00:20.100 --> 00:00:22.510 line:15%
and the market is ever expanding.
7
00:00:22.510 --> 00:00:24.170
The threat is considered high
8
00:00:24.170 --> 00:00:26.470
because UAS platforms can be used
9
00:00:26.470 --> 00:00:29.630
for clandestine surveillance of high value facilities,
10
00:00:29.630 --> 00:00:32.940
or loaded with munitions and used in attacks.
11
00:00:32.940 --> 00:00:34.780
Really what it comes down to is,
12
00:00:34.780 --> 00:00:38.750
is any nefarious actor can own his own air force.
13
00:00:38.750 --> 00:00:40.500
The Department of Homeland Security,
14
00:00:40.500 --> 00:00:44.570
Science and Technology Directorate, or DHS S&T,
15
00:00:44.570 --> 00:00:47.260
has been tasked as the lead agency for research,
16
00:00:47.260 --> 00:00:50.100
testing and evaluation within DHS
17
00:00:50.100 --> 00:00:53.710
for Counter UAS, known as C-UAS.
18
00:00:53.710 --> 00:00:56.900
C-UAS is state-of-the-art technology,
19
00:00:56.900 --> 00:01:01.310 line:15%
deployed in coupling with procedures, tactics,
20
00:01:01.310 --> 00:01:04.500 line:15%
that law enforcement uses to defend against
21
00:01:04.500 --> 00:01:08.300
malicious threat actors utilizing UAS platforms.
22
00:01:08.300 --> 00:01:11.280
It allows law enforcement officers the ability to
23
00:01:11.280 --> 00:01:15.220
track, identify and classify hostile UAS threats,
24
00:01:15.220 --> 00:01:17.790
determine the proper mitigation strategy,
25
00:01:17.790 --> 00:01:20.070
whether that be electronic mitigation,
26
00:01:20.070 --> 00:01:21.950
or actually physically going out there
27
00:01:21.950 --> 00:01:25.000
and interdicting the UAS operator.
28
00:01:25.000 --> 00:01:27.950
DHS is addressing the UAS situation
29
00:01:27.950 --> 00:01:29.690
while balancing its obligations
30
00:01:29.690 --> 00:01:32.000
to sustain and not erode privacy
31
00:01:32.000 --> 00:01:35.500
by adhering to privacy and civil liberties protections.
32
00:01:35.500 --> 00:01:37.800
So while cutting edge science and technology
33
00:01:37.800 --> 00:01:39.270
protect the Homeland,
34
00:01:39.270 --> 00:01:42.620 line:15%
smart legislation, such as section 124n
35
00:01:42.620 --> 00:01:44.560 line:15%
of the Preventing Emerging Threats Act
36
00:01:44.560 --> 00:01:47.750 line:15%
and DHS privacy safeguards protect privacy
37
00:01:47.750 --> 00:01:50.560 line:15%
and other rights of lawful drone users.
38
00:01:50.560 --> 00:01:52.420
But that complexity doesn't end
39
00:01:52.420 --> 00:01:55.130
with just weekend drone enthusiasts.
40
00:01:55.130 --> 00:01:58.330 line:15%
DHS is fully aware that small UAS and drones
41
00:01:58.330 --> 00:02:01.530 line:15%
are a key enabling technology that support
42
00:02:01.530 --> 00:02:04.050 line:15%
many positive missions like safety missions
43
00:02:04.050 --> 00:02:07.350
for search and rescue, disaster surveying,
44
00:02:07.350 --> 00:02:08.780
even medical missions.
45
00:02:08.780 --> 00:02:11.460
But along with those capabilities and advances,
46
00:02:11.460 --> 00:02:14.580
comes the potential for nefarious activity.
47
00:02:14.580 --> 00:02:16.760
So when S&T conducted the first
48
00:02:16.760 --> 00:02:19.580
of its C-UAS technology test events,
49
00:02:19.580 --> 00:02:23.410
it coordinated closely with DHS components and others.
50
00:02:23.410 --> 00:02:26.300 line:15%
The goal of this multi-day event is to test and evaluate
51
00:02:26.300 --> 00:02:28.860 line:15%
how well these systems work in the operational environment.
52
00:02:28.860 --> 00:02:31.120
Meanwhile, S&T is always looking
53
00:02:31.120 --> 00:02:34.130
to connect with promising outside innovators.
54
00:02:34.130 --> 00:02:36.640
To ensure DHS S&T stays abreast of all of these
55
00:02:36.640 --> 00:02:38.610
technologies and [commerical] UAS,
56
00:02:38.610 --> 00:02:41.550
we've established a Long Range Broad Agency Announcement,
57
00:02:41.550 --> 00:02:44.220
where we invite academia, traditional,
58
00:02:44.220 --> 00:02:46.270
and even non-traditional providers,
59
00:02:46.270 --> 00:02:48.270
to give us their best ideas
60
00:02:48.270 --> 00:02:50.720
to address this kind of UAS problem set.
61
00:02:50.720 --> 00:02:52.900
S&T is rising to meet the challenge
62
00:02:52.900 --> 00:02:56.200
of this growing threat with its C-UAS program.
63
00:02:56.200 --> 00:02:59.460
The technology is a game changer in National Security.
64
00:02:59.460 --> 00:03:02.560 line:15%
The challenge is keeping up with the evolving threat,
65
00:03:02.560 --> 00:03:05.150 line:15%
and making sure that the technology continues
66
00:03:05.150 --> 00:03:07.713 line:15%
to identify that that evolving threat.