<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>White Papers &#8211; HLS.Today</title>
	<atom:link href="https://hls.today/topic/white-papers/feed/" rel="self" type="application/rss+xml" />
	<link>https://hls.today</link>
	<description>Homeland Security, Public Safety, Cyber and Intelligence News and Information</description>
	<lastBuildDate>Wed, 21 Dec 2022 08:37:59 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://hls.today/wp-content/uploads/2023/03/cropped-hlt.today-favicon--32x32.png</url>
	<title>White Papers &#8211; HLS.Today</title>
	<link>https://hls.today</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>IEEE: Surveying and Protecting your Skies with C-UAS Systems</title>
		<link>https://hls.today/white-papers/ieee-surveying-and-protecting-your-skies-with-c-uas-systems/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Thu, 17 Nov 2022 08:06:43 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=4025</guid>

					<description><![CDATA[HLS.Today &#8211; IEEE &#8211; Given the various practical and potential applications and purposes behind the use of unmanned aerial vehicles (UAVs) and unmanned aircraft systems (UAS) from non-public hobbies to military purposes, UAVs and UASs have been rigorously studied and developed over the last 30 years. Currently, in real life, we can readily observe various [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">HLS.Today &#8211; IEEE &#8211; Given the various practical and potential applications and purposes behind the use of unmanned aerial vehicles (UAVs) and unmanned aircraft systems (UAS) from non-public hobbies to military purposes, UAVs and UASs have been rigorously studied and developed over the last 30 years.<br />
</span><span style="font-weight: 400;"> Currently, in real life, we can readily observe various public and non-public use cases of UAVs, also widely known as drones.</span></p>
<p><span style="font-weight: 400;">In this paper, UAV is used as a general term for unmanned aircraft, including remotely piloted aircraft controlled by an operator on the ground and drones that can fly autonomously.</span></p>
<p><span style="font-weight: 400;">Though the word &#8216;drone&#8217; can be used to describe a wide variety of vehicles, including even seafaring submarines and land-based autonomous vehicles, UAVs (or UASs) and drones are used interchangeably throughout the paper.</span></p>
<p><span style="font-weight: 400;">Moreover, the UAS, which consists of a UAV and the controllers, is also used interchangeably with UAV.</span></p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-4023 size-full" src="https://hls.today/wp-content/uploads/2022/11/HLS.Today-Protect-Your-Sky-A-Survey-of-Counter-Unmanned-Aerial-Vehicle-Systems.jpg" alt="HLS.Today Protect Your Sky A Survey of Counter Unmanned Aerial Vehicle Systems" width="1920" height="1280" srcset="https://hls.today/wp-content/uploads/2022/11/HLS.Today-Protect-Your-Sky-A-Survey-of-Counter-Unmanned-Aerial-Vehicle-Systems.jpg 1920w, https://hls.today/wp-content/uploads/2022/11/HLS.Today-Protect-Your-Sky-A-Survey-of-Counter-Unmanned-Aerial-Vehicle-Systems-300x200.jpg 300w, https://hls.today/wp-content/uploads/2022/11/HLS.Today-Protect-Your-Sky-A-Survey-of-Counter-Unmanned-Aerial-Vehicle-Systems-1024x683.jpg 1024w, https://hls.today/wp-content/uploads/2022/11/HLS.Today-Protect-Your-Sky-A-Survey-of-Counter-Unmanned-Aerial-Vehicle-Systems-768x512.jpg 768w, https://hls.today/wp-content/uploads/2022/11/HLS.Today-Protect-Your-Sky-A-Survey-of-Counter-Unmanned-Aerial-Vehicle-Systems-1536x1024.jpg 1536w" sizes="(max-width: 1920px) 100vw, 1920px" /></p>
<a href="https://hls.today/wp-content/uploads/2022/11/HLS.Today-Protect_Your_Sky_A_Survey_of_Counter_Unmanned_Aerial_Vehicle_Systems.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">HLS.Today - Protect_Your_Sky_A_Survey_of_Counter_Unmanned_Aerial_Vehicle_Systems</a>
<p><a href="https://hls.today/wp-content/uploads/2022/11/HLS.Today-Protect_Your_Sky_A_Survey_of_Counter_Unmanned_Aerial_Vehicle_Systems.pdf" target="_blank" rel="noopener">Download</a></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;"><strong>RAPID GROWTH OF UAVs AND THEIR APPLICATIONS</strong> Applications of UAVs range from recreation to commercial and military applications, including enjoyment, hobbies, and games with drones, the filming of movies for recreation, and the operation of UAVs for military purposes. As reported by the federal aviation administration (FAA) in the United States (US), there are 1; 692; 700 registered drones (approximately, 29% for commercial and 71% for recreation) in the US as of September 2020. The commercial UAV industry, whose dynamics has been dubbed a modern-day gold rush by multiple industry players, has grown rapidly in tandem with expanding market needs, such as disaster management, emergency services, agricultural applications, cargo inspection, or recreational purposes, to name a few.</span></p>
<p><span style="font-weight: 400;"><strong>Clearly, UAVs are considered as an essential enabler to enlarge commercial markets</strong> and are used in various industries, such as in:</span></p>
<p><span style="font-weight: 400;">i) the agricultural industry for seeding, crosspollination, and crop-dusting;</span></p>
<p><span style="font-weight: 400;">ii) the distribution industry for the delivery and/or collection of packages;</span></p>
<p><span style="font-weight: 400;">iii) the construction industry for building and measuring; and,</span></p>
<p><span style="font-weight: 400;">iv) the information technology (IT) industry for enlarging service coverage areas and establishing emergency networks. Furthermore, <strong>UAVs are used to provide effective public services</strong>, such as environmental (e.g., <strong>traffic and air pollution</strong>) monitoring and lighting and rescue operations.</span></p>
<p>&nbsp;</p>
<p><iframe title="Autonomous UAV based Air Quality Monitoring System | TEAM FALCON" width="800" height="450" src="https://www.youtube.com/embed/0CWqBc53Guc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;"><strong>RAPID GROWTH OF ACCIDENTS AND CRIMES INVOLVED IN UAVs<br />
</strong></span><span style="font-weight: 400;">With the various and vigorous promising applications of UAVs, now is a suitable time to consider UAVs from a different angle considering the possibility that they may threaten our safety. At a 2013 campaign rally in Dresden, Germany, a quadcopter drone hovered within a few feet of Angela Merkel, the Chancellor of Germany, and Thomas Maiziere, the German Defense Minister, eventually crashing in front of Merkel. This harmless stunt was found to have been orchestrated by the Pirate Party in the form of a protest against drone observation and government surveillance in Germany.</span></p>
<p>&nbsp;</p>
<p><img decoding="async" class="alignnone wp-image-4020 size-full" src="https://hls.today/wp-content/uploads/2022/11/hls.today-cus-communications.png" alt="hls.today cus communications" width="1019" height="839" srcset="https://hls.today/wp-content/uploads/2022/11/hls.today-cus-communications.png 1019w, https://hls.today/wp-content/uploads/2022/11/hls.today-cus-communications-300x247.png 300w, https://hls.today/wp-content/uploads/2022/11/hls.today-cus-communications-768x632.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;"><strong>The White House has not remained exempt from threats of rogue drones either</strong>; a DJI quadcopter for recreational purposes accidentally crash-landed on the south lawn of the White House in 2015. The benign nature in these cases, however, was not replicated in subsequent incidents. About a year and a half later, a Japanese protester against the use of nuclear power managed to land a drone, marked with an odious radioactive sign, on the roof of the Japanese prime minister&#8217;s office. The drone was carrying a container filled with radioactive sand from Fukushima. Multiple major news outlets have started to voice serious concerns over hostile drones. Recently, hostility by malignant drones became apparent to the general public when Nicolas Maduro, the President of Venezuela, was attacked by two commercial drones, each of which contained one kilogram of C-4 explosive, in Caracas, Venezuela, in August of 2018.</span></p>
<p>&nbsp;</p>
<p><img decoding="async" class="alignnone wp-image-4021 size-full" src="https://hls.today/wp-content/uploads/2022/11/hls.today-c-uas-platforms.png" alt="hls.today c-uas platforms" width="1228" height="747" srcset="https://hls.today/wp-content/uploads/2022/11/hls.today-c-uas-platforms.png 1228w, https://hls.today/wp-content/uploads/2022/11/hls.today-c-uas-platforms-300x182.png 300w, https://hls.today/wp-content/uploads/2022/11/hls.today-c-uas-platforms-1024x623.png 1024w, https://hls.today/wp-content/uploads/2022/11/hls.today-c-uas-platforms-768x467.png 768w" sizes="(max-width: 1228px) 100vw, 1228px" /></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">This series of drone attacks on a head of state captured only a fraction of the negative externalities of the booming UAV industry. <a href="https://hls.today/all-topics/hls-today-airport-security/" target="_blank" rel="noopener">Rogue drones hovering over airports</a> or private compounds pose diverse ranges of threats from security to privacy. Stealth drones deliver contraband by dropping packages onto prison grounds. Concerns over potential threats by UAVs have materialized quickly. Furthermore, according to a survey of online news articles, there were more than 200 incidents (100 in North America, 77 in Europe, 38 in Asia/Pacific, 17 in the Middle East, and 6 in Latin America) in 2019. As also shown in Figure below, the number of incidents that are caused by UAVs, as reported to the FAA in the US, generally increases every year. Compared to the total number of incidents in 2015, i.e., 1; 213, this number increased by 76% to 2; 142 in 2019.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-4022 size-full" src="https://hls.today/wp-content/uploads/2022/11/hls.today-incidents-drones.png" alt="hls.today incidents drones" width="934" height="473" srcset="https://hls.today/wp-content/uploads/2022/11/hls.today-incidents-drones.png 934w, https://hls.today/wp-content/uploads/2022/11/hls.today-incidents-drones-300x152.png 300w, https://hls.today/wp-content/uploads/2022/11/hls.today-incidents-drones-768x389.png 768w" sizes="(max-width: 934px) 100vw, 934px" /></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">HLS.Today Source: </span><a href="https://ieeexplore.ieee.org/" target="_blank" rel="noopener"><span style="font-weight: 400;">IEEE.ORG</span></a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FEMA October 2022 &#8211; Planning Considerations for Cyber Incidents</title>
		<link>https://hls.today/white-papers/fema-october-2022-planning-considerations-for-cyber-incidents/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Thu, 10 Nov 2022 13:26:22 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=3956</guid>

					<description><![CDATA[FEMA &#8211; Planning Considerations for Cyber Incidents October 2022 Emergency management personnel play a central role in preparing for and responding to cyber incidents in their jurisdictions. Although emergency managers are not expected to be technical experts on cyber incidents, they do need to understand and prepare for the potential impacts of an incident on [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>FEMA &#8211; Planning Considerations for Cyber Incidents</p>
<p>October 2022</p>
<p>Emergency management personnel play a central role in preparing for and responding to cyber incidents in their jurisdictions. Although emergency managers are not expected to be technical experts on cyber incidents, they do need to understand and prepare for the potential impacts of an incident on their communities and operations. Knowing whom to engage when a cyber incident occurs and having plans in place to effectively address an incident’s impacts is central to the role of emergency managers, regardless of hazard type. This guide is intended to help state, local, tribal and territorial (SLTT) emergency management personnel collaboratively prepare for a cyber incident and support the development of a cyber incident response plan or annex.</p>
<p>&nbsp;</p>
<a href="https://hls.today/wp-content/uploads/2022/11/HLS.Today-FEMA-planning-considerations-for-cyber-incidents-2022.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">HLS.Today - FEMA planning-considerations-for-cyber-incidents 2022</a>
<p>&nbsp;</p>
<p><a href="https://hls.today/wp-content/uploads/2022/11/HLS.Today-FEMA-planning-considerations-for-cyber-incidents-2022.pdf">Download</a></p>
<p>&nbsp;</p>
<p>HLS.Today</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>US CBP 2022 Report: Commercial Customs Operations Advisory Committee (COAC)</title>
		<link>https://hls.today/white-papers/us-cbp-white-paper-report-commercial-customs-operations-advisory-committee-coac/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Thu, 13 Oct 2022 12:33:44 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=3598</guid>

