Skip to content

    Read more about Counter Unmanned Aircraft Systems Technologies and Operations

    Counter Unmanned Aircraft Systems Technologies and Operations

    (0 reviews)

    No ratings

    Randall K. Nichols, Kansas State University

    Hans C. Mumm, California University of Pennsylvania

    Wayne D. Lonstein, Pennsylvania State University

    Julie J.C.H Ryan, Wyndrose Technical Group

    Candice Carter, NASA

    Copyright Year:

    Last Update: 2024

    ISBN 13: 9781944548278

    Publisher: New Prairie Press

    Language: English

    Formats Available

    Conditions of Use

    Attribution-NonCommercial-ShareAlike Attribution-NonCommercial-ShareAlike
    CC BY-NC-SA

    Table of Contents

    • Front Matter
    • Foreword
    • Chapter 1 - The Role of Information Technology
    • Chapter 2 - Understanding C-UAS Purpose and Process
    • Chapter 3 - Developing a C-UAS Strategy Goals, Options, Target Analyses, Process Selection, Operational Metrics Approaches to Countering UAS Activities (First Principles)
    • Chapter 4 - Planning for Resiliency and Robustness
    • Chapter 5 - Surveillance and Reconnaissance
    • Chapter 6 - C-UAS Evolving Methods of Interdiction
    • Chapter 7 - UAS Area / Airspace denial
    • Chapter 8 - Emerging Interdiction Technologies
    • Chapter 9 - Non-Kinetic: Military Avionics, EW, CW, DE, SCADA Defenses
    • Chapter 10 - When the Other Side Fights Back - Cyberwarfare, Directed Energy Weapons, Acoustics, Integrating C-UAS into Planning
    • Chapter 11 - Thinking Like the Enemy: Seams in the Zone
    • Chapter 12 - C-UAS Regulation, Legislation, & Litigation from a Global Perspective

    Ancillary Material

    Submit ancillary resource

    About the Book

    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020). This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020). Every country seems to be announcing steps forward in this bludgeoning field.

    About the Contributors

    Authors

    Randall K. Nichols is Professor of Practice in Unmanned Aircraft Systems (UAS) – Cybersecurity at Kansas State University Polytechnic (KSUP) in Salina, Kansas. Nichols serves as Director, graduate UAS- Cybersecurity Certificate program at KSUP. Nichols is internationally respected, with 50 years of experience in leadership roles in cryptography, counterintelligence, INFOSEC, and sensitive computer applications. Throughout his career, Nichols has published nine best-selling textbooks. Nichols has provided counsel to the United States government and is certified as a federal subject matter expert (SME) in both cryptography and computer forensics. His most recent work involves creating master and certificate graduate – level programs for KSU and Utica College. 

    Dr. Hans C. Mumm holds a Doctor of Management with a concentration in Homeland Security from Colorado Technical University (CTU) and an MS in Strategic Intelligence from American Military University (AMU).  He gained notoriety during Operation Iraqi Freedom as the officer in charge of the “Iraqi Regime Playing Cards; CENTCOM’S Top 55 Most Wanted List” which was touted by the Defense Intelligence Agency (DIA) as one the most successful Information Operations (IO) in the history of Defense Intelligence Agency (DIA). Dr. Mumm is the former Division Chief for Cyber Security at the Office of The Director of National Intelligence (ODNI) programming and executing a budget of over $140 M. Dr. Mumm has earned twenty-three personal military ribbons/medals including six military unit medals/citations, and two Directors Awards, from the DIA. In 2016 he was awarded the People of Distinction Humanitarian Award as well as being granted a US Patent and Trademark for How to Harmonize the Speed of Innovation and Change with the Human Spirit’s Need for Leadership. In 2005, Dr. Mumm was recognized as one of the “Ten Outstanding Young Americans,” and in 2003 he was awarded the National Defense PAC “American Patriot Ingenuity Award” for his service during “Operation Iraqi Freedom.” 

    Wayne Lonstein holds a Bachelor of Arts Degree in Political Science from Wilkes University, a Bachelor of Science Degree in Cyber Forensics and Information Security from Syracuse University – Utica Collage, A Master of Science Degree in Homeland Security with a concentration in Information Security from The Pennsylvania State University and a Juris Doctor Degree from Pace University School of Law. Additionally he holds a CISSP Certification from The Pennsylvania State University. He is a member of the state bars of New York, New Jersey, Massachusetts an Pennsylvania as well as being admitted to over 30 United States District Court Bars, The Court of Veterans Appeals, United States Tax Court and the bar of the United States Court of Appeals of the 2nd, 3rd and 5th Circuits. 

    Julie J.C.H. Ryan, D.Sc., is the CEO of Wyndrose Technical Group, having retired from academia in 2017.  Her last position in academia was Professor of Cybersecurity and Information Assurance from the U.S. National Defense University.  Prior to that, she was tenured faculty at the George Washington University and a visiting scholar at the National Institute for Standards and Technology (NIST). 

    Ms. Candice Carter is a  cybersecurity expert with over 15 years of hands-on experience in the areas of counter-terrorism, counterintelligence and criminal cyber investigations. She conducts Classified/Unclassified briefings in the areas of Terrorism Cyber Capabilities using Social Media and Counter-terrorism for the Intelligence Community (IC). Ms. Carter conducts research and constructs Asymmetric Warfare and Attack / Defense Scenarios against National Critical Infrastructure. She is the Team Lead and for NASA Aeronautics Research Institute for Transformative Vertical Flight (TVF) Commercial Intra-City On-Demand VTOL group. Ms. Carter is an invited speaker for key organizations including BSides London and (ISC)2 Security Congress. She is an Assistant Professor/ Chair MSc Cybersecurity program at the Wilmington University. Ms. Carter  holds a MSc Cybersecurity Forensics and Intelligence from Utica College, Utica , NY and a PMT Cybersecurity UAS (expected 2019) from Kansas State University. 

    Contribute to this Page

    Suggest an edit to this book record