Bottom Line Up Front:
Militaries worldwide are searching for counter-UAS (CUAS) solutions due to the proliferation of small unmanned aerial systems (sUAS) across modern battlefields.
To defeat the threat, a scalable, integrated approach to using the CUAS trinity is required at the appropriate unit echelon.
The diversity of modern sUAS requires many CUAS technical solutions accompanied by new techniques, tactics, and procedures.
The modern battlefield is no longer defined by dominance in the air, but by survivability under it. CUAS falls under the larger umbrella of integrated air and missile defense, but this used to be a concern for operational commanders and staff. With the emergence of sUAS, air defense in the form of CUAS is everyone's concern, down to the lowest tactical unit. Group 1–2 small sUAS — once dismissed as hobbyist curiosities — have evolved into pervasive and lethal threats. They reconnoiter, target, jam, and kill — often at a fraction of the cost of the systems they neutralize. Evidence from recent and ongoing conflicts continues to mount: sUAS have become an indispensable feature of modern battle.

Yet despite this evidence, many Western forces continue to underinvest in CUAS systems, clinging to legacy capabilities designed for much larger threats. This decision overlooks the new economics of warfare. Cheap drones bypass expensive defenses, and adversaries have learned that volume and velocity can overwhelm even the best air and missile defense technology if it is not scaled and networked.
A new approach is needed — one that is layered, scalable, and formation-integrated. The recent Royal United Services Institute (RUSI) report, Protecting the Force from Uncrewed Aerial Systems, presents a sobering yet clear-eyed view of how sUAS are shaping the fight in Ukraine, emphasizing the urgent need for echeloned sensor-to-shooter chains and soft/hard-kill layering. Simultaneously, U.S. Army-sponsored studies conducted by RAND make the case for treating sUAS as an integral part of future formations while synchronizing both sUAS effects and CUAS defenses.
Militaries must adapt to the emerging threat posed by sUAS. This article is intended to serve as the introduction to the primer, defining key terms, concepts, and frameworks for dissecting the complex sUAS space.
Subsequent articles will be divided into sensing, soft-kill, and hard-kill sections. They will draw from those insights and add additional perspective by integrating operational modeling, kill chain analysis, and exploring layered countermeasures.
I. Understanding the Threat: Small UAS, Big Disruption
The term sUAS belies the scale of the impact of this capability on modern battlefields. sUAS have proven to be disproportionately disruptive and ubiquitous, with Group 1 and 2 platforms weighing less than 55 pounds, and available in high volumes through commercial channels either as complete solutions or modular kits. In Ukraine and in other recent conflicts, sUAS have performed critical roles in reconnaissance, fires coordination, and direct attack. Their small size, low cost, and flexible payloads allow militaries to deploy them en masse, adapt rapidly, and exploit gaps in traditional air defenses.
Taxonomy of SUAS Threats
To build a resilient CUAS strategy, we must first understand the types of sUAS in play. While each system is unique, threats fall into several general categories:
Methods of Operation:
1. First-Person View (FPV)
Often manually piloted via analog or digital video feeds, these drones are used in loitering kamikaze roles or for rapid strike missions.
FPV attack drones have become Ukraine’s signature battlefield innovation, enabling precision strikes on armor, trench systems, and command posts for as little as several hundred dollars per unit. Increasingly, semi-autonomous variants are emerging with basic object tracking or pre-programmed GPS routes, making them harder to jam.
2. Autonomous
These sUAS use onboard computer vision and decision making, AI target recognition, and other methods to find and engage targets. They can operate without a human in the loop, though rules of engagement may require human approval before they can attack.
3. Preprogrammed Route
In this case, sUAS are preprogrammed with a specific mission and a static target. They execute the mission as designed and cannot deviate.
4. Hybrid
The three methods above can be combined and employed at different mission stages or in different environments depending on operational requirements.
Methods of Control:
1. Line-of-sight communications
Often, VHF and UHF radio frequencies, line-of-sight communications limit range but are the most common in tactical operations.
2. Beyond line-of-sight communications
These drones often use satellite or communications relays. Some commercial UAS even operate on civilian cellular network infrastructure. Mesh networks allow relays of UAS and other assets to be combined, enabling an extended area of operations.
3. Fire and Forget. Autonomous and/or preprogrammed
These systems use onboard software and hardware to find, fix, and finish targets without humans in the loop. Humans can be on or in the loops; however, they are technically not necessary, but a choice of rules of engagement.
4. Tethered-fiber optic controlled sUAS
These systems physically connect the UAS to the controller. This connection cannot be jammed, but the physical connection limits their range.
sUAS Missions:
1. One-Way Attack (OWA)
OWA, or kamikaze, drones have munitions onboard and are designed to deliver their payloads by flying into the target.
2. Intelligence, Surveillance, and Reconnaissance (ISR)
These drones are meant to collect information on the battlefield. Their primary payload is sensors.
Systems like the Orlan-10 perform real-time target acquisition, BDA (battle damage assessment), and artillery spotting.
ISR drones often operate persistently at medium altitude, providing fire control for precision strike systems or guiding FPVs.
Their ability to fly extended missions with minimal emissions makes them particularly hard to detect without a well-networked sensor grid.
3. sUAS Bombers/Multi-attack
Ukraine has successfully run an sUAS bomber campaign against the Russians. Colloquially known as Baba Yaga, these sUAS ideally operate for multiple missions, dropping ordnance on static and dynamic targets across the battlefield.
4. Electronic/Cyber Warfare
sUAS with EW payloads can jam, spoof, or act as decoys. A more emerging technology is sUAS, which can fly near IT networks and inject malware/cyber attacks.
5. Logistics and Resupply
Soldiers on foot and vehicles often struggle to get supplies forward on contested battlefields. sUAS can bring small amounts of high-value supplies forward at lower risk to units.
This taxonomy forms a modelable framework for sUAS classification and engagement. Take the drone below from a recent Forbes article. The article covers the recent Russian battlefield innovation of modifying drones with fiber-optic cables to allow operation in electronic warfare-saturated environments where jamming stops radio frequency control.

