Unmanned Aircraft Systems in the Cyber Domain - Second Edition
Randall K. Nichols, Kansas State University
Hans C. Mumm, California University of Pennsylvania
Wayne D. Lonstein, VFT Solutions
Copyright Year: 2019
ISBN 13: 9781944548155
Publisher: New Prairie Press
Conditions of Use
The book provides a comprehensive overview of the capabilities and effectiveness of unmanned aircraft systems on the battlefield in urban areas and ways governments can utilize this developing next-gen technology. At the heart of UAS is the... read more
The book provides a comprehensive overview of the capabilities and effectiveness of unmanned aircraft systems on the battlefield in urban areas and ways governments can utilize this developing next-gen technology. At the heart of UAS is the ability for delivering airborne capabilities in intelligence and surveillance while delivering maximum efficiency in the most complex operating environments on our planet.
The book synthesizes many different resources and aligns them with UAS and ADS (Airborne Delivery Systems) which enables them to operate in sophisticated and challenging environments with self-learning autonomous AI systems. There are many chapters that address everything from legal considerations, cyber threats, foreign governments, and so much more.
From Amazon to UPS autonomous drones will become part of our everyday lives within the next decade. Africa is the largest proving ground for this technology and the results show that the efficiency and functionality will be used in a myriad of ways in our everyday life.
This book addressed many of the aspects of surveillance, intelligence, and recognizance in not just UAS but in the ways that governments are using these elements today. While most of the chapters were detailed and comprehensive, sometimes they did not flow together seamlessly, they were still valuable sources of information.
The text was consistent throughout in terms of the terminology and framework used to describe UAS, ADS, and principles of the technology being used.
One of the best attributes of this book is that the chapters are easily adapted to a course and each chapter can expand and integrate with different components.
The organization of the book was comprehensive, easy to navigate, and aligned with current and future geopolitical issues throughout the world.
The interface was straightforward, easy to read, and provided a logical transition through topics.
The book was free from grammatical errors, flowed well, and provided excellent theoretical and practical frameworks.
This text is free from offensive or insensitive remarks or characterizations.
I will integrate this book into future courses.
Detailed analysis of the usage of UAV's in the cyber domain. read more
Detailed analysis of the usage of UAV's in the cyber domain.
second edition updated the use of newer technologies.
Anyone working with UAV's should read this book.
Easy enough to read without expertise with UAV technology.
Updated to maintain changes in technology.
chapters can be read as "read alone" assignments.
chapters can be read as "read alone" assignments.
Images reinforce key points of the text.
No grammar errors
Excellent rad for those interested with UAV technology.
Table of Contents
- Chapter 1 - A View of the UAS Market
- Chapter 2 - UAS Law - Legislation, Regulation, and Adjudication
- Chapter 3 - Understanding Hostile Use and Cyber-Vulnerabilities of UAS
- Chapter 4 - INFOSEC – Protecting UAS Information Channels & Components
- Chapter 5 - Intelligence & Red Teaming
- Chapter 6 - Case Studies in Risk for UAS
- Chapter 7 - UAS SAA Methodologies, Conflict Detection
- Chapter 8 - Designing UAS Systems for Stealth
- Chapter 9 - Case Study Smart Skies Project
- Chapter 10 - UAS Intelligence, Surveillance and Reconnaissance (ISR)
- Chapter 11 - UAS Weapons
- Chapter 12 - UAS System Deployment and Information Dominance (ID)
- Chapter 13 - Data Links Functions, Attributes and Latency
- Chapter 14 - Exposing UAS Vulnerabilities via Electronic Warfare (EW) and Countering with Low Probability Intercept Signals (LPI)
- Chapter 15 - Africa - World’s First Busiest Drone Operational Proving Ground
- Chapter 16 - Chinese Drones in Spratly Islands, and Chinese Threats to USA forces in Pacific
- Chapter 17 - High-Altitude Platforms (HAPS) – A Promise not Reached
- Chapter 18 - C-UAS and Large Scale Threats
- Chapter 19 - Audiology, Acoustic Countermeasures against Swarms and Building IFF Libraries
- Chapter 20 - Legal and Regulatory – Where It Was, Where It Is and What’s Ahead?
- Chapter 21 - Chinese UAS Proliferation along New Silk Road Sea/Land Routes
- Chapter 22 - Ethics in the New Age of Autonomous Systems and Artificial Intelligence (AI)
About the Book
Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.
About the Contributors
Randall K. Nichols is Professor of Practice in Unmanned Aircraft Systems (UAS) – Cybersecurity at Kansas State University Polytechnic (KSUP) in Salina, Kansas. Nichols serves as Director, graduate U AS- Cybersecurity Certificate program at KSUP. Nichols is internationally respected, with 50 years of experience in leadership roles in cryptography, counterintelligence, INFOSEC, and sensitive computer applications. Throughout his career, Nichols has published seven best-selling textbooks. Nichols has provided counsel to the United States government and is certified as a federal subject matter expert (SME) in both cryptography and computer forensics. His most recent work involves creating master and certificate graduate – level programs for KSU and Utica College.
Dr. Hans C. Mumm holds a Doctor of Management with a concentration in Homeland Security from Colorado Technical University (CTU) and an MS in Strategic Intelligence from American Military University (AMU). He gained notoriety during Operation Iraqi Freedom as the officer in charge of the “Iraqi Regime Playing Cards; CENTCOM’S Top 55 Most Wanted List” which was touted by the Defense Intelligence Agency (DIA) as one the most successful Information Operations (IO) in the history of Defense Intelligence Agency (DIA). Dr. Mumm is the former Division Chief for Cyber Security at the Office of The Director of National Intelligence (ODNI) programming and executing a budget of over $140M. Dr. Mumm has earned twenty-three personal military ribbons/medals including six military unit medals/citations, and two Directors Awards, from the DIA.
Wayne D. Lonstein holds a Bachelor of Arts Degree in Political Science from Wilkes University, a Bachelor of Science Degree in Cyber Forensics and Information Security from Syracuse University – Utica Collage, A Master of Science Degree in Homeland Security with a concentration in Information Security from The Pennsylvania State University and a Juris Doctor Degree from Pace University School of Law. Additionally he holds a CISSP Certification from The Pennsylvania State University. He is a member of the state bars of New York, New Jersey, Massachusetts an Pennsylvania as well as being admitted to over 30 United States District Court Bars, Court of Veterans Appeals, United States Tax Court and the bar of the United States Court of Appeals of the 2nd, 3rd and 5th Circuits.