Unmanned Aircraft Systems in the Cyber Domain - Second Edition
Randall K. Nichols, Kansas State University
Hans C. Mumm, California University of Pennsylvania
Wayne D. Lonstein, VFT Solutions
Copyright Year:
ISBN 13: 9781944548155
Publisher: New Prairie Press
Language: English
Formats Available
Conditions of Use
Attribution-NonCommercial-ShareAlike
CC BY-NC-SA
Reviews
The book is easy to read, and covers the latest developments on UAVs, a.k.a. drones, from the last 10 years. It has been written by a variety of experts, who have contributed with knowledge, definitions, examples, as well as diagrams and... read more
The book is easy to read, and covers the latest developments on UAVs, a.k.a. drones, from the last 10 years. It has been written by a variety of experts, who have contributed with knowledge, definitions, examples, as well as diagrams and photographs of existing, unclassified projects involving drones. Not only the book is informative and easy to follow, but the amount of visual materials makes it appealing to readers interested in this emerging technology.
The contents of the book are accurate, illustrative, and have been obtained from a variety of sources as well as the experiences of each co-author. Generally, the contents are also un-biased, presenting different points of view with a minor focalization in national security and military agencies.
The book is quite relevant to the field of study, and contains valuable information from academics and people from industry. Concepts are carefully explained and accompanied with photos from actual drone-related projects. Whereas the core of the book is not likely to change over time, some projects and side concepts may quickly change. As a matter of fact, a second edition of the book was quickly produced due to the rapid changes in the field. A similar behavior may be expected in the future.
The book is well-organized. Topics are discussed in an easy-to-grasp, chronological order. Descriptions are self-contained, and properly backed up by relevant references.
A long list of acronyms, as used in the field, is listed, presented, and used throughout the text. Readers are invited to look up such table when an acronym is difficult to grasp or it is presented by the first time.
The book is well-modularized, however, some chapters lack proper numbering of sections and subsections, which may complicate distributing their content as reading assignments to students.
The book is well-organized, the contents are presented in a logical fashion, suitable for college students as well as specialists in industry.
Some figures/photos are presented out of context, and are not related to the text contained within the same page. Perhaps a re-organization and/or adding extended captions to the figures would alleviate this problem. Tables are also poorly-formatted, which complicates their understanding.
No grammatical errors, a.k.a., typos, were detected in the text.
Given the fact that drones are one of the most attractive, emerging technologies nowadays, the cultural relevance of this text is high. No offensive materials or contents were found, and a variety of projects depicting drones, with many different domain applications, are presented. However, no clear, explicit examples targeted for diversity and/or inclusion were identified within the text.
The book is authored not only by academic specialists but also by industry and government leaders. The amount of information is quite relevant and there seems to be an effort to keep the book up to date. Readers should be pending for newer editions of the book as the field of UAVs (drones) keeps changing every few years.
The authors provide a comprehensive background of UAS and cyber challenges concerning UAS. The background information is very UAS focused though, without informing the reader about related historical cyber challenges. read more
The authors provide a comprehensive background of UAS and cyber challenges concerning UAS. The background information is very UAS focused though, without informing the reader about related historical cyber challenges.
As may be expected with this rapidly evolving subject matter, some information is out-of-date. The more concerning factor in the accuracy of this text is the sources that were used and how they were represented. In one case an article involving a UAS-crewed aircraft collision was referenced and paraphrased, but the authors failed to mention the incident was not proven to involve UAS. Otherwise, this text does use accurate sources in key areas.
The information presented in this text is highly relevant. Though some information, particularly relating to regulation, has changed since publication, the core of the content will continue to be relevant and should be easily updated.
The authors have taken a complex subject matter and presented it in a manner that is easily understood. Subjects involving uncrewed aircraft systems tend to unavoidably become laden with jargon and technical terms. The Appendix including lists of acronyms, overviews, and figures within the chapters helps to make the subject more easily understood.
The layout and language of the text remained consistent throughout.
The text was well-divided into smaller sections. It cannot be easily realigned due to how the information builds upon itself, but is not overly self-referential.
The early chapters have a logical flow that is easy to follow. The later chapters seem be written with less clarity of broader learning goals.
The interface of this text is no flashy, but it is easy to navigate and provides a thorough yet appropriate amount of visualizations.
No grammatical errors were noticed.
Updates are needed to reflect modern changes in terminology such as the adjustment from unmanned to uncrewed.
The book provides a comprehensive overview of the capabilities and effectiveness of unmanned aircraft systems on the battlefield in urban areas and ways governments can utilize this developing next-gen technology. At the heart of UAS is the... read more
The book provides a comprehensive overview of the capabilities and effectiveness of unmanned aircraft systems on the battlefield in urban areas and ways governments can utilize this developing next-gen technology. At the heart of UAS is the ability for delivering airborne capabilities in intelligence and surveillance while delivering maximum efficiency in the most complex operating environments on our planet.
The book synthesizes many different resources and aligns them with UAS and ADS (Airborne Delivery Systems) which enables them to operate in sophisticated and challenging environments with self-learning autonomous AI systems. There are many chapters that address everything from legal considerations, cyber threats, foreign governments, and so much more.
From Amazon to UPS autonomous drones will become part of our everyday lives within the next decade. Africa is the largest proving ground for this technology and the results show that the efficiency and functionality will be used in a myriad of ways in our everyday life.