Using this framework, we would classify its method of operations as FPV, its method of control as fiber-optic, and its mission as a one-way attack. These three different parameters require specific countermeasures to defeat.
Characteristics That Complicate Defense
SUAS aren’t just disruptive because they’re new — they’re disruptive because they invert traditional airpower economics and defense logic.
1. Cost Asymmetry
A $500 drone can destroy a $2 million IFV or trigger the launch of a $150,000 interceptor. This cost imbalance incentivizes volume attacks and forces defenders into difficult trade-offs: overreact and exhaust resources, or underreact and take losses.
2. Size, Altitude, and Flight Profile
SUAS typically fly in the low hundreds to thousands of feet, relatively slowly compared to modern aircraft, and with potentially erratic flight paths. They can avoid radar detection by staying below the radar horizon or blending into ground clutter. Their small radar cross-section (RCS) and low thermal signature further complicate tracking.
3. Rapid Iteration and Modularity
These systems are evolving faster than most defense acquisition cycles. New drone variants appear weekly on the battlefield, often built with commercial parts, custom payloads, and open-source flight software. Modularity allows adversaries to modify drone capabilities. With a new radio or software, a drone you can jam today may be unjammable tomorrow.
II. The Targeting Cycle: How Groups of sUAS Hunt and Kill
Small UAS do not operate in isolation—they form part of an evolving, decentralized kill web, executing coordinated tasks in the targeting cycle with speed and precision. This cycle, from traditional military doctrine, unfolds in six core stages: Find, Fix, Track, Target, Engage, and Assess.
In practice, this cycle is now often distributed across multiple drones. An ISR quadcopter might “find” a target, a relay drone may help “fix” its position, an FPV drone will launch to “engage,” and a secondary ISR asset confirms the “assessment.” This separation of roles enables massed, asynchronous attacks, overwhelming defenders who react only when the terminal drone is too close. Key vulnerabilities will be covered in later installments of this primer as they form the basis for defeating sUAS.

III. The Counter-UAS Trinity: Sensor – Soft Kill – Hard Kill
Effective counter-UAS defense relies on a layered approach, which we call the Counter-UAS Trinity: Sensing, Soft-Kill, and Hard-Kill. First, drones must be detected and classified using a network of sensors — radar, RF, EO/IR, and acoustic — to enable rapid cueing. Once detected, defenders may attempt a soft-kill by disrupting the drone’s control, navigation, or sensors using jamming, deception, or cyber tools. A soft-kill does not physically destroy the drone, but renders it useless. If soft-kill fails or isn’t feasible, hard-kill options — including lasers, bullets, missiles, or interceptor drones — must physically neutralize the threat before it reaches its target. Hard-kill options physically destroy the drone, rendering it unusable. Success depends not on any single layer, but on the speed, integration, and adaptability of all three working in concert.
The proliferation of sUAS demands a structured, model-driven response. This primer has defined a taxonomy for classifying threats by operation, control, and mission. The next step is to apply this taxonomy to each layer of the CUAS Trinity — sensing, soft-kill, and hard-kill — and model their performance, limitations, and integration across echelons. We can only design effective, scalable CUAS systems that keep pace with the threat through layered analysis.
Read More of Our Work Here:
Rearmament Along the Rhine
Damn the Torpedoes: Smaller, Cost Efficient, Less-than-Lethal Systems
Precision Mass at Sea: A Preliminary Analysis
Capability Analysis: AI Machine Guns for Drone Short-Range Air Defense
The views and opinions expressed on War Quants are those of the authors and do not necessarily reflect the official policy or position of the United States Government, the Department of Defense, or any other agency or organization.