Download Full Text (30.4 MB)

Download Title page, copyright, and other front matter (761 KB)

Download Chapter 1 - A View of the UAS Market (566 KB)

Download Chapter 2 - UAS Law - Legislation, Regulation, and Adjudication (914 KB)

Download Chapter 3 - Understanding Hostile Use and Cyber-Vulnerabilities of UAS (1.0 MB)

Download Chapter 4 - INFOSEC – Protecting UAS Information Channels & Components (287 KB)

Download Chapter 5 - Intelligence & Red Teaming (182 KB)

Download Chapter 6 - Case Studies in Risk for UAS (153 KB)

Download Chapter 7 - UAS SAA Methodologies, Conflict Detection (848 KB)

Download Chapter 8 - Designing UAS Systems for Stealth (833 KB)

Download Chapter 9 - Case Study Smart Skies Project (1.1 MB)

Download Chapter 10 - UAS Intelligence, Surveillance and Reconnaissance (ISR) (1.2 MB)

Download Chapter 11 - UAS Weapons (615 KB)

Download Chapter 12 - UAS System Deployment and Information Dominance (ID) (2.0 MB)

Download Chapter 13 - Data Links Functions, Attributes and Latency (1.6 MB)

Download Chapter 14 - Exposing UAS Vulnerabilities via Electronic Warfare (EW) and Countering with Low Probability Intercept Signals (LPI) (4.3 MB)

Download Chapter 15 - Africa - World’s First Busiest Drone Operational Proving Ground (5.1 MB)

Download Chapter 16 - Chinese Drones in Spratly Islands, and Chinese Threats to USA forces in Pacific (2.0 MB)

Download Chapter 17 - High-Altitude Platforms (HAPS) – A Promise not Reached (404 KB)

Download Chapter 18 - C-UAS and Large Scale Threats (571 KB)

Download Chapter 19 - Audiology, Acoustic Countermeasures against Swarms and Building IFF Libraries (2.0 MB)

Download Chapter 20 - Legal and Regulatory – Where It Was, Where It Is and What’s Ahead? (1.2 MB)

Download Chapter 21 - Chinese UAS Proliferation along New Silk Road Sea/Land Routes (1.5 MB)

Download Chapter 22 - Ethics in the New Age of Autonomous Systems and Artificial Intelligence (AI) (1.2 MB)


Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.

This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).



Publication Date


Edition Statement

Second Edition


A web version of this edition is available at

Previous Editions

Nichols, Randall K.; Mumm, Hans C.; Lonstein, Wayne D.; Ryan, Julie J.C.H.; and Carter, Candice, "Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA's Advanced Air Assets" (2018). NPP eBooks. 21.


New Prairie Press




Cybersecurity, Online Cybersecurity Certificate, Cyber Security, Cybersecurity, Cyber Security Course, Online Cyber security courses, Cybersecurity program, Cybersecurity Books, Cybersecurity specialist, Security book, Cyber Domain, Cybersecurity professional, Information security books, Cybersecurity and cyberwar, Cyberwar book, Infosec books, DRONE, UAS, UAV/Drone, UCAV, Unmanned Aircraft Systems, Aircraft, Intelligence, Surveillance, Reconnaissance, C4ISR, ISR Platforms, Autonomous Drone, SWARM, Aviation unmanned, Air drone, Commercial drones, Drone applications, Defense, Air Assets, UAS capabilities, Drone aviation, Drone controllers, Hostile Use, Drone Technology, Flying drones for military, UAS/Drone warfare, Small surveillance drones, SUAS, UAV Drone, UAV payloads, Unmanned Aerial systems, Unmanned Aerial Vehicle, Unmanned Aircraft Systems, Unmanned Aircraft


Aeronautical Vehicles | Aerospace Engineering | Aviation and Space Education | Higher Education | Other Aerospace Engineering | Science and Technology Studies

Creative Commons License

Creative Commons Attribution-Noncommercial 4.0 License
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License.

Unmanned Aircraft Systems in the Cyber Domain