					<description><![CDATA[HLS.Today &#8211; The first significant customs modernization legislation in nearly 30 years is taking shape in Congress, providing the opportunity to identify statutes and, subsequently, regulations that require updates to better reflect today’s global trade environment, ensure supply chain continuity, and promote best practices. The Administration and Congress should take this opportunity to update our [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>HLS.Today &#8211; The first significant customs modernization legislation in nearly 30 years is taking shape in Congress, providing the opportunity to identify statutes and, subsequently, regulations that require updates to better reflect today’s global trade environment, ensure supply chain continuity, and promote best practices.</p>
<p>The Administration and Congress should take this opportunity to update our laws to strengthen our economic security by increasing trade throughput, reducing delays, reducing costs, deterring and detecting violations and lowering non-tariff barriers for trade.</p>
<p>We welcome the opportunity to partner with the Administration, Congress, and Customs and Border Protection (CBP) to reimagine the process to make trade more fluid and transparent to the right degree and to facilitate legal transactions through legislation that should advance CBP’s 21st Century Customs Framework.</p>
<p>&nbsp;</p>
<a href="https://hls.today/wp-content/uploads/2022/10/HLS.Today-COAC-21st-Century-Customs-Framework-Task-Force-Report_September-V.3-003.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">HLS.Today - COAC 21st Century Customs Framework Task Force Report_September V.3 (003)</a>
<p>&nbsp;</p>
<p>We continue to assert the position that CBP’s draft Challenge Areas summarized in this report and the proposed Cassidy bill omit trade facilitation objectives and are focused predominantly on enforcement enhancements. We support enforcement measures and efforts to identify and curtail bad actors, but believe they should seek to strike a balance with facilitation of legitimate trade.</p>
<p>During the June 2022 meeting, COAC published the 21CCF Report which provided an executive summary, timeline of activities, COAC position and status for each proposed amendment to or enactment of an enforcement statute, and an overview of trade facilitation and modernization opportunities. This report is a continuation of the COAC 21st Century Customs Framework Task Force activities and provides key updates related to the remaining CBP Challenge Areas.</p>
<p>The COAC is seeking to finalize all discussions related to CBP Challenge Areas this quarter in an effort to focus more holistically on the trade facilitation and modernization opportunities that must be advanced as part of this legislation. The broader trade sector will not endorse the modified CBP Challenge Areas if CBP and the Trade are unable to collectively advance facilitative measures. Background: The 21st Century Customs Framework (21CCF) is CBP’s comprehensive trade modernization effort comprising policy, regulatory, and statutory reform that seeks to address modern trade challenges, leverage emerging opportunities, and achieve transformational long-term change.</p>
<p>As part of this initiative, CBP has developed draft legislative concepts that the agency believes are designed to remove modernization barriers, eliminate outdated requirements, and provide sufficient legal flexibility to implement the 21CCF modernization vision over time.</p>
<p>The legislative concepts are intended to address five CBP Challenge Areas:</p>
<p>Challenge</p>
<p>1: Limited Data Collection (previously Enhanced Facilitation) Challenge</p>
<p>2: Restricted Data Usage (previously Seamless Data Sharing) Challenge</p>
<p>3: Narrow Visibility and Accountability (previously Increased Visibility &amp; Accountability) Challenge</p>
<p>4: Untimely &amp; Ineffective Enforcement (previously Timely and Effective Enforcement) Challenge</p>
<p>5: Insufficient Funding (previously Secure Funding)</p>
<p><strong>About COAC</strong><br />
The COAC shall advise the Secretaries of the Department of the Treasury (Treasury) and the Department of Homeland Security (DHS) on the commercial operations of U.S. Customs and Border Protection (CBP) and related Treasury and DHS functions. In accordance with section 109 of the Trade Facilitation and Trade Enforcement Act of 2015, the COAC shall:</p>
<ul>
<li>Advise the Secretaries of the Treasury and DHS on all matters involving the commercial operations of CBP, including advising with respect to significant changes that are proposed with respect to regulations, policies, or practices of CBP;</li>
<li>Provide recommendations to the Secretaries of the Treasury and DHS on improvements to the commercial operations of CBP;</li>
<li>Collaborate in developing the agenda for COAC meetings; and</li>
<li>Perform such other functions relating to the commercial operations of CBP as prescribed by law or as the Secretaries of the Treasury and DHS jointly direct.</li>
</ul>
<p>&nbsp;</p>
<p>HLS.Today Source: <a href="https://www.cbp.gov/" target="_blank" rel="noopener">CBP.GOV</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>UNCCT UNIDIR &#8211; Preventing Terrorists from Acquiring Weapons</title>
		<link>https://hls.today/white-papers/uncct-unidir-preventing-terrorists-from-acquiring-weapons/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Thu, 22 Sep 2022 09:17:44 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=3045</guid>

					<description><![CDATA[Technical Guidelines to Facilitate the Implementation of Security Council Resolution 2370 (2017) and Related International Standards and Good Practices on Preventing Terrorists from Acquiring Weapons &#8211; CTED, UNOCT and UNIDIR &#8211; March 2022 &#160; Terrorist acquisition of different types of weapons, including Small Arms and Light Weapons (SALW), their corresponding ammunition, improvised explosive device (IED) [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="row">
<div class="col-6 col-lg-9 custom-mb">
<div class="author-details">
<p><strong><span style="color: #000000;">Technical Guidelines to Facilitate the Implementation of Security Council Resolution 2370 (2017) and Related International Standards and Good Practices on Preventing Terrorists from Acquiring Weapons &#8211; </span></strong><span style="color: #000000;">CTED, UNOCT and UNIDIR &#8211; March 2022</span></p>
<a href="https://hls.today/wp-content/uploads/2022/09/UNCCT-Preventing-Terrorists-from-Acquiring-Weapons-Technical-guidelines-2370.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">UNCCT - Preventing Terrorists from Acquiring Weapons - Technical guidelines 2370</a>
</div>
</div>
</div>
<div class="publication-article">
<p>&nbsp;</p>
<p><span style="color: #000000;">Terrorist acquisition of different types of weapons, including Small Arms and Light Weapons (SALW), their corresponding ammunition, improvised explosive device (IED) components, and unmanned aerial systems (UAS) and components, poses a global threat to international peace and security. Preventing such acquisitions by terrorists presents States and the international community as well as communities of practitioners with a set of complex and multifaceted challenges.</span></p>
<p><span style="color: #000000;">In March 2022, the UN Counter-Terrorism Committee Executive Directorate (CTED), United Nations Counter-Terrorism Centre (UNCCT) of the UN Office of Counter-Terrorism (UNOCT) and UNIDIR launched the “Technical guidelines to facilitate the implementation of Security Council resolution 2370 (2017) and related international standards and good practices on preventing terrorists from acquiring weapons”. The technical guidelines have been developed under a joint project implemented by CTED, working on behalf of the UN Global Counter-Terrorism Coordination Compact Working Group on Border Management and Law Enforcement relating to Counter-Terrorism, funded by UNCCT and co-implemented by UNCCT and UNIDIR.</span></p>
<p><span style="color: #000000;">With the adoption by the Security Council of its resolution 2370 (2017), the Council reaffirmed its previous decision in resolution 1373 (2001) that all States should refrain from providing any form of support to those involved in terrorist acts, including by eliminating the supply of weapons – including SALW, military equipment, UAS and their components, and IED components – to those involved in terrorist acts. The Security Council urged Member States to act cooperatively to prevent terrorists from acquiring weapons and called upon them to become party to related international and regional instruments. Resolution 2370 is the first Security Council resolution specifically dedicated to preventing terrorists from acquiring weapons.</span></p>
<p><span style="color: #000000;">The technical guidelines have been developed as part of a broader project that seeks to facilitate and support the implementation of resolution 2370 (2017), relevant subsequent resolutions, good practices, and international standards. The technical guidelines aim at contributing to the enhancement of Member States’ legislative, strategic, and operational capacities to prevent, detect and counter the acquisition, illicit trafficking and use of different weapons, systems, and components.</span></p>
<p><span style="color: #000000;">These technical guidelines are non-binding and should be considered living working reference document. They are also expected to form a basis for dialogue at different levels, including among regional and national stakeholders in their efforts to assess, develop, review, and refine regional and national measures to prevent terrorist acquisition of weapons. Following roll-out, application and use, the document will be subject to modifications, revisions, and updates, based on feedback received from States and the technical communities of practice.</span></p>
<p><span style="color: #000000;">Support from UNIDIR’s core funders provides the foundation for all of the Institute’s activities. UNIDIR’s work in this area has been supported by the Government of Germany.</span></p>
<p><span style="color: #000000;">Source: <a style="color: #000000;" href="https://unidir.org/" target="_blank" rel="noopener">UNIDIR</a></span></p>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Lecture: Drones and the Future of CBRN Threats</title>
		<link>https://hls.today/white-papers/lecture-drones-and-the-future-of-cbrn-threats/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Mon, 05 Sep 2022 10:37:19 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2572</guid>

