Table of Figures
BOOK SECTIONS / CHAPTERS
SECTION 1 Counter-UAS (C-UAS) Operations as a Concept
Chapter 1 The Role of Information Technology [Ryan]
Figure 1-1 Simplified OODA Loop
Figure 1-2 Boyd’s Drawing of the OODA Loop
Figure 1-3 Time Elements of the OODA Loop
Figure 1-4 OODA Loop 2.0 – Making Decisions V2.0
Chapter 2 Understanding C-UAS Purpose and Process [Carter]
Figure 2-1 Flock of Drones in the Air
Figure 2-2 UTM and C-UAS
Figure 2-3 Black Sage UASX-L3 Automatic Drone Disruptor
Figure 2-4 Russia’s Kasta 2-2
Figure 2-5 U.S. High Energy Laser Weapon Systems (HELWS)
Figure 2-6 IDS NO-DRONE
Figure 2-7 China’s LW-30
Chapter 3 Developing a C-UAS Strategy, Goals, Options, Target Analysis, Process Selection, Operational Metrics, Approaches to Countering UAS Activities (First Principles) [Mumm]
Figure 3-1 XBee Chip
Figure 3-2 UAV Net
Figure 3-3 Kamikaze Drone Example
Figure 3-4 Mobile High-Powered Microwave System
Figure 3-5 Laser Sensor Ball
Figure 3-6 Iranian Drone
Figure 3-7 Chinese Drones on Parade
Figure 3-8 Toofan Drone
Figure 3-9 Quds-1 Cruise Missile
Figure 3-10 SAAB Giraffe AMB Radar
Figure 3-11 Toofan Detection System
Figure 3-12 StarkStreak II Missile System
Figure 3-13 Example of a High-Powered Microwave System
Figure 3-14 Sample Image of an AVERT C2 System
Figure 3-15 Case Study C-UAS Solution Diagram
Chapter 5 Surveillance and Reconnaissance [Mumm]
Figure 5-1 Drone Capability Diversity
Figure 5-2 Example of RADAR Signal
Figure 5-3 Infrared Heat Signature
Figure 5-4 Air Space Classification
Figure 5-5 ADS-B Signal Broadcast
Figure 5-6 Size Comparison Drone to Commercial Aircraft -A
Figure 5-7 Size Comparison Drone to Commercial Aircraft-B
Figure 5-8 Overlapping Sensor Example
Chapter 6 C-UAS Evolving Methods of Interdiction
Figure 6-1 Blockchain in Supply Chain Management
Figure 6-2 Notional Design of Blockchain-Mitigated Channels of Communication
Figure 6-3 Communications Blockchain Geofence for the Financial District of Manhattan NYC
SECTION 2 C-UAS TECHNOLOGIES AND OPERATIONS
Chapter 7 UAS Area / Airspace Denial [Hood]
Figure 7-1 The Premise of Anti-Access / Area Denial
Figure 7-2 Overcoming Adversarial Defenses
Figure 7-3 Air Space Denial Russian A2AD Strategy and Its Implications for NATO
Figure 7-4 Russian A2AD Strategy Against NATO
Figure 7-5 Drone Shield Drone Sentry
Figure 7-6 Drone Sentry X
Chapter 8 Emerging Interdiction Technologies [Hood]
Figure 8-1 Boeing X-51 Hypersonic
Figure 8-2 Scramjet Engine Principles
Figure 8-3 Raytheon Mobile High Energy Laser System
Figure 8-4 Ascent Vision Technologies Marine Air Defense Integrated System (MADIS)
Figure 8-5 Drone Gun MKIII
Figure 8-6 Typical Layered Russian Air IADS
Chapter 9 Non- Kinetic Military Avionics, EW, CW, DE, SCADA Defenses [Nichols]
Figure 9-1 Global Hawk
Figure 9-2 Chinese Pterodactyl
Figure 9-3 Shows A haze of smoke is seen from the attacked oil plant in Saudi Arabia
Figure 9-4 Strait of Hormuz
Figure 9-5 A Military Avionics System
Figure 9-6 P-3 Orion MPA
Figure 9-7 MPA Example – Swordfish
Figure 9-8 MQ-4C Triton BAMS MPA (unmanned)
Figure 9-9 High-Power Microwave Weapon to Destroy or Disable Swarms of Unmanned Aircraft
Figure 9-10 THOR
Figure 9-11 Raytheon announces delivery of first laser counter-UAS system to U.S. Air Force
Figure 9-12 Information Operations
Figure 9-13 Drone Crash into 737-700 passenger jet while landing at Mozambique
Figure 9-14 Legacy SCADA system for Chemical Plant.
Figure 9-15 UAS SCADA System Internals
Figure 9-16 High -Level C4 Operational Concept Incorporating UAS
Figure 9-17 Drone Jammer Model KWT-FZQ.
Figure 9-18 Simple Radar Block Diagram
Figure 9-19 Simple Surveillance Radar
Figure 9-20 Computer modeling of sophisticated radio electronic systems
Figure 9-21 Cyber Electromagnetic Activities
SECTION 3 Counter C-UAS
Chapter 10 When the Other Side Fights Back – Cyberwarfare, Direct Energy Weapons, Acoustics, Integrating C-UAS into Planning [Nichols]
Figure 10-1 Integration of the Electromagnetic Spectrum (EMS) into Every Operating Domain
Figure 10-2 Electronic Warfare in today’s military environment
Figure 10-3 EMS Purview
Figure 10-4 EMO in EME
Figure 10-5 Collimated light for Laser
Figure 10-6 Laser processing activities as a function of the laser pulse width
Figure 10-7 Microwave portion of the EMS
Figure 10-8 LRAD 1000X
Figure 10-9 Conversion for sound and acoustic wave period to frequency and back
Figure 10-10 Sound EMS Regions
Figure 10-11 Equal Loudness Contours
Figure 10-12 Inverse Square Law, Sound Intensity
Figure 10-13 Common decibel and Intensity levels within the hearing range.
Figure 10-14 Tuning for Oscillations
Figure 10-15 Tuning fork oscillations over time
Figure 10-16 Standing Wave
Figure 10-17 MEMS Gyroscope
Figure 10-18 Chinese CH7 – UAV
Figure 10-19 Okhotnik drone flying next to the SU-57, Russia’s most advanced stealth fighter
Figure 10-20 The Iranian The Shahed 129
Figure 10-21 Israeli Tactical Heron Top of Form
Figure 10-22 Predator C Avenger
Chapter 11 Thinking Like the Enemy – Seams in the Zone [Lonstein]
Figure 11-1 Opana Radar site
Figure 11-2 Battle of Constantinople
Figure 11-3 Talking Drone
Figure 11-4 Trojan Horse
Figure 11-5 Drone Enforcement
SECTION 4 Legal and Administrative Issues
Chapter 12 C-UAS Regulation, Legislation & Litigation from A Global Perspective [Lonstein]
Figure 12-1 Angry Farmer Spoof
Figure 12-2 Global C-UAS Legal Implication Matrix
Figure 12-3 Cockroaches and Nuclear Bombs
Figure 12-4 FAA Law Enforcement Guidance
Figure 12-5 Angel Has Fallen
Figure 12-6 Asimov’s 3 Laws for Robots