We create intelligent and purposeful C-UAS solutions.

Corporate espionage and physical damage are only a few of the potential threats by a drone entering your airspace. RedSec1 works with its clients and industry partners to design, build, and deploy innovative solutions providing situational awareness to Counter Unmanned Aircraft Systems (C-UAS), drones, operating within or near your perimeter. Using a variety of technologies, suited to your unique requirements, RedSec1 provides you with capabilities to detect, identify, classify, and track drones in real-time. Inherent within the solution are alerting and data capture capabilities that can allow you to clear the airspace (e.g., clear approach and departure corridors at an airport) or supply law enforcement with the necessary forensic data (evidence) to conduct an investigation.

Below are the five solution areas we focus upon when engaging with our government, commercial, and international clients.

rs1_Asset 1.png

DETECT
Application of sensors using radar, radio frequency (RF), optical and thermo-optical, or acoustic to detect UAS and controller location, monitor and store track of UAS, and deconflict track and target from other signals.

rs1_Asset 1.png

IDENTIFY
Classify target and store appropriate forensic data available from sensor source. Provide real-time threat prioritization and alerts based on numerous variables such as class of target, geo-location, and vulnerability zones.

rs1_Asset 1.png

DEFEAT
Attempts to take down a UAS are solely in the jurisdiction of federal agencies. However, we can help you understand the rules while providing you an understanding of the techniques and tactics used to defeat a UAS such as geo-fencing, jamming, interception, and destruction.

INVESTIGATE
Utilize captured forensic data to work with local or federal law enforcement to empower their investigation and make determinations on intentions and motives, i.e., determining if it was the 8 year old that didn’t know the rules or someone with much more sinister or nefarious intentions.

 

Redskies™ C-UAS Program

RedSec1’s RedSkies™ program provides a full lifecycle of C-UAS services to assist you in your initial decision making process, plan and deployment of the C-UAS solution, including integration and management of the solution.

Pre-Deployment

  • Conduct a risk assessment to understand specific threats and vulnerabilities to your organization and its assets, including the analysis of impact and likelihood to make informed choices about your C-UAS needs.

  • Product evaluation, testing, and selection to ensure you deploy an optimized product suite against UAS threat. This includes a site-survey to understand the perimeter landscape, current structures, threat/vulnerability scenarios, and potential causes of interference.

  • Deliver training to appropriate personnel on the solution but also enhanced tactics, techniques, and procedures used to conduct C-UAS operations at your facility.

  • Define system requirements to integrate and converge the C-UAS solution into a new or existing Command and Control (C2) and Physical Security Information Management (PSIM) systems. Define procedural, reporting, communications, and alerting workflow requirements.

Deployment

  • Procurement, deployment, and integration of operational system.

  • Tuning, testing, and evaluation to assess solution performance and effectiveness.

Post-Deployment

  • Integration with disparate products (sensors or software) as required into a user-friendly, cohesive, and functional system.

  • Continuous risk management to ensure solution evolves with changing threats and vulnerabilities.

  • Training tailored for the deployed solution.

  • On going support, tuning, and system maintenance.