					<description><![CDATA[Drones and the Future of Chemical, Biological, Radiological, and Nuclear (CBRN) Threats April 1, 2021 &#8211; Center for Security Policy Studies &#8211; Schar School of Policy and &#124;Government at George Mason University. &#160; Good afternoon everyone. I&#8217;m pleased to welcome you to this exciting event at the Center for Security Policy Studies at George Mason [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Drones and the Future of Chemical, Biological, Radiological, and Nuclear (CBRN) Threats</strong></p>
<p>April 1, 2021 &#8211; Center for Security Policy Studies &#8211; <strong>Schar</strong> School of Policy and |Government at George Mason University.</p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Good afternoon everyone. I&#8217;m pleased to welcome you to this exciting event at the Center for Security Policy Studies at George Mason University.</span></p>
<p><span style="font-weight: 400;">CSPS is one of several research centers at the Schar School of Policy and Government that examine diverse aspects of the security agenda, and this is why our security programs are highly ranked and drawing students from all over the country and from abroad.</span></p>
<p><span style="font-weight: 400;">The Center for Security Policy Studies organizes and hosts events as well as student-led activities such as crisis simulations. Our next simulation is going to be in late April, by the way.</span></p>
<p><span style="font-weight: 400;">Today&#8217;s topic addresses an emerging issue in National Security Policy deliberations. How could advances in drone technology further complicate defenses against chemical, biological, radiological, and nuclear attacks?</span></p>
<p><span style="font-weight: 400;">We have a great panel to explore these issues. I&#8217;m happy to pass the virtual mic to Ellen Laipson, who directs the Center for Security Policy Studies, and she&#8217;s going to moderate today&#8217;s discussion and also introduce our speakers. Ellen.</span></p>
<p><span style="font-weight: 400;">Thank you so much Dean Rozell and welcome to everyone on this topic that I think has garnered a lot of interest. We&#8217;ve all watched the emergence of drones as almost ubiquitous technology from Amazon delivering packages, etc, but the military and security applications of drones really do require a lot of serious study in consideration.</span></p>
<p><span style="font-weight: 400;">Today, we&#8217;re going to be looking at drones and the CBRN cluster of challenges, both who&#8217;s using them and how might they use them in an offensive way, but in particular as well what are possible defenses.</span></p>
<p><span style="font-weight: 400;">How is the US government and the US policy thinking world thinking through the challenges and the dilemmas of drones that could further complicate how we protect ourselves against chem, bio, radiological, and nuclear threats. Today we&#8217;re going to have three wonderful speakers.</span></p>
<p><span style="font-weight: 400;">Each will speak for 10 plus, 10-12 minutes, and then we&#8217;ll open to a discussion among the three of them. We&#8217;ll see if they want to challenge each other a little bit, and then we&#8217;ll open it to our audience for some questions and comments.</span></p>
<p><span style="font-weight: 400;">I would ask you to please put any question or comment that you want raised in the Q&amp;A box at the bottom of the screen. First, let me quickly introduce myself. We have longer bios available to you online, but I&#8217;m delighted to welcome my colleague, Greg Koblentz, Associate Professor and Director of the Biodefense program at George Mason.</span></p>
<p><span style="font-weight: 400;">He has been working on nuclear and biological threats and runs, as I said, our Biodefense program. Professor Koblentz will speak first. We&#8217;ll then turn to Zach Kallenborn, who was now affiliated with our Center for Security Policy Studies, and he&#8217;s also a research affiliate with the unconventional weapons and technology division of the group that studies terrorism at the University of Maryland.</span></p>
<p><span style="font-weight: 400;">The US Army has proclaimed him a mad scientist, which we are quite intrigued by. Zach will talk about his work on drone swarms and other clusters of issues related to drones. We&#8217;re really delighted to have Nicole Thomas join us.</span></p>
<p><span style="font-weight: 400;">She is the Deputy Chief for strategy and policy at the Joint Counter-Small Unmanned Aircraft Systems Office in the Department of Defense. She graduated from the Army War College, and she will give us perhaps a broader perspective on how some of these issues fit into the work that her office does on Small Unmanned Aircraft. Greg, I think you&#8217;re up first, so we&#8217;ll look forward to your remarks. Great.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Thank you, Ellen. </span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Really glad to be here with everybody today. Nice to see so many people have tuned in despite the really nice weather and the temptation to both side and enjoy that. So I&#8217;ll try to make it worth your while. I&#8217;m going to be talking about drone and the future of CBRN terrorism, and this is not actually a new topic.</span></p>
<p><span style="font-weight: 400;">In 2016, at a nuclear security summit, 50 world leaders gathered and conducted a crisis simulation involving a radiological terrorist attack conducted by a drone.</span></p>
<p><span style="font-weight: 400;">Even though this was a fictional scenario, it embodied facts and technologies that are very much</span></p>
<p><span style="font-weight: 400;">a reality now and have implications for the ability of terrorist groups to use chemical, biological, radiological, and nuclear weapons. This threat is enabled by the fact that drones are now maybe not quite ubiquitous, but they are multiplying evermore quickly in terms of both numbers and capabilities and applications throughout the civilian sector.</span></p>
<p><span style="font-weight: 400;">The market now for drones globally has an expected count of $30 billion in about four years or so, and so we can expect this trend to continue if not accelerating.</span></p>
<p><span style="font-weight: 400;">The drones that have emerged, the ones that I&#8217;ll be talking about, have applications in the areas of consumer and commercial imagery, cargo delivery, and in agriculture. The risks that we have to worry about is the fact that these commercial off-the-shelf systems with little to no modification can be used to provide unprecedented means for non-state actors to gather intelligence and attack targets that could release chemical, biological, radiological materials in unconventional ways.</span></p>
<p><span style="font-weight: 400;">Today, I&#8217;m going to briefly discuss three ways that drones can enable CBRN terrorism.</span></p>
<p><span style="font-weight: 400;">The first is the role of drones to conduct intelligence, surveillance, and reconnaissance on potential targets.</span></p>
<p><span style="font-weight: 400;">Next, the role of drones as basically flying IEDs when equipped with explosive weapons to attack critical infrastructure targets that contain large quantities of chemical, biological, radiological materials.</span></p>
<p><span style="font-weight: 400;">Then finally, the risk posed by drones serving as delivery systems directly use chemical, biological, radiological, or nuclear weapons against the target. I will just note that this talk is based on an article that came out last summer that in itself is based on a talk I gave to the UN Security Council in 2016 on the threats of emerging technologies and the impact on the ability of non-state actors to acquire and use weapons of mass destruction.</span></p>
<p><span style="font-weight: 400;">So first looking at the role of intelligence, surveillance, and reconnaissance, there&#8217;s already quite a record of terrorist groups and certain groups using drones to gather intelligence on high-security areas, and one of the real damages that the drone bring to this is their ability to circumvent ground-based defenses that are the primary means of security for these types of facilities and their ability to loiter over long periods of time over such targets together, high-quality intelligence.</span></p>
<p><span style="font-weight: 400;">Traditionally, this has been done using visual imagery in cameras, but there are now more advanced drones that are available commercially that have thermal imaging, and infrared capabilities so they can operate at night as well.</span></p>
<p><span style="font-weight: 400;">This kind of intelligence gathering can provide really useful insight into not just the layout of a facility internally, but also the practices and capabilities of any security forces that are operating at the facility.</span></p>
<p><span style="font-weight: 400;">We know of at least five terrorist groups, including Hamas, Hezbollah, Islamic State, the Taliban, </span><span style="font-weight: 400;">and HTS that have used drones for this purpose. In fact, they make this part of the propaganda as you can see here from the imagery that the Islamic State and Hezbollah have released to demonstrate their ability to gather information and otherwise inaccessible targets.</span></p>
<p><span style="font-weight: 400;">We&#8217;ve also seen several cases of unidentified operators using drones to penetrate secure, restricted areas over securing sensitive sites.</span></p>
<p><span style="font-weight: 400;">For example, there were a series of cases both in the United States and France of unidentified drones in very close proximity to nuclear power plants for unknown reasons. In 2016, an unidentified drone flew over the Bangor naval base, which is home to eight of the United States&#8217; tried and ballistic missile submarines as well as over 1,300 nuclear warheads, which is the largest nuclear weapon stockpile in the United States. Since these sites are surrounded by fences and gates and guard and patrols, the ability of these drones to fly over all of those security precautions provided a unique means for whoever is operating these drones to gather information about the internal web of these facilities, the configuration, and the security practices inside.</span></p>
<p><span style="font-weight: 400;">Another application of these drones, and this is a newer trend but one that has been widely copied, is weaponizing drones, either weaponizing commercially available off-the-shelf drones or groups building their own to either use in a kamikaze tactic or dropping small munitions on a target.</span></p>
<p><span style="font-weight: 400;">We&#8217;ve seen groups including Hezbollah, Hamas, the Islamic State, Palestinian Islamic Jihad developed these types of drone-based weapons to attack their targets. One of the major disadvantages of using a drone in this way is the relatively small payload that the drone can carry. Drones that are commonly available for consumer use have a payload of only a few kilograms.</span></p>
<p><span style="font-weight: 400;">There are more commercial, professional way drones that have a payload and maybe a dozen of have kilograms, but there are models that are being developed that carry even heavier payloads. However, these drones do the advantage of being able to be turned into precision-guided munitions basically based on either the onboard camera that can be used to target a drone directly onto a specific endpoint or the use of precision guidance through GPS that can allow the drone to attack a target in a very specific location.</span></p>
<p><span style="font-weight: 400;">In addition, again, the drone has the somewhat unique ability to circumvent ground-based defenses and then attack specific targets inside of a secure compound, and vulnerability of otherwise secure facilities to this kind of tactic was revealed in 2015 when a drone accidentally crashed on the grounds of the White House. But that was just an illustration of the ability of these kinds of vehicles to enter otherwise restricted, heavily-controlled areas.</span></p>
<p><span style="font-weight: 400;">Now there&#8217;s a way for terrorist groups to compensate for the small payload on these drones, and the example you see here on the right of an ISIS drone equipped with a high explosive anti-tank grenade, which is designed to punch through the heavy armor of a tank. This kind of shape charge or explosive-formed projectile is relatively small and it can be carried by relatively small drones, and that does provide enough firepower to punch through a storage tank that contains toxic industrial chemicals.</span></p>
<p><span style="font-weight: 400;">Using just one drone in this way, they&#8217;ll probably won&#8217;t be sufficient to cause a disruption of a site that stores toxic industrial chemicals or a nuclear power plant, spent fuel ponds or highlight containment facilities, because these sites are designed to withstand natural events such as tornadoes, hurricanes and earthquakes, and they tend to have redundant safety systems to prevent a catastrophic release of a dangerous material in the event of some kind of accident or for security breach. In addition, being able to use these drones to release large quantities of a hazardous material,</span></p>
<p><span style="font-weight: 400;">would probably also require fairly detailed understanding about the operations of the facility and its weak points.</span></p>
<p><span style="font-weight: 400;">That being said, the possibility of using swarms of drones to attack multiple sensitive points in a facility simultaneously, it does create a considerable risk that a group would be able to neutralize or circumvent or mitigate some of the backup systems that are at these facilities and would normally prevent that kind of release of a dangerous material. Finally, commercial off-the-shelf drones could one day serve as a poor man&#8217;s cruise missile to deliver a weapon of mass destruction.</span></p>
<p><span style="font-weight: 400;">Nuclear weapons will remain too large and bulky for delivery by any of the kinds of drones that the non-state actor could either build or buy themselves. But some of the other CBR agents are more suitable for delivery by drones. Probably the most suitable would be the delivery of chemical and biological agents because it requires a very small payload to have a very large effect. The low-speed, low altitude flight profile of these drones is very well suited for disseminating chemical and biological agents on top of a target.</span></p>
<p><span style="font-weight: 400;">There are actual drones that are already equipped to spray pesticides on fields, and these are becoming increasingly common, increasingly capable. They are even designed online to build your own sprayer drone for just a few thousand dollars. These commercially available drones can carry upwards of 20 or 30 liters of pesticides or of saron. It&#8217;s worth remembering that the oceanhackweek group use only 6-7 liters of Saron to kill 11 people and injure over 1000 commuters on the Tokyo subway system in March 1995.</span></p>
<p><span style="font-weight: 400;">Even a small quantity of a potent nerve agent can cause really massive casualties if delivered effectively. There also, the potential for delivery of biological agents by amenorrhea vehicles.</span></p>
<p><span style="font-weight: 400;">However, dissemination mechanisms for biological agents are different than for chemical agents. You&#8217;d need a more specialized dissemination device. Those are commercially available, but they wouldn&#8217;t be integrated into the drone to turn the drone into a flying biological weapon, which would be more challenging. However, biological agents that don&#8217;t require a crystallization for dissemination, such as certain animal and plant pathogens could be more easily delivered by a drone. In fact, we have a case from just about a year and a half ago in China where there were reports of gangs using drones to deliver material infected with African swine fever onto pig farms in China.</span></p>
<p><span style="font-weight: 400;">This was not terrorism, this was not bio-terrorism, but this was a bio crime because these gangs would then buy the contaminated pigs from these farmers at a very cheap rate. But then go on to the black market and resell it at a higher rate as healthy meat. This was a bio crime episode, but it does demonstrate the unfortunate creativity of non-state actors to use drones for these different purposes. It&#8217;s worth noting that African swine fever is considered a select agent in the United States, because that disease does not occur naturally in the United States, and any outbreak of African swine fever would have catastrophic consequences for our pork industry in the US.</span></p>
<p><span style="font-weight: 400;">Finally, there is one known case of a radio-logical incident involving a drone. This occurred in 2015 when a anti-nuclear activist fluid drone containing a small amount of slightly radioactive soil under the roof of the Japanese Prime Minister&#8217;s office in Tokyo. Even though this was a wanted to be a harmless political gesture, it very radically demonstrated the vulnerability of even highly secure buildings and compounds to these kinds of aerial assault from above. It also highlighted the diversity of payloads that these kinds of drones can carry and especially as more capable drones for cargo delivery, such as it has been developed by Amazon and DHL, become more widely available that payload limitation will become less and less important.</span></p>
<p><span style="font-weight: 400;">At that point, really it&#8217;s only the ingenuity of the non-state actor that will limit the application of the drone for enabling or facilitating a CBRN terrorist attack.</span></p>
<p><span style="font-weight: 400;">The final point I want to make is that there are also ways that drones can be used to improve our defenses against chemical, biological, radio-logical, and nuclear weapons. There&#8217;s some definite need for investment in technologies that will enable unmanned ground vehicles to play a role in either preventing or defending against or responding to a CBRN attack. I&#8217;ve just highlighted a couple of examples here on the slides. Really the most useful short-term application will be using aerial and ground vehicles for detection of chemical, biological, and radio-logical agents. Since most of the detectors that we have available require to be in close proximity to the agent that they&#8217;re protecting, it makes a lot of sense to mount these on drones and find these and potentially contaminated areas as a way of reducing the risk to humans from doing that kind of operation.</span></p>
<p><span style="font-weight: 400;">Then with the ability for these vehicles to the load or be persistent, it will enable them to map contaminated areas, to conduct monitoring of the spread of contamination and then track plumes that might be spreading downwind and feed that information back to first responders or military in order for them to take defensive measures or to warn civilians in the area about how the risk from this incident is changing. The EU, for example, has developed a suite of vehicles that are designed for conducting friends at work after CBRN incident, where they can go downrange of a CBRN incident from either terrorists or criminal, intend to gather evidence and bring it back for analysis safely without endangering human health.</span></p>
<p><span style="font-weight: 400;">There are a lot of opportunities here, I think, in the future for investments in science technology to leverage the capabilities that are offered by many oracle vehicles to enhance our defenses against drones. Hopefully we&#8217;ll hear a little bit about that from our future speakers.</span></p>
<p><span style="font-weight: 400;">That&#8217;s it. I will stop sharing my screen and turn things over to Zach as the next speaker. Thanks, Greg. That was quite excellent. The Zoom thing is blocking the PowerPoint ribbon. Here we go. Thank you very much for attending. I&#8217;ll just give a quick DC disclaimer that, of course, these are all my own thoughts and don&#8217;t represent any of my current or former employers, funders, affiliates, or anyone else, just my own views. I&#8217;m going to be building a bit on Greg&#8217;s comments by focusing on specifically the application of drone swarms and what they mean for a CBRN warfare.</span></p>
<p><span style="font-weight: 400;">By drone swarms, I&#8217;m specifically referring to the ability of multiple drones to work together and collaborate to accomplish some shared task. I realized that when I bring up drone swarms, I think there&#8217;s often a sense of, oh, this is science fiction. This is the type of thing we see in the Star Trek Beyond movie, whereas there&#8217;s a huge storm and robots that overwhelm and attack the Star Trek Enterprise and destroy everything. Like that&#8217;s what we expect to see, that capability. That&#8217;s for not all that long ago. I thought that was pretty much the same thing, I didn&#8217;t really think too much about it.</span></p>
<p><span style="font-weight: 400;">But the reality is that drone swarms are already here. What&#8217;s more, they&#8217;re likely to proliferate incredibly fast. In 2016, US Strategic Capabilities Office launched 103 products drones. Those are the little orange ones you can see at the top right there. Out of three FAT and super hornets, these drones all collaborated together autonomously. They work together, they form into some various formations, as you can see, like in the bottom left. They moved across a theoretical battlefield and then formed in some other information. They were doing all of this through a collective collaborative operation, information sharing entirely autonomously. Now, what&#8217;s even more important than the fact that there was a test and that&#8217;s what was five years ago,</span></p>
<p><span style="font-weight: 400;">is who actually designed the system. This product&#8217;s drone was not created from a skunkworks tight multi-million dollar R&amp;D project where there were Boeing type things where you&#8217;re designing the next F36 or F23 or whatever. Rather, these systems were actually designed by students at MIT as part of the class project. Now, those are probably some of the smartest students in the world, but they are nonetheless students. It shows that you don&#8217;t necessarily need that level of sophistication and capability to design some very sophisticated systems to actually carry out these attacks. What that suggests is that the likelihood of proliferation is quite high because you don&#8217;t need that level of expertise.</span></p>
<p><span style="font-weight: 400;">Just in the past, like six months to a year or so, there&#8217;s been reports and announcements of new drone swarm related projects from the United States, United Kingdom, India, China, Spain, South Africa. I think France announced a new one. That&#8217;s a very short amount of time. Now, most of these are not for CBRN purposes. In fact, they&#8217;re not aware of any that are specific to CBRN. But nonetheless, you can see that the basic technology here is quite simple. There&#8217;s likely to be quite a lot of movement in a very short amount of time. I&#8217;ll not just to connect a bit too, one of Greg&#8217;s comments about non-state actors is that I think there is a very real risk when it comes to non-state actors. I&#8217;m not sure how much worry that is a short-term because even though these are simple, like they&#8217;re from an attack perspective. There&#8217;s quite a lot of integration that you need to do.</span></p>
<p><span style="font-weight: 400;">I suspect it&#8217;s probably going to mostly remain in the domain of higher levels, like the Aum Shinrikyo type thing. it&#8217;s possible you may have like a one-off small actor, but it seems at least at the moment, not as likely, but certainly is likely to grow over the feature just given this level of simplicity. Drone swarms have applications really across all aspects of warfare. I think that&#8217;s why you see this incredible proliferation. Drone swarms can be useful for logistics in terms like bringing supplies to folks out in the battlefield, can be useful for mounting bombs or guns onto to carry out attacks. There&#8217;s been some work on using basically swarms as smart munitions to serve like a missile warhead that releases like 48 or some odd drones that all work together.</span></p>
<p><span style="font-weight: 400;">Of course, there&#8217;s also extensive applications across all aspects of offensive and defensive chemical, biological, radiological, and nuclear warfare, which is of course what I&#8217;ll be focusing on today. I think I&#8217;m going to be breaking it up a little bit. I&#8217;m first going to be talking a bit about the chem, bio and radiological side and then about the nuclear I think there are distinct insignificant applications. At the moment, I&#8217;m going to be drawing some broader conclusions about what is likely to mean like on balance for broader CBRN warfare. Because there&#8217;s so many applications, I think it&#8217;s probably more important just to explore and think more carefully about where these applications are and how they mesh up. Because often I think imagination is a declaredly important aspect into how these stack up. For example, during World War II. Both France and Germany realized the importance of a tank for militaries, but France used it primarily as an adjunct to light infantry, whereas Germany designed their entire blitzkrieg strategy around it to significant effect.</span></p>
<p><span style="font-weight: 400;">The importance of that means that these drone swarms may be applicable in all sorts of ways that we&#8217;re not even really considering at the moment. There&#8217;s, I think, an important need to explore and think carefully about what this all means. Let&#8217;s dive into specifics. I think when it comes to chemical, biological, and radiological weapons, I think, again, you have applications for both offense and defense, but to me, I think that particularly impactful applications are around delivery systems for chem, biologic and radiological weapons. Historically, we know that a huge challenge with these weapons is environmental factors, where a bad wind might blow gas or cloud of sand into a bad area.</span></p>
<p><span style="font-weight: 400;">We know that historically, for example, from the decision to, actually it was in the 1960s or so the US tested, I believe it was sarin gas in the Dugway Proving Grounds in Utah. It was like a nice little controlled area where you don&#8217;t have anyone at risk but a bad wind ended up blowing the cloud into a nearby farm killing a whole bunch of sheep. Got a bunch of media attention in 60 minutes and it excited the passions of Congress folks who then helped launch a broader review of the chemical and biological weapons programs. The time leading to a biological program, even though ironically it was a chemical weapon that started. The point being here is that because these environmental factors are so big, that creates big challenges in terms of the reliability of these weapons. Which means if you can improve that, that can be quite significant, and drone swarms, I think, are likely to do that.</span></p>
<p><span style="font-weight: 400;">Because we&#8217;ve talked about a drone swarm, you can potentially integrate multiple different types of sensors, weapons, and other types of capabilities and have them all interact in and support one another. You could, for example, have a variety of environmental sensors that are monitoring wind conditions and then feeding that information to drones armed with CBRN agents to better tailor and position that they&#8217;re targeting. Alternatively, you can incorporate aspects of the same machine vision to better recognize more precisely where the target is and have a higher likelihood of placing the agent on a particular target. Now, that&#8217;s a really big issue because if we think, just think about the broader proliferation norms, those risks to civilians and the lack of ability is a big aspect of why we don&#8217;t use these weapons anymore. If you can improve that and that would just reduce, that potentially creates a real concern, especially at the same time where we&#8217;re seeing broader concerns over chemical norms, particularly around some of these open-source reporting about Russia and use of Nova chalk agents in various assassination programs at Balin recently released.</span></p>
<p><span style="font-weight: 400;">I think more than just improving that delivery, there&#8217;s all sorts of interesting and complex things that militaries can do if you have this mixed complexity where you have different types of sensors, different types of armaments. For example, what if you had a mixed chemical and conventional armed swarm in which the military says, sprays a bunch of chemical agents on an adversary to force them until the really restrictive protective gear slows their movement and makes it hard to respond. Then they follow up with a bunch of drones that are armed with, say, bombs and guns and then just kill them and destroy them. Or vice versa, start out with a bunch of guns and bombs to focus their attention, and so then they don&#8217;t pay attention to the chemicals being sprayed in the air around them that might create significant harm. I think it&#8217;s a very real concern there on the delivery system aspect.</span></p>
<p><span style="font-weight: 400;">I think there are also defensive aspects and Greg Kidd on I think both of the ones I was planning on doing around forensics and plume modeling, as well as some of the cleanup aspects. I think drone swarms escalate that capability even further. Because what you get with drone swarms is that mass aspect and coordination aspect where you have multiple drones working together to coordinate around behaviors. Rather than having, say, a single drone that&#8217;s searching an area, looking for signs of some chemical agent, you get a whole bunch of them that are all operating together.</span></p>
<p><span style="font-weight: 400;">You maybe have some ground drones that are working with aerial drones, and they&#8217;re communicating and collaborating and breaking out how exactly they are searching over a particular area of concern or monitoring for these plumes or getting, say, different angles around different data on that plume to get more precise modeling of where that spread is. That may even be integrated with say, live sensors about the population in the likely direction of where that plume is headed. Hey, is there some big group of people hanging out very clearly downwind?</span></p>
<p><span style="font-weight: 400;">I think there&#8217;s some very real applications that could be really interesting there to explore. On the nuclear side, I think again, there are applications for both offense and defense. I think on this side, I think the more significant aspect is on the defensive side.</span></p>
<p><span style="font-weight: 400;">Just follow the same order, we&#8217;ll start with offense again. I think offense is relatively limited here in drone swarms. It&#8217;s more of how technology may enable existing technologies, so you can imagine how collaboration, communication might be helpful for say, like cruise missiles or other types of missiles to slightly change their targeting depending on how they change it, where they&#8217;re heading towards a target. Already there&#8217;s been some work around communication between just regular types of bombs. It just better improved their targeting.</span></p>
<p><span style="font-weight: 400;">I&#8217;m a little bit skeptical about how significant that&#8217;ll be for nuclear weapons, just given the sheer size. Does it seem as important to have some of that communication collaboration? But I think there&#8217;s at least potential there. But I think again, like where there&#8217;s likely to be more significant aspects around the defensive challenge, particularly in identifying, targeting, and destroying some of these mobile delivery systems. Think about it from a broader nuclear deterrence perspective. It&#8217;s really important for states to have second strike deterrence where they can be assured that a single attack will destroy their entire nuclear forces. We have a summary and hide in the vastness of the ocean.</span></p>
<p><span style="font-weight: 400;">We believe that now even in the event of a major nuclear attack, there&#8217;ll be survivable, so if you can better identify and target those systems that tends to be quite significant. What you can imagine with drone swarms is how you might use that same collaboration, wide-spread area searches to try to search for some of these vehicles, either on land or even at sea, developing and there&#8217;s quite a lot of work going on building undersea drone networks as well and undersea vehicles. Where they may say search the ocean, looking for signatures or submarines.</span></p>
<p><span style="font-weight: 400;">Now I think realistically, given the vastness of the ocean, there&#8217;s going to be a lot of major logistics challenges that only have to be coupled extensively with intelligence, knowledge of adversary behaviors, doctrine, and very targeted to say, focus your search areas around known nuclear or submarine ports and stuff like that, rather than just searching the vastness of the ocean. But I think the potential for identifying these systems is very real.</span></p>
<p><span style="font-weight: 400;">There was a really fascinating international security article the other day that looked at submarine warfare. It touched on it. The main topic was something slightly different, but it was talking extensively about undersea competition and nuclear warfare during the Cold War and they found that based on historical records during, I think it was the &#8217;60s and &#8217;70s, the United States had such an understanding of Soviet nuclear submarine forces that they actually at the time believed they could actually take out all Soviet nuclear capabilities in a single strike because of particular aspects of how the Soviet forces were maneuvering their submarines, where it ended up being somewhat predictable, particularly when coupled with various sensor systems that were placed in various aspects of the ocean.</span></p>
