Skip to main content

Currently Skimming:

3 Unmanned Systems Context
Pages 29-42

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 29...
... This chapter s discusses some of these considerations when leveraging unmanned technologies from other domains and sectors, leaving the more detailed discussion of Coast Guard–specific circumstances to later chapters. This chapter begins with an overview of the terminology and nomenclature of the report, such as the specific terms used to describe unmanned vehicles and systems and the meaning of "unmanned" with respect to human control and onboard presence.
From page 30...
... Finally, when operating UxS in the air and on the water, the Coast Guard must consider a variety of legal and policy requirements intended to ensure the safety of the civil airspace and waterways, protect individual privacy, and further other interests such as adherence to federal and Coast Guard acquisition guidelines. These requirements are covered in detail in later chapters but are discussed briefly here because they are relevant to the Coast Guard's ability to acquire and fully exploit unmanned technologies.
From page 31...
... Remote, Automated, and Autonomous Control The legislative request for this study seeks an assessment of current and emerging unmanned technologies, both autonomous and remotely controlled, for maritime domain awareness applications by the Coast Guard. A key difference between autonomous and remotely controlled systems is straightforward: the former implies a degree of independent action by the system, and the latter implies that a human operator exercises full control.
From page 32...
... Although this workflow has traditionally been performed by humans, autonomous technologies -- from artificial intelligence and machine learning to advanced sensor and control systems -- can be applied across all three phases to create a faster, more efficient, and more effective feedback loop. The ability to harness the power of unmanned technologies in all three phases of the workflow can be especially important in complex operations such as the pollution-response event depicted in Figure 3-2.
From page 33...
... FIGURE 3-1 Depiction of the basic workflow for a Coast Guard action.
From page 34...
... 34 FIGURE 3-2 Depiction of the Coast Guard's workflow during a complex pollution response event.
From page 35...
... "Bluefin Robotics Unmanned Underwater Vehicles." https://­ gdmissionsystems.com/underwater-vehicles/bluefin-robotics. 2  Hydroid.
From page 36...
... 36 LEVERAGING UNMANNED SYSTEMS FOR COAST GUARD MISSIONS space and time demands can be major advantages. Examples of systems that might be attractive for these reasons are those that are • Small enough to be launched from a vessel of opportunity, rather than dedicated space on a larger cutter; • Autonomous enough for "fire and forget," which means the mis sion can be carried out without constant monitoring; • Capable of long enough range so that launch and recovery can o ­ ccur from the shore, without using ship time; • Affordable enough to be launched on one-way missions, without the need to expend vessel and crew time for recovery at sea; and • Smart enough to do onboard sensor processing and only call home -- through robust and secure communications links -- with snippets of information or windows of images.
From page 37...
... When leveraging unmanned technologies developed by others, the Coast Guard must determine the criticality of ensuring cybersecurity in light of the intended application, the availability and cost of cybersecurity solutions, and the prospects of the solutions performing as required and not creating undesirable operational challenges.
From page 38...
... Although DOD, and the Navy in particular, can help identify potential cyberattack likelihoods and corresponding security solutions, the burden remains on the Coast Guard to assess the consequences of attacks and to identify operational issues related to employing potential solutions, including the need for operational doctrine and corresponding personnel training. DOD's experience suggests that systems must undergo considerable testing to assure proper implementation and effectiveness of security solutions.
From page 39...
... In some cases, the Coast Guard may need to secure special authorizations or permissions from a cognizant authority, such as the FAA. Finally, even if the Coast Guard confirms both its legal authority and jurisdiction to use UxSs, it will need to consult relevant policy guidance that govern technology procurements, at the federal and Coast Guard levels.
From page 40...
... fully assess the complex legal environment in which a UxS will o ­ perate and the relevant legal authorities on which the UxS will rely; (3) be vetted through the relevant field units and Coast Guard Headquarter Programs prior to acquisition and use of a UxS in the maritime domain; and (4)
From page 41...
... Furthermore, partnerships with industry can be pursued through a variety of mechanisms including CRADAs, the National Oceanographic Partnership Program, Small Business Innovation Research, and standard grants and contracts.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.