An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Feature Stories

NEWS | Sept. 5, 2019

US, Jordan integrate for counter-UAS training at EL19

By Sgt. Devon Bistarkey 29th Mobile Public Affairs Detachment

Battlefield operations continue to evolve in order to outmaneuver near-peer adversaries by bringing Counter-Unmanned Aerial System training to the tactical level.

During capabilities integration training, an integral part of Exercise Eager Lion 2019, a U.S. Army Special Operations Task Force partnered with a Jordan Armed Forces Explosive Ordnance Disposal unit to conduct site exploitation of a notional downed unmanned aerial vehicle, or UAV, on Sept. 2 at the King Abdullah II Special Operations Training Center in Amman, Jordan.

“Our task today is to understand the tactics, techniques and procedures our partner forces have in response to identifying the threat of a UAV, and the opportunity to extract any intelligence from that device at the field level,” said U.S. Army Sgt. 1st Class Andrew Bird, the scenario ground force commander.

Outsmarting UAS technologies involves a three pronged approach: detection, defeat and exploitation. The joint forces training focused on site exploitation in order to effectively disrupt enemy operations.

The capabilities exchange allowed the two nations to understand and deploy equipment including JAF robotics, jammers, x-ray and photography.

Given the scenario of a downed adversarial drone, members of the U.S. SOTF provided site security as elements of the JAF EOD unit deployed robotic systems to approach the UAV and x-ray systems to identify explosive materials, ultimately disposing of the threat.

“We left today understanding how to integrate communications, overcome any language barriers, and how to respond to a very real scenario,” said Bird.

Editor’s note: Source’s name and identifying details have been changed for operational security purposes.