<p><span style="font-weight: 400;">It&#8217;s certainly possible to imagine that enhancing that capability, having these broad sensor networks will get that same capability, identify and find some of these nuclear systems in conjunction with intelligence and doctrine and all these other aspects of it, are important too. Given all this application, what do we do about that? I think there&#8217;s a few things important to hit on. First, I think perhaps most importantly is red teaming and assessing adversary tactics and strategies. Thinking imaginatively about how states and non-state actors work as well, but again, I think that&#8217;s less of a risk.</span></p>
<p><span style="font-weight: 400;">But how might folks employ these in novel ways and how might these different ideas stack up. How big of a deal is it if you have some of these big networks of drone searching across the ocean or how big of a deal is it if you have these mixed chemical and biological delivery systems and we need to explore and figure out which of these are nice to think about, but may not really be that big of a deal, and which of these like, we need to really worry about these defensive measures. I think there&#8217;s a need to think about how we defend some of these nuclear delivery systems in new and novel ways. Particularly the role of decoys and disguise, I think are particularly important as we saw </span><span style="font-weight: 400;">in the conflict of Armenia and Azerbaijan. Part of that, what&#8217;s makes these drones significant or that </span><span style="font-weight: 400;">loitering capability where they can just sit and watch for movement of some particular vehicle and just destroy it as needed.</span></p>
<p><span style="font-weight: 400;">Drone in that case, destroyed a whole bunch of tanks and armored personnel characters and all those types of things. One of the answers to that is to better disguise these systems and deploy, as you can see, what looks like just a blow-up model of a little nuclear system there. But exactly what that looks like, I think it&#8217;ll be interesting. I think there&#8217;s probably also need to develop potentially even unmanned versions for some of these systems that may not necessarily be nuclear armed but look like them, because as we improve image recognition and high resolution images, some of these decoys may very well show up as more likely to be decoys. Nonetheless, I think just exploring some of these options is important.</span></p>
<p><span style="font-weight: 400;">Finally, I think this will tailor up nicely to our final presentation report. I think there&#8217;s a need to think about Counter UAS and integrating that within the Counter WMD space. Because if we think about detecting and stopping drone swarms armed with a bunch of chemical, biological, radiological agents, it&#8217;s really not all that different from detecting any type of drone. There may be some slight differences in terms of like, because a chemical drone probably has some big like canister that might be recognized, really much of the challenge is the same.</span></p>
<p><span style="font-weight: 400;">I think there&#8217;s a need to work together with all the different departments working on cUAS as well as interested in the WMD aspect of it, to think about what lessons learned have they found? What types of technology seems to be working better or worse, and how we can go about addressing these strategies. But to sum up, overall, I think there are some extremely broad applications for this technology, and I think this technology is here now, and so there&#8217;s a very real need to think carefully about what this needs and figure out our best solutions to reduce the risk and hopefully develop some better defenses.</span></p>
<p><span style="font-weight: 400;">Thank you.</span></p>
<p><span style="font-weight: 400;">Over to you, Nicole.</span></p>
<p><span style="font-weight: 400;">Great.</span></p>
<p><span style="font-weight: 400;">Thank you.</span></p>
<p><span style="font-weight: 400;">Let me see if I can share my screen here. It says the host has disabled sharing screen. That&#8217;s okay. I only had one slide, it&#8217;s fine. Hello, my name is Nicole Thomas and I am the Division Chief for Strategy and Policy in the Joint Counter UAS Office. Both Greg and Zack talked a lot about CBER and the implications of drones and swarm technology. I&#8217;m going to briefly cover what the Department of Defense&#8217;s approach is to addressing the potential threats and hazards from small UAS in general. We recognize that the threat is quickly evolving. In 2019, the Secretary of Defense designated the army to be the executive agent for Counter-Small UAS. To execute that designation, the Secretary of the Army set up the Joint Counter UAS Office or the JCO, which is where I work.</span></p>
<p><span style="font-weight: 400;">Our role is to synchronize Counter UAS efforts across the DoD. One of the first big things the JCO did was to complete an operational assessment of the equipment we have already fielded. Over the past couple of years, we fielded a lot of systems and this assessment allowed us to step back and pare down our systems to have few interim solutions in different categories like fixed, mobile and command and control. We also developed an operational requirements document that helps us focus our future investment on very specific capabilities.</span></p>
<p><span style="font-weight: 400;">The other big thing that we did in the JCO was to produce the DoD&#8217;s first Counter UAS Strategy, and that&#8217;s what my division was responsible for doing. As we were thinking through how to characterize the problem, we used a few key trends to help frame the central challenge that we felt the department was facing. One, first obviously, is the exponential growth of this sector, the expanding capability of these systems and its affordability are enabling and even more diverse set of actors that had access to the air domain and quite frankly, that&#8217;s something that was previously only for state actors and so now we have a variety of people who can do this.</span></p>
<p><span style="font-weight: 400;">The second is the increasing number of ways in which these systems can be used for nefarious needs as Greg and Zack pointed out. Third is the growing commercial and private use of small UAS, which is driving us to make it increasingly important that we have the capability and the training to detect and identify what&#8217;s flying near and above our operations. If you take a look at the strategy which is posted on the DoD website, we found a couple of things. One, we&#8217;re doing a pretty good job of developing and deploying material and sending it down range in contingency locations when needed. But our desire to be really responsive created a gap in training. One of the things the department tends to do is to synchronize our solutions to ensure that the policies and the training we provide support the material we&#8217;re developing.</span></p>
<p><span style="font-weight: 400;">Second, we realize that the joint force must be more agile in responding to emerging threats. That will require us to look at our processes and find ways to get after those threats faster. Finally, our interagency partners and international allies and partners around the world are our key enablers for the strategy. We dedicate a lot of effort that drives us to improve how we integrate and how we become interoperable with them. In the end, we want to give commanders and the joint force what they need to defend our facilities and personnel admissions. Given the complexity of the problem, we need to pull in a more diverse community to provide their unique perspective on this mission set.</span></p>
<p><span style="font-weight: 400;">Partnering with academia, and research labs and finding new ways to work with industry will be one of the ways we&#8217;ll be able to remain agile and stay ahead of the threat. Thank you. Well, thank you Nicole and we caught up a little bit on time. That was very synchronized and I appreciate it. Sorry, I didn&#8217;t get to share your slide but if you want to pull it up you&#8217;re most welcome.</span></p>
<p><span style="font-weight: 400;">We&#8217;ve got some terrific questions and because I think there&#8217;s just a lot of technical knowledge in this group I&#8217;m going to go directly to the questions and I hope I won&#8217;t garble them because some of them are more technical than I might understand. Let&#8217;s get started. What do you see as the future application of collaborative smart tools like facial recognition to run against a terrorist use of drones. Will this type of collaboration be useful when countering the CBRN deployments because presuming that there has to be proximity to controlling the use of the drones? Anybody want to grab that one? I think the private limited utility for that approach is just because one of the advantages of UAVs is that they can be remotely operated and it depends on the model but the individual, especially the example, the camera they can use for guidance.</span></p>
<p><span style="font-weight: 400;">Could be several miles away as the drone drew lines purely on GPS guidance. They might be completely autonomous and therefore there won&#8217;t be anyone operating them at the time. There might be other counter-terrorism applications for coupling facial recognition and drones but in the CBRN space, I don&#8217;t particularly see it as being a leading defensive measure. Greg, you may have partially answered the next question. How are terrorists controlling the drones? Is there an argument for regular signal disruption to prevent the approach of such drones as part of a perimeter of defense at a nuclear facility? Zack, do you want to come in on that one? Yeah, I can cover a little bit of that. I think there has been a little bit of work on that.</span></p>
<p><span style="font-weight: 400;">There&#8217;s been a big focus on geofencing. Within many of these drones, they had these in-built GPS systems and when they hit a particular sense of location the idea is they stop operating. There has been some work on that for sensitive facilities. However, it also looks like there are already available countermeasures available online and how to get around that. Thanks. We have a question on Iraq and one on Iran. Let me just put them together. Do you think that the militia forces in Iraq, the Shia-backed militias, the Iranian-backed militias are likely to be increasing their use of drones? The US military is developing drone defense measures but they&#8217;ve already started to see any engagement with forces in Iraq and the second question of the report that intercepted communications out of Iran said that there was a drone attack in DC.</span></p>
<p><span style="font-weight: 400;">Does anybody know anything about drones that Iran threatened DC with? Anybody know anything about those? I&#8217;ve not heard anything about that. I&#8217;ll comment on the general Iraq and Iran issue. I believe General McKenzie has commented a few times in the news media about how very concerned he is about drone use against forces. I can&#8217;t remember exactly which I believe was basically we&#8217;re getting straight outgunned. I might be misremembering but that was the basic gist of it. This is a major problem and he was particularly concerned about swarming and multiple drones coming together as a huge problem. But not necessarily with any WMD on it? No, not necessarily. Go ahead Nicole. Nothing.</span></p>
<p><span style="font-weight: 400;">It&#8217;s just I was going to piggyback on what he said. Yes, General McKenzie said that drones are very concerning. The most concerning thing since the IED and that&#8217;s pretty significant. Iran&#8217;s been having a lot of experience with these kinds of tactics by supporting the Hutu rebels and some of the attacks on Saudi Arabia. I would not be surprised if Iran experts on those tactics to the other proxy groups they support in</span></p>
<p><span style="font-weight: 400;">Iraq and Syria and Lebanon and elsewhere. Whatever is demonstrated and proven to be useful in one field of engagement I think we should expect it to pop up in other areas as well. But so far we&#8217;ve seen drones for surveillance purposes. Have we seen them heavily weaponized causing any casualties? In Yemen yes but in Iran or Iraq? I believe so. I&#8217;m not aware of specifics but I know ISIS, for example, used I think, 300 drone operations during the Battle of Mosul and I know at least quite a few of those were directly armed. Nicole. No, I was just going to comment on something Greg said earlier about replicating tactics and the recent conflict between Azerbaijan and Armenia is a good way. People are studying that fight because it had such novel things going on in it. That&#8217;s another example of things that are happening. They&#8217;re going to replicate across.</span></p>
<p><span style="font-weight: 400;">Good.</span></p>
<p><span style="font-weight: 400;">This may be for Nicole and I don&#8217;t know whether you can answer.</span></p>
<p><span style="font-weight: 400;">This is DOD working on a miniature rail gun that can be integrated into a UAV? I personally am not aware of that. It doesn&#8217;t mean it&#8217;s not happening, I just don&#8217;t know about that. Next question is, much of the UAV, UGV technology requires advanced data analytics and real-time processing to be truly effective. The same is true in order to truly defeat them. Could you comment on the critical requirement for application of AI, machine learning, advanced data analytics, and processing to enable timely informed decision making and enhance situational awareness to defeat and defend against these threats?</span></p>
<p><span style="font-weight: 400;">Great.</span></p>
<p><span style="font-weight: 400;">Thank you.</span></p>
<p><span style="font-weight: 400;">Yeah, that&#8217;s definitely important. What we have talked about in my earlier comments was that we have the operational capabilities requirements document which is a mouthful but it basically lays out the things that we need industry to help us build future capability. We&#8217;re looking at AI, automation, machine learning. Those are things that are going to help us get after the threat and close some of those gaps. Great. But one of the things that we&#8217;re doing is we&#8217;re trying to develop a joint common C2 called the jack C2.</span></p>
<p><span style="font-weight: 400;">That&#8217;s going to enable us to pull in that information. As we have AI and automation and machine learning, it&#8217;s going to pull in a lot of data. The common C2 is going to allow us not only to have a better site picture but it&#8217;s going to rationalize all of that data that&#8217;s coming in so that the operator can make better decisions and process that information that&#8217;s coming in and it will actually decrease the burden and stress on the operators. Actually has to make sense of what they&#8217;re saying. From someone at the CBRN academy, what are the required control measures that need to be applied to prevent CBRN drone attacks? Well, I think this is one of the real dilemmas we face because there&#8217;s such a proliferation of drones for civilian and commercial purposes that could be either misused or modified for misuse. That&#8217;s going to be a real challenge.</span></p>
<p><span style="font-weight: 400;">Zach mentioned geo fencing and there might be some other built-in features, but at the end of the day, those will be vulnerable to hacking or otherwise circumventing threats at the low end. Commercially available systems will definitely be harder to counter than some of the more high end threats that Zach was talking about that involve swarms and highly integrated systems. At some point, you have to focus more on the bottleneck which might be the CBR and agents themselves, not the drones as delivery systems.</span></p>
<p><span style="font-weight: 400;">Again, this is just to reinforce Zach&#8217;s point about the need for the counter UAS and the counter WMD communities to work more closely together to figure out where are the right bottlenecks and where are the places we should emphasize joint efforts to try and reduce some of those threats. I think that would be an important area moving forward. Thanks. Will Fed eventually be replaced by drone swarms or possibly used in conjunction? Do you see drone swarms being integrated at that level, Zach? I think there&#8217;s potential to integrate.</span></p>
<p><span style="font-weight: 400;">I would be skeptical about fully replacing it just given the size of the relative missiles. I don&#8217;t know enough about that system to comment for sure. But I think certainly looking at how drones swarms can integrate and support auto missile defense is definitely a good thing to do. I think it would make sense to integrate them if you look into what Russia is doing. They took a lot of lessons from their foreign countries such as Ukraine and Syria and they are integrating drones at every level and across all their services and that&#8217;s something you want to probably consider as well. Interesting. Commercial applications to swarms include displays and alternatives to fireworks, will this accelerate the hostile use of swarms?</span></p>
<p><span style="font-weight: 400;">I don&#8217;t think that probably we won&#8217;t accept the hostile use, but certainly the broader awareness that this technology is out there and could imagine it creating some challenges from responses in terms of like, this person is buying a whole bunch of drones, are they doing it for display purposes or commercial applications? Or is this potentially trying to do something hostile?</span></p>
<p><span style="font-weight: 400;">Thanks.</span></p>
<p><span style="font-weight: 400;">From Larry Pfeiffer, what are the greatest intelligence challenges and gaps that need to be addressed in the counter UAS domain? Is the intel community making this a priority? Yes, actually I co-chair the threat intelligence working group, and one of the things that we&#8217;re doing is we&#8217;re really improving, like I said in my earlier comments, that connective tissue between the intelligence and dread assessments, and the capability that we are developing. So we&#8217;re trying to make better use of that, and actually we&#8217;re doing a TTX further exploration of that.</span></p>
<p><span style="font-weight: 400;">That&#8217;s definitely something that&#8217;s going to be very critical if we&#8217;re going to get after some of these gaps. We also have a process that&#8217;s called the joint counter UAS strategic portfolios review, and that basically takes the threat assessment and looks at studies and analysis, and it looks at what our capability gaps are, and then we decide what we&#8217;re going to resource based on those gaps. Again, the intelligence assessments play a huge role in future capability development.</span></p>
<p><span style="font-weight: 400;">Nicole the next one is for you so keep your mic open if you can. Could you expand on the required training that you brought, who would be trained and what type of training? Can you say more about that? Yes. One of the things that we&#8217;re doing, as I said in my comments, is that we got to pair down those systems to a few, and then the idea is that we&#8217;re going to move into some joint capability. Before there were lots of systems out there and services had very service specific systems. But the training was inconsistent, and so what we&#8217;re doing is we are pairing those systems down, we&#8217;re having joint capability and with that we&#8217;ll have joint training. So we&#8217;re developing online training and they&#8217;re in the testing phase now.</span></p>
<p><span style="font-weight: 400;">We are going to have institutional training, a joint academy, not to address you to call it, but it&#8217;s going to be a way in which all the services will have a common level of training so that you don&#8217;t have that inconsistency. Great. Is there any unclassified information into the UAP reported by the USS Kidd off the coast of California? Anybody heard about that one? Okay, why don&#8217;t we move on. Somebody&#8217;s asking Nicole, could you post the reference to the publicly available document on the strategy. If you want to maybe tell people how to find it on the DoD website, I don&#8217;t know, would someone like to use it?</span></p>
<p><span style="font-weight: 400;">Sure.</span></p>
<p><span style="font-weight: 400;">Absolutely.</span></p>
<p><span style="font-weight: 400;">It&#8217;s on the DoD website and there&#8217;s a list of documents and all the documents that DoD has published for this year or last year are right there.</span></p>
<p><span style="font-weight: 400;">Or if you simply just Google counter UAS DoD strategy it&#8217;ll pop right up. Thanks. In what ways are we preparing for agricultural bio-terrorism? In your opinion, what should be done next?</span></p>
<p><span style="font-weight: 400;">Reduced biodiversity in US agriculture in some large swaths where essentially monoculture is very worrying. Greg, that looks like it&#8217;s up to your ally. Sure. There&#8217;s a longtime concern about our cultural bio-terrorism, but we have actually not seen any groups really interested in pursuing that type of thread. This case I&#8217;m trying to mention is one of the few cases we know of intentional, deliberate attempt to spread an animal pathogen. Unfortunately, our cultural system is very vulnerable in the center, it&#8217;s very open, it&#8217;s very large, it&#8217;s very spread out.</span></p>
<p><span style="font-weight: 400;">The one advantage we have though, is that because the system is so large, any attack will likely have a local impact, but is unlikely to be able to spread to become something that can affect the entire cattle population or the entire weak crop. Just because it is such a large and widely dispersed agricultural system. At this point, the focus is on controlling the pathogens that are of most concern, but the problem as demonstrated by the case in China is that a lot of these diseases that we worry about in the US that don&#8217;t exist naturally here are endemic in other parts of the world.</span></p>
<p><span style="font-weight: 400;">Transporting those types of agents into the US would not be that difficult. Animal plant pathogens are easier to disseminate than ones that are aimed at humans because you don&#8217;t need to actually aerosolized animal and plant pathogens into the very small particle size to infect humans. The key then becomes, if you can prevent a small-scale local attack, the key is early detection, and containment of the disease in that animal population or that plant population.</span></p>
<p><span style="font-weight: 400;">So really the emphasis should be on bio-surveillance by veterinarians and farmers and plant pathologists to make sure that we identify any outbreak early on and respond as quickly as possible to contain and prevent it from spreading. I think at this point that would be the area where I would emphasize more investments in terms of bio-surveillance for both animal and plant disease outbreaks. Somebody is asking if there&#8217;s any database, either academic or official that is tracking drone incidence. Is anybody aware of the publicly available data collection like we have on terrorism incidents? I was going to say yes, but then you said public. No, there&#8217;s no publicly available information that I&#8217;m aware of.</span></p>
<p><span style="font-weight: 400;">Oh, go ahead Please.</span></p>
<p><span style="font-weight: 400;">I think there was one published study that did collect all of them on non-state actor use, but I&#8217;m not aware that it&#8217;s kept alive. Probably there&#8217;s also some under the global terrorism database. I&#8217;m sure they&#8217;re capturing drone incidents but I&#8217;m not aware that they specifically fly like this is a drone versus other type incident. I&#8217;m going to combine two questions.</span></p>
<p><span style="font-weight: 400;">A few years back, there was just a lot of concern about the ethics of the use of drones that changed the nature of warfare with the threat not equally distributed among the adversaries and even the psychological stress on people who were managing drones in the US military. Do any of you work on the human dimension of drone policy and public attitudes towards drones? Maybe this is outside the parameters of today&#8217;s conversation but if anybody has something to add, that would be great. I think there needs to be focus on that. I&#8217;m generally a believer that drone swarms, not necessarily WMD armed but could very well just be a WMD in and of themselves which is a much larger discussion.</span></p>
<p><span style="font-weight: 400;">I think it&#8217;s important to bring up many of these concerns particularly, given these proliferation risks. I think trying to put major treaties and norms in place in a quick way is going to happen and once there&#8217;s pretty broad negative views like, hey, this is something we need to worry about. I think that&#8217;s definitely an important aspect of it. Greg, you mentioned that storage tanks or chemical plants are considered hard targets for attack.</span></p>
<p><span style="font-weight: 400;">How vulnerable to UAS attacks are the rest of the chemical facilities; pipelines, valves, corrugated steel warehouses, etc. Could you speak a little bit more about chemical plants? Sure. Either I misspoke or I miss heard because I don&#8217;t think those storage containers actually are hard targets, especially if you have a malicious actor that has access to shape-charged projectiles or anything that is able to have a piercing capability to it.</span></p>
<p><span style="font-weight: 400;">Those are very large tanks that are usually exposed from above very openly as opposed to there being better defenses on the ground to prevent unauthorized access to a facility. Those would be easier to target than pipelines, other things that are smaller targets. But I think this is an example of an area where chemical security and nucleus security in the US, if they haven&#8217;t grappled with the UAS threat the way that DOD has, then we will have lots of vulnerabilities that people are just not thinking about. This goes back to Zach&#8217;s plan about the importance of right teaming. DHS has chemical facility security standards.</span></p>
<p><span style="font-weight: 400;">I haven&#8217;t tried lately. I don&#8217;t know if they&#8217;ve been updated to deal with possible threats from above as opposed to traditional terrestrial assault. Same thing applies to nuclear power plants that have a design basis threat, last I heard was updated about 10 years ago. It probably does not include groups that have inside knowledge about the facility due to drones or using drones as flying IDEs to disrupt defenses or target backup systems at a noc facility. This is the thing I think that facilities and recommendations to who is in charge of security need to be looking at and thinking about and then figure out how to then increase awareness and update policies, procedures, and defensive measures in order to have a layered defense against this new type of threat that&#8217;s emerging. Thank you. We&#8217;ve really made good progress. We&#8217;ve gone through most of the questions. I thought just in the interest of time, I&#8217;ll throw out one more form and then if any of our speakers want to just make any final point.</span></p>
<p><span style="font-weight: 400;">The last question will be on resources and how the governments get ready from a financial resources and budget perspective to prepare countermeasures. Drones are inexpensive but countermeasures devices are very expensive. For law enforcement and defense, how do you anticipate that drone technology is going to become a more important driver of budget decisions and the competition for resources in both federal and state level budgets? Anybody want to come up? I didn&#8217;t know that drone technology is going to be driving those budget decisions, but definitely the cost curve is upside down. Drones are very inexpensive, countermeasures are incredibly expensive.</span></p>
<p><span style="font-weight: 400;">But we have to have an innovative approach to it. Since we are talking about swarms, I wanted to talk about what the Department of Defense is doing for swarms, and that cut ties into the budget piece. Nowadays the drone defense program is called THOR; is a tactical high-powered microwave operational responder and by the title, it&#8217;s a high-powered microwave. THOR is the perfect example, it encapsulates what the Department of Defense in general approaches for counter UAS. The department had a specific issue and that was a potential for swarms.</span></p>
<p><span style="font-weight: 400;">They needed to get some capability out there quickly and as you know the process for capability to validate from development, to testing to fielding is years and quite frankly, we don&#8217;t have that time. The folks that developed THOR did it in 18 months and that is very fast. They did it fairly inexpensively so it was $15 million. That&#8217;s a way in which we can be innovative and be quick and be relatively inexpensive. THOR does a couple of other things as well. We are putting a few more resources against that program in the next couple of years.</span></p>
<p><span style="font-weight: 400;">One of the things they want to do is create an exportable version of that and that&#8217;s really a big deal. As I said in my earlier statements, that our partners and allies are really key to our security overseas, and they often buy our capability, but there&#8217;s a long lead time to getting it because we have to work through releasability and for making that, I didn&#8217;t know that it&#8217;s exportable. With THOR, they&#8217;re doing that on the front end, so as soon as that is ready, they can go out the door. You don&#8217;t have that long lead time. I think THOR cracks the code on how to do things fast, do things inexpensively and get it up there to the field and it&#8217;s for our allies and partners.</span></p>
<p><span style="font-weight: 400;">Thank you, Nicole. Greg and Zach, any final thoughts and we&#8217;ll wrap up?</span></p>
<p><span style="font-weight: 400;">I was going to add to Nicole&#8217;s comment from a homelands perspective. I think there&#8217;s also a need to rethink some particular authorities and how we address counter UAS. Particularly where at the moment, only a handful of federal authorities are allowed to operate counter UAS systems but many of these threats are to private sector facilities. I think there&#8217;s a need to think about how you balance that. Personally, the one that I like to put out is tele-operated drone systems; counter-drone systems operated by federal authorities that are then disbursed to various facilities. But even if that&#8217;s not the best approach, that&#8217;s definitely a key issue. I think that needs to be addressed to reduce the threat.</span></p>
<p><span style="font-weight: 400;">Thanks.</span></p>
<p><span style="font-weight: 400;">Greg?</span></p>
<p><span style="font-weight: 400;">I just want to highlight that this is just another one of these areas where you have emerging technologies, national security, homeland security, and public policy all intersecting and in a really interesting way. It&#8217;s nice to hear what DOD is doing on the threat but unfortunately, Zach and I have highlighted the way that threat keeps evolving and emerging. I think this is a dynamic threat and we&#8217;re going to need a dynamic process to keep evaluating it and trying to develop countermeasures to stay ahead of it. I think this is just going to be an enduring challenge we&#8217;re just going to have to be grappling with for several years. Thank you, Greg. A very perfect way to end.</span></p>
<p><span style="font-weight: 400;">Greatest thanks to Nicole Thomas for joining us.</span></p>
<p><span style="font-weight: 400;">Zach Kallenborn, terrific presentation.</span></p>
<p><span style="font-weight: 400;">Greg, thank you so much.</span></p>
<p><span style="font-weight: 400;">Thanks to everybody who tuned in and from time to time for upcoming programs. Thanks everybody and we&#8217;ll catch you next time.</span></p>
<p>&nbsp;</p>
<p><iframe title="Drones and the Future of Chemical, Biological, Radiological, and Nuclear (CBRN) Threats" width="800" height="600" src="https://www.youtube.com/embed/UnI8JMRogtE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p><strong>ABOUT THE SPEAKERS</strong><br />
Nicole Thomas</p>
<p>Division Chief for Strategy and Policy @Joint Counter-UAS Office, Department of Defense</p>
<p>Nicole Thomas is a civilian with the U.S. Army and the Division Chief for Strategy and Policy in the Joint Counter-Small Unmanned Aircraft Systems Office. She is a graduate of the United States Army War College.</p>
<p>Zak Kallenborn</p>
<p>Policy Fellow @Schar School of Policy and Government</p>
<p>Zachary Kallenborn is an analyst in horrible ways people kill each other: weapons of mass destruction, WMD terrorism, and drone swarms. Officially, he’s a Policy Fellow at the Center for Security Policy Studies at the Schar School of Policy and Government; a Research Affiliate with the Unconventional Weapons and Technology Division at the National Consortium for the Study of Terrorism and Responses to Terrorism (START), headquartered at the University of Maryland; an officially proclaimed U.S. Army “Mad Scientist”, and a national security consultant.</p>
<p>Gregory Koblentz</p>
<p>Associate Professor and Director, Biodefense Program @Schar School of Policy and Government</p>
<p>Gregory Koblentz is an associate professor and director of the biodefense program at George Mason University’s Schar School of Policy and Government. Dr. Koblentz has authored, co-authored, or edited multiple books on nuclear and biological threats and published widely on biodefense, biosecurity, dual-use research, and the proliferation of nuclear, biological, and chemical weapons. Dr. Koblentz earned his PhD in political science at the Massachusetts Institute of Technology and his MPP from the Kennedy School at Harvard University.</p>
<p>Source: <a href="https://globalbiodefense.com/event/drones-and-the-future-of-cbrn-threats/" target="_blank" rel="noopener">Schar</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NATO: The Vulnerabilities of the Drone Age Established Threats and Emerging Issues out to 2035</title>
		<link>https://hls.today/white-papers/nato-the-vulnerabilities-of-the-drone-age-established-threats-and-emerging-issues-out-to-2035/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 07:19:25 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2453</guid>

