U.S. soldiers with the 1st Stryker Battalion, 4th Infantry Division participated in the Small, Slow, and Low Range Mobile Unmanned Defense System (M-LIDS) training course at Camp Buehring, Kuwait.
The Army’s press release says soldiers are trained on the M-LIDS weapon system, which can be mounted on an all-terrain mine-resistant ambush vehicle, or MATV, and is designed to target destroy and neutralize, or destroy, hostile drones or other unmanned aerial vehicles, with the assistance of Joint Task Force – Operation Resolve Advisory Readiness, support and enable missions.
Number of commercially available drones and availability of online kits and tutorials for building drones out of easy-to-find items means drone systems driver (C-UAS) must be modular, open-architecture, and extensible to evolve with the threat. Both terrorist organizations and national states have used weaponized drones to inflict damage ranging from targeted attacks on personal tanks to attacks. large scale targeting strategically critical infrastructure.
– ADVERTISING – READ MORE BELOW –
The latest M-LIDS provides Soldiers with the mobility, firepower, and protection they need to detect, identify, track, and defeat unmanned aerial vehicle systems (UAS) threats. ).
Existing M-LIDS capabilities also allow for easy system improvements as new technologies develop in the future. Passed through rigorous Army testing, M-LIDS is the low-risk mobile counter-UAS capability offered today.
The M-LIDS series of systems use a modular framework with advanced capabilities, overlaid on existing recording schemes, to create a UAS defeat mechanism from the smallest systems to Group drones 3 capable of carrying large explosives or complex observable payloads. These planes typically weigh more than 55 pounds, but are under 1,320 pounds, and operate below 18,000 feet at speeds slower than 250 knots — like the Shadow and the Integrator.
M-LIDS uses a range of passive and active sensors to detect, track and identify UAS and non-hostile aircraft. M-LIDS utilizes a comprehensive network for communication, allowing operators to execute tailored mitigation techniques, from electronic warfare to outright physical interception.