Crow focuses on detecting, tracking, identifying and neutralizing UAS threats using a different combination of modern technologies. Our goal is to create a flexible system, so that every user can adapt their model to their own specific requirements. The devise has been designed using the minimum number of basic elements, but it integrates the ability to incorporate numerous incremental improvements in its detection and disruption functions if the need arises.
All the used technologies, including radar detection, RF analysis, Radio Direction finding, Electro-optical detection, analysis and classification, RF datalink jamming, GNSS jamming or GNSS spoofing are integrated in a single operation post through C4ARMS, the Command and Control unit.
The basic system performs first and anticipated detection with high-resolution radars, capable of detecting small UAS over long distances. It includes an optronic system that allows the Crow to discriminate if detection is a tangible threat and determine its precise spatial location. Once the threat is confirmed and located, the model will then make use of a jamming system to disrupt the UAS’s guide. In order to guarantee the protection of larger surfaces, several Crow can be programmed to work jointly.
UTM, ATM & C-UAS Convergence
In order to achieve a complete protection around airports, Indra offers the convergence of three systems: ATM, UTM & Crow.
The surveillance data of counter UAS is shared with the ATM system, providing information about possible threats. The problem relays in the high probability of false positives and the overload of information the ATM system will be forced to handle. In order to refine this information, the UTM system will contribute by gathering data about all collaborative drones that have had a flight plan authorized in order to fly in certain areas, eliminating the licit traffic from the list of possible threats.
This information will be put to use by the three systems:
- The security forces, in charge of C-UAS system, can ignore licit traffic and use the information provided to distinguish drones that actually pose a threat to society from those who do not.
- The UTM system uses the information of C-UAS as a non-collaborative surveillance source, making fusion of this data with the telemetry sent by the drone, unifying all UTM available data.
- The ATM system will have now the complete information about illegal drones and it can evaluate jointly with the security forces the necessity of airport disruption.
With this convergence, airport disruptions can be reduced to minimum, improving the service continuity and enhancing the overall resilience of the ATM network.