					<description><![CDATA[Over 24-months, the Vulnerabilities of the Drone Age (VDA) project team, led by Dr James Rogers and Dr Dominika Kunertova, gathered evidence from three NATO Science for Peace and Security (SPS) funded Strategic Foresight Analysis workshops to analyse the global proliferation of drones to hostile state and non-state actors. The present report focuses on drone [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Over 24-months, the Vulnerabilities of the Drone Age (VDA) project team, led by Dr James Rogers and Dr Dominika Kunertova, gathered evidence from three NATO Science for Peace and Security (SPS) funded Strategic Foresight Analysis workshops to analyse the global proliferation of drones to hostile state and non-state actors. The present report focuses on drone threats posed to NATO Member and Partner Nations and is separated into three sections: ‘Drone Attack’, ‘Drone Defence’, and ‘Future Threats’.</p>
<a href="https://hls.today/wp-content/uploads/2022/09/NATO-The-Vulnerabilities-of-the-Drone-Age-Established-Threats-and-Emerging-Issues-out-to-2035.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">NATO The Vulnerabilities of the Drone Age Established Threats and Emerging Issues out to 2035</a>
<p><a href="https://hls.today/wp-content/uploads/2022/09/NATO-The-Vulnerabilities-of-the-Drone-Age-Established-Threats-and-Emerging-Issues-out-to-2035.pdf">Download</a></p>
<p>Our findings, summarised below, detail the most concerning vulnerabilities of the drone age:</p>
<p><strong>1 Drone Attack:</strong> The Threat from Hostile State and Non-state Drones<br />
• We have entered a new age of assassinations: Weaponised drones with ever greater lethality, payload, and range are increasingly being used in the attempted assassination of NATO allied political and military leaders.<br />
• The drone will always get through: For the first time in a generation, a viable and deadly threat from hostile enemy airpower has emerged. Advances in range, payload, information transmission, multi-drone teaming and precision-strike necessitate a rethinking of so-called ‘Asymmetric Warfare’ and existing form of force deployment.<br />
• Drones can be both unarmed and dangerous: Unarmed fixed-wing and quadcopter drones, of various sizes, provide state and non-state adversaries with a range of threatening capabilities. For example, at a tactical level, these smaller drones feature prominently in intelligence, surveillance, electronic warfare measures and target acquisition to increase precision lethality from ground-based systems.<br />
• Beyond the state/non-state nexus: Drone supplies have moved beyond the control of the nation state as non-state proxies develop their own local manufacturing bases and commercial supply lines.<br />
<strong>2 Drone Defence:</strong> The Challenges of Countering Drones<br />
• The defender’s dilemma: ‘The good guys need to be on guard always, the bad ones need only to succeed once.’ Drone countermeasures should<br />
always focus on capturing the human operator and weakening the industrial base, not just stopping the drone.<br />
• Air defence has been neglected for a generation: To preserve the tactical and strategical advantage, NATO Members and Partners need to invest in next-generation recruitment, training, and technology for Command and Control and Air Defence.<br />
• Detection and interception in urban environments: Drone use in urban spaces opens a vulnerability gap that needs to be taken seriously. A well-defined legal and regulatory architecture matters for both safety and security reasons.<br />
<strong>3 Future Threats and Opportunities out to 2035</strong><br />
• Drone swarms, autonomy, Artificial Intelligence (AI): Technological advances will allow for a lethal use of unmanned platforms with a decreasing human involvement. This will pose new challenges to drone defences in both qualitative and quantitative terms.<br />
• Proliferation of land, air, sea, and under water drones will expand the domains and dimensions of drone threats: ‘The Third Drone Age’ will be defined by full spectrum drone warfare; a phenomenon that will alter the character of warfare and is thus in need of further evaluation.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>US: UAS Roadmap to 2035 &#8211; US Army Center of Excellence</title>
		<link>https://hls.today/white-papers/us-army-uas-roadmap-to-2035-center-of-excellence/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 07:11:45 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2449</guid>