This book addressed many of the aspects of surveillance, intelligence, and recognizance in not just UAS but in the ways that governments are using these elements today. While most of the chapters were detailed and comprehensive, sometimes they did not flow together seamlessly, they were still valuable sources of information.
The text was consistent throughout in terms of the terminology and framework used to describe UAS, ADS, and principles of the technology being used.
One of the best attributes of this book is that the chapters are easily adapted to a course and each chapter can expand and integrate with different components.
The organization of the book was comprehensive, easy to navigate, and aligned with current and future geopolitical issues throughout the world.
The interface was straightforward, easy to read, and provided a logical transition through topics.
The book was free from grammatical errors, flowed well, and provided excellent theoretical and practical frameworks.
This text is free from offensive or insensitive remarks or characterizations.
I will integrate this book into future courses.
Detailed analysis of the usage of UAV's in the cyber domain. read more
Detailed analysis of the usage of UAV's in the cyber domain.
second edition updated the use of newer technologies.
Anyone working with UAV's should read this book.
Easy enough to read without expertise with UAV technology.
Updated to maintain changes in technology.
chapters can be read as "read alone" assignments.
chapters can be read as "read alone" assignments.
Images reinforce key points of the text.
No grammar errors
Cultural unbiased.
Excellent rad for those interested with UAV technology.
Table of Contents
- Chapter 1 - A View of the UAS Market
- Chapter 2 - UAS Law - Legislation, Regulation, and Adjudication
- Chapter 3 - Understanding Hostile Use and Cyber-Vulnerabilities of UAS
- Chapter 4 - INFOSEC – Protecting UAS Information Channels & Components
- Chapter 5 - Intelligence & Red Teaming
- Chapter 6 - Case Studies in Risk for UAS
- Chapter 7 - UAS SAA Methodologies, Conflict Detection
- Chapter 8 - Designing UAS Systems for Stealth
- Chapter 9 - Case Study Smart Skies Project
- Chapter 10 - UAS Intelligence, Surveillance and Reconnaissance (ISR)
- Chapter 11 - UAS Weapons
- Chapter 12 - UAS System Deployment and Information Dominance (ID)
- Chapter 13 - Data Links Functions, Attributes and Latency
- Chapter 14 - Exposing UAS Vulnerabilities via Electronic Warfare (EW) and Countering with Low Probability Intercept Signals (LPI)
- Chapter 15 - Africa - World’s First Busiest Drone Operational Proving Ground
- Chapter 16 - Chinese Drones in Spratly Islands, and Chinese Threats to USA forces in Pacific
- Chapter 17 - High-Altitude Platforms (HAPS) – A Promise not Reached
- Chapter 18 - C-UAS and Large Scale Threats
- Chapter 19 - Audiology, Acoustic Countermeasures against Swarms and Building IFF Libraries
- Chapter 20 - Legal and Regulatory – Where It Was, Where It Is and What’s Ahead?
- Chapter 21 - Chinese UAS Proliferation along New Silk Road Sea/Land Routes
- Chapter 22 - Ethics in the New Age of Autonomous Systems and Artificial Intelligence (AI)
Ancillary Material
Submit ancillary resourceAbout the Book
Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.
About the Contributors
Authors
Randall K. Nichols is Professor of Practice in Unmanned Aircraft Systems (UAS) – Cybersecurity at Kansas State University Polytechnic (KSUP) in Salina, Kansas. Nichols serves as Director, graduate U AS- Cybersecurity Certificate program at KSUP. Nichols is internationally respected, with 50 years of experience in leadership roles in cryptography, counterintelligence, INFOSEC, and sensitive computer applications. Throughout his career, Nichols has published seven best-selling textbooks. Nichols has provided counsel to the United States government and is certified as a federal subject matter expert (SME) in both cryptography and computer forensics. His most recent work involves creating master and certificate graduate – level programs for KSU and Utica College.
Dr. Hans C. Mumm holds a Doctor of Management with a concentration in Homeland Security from Colorado Technical University (CTU) and an MS in Strategic Intelligence from American Military University (AMU). He gained notoriety during Operation Iraqi Freedom as the officer in charge of the “Iraqi Regime Playing Cards; CENTCOM’S Top 55 Most Wanted List” which was touted by the Defense Intelligence Agency (DIA) as one the most successful Information Operations (IO) in the history of Defense Intelligence Agency (DIA). Dr. Mumm is the former Division Chief for Cyber Security at the Office of The Director of National Intelligence (ODNI) programming and executing a budget of over $140M. Dr. Mumm has earned twenty-three personal military ribbons/medals including six military unit medals/citations, and two Directors Awards, from the DIA.
Wayne D. Lonstein holds a Bachelor of Arts Degree in Political Science from Wilkes University, a Bachelor of Science Degree in Cyber Forensics and Information Security from Syracuse University – Utica Collage, A Master of Science Degree in Homeland Security with a concentration in Information Security from The Pennsylvania State University and a Juris Doctor Degree from Pace University School of Law. Additionally he holds a CISSP Certification from The Pennsylvania State University. He is a member of the state bars of New York, New Jersey, Massachusetts an Pennsylvania as well as being admitted to over 30 United States District Court Bars, Court of Veterans Appeals, United States Tax Court and the bar of the United States Court of Appeals of the 2nd, 3rd and 5th Circuits.