Download Full Text (20.1 MB)
Download Title page, copyright, table of contents (1.3 MB)
Download Chapter 1 - View of the UAS Market (2.0 MB)
Download Chapter 2 - UAS Law - Legislation, Regulation and Adjudication (2.9 MB)
Download Chapter 3 - Understanding Hostile Use and Cyber-Vulnerabilities of UAS (1.8 MB)
Download Chapter 4 - INFOSEC – Protecting UAS Information Channels & Components (721 KB)
Download Chapter 5 - Intelligence & Red Teaming (707 KB)
Download Chapter 6 - Case Studies in Risk for UAS (654 KB)
Download Chapter 7 - UAS SAA Methodologies, Conflict Detection & Resolution Principles (1.9 MB)
Download Chapter 8 - Designing UAS Systems for Stealth (1.1 MB)
Download Chapter 9 - Case Study Smart Skies Project (1.8 MB)
Download Chapter 10 - UAS Intelligence, Surveillance and Reconnaissance (ISR) (1.9 MB)
Download Chapter 11 - UAS Weapons (1.9 MB)
Download Chapter 12 - UAS System Deployment and Information Dominance (ID) (1.6 MB)
Download Chapter 13 - Data Links Functions, Attributes and Latency (2.8 MB)
Download Chapter 14 - Exposing UAS Vulnerabilities via Electronic Warfare (3.0 MB)
Download Chapter 15 - Africa - World’s First Busiest Drone Operational Proving Ground (3.5 MB)
Download Chapter 16 - Chinese Drones in Spratly Islands, and Chinese Threats to USA Forces in Pacific (2.8 MB)
Unmanned Aircraft Systems (UAS) are an integral part of the US national critical infrastructure. They must be protected from hostile intent or use to the same level as any other military or commercial asset involved in US national security. However, from the Spratly Islands to Djibouti to heartland America, the expanding Chinese Unmanned Aircraft Systems (UAS / Drone) industry has outpaced the US technologically and numerically on all fronts: military, commercial, and recreational.
Both countries found that there were large information security gaps in unmanned systems that could be exploited on the international cyber-security stage. Many of those gaps remain today and are direct threats to US advanced Air Assets if not mitigated upfront by UAS designers and manufacturers. The authors contend that US military / commercial developers of UAS hardware and software must perform cyber risk assessments and mitigations prior to delivery of UAS systems to stay internationally competitive and secure.
The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This book will fully immerse and engage the reader in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). Topics covered include National Airspace (NAS) policy issues, information security, UAS vulnerabilities in key systems (Sense and Avoid / SCADA), collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.
New Prairie Press
Cybersecurity, Online Cybersecurity Certificate, Cyber Security, Cybersecurity, Cyber Security Course, Online Cyber security courses, Cybersecurity program, Cybersecurity Books, Cybersecurity specialist, Security book, Cyber Domain, Cybersecurity professional, Information security books, Cybersecurity and cyberwar, Cyberwar book, Infosec books, DRONE, UAS, UAV/Drone, UCAV, Unmanned Aircraft Systems, Aircraft, Intelligence, Surveillance, Reconnaissance, C4ISR, ISR Platforms, Autonomous Drone, SWARM, Aviation unmanned, Air drone, Commercial drones, Drone applications, Defense, Air Assets, UAS capabilities, Drone aviation, Drone controllers, Hostile Use, Drone Technology, Flying drones for military, UAS/Drone warfare, Small surveillance drones, SUAS, UAV Drone, UAV payloads, Unmanned Aerial systems, Unmanned Aerial Vehicle, Unmanned Aircraft Systems, Unmanned Aircraft
Nichols, Randall K.; Mumm, Hans C.; Lonstein, Wayne D.; Ryan, Julie J.C.H.; and Carter, Candice, "Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA's Advanced Air Assets" (2018). NPP eBooks. 21.
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License.