					<description><![CDATA[The U.S Army UAS CoE provides integration and coordination with all Army organizations, Joint Services and other DoD agencies to achieve the U.S. Army  UAS strategy that includes concepts for current, emerging, and future UAS interoperability with all manned and  unmanned systems. Download]]></description>
										<content:encoded><![CDATA[<p>The U.S Army UAS CoE provides integration and coordination with all Army organizations, Joint Services and other DoD agencies to achieve the U.S. Army  UAS strategy that includes concepts for current, emerging, and future UAS interoperability with all manned and  unmanned systems.</p>
<a href="https://hls.today/wp-content/uploads/2022/09/US-UAS-Roadmap-to-2035-US-ARMY-.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">US UAS Roadmap to 2035 - US ARMY</a>
<p><a href="https://hls.today/wp-content/uploads/2022/09/US-UAS-Roadmap-to-2035-US-ARMY-.pdf">Download</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>US: UAV Roadmap to 2030 &#8211; DoD &#8211; Office of The Secretary of Defense</title>
		<link>https://hls.today/white-papers/us-uav-roadmap-to-2030-dod-office-of-the-secretary-of-defense/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 06:59:06 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2440</guid>

					<description><![CDATA[US: UAV Roadmap to 2030 &#8211; DoD &#8211; Office of The Secretary of Defense HLS.Today &#8211; As the Global War on Terrorism (GWOT) enters its fourth year, the contributions of unmanned aircraft (UA)* in sorties, hours, and expanded roles continue to increase. As of September 2004, some twenty types of coalition UA, large and small, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>US: UAV Roadmap to 2030 &#8211; DoD &#8211; Office of The Secretary of Defense</strong></p>
<p>HLS.Today &#8211; As the Global War on Terrorism (GWOT) enters its fourth year, the contributions of unmanned aircraft (UA)* in sorties, hours, and expanded roles continue to increase. As of September 2004, some twenty types of coalition UA, large and small, have flown over 100,000 total flight hours in support of Operation ENDURING FREEDOM (OEF) and Operation IRAQI FREEDOM (OIF). Their once reconnaissance only role is now shared with strike, force protection, and signals collection, and, in doing so, have helped reduce the complexity and time lag in the sensor-to-shooter chain for acting on “actionable intelligence.” UA systems (UAS) continue to expand, encompassing a broad range of mission capabilities. These diverse systems range in cost from a few thousand dollars to tens of millions of dollars, and range in capability from Micro Air Vehicles (MAV) weighing less than one pound to aircraft weighing over 40,000 pounds. UA, and unmanned systems in general, are changing the conduct of military operations in the GWOT by providing unrelenting pursuit without offering the terrorist a high value target or a potential captive.</p>
<a href="https://hls.today/wp-content/uploads/2022/09/US-UAV-Roadmap-to-2030-DoD-Office-of-The-Secretary-of-Defense.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">US UAV Roadmap to 2030 - DoD - Office of The Secretary of Defense</a>
<p><a href="https://hls.today/wp-content/uploads/2022/09/US-UAV-Roadmap-to-2030-DoD-Office-of-The-Secretary-of-Defense.pdf">Download</a></p>
<p>&nbsp;</p>
<p>HLS.Today</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FAA: Accepted Means of Compliance; Remote Identification of Unmanned Aircraft</title>
		<link>https://hls.today/white-papers/faa-accepted-means-of-compliance-remote-identification-of-unmanned-aircraft/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Wed, 31 Aug 2022 10:38:19 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2393</guid>

					<description><![CDATA[A Rule by the Federal Aviation Administration Federal Aviation Administration, Department of Transportation (DOT). ACTION: Acceptable means of compliance; notice of availability. This document announces the acceptance of a means of compliance (MOC) in accordance with a rule issued by the FAA on January 21, 2021, that went into effect on April 21, 2021. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A Rule by the Federal Aviation Administration</p>
<p>Federal Aviation Administration, Department of Transportation (DOT).</p>
<p>ACTION: Acceptable means of compliance; notice of availability.</p>
<p>This document announces the acceptance of a means of compliance (MOC) in accordance with a rule issued by the FAA on January 21, 2021, that went into effect on April 21, 2021. The Administrator accepts ASTM, International (ASTM) F3586-22, with additions identified in this document as an acceptable means, but not the only means, of demonstrating compliance with the requirements for producing standard remote identification unmanned aircraft and remote identification broadcast modules.</p>
<a href="https://hls.today/wp-content/uploads/2022/08/2022-16997-A-Rule-by-the-Federal-Aviation-Administration.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">2022-16997 A Rule by the Federal Aviation Administration</a>
<p><a href="https://hls.today/wp-content/uploads/2022/08/2022-16997-A-Rule-by-the-Federal-Aviation-Administration.pdf">Download</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA: The Business Case for Security</title>
		<link>https://hls.today/white-papers/cisa-the-business-case-for-security/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Mon, 29 Aug 2022 10:14:57 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2256</guid>

					<description><![CDATA[THE BUSINESS CASE FOR SECURITY &#160; The Business Case for Security is a resource that will help small and mid-sized businesses consider how they can sell the costs for security improvements to senior leaders and other organizational controllers of the purse strings. It provides statistical data on common physical and cybersecurity challenges, as well as suggestions [&#8230;]]]></description>
										<content:encoded><![CDATA[<p id="page-title"><strong>THE BUSINESS CASE FOR SECURITY</strong></p>
<hr class="title-separator" />
<article class="cisa-publication full clearfix" role="article">
<div class="content">
<div class="layout layout--onecol">
<div class="layout__region layout__region--content">
<div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">
<p>&nbsp;</p>
<p>The Business Case for Security is a resource that will help small and mid-sized businesses consider how they can sell the costs for security improvements to senior leaders and other organizational controllers of the purse strings. It provides statistical data on common physical and cybersecurity challenges, as well as suggestions for first steps and resources to assist organizations in bolstering their security postures.</p>
<p>&nbsp;</p>
<a href="https://hls.today/wp-content/uploads/2022/08/The-Business-Case-for-Security.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">The-Business-Case-for-Security</a>
<p>&nbsp;</p>
<p><a href="https://hls.today/wp-content/uploads/2022/08/The-Business-Case-for-Security.pdf">Download</a></p>
</div>
</div>
</div>
</div>
</article>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA: Protected Critical Infrastructure Information Program</title>
		<link>https://hls.today/white-papers/cisa-protected-critical-infrastructure-information-program/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Mon, 29 Aug 2022 10:12:20 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2252</guid>

					<description><![CDATA[PROTECTED CRITICAL INFRASTRUCTURE INFORMATION (PCII) PROGRAM Congress created the Protected Critical Infrastructure Information (PCII) Program under the Critical Infrastructure Information (CII) Act of 2002 to protect private sector infrastructure information voluntarily shared with the government for the purposes of homeland security. The 6 Code of Federal Regulations (CFR) part 29, Procedures for Handling Critical Infrastructure Information; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p id="page-title"><strong>PROTECTED CRITICAL INFRASTRUCTURE INFORMATION (PCII) PROGRAM</strong></p>
<hr class="title-separator" />
<article class="cisa-site-page full clearfix" role="article">
<div class="content">
<div class="layout layout--onecol">
<div class="layout__region layout__region--content">
<div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">
<div class="accordion">
<p>Congress created the Protected Critical Infrastructure Information (PCII) Program under the Critical Infrastructure Information (CII) Act of 2002 to protect private sector infrastructure information voluntarily shared with the government for the purposes of homeland security. The 6 Code of Federal Regulations (CFR) part 29, <i>Procedures for Handling Critical Infrastructure Information; Final Rule</i>, published in the <i>Federal Register </i>on September 1, 2006, established uniform procedures on the receipt, validation, handling, storage, marking, and use of CII voluntarily submitted to the Department of Homeland Security (DHS).</p>
<p>The protections offered by the PCII Program enhance the voluntary sharing of CII between infrastructure owners and operators and the government. The PCII Program protections provide homeland security partners confidence that sharing their information with the government will not expose sensitive or proprietary data.</p>
<a href="https://hls.today/wp-content/uploads/2022/08/CISA-IST-Fact-Sheet.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">CISA IST Fact Sheet</a>
</div>
<p>HLS.Today</p>
</div>
</div>
</div>
</div>
</article>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA: Responding to Drone Calls Guidance for Emergency Communications Centers</title>
		<link>https://hls.today/white-papers/cisa-responding-to-drone-calls-guidance-for-emergency-communications-centers/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Mon, 29 Aug 2022 10:08:12 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2246</guid>

					<description><![CDATA[RESPONDING TO DRONE CALLS: GUIDANCE FOR EMERGENCY COMMUNICATIONS CENTERS Drone use by critical infrastructure and hobbyist alike continue to rise due to their popularity and affordability. As drone activity increases around communities, concerned citizens are likely to contact 9-1-1 call centers and report suspicious drone flights. This guidance provides an overview of safe and unsafe [&#8230;]]]></description>
										<content:encoded><![CDATA[<p id="page-title"><strong>RESPONDING TO DRONE CALLS: GUIDANCE FOR EMERGENCY COMMUNICATIONS CENTERS</strong></p>
<hr class="title-separator" />
<article class="cisa-publication full clearfix" role="article">
<div class="content">
<div class="layout layout--onecol">
<div class="layout__region layout__region--content">
<div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">
<p>Drone use by critical infrastructure and hobbyist alike continue to rise due to their popularity and affordability. As drone activity increases around communities, concerned citizens are likely to contact 9-1-1 call centers and report suspicious drone flights. This guidance provides an overview of safe and unsafe drone flight and a recommended script that Emergency Communications Centers (ECCs) may follow when responding to drone related calls.</p>
<p>&nbsp;</p>
<a href="https://hls.today/wp-content/uploads/2022/08/Responding-to-Drone-Calls-Guidance-for-Emergency-Communications-Centers.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">Responding to Drone Calls Guidance for Emergency Communications Centers</a>
</div>
<p>&nbsp;</p>
<p>As drone activity continues to increase in the United States, Emergency Communications Centers (ECCs) or Public Safety Answering Points (PSAPs) may experience an increase in drone-related calls. ECCs should understand the distinctions between proper and improper drone activity and collect the information needed to inform potential law enforcement response. This guidance provides an overview of safe and suspicious drone flight activity and a suggested script that may be used during a drone-related call. In addition to this guidance, ECCs should refer to relevant state or local laws to inform their drone response.</p>
</div>
<p>HLS.Today</p>
</div>
</div>
</article>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS: CBRN White Paper</title>
		<link>https://hls.today/white-papers/dhs-cbrn-white-paper/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Mon, 29 Aug 2022 09:58:39 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2241</guid>

					<description><![CDATA[Homeland Security Science and Technology Advisory Committee The Homeland Security Science and Technology Advisory Committee (HSSTAC) serves as a source of independent expert advice to the Under Secretary for Science and Technology. &#160; HLS.Today]]></description>
										<content:encoded><![CDATA[<div id="block-dhs-uswds-subtheme-pagetitle" class="block block-core block-page-title-block">
<p class="uswds-page-title page-title"><strong>Homeland Security Science and Technology Advisory Committee</strong></p>
</div>
<div id="block-mainpagecontent" class="block block-system block-system-main-block">
<article lang="en" role="article">
<div>
<div class="field field--name-body field--type-text-with-summary field--label-hidden field__item">
<p>The Homeland Security Science and Technology Advisory Committee (HSSTAC) serves as a source of independent expert advice to the Under Secretary for Science and Technology.</p>
<a href="https://hls.today/wp-content/uploads/2022/08/CBRN-White-Paper-2017_508-FINAL_1.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">CBRN White Paper 2017_508 FINAL_1</a>
</div>
</div>
</article>
</div>
<p>&nbsp;</p>
<p>HLS.Today</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS: Cybersecurity White Paper</title>
		<link>https://hls.today/white-papers/dhs-cybersecurity-white-paper/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Mon, 29 Aug 2022 09:57:50 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2239</guid>

					<description><![CDATA[Homeland Security Science and Technology Advisory Committee The Homeland Security Science and Technology Advisory Committee (HSSTAC) serves as a source of independent expert advice to the Under Secretary for Science and Technology. &#160; HLS.Today]]></description>
										<content:encoded><![CDATA[<div id="block-dhs-uswds-subtheme-pagetitle" class="block block-core block-page-title-block">
<p class="uswds-page-title page-title"><strong>Homeland Security Science and Technology Advisory Committee</strong></p>
</div>
<div id="block-mainpagecontent" class="block block-system block-system-main-block">
<article lang="en" role="article">
<div>
<div class="field field--name-body field--type-text-with-summary field--label-hidden field__item">
<p>The Homeland Security Science and Technology Advisory Committee (HSSTAC) serves as a source of independent expert advice to the Under Secretary for Science and Technology.</p>
<a href="https://hls.today/wp-content/uploads/2022/08/Cybersecurity-White-paper-2017_508-FINAL_5.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">Cybersecurity White paper 2017_508 FINAL_5</a>
</div>
</div>
</article>
</div>
<p>&nbsp;</p>
<p>HLS.Today</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS: Human Factors White Paper</title>
		<link>https://hls.today/white-papers/dhs-human-factors-white-paper/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Mon, 29 Aug 2022 09:56:45 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2237</guid>

					<description><![CDATA[Homeland Security Science and Technology Advisory Committee The Homeland Security Science and Technology Advisory Committee (HSSTAC) serves as a source of independent expert advice to the Under Secretary for Science and Technology.]]></description>
										<content:encoded><![CDATA[<div id="block-dhs-uswds-subtheme-pagetitle" class="block block-core block-page-title-block">
<p class="uswds-page-title page-title"><strong>Homeland Security Science and Technology Advisory Committee</strong></p>
</div>
<div id="block-mainpagecontent" class="block block-system block-system-main-block">
<article lang="en" role="article">
<div>
<div class="field field--name-body field--type-text-with-summary field--label-hidden field__item">
<p>The Homeland Security Science and Technology Advisory Committee (HSSTAC) serves as a source of independent expert advice to the Under Secretary for Science and Technology.</p>
<a href="https://hls.today/wp-content/uploads/2022/08/Human-Factors-White-paper-2017_508-FINAL.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">Human Factors White paper 2017_508 FINAL</a>
</div>
</div>
</article>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS: Autonomous Technology White Paper</title>
		<link>https://hls.today/white-papers/dhs-autonomous-technology-white-paper/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Mon, 29 Aug 2022 09:55:41 +0000</pubDate>
				<category><![CDATA[White Papers]]></category>
		<guid isPermaLink="false">https://hls.today/?p=2234</guid>

					<description><![CDATA[Homeland Security Science and Technology Advisory Committee The Homeland Security Science and Technology Advisory Committee (HSSTAC) serves as a source of independent expert advice to the Under Secretary for Science and Technology. &#160; HLS.Today]]></description>
										<content:encoded><![CDATA[<div id="block-dhs-uswds-subtheme-pagetitle" class="block block-core block-page-title-block">
<p class="uswds-page-title page-title"><strong>Homeland Security Science and Technology Advisory Committee</strong></p>
</div>
<div id="block-mainpagecontent" class="block block-system block-system-main-block">
<article lang="en" role="article">
<div>
<div class="field field--name-body field--type-text-with-summary field--label-hidden field__item">
<p>The Homeland Security Science and Technology Advisory Committee (HSSTAC) serves as a source of independent expert advice to the Under Secretary for Science and Technology.</p>
</div>
</div>
</article>
</div>
<a href="https://hls.today/wp-content/uploads/2022/08/Autonomous-Technology-whitepaper-2017_508-FINAL.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">Autonomous Technology whitepaper 2017_508 FINAL</a>
<p>&nbsp;</p>
<p>HLS.Today</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
