Table of Figures
- Drone Capabilities to Deliver Weapons of Mass Destruction / Disruption (WMDD) -Global Perspective
Figure 1.1-Armed Unmanned Surface Vehicle from BAE Systems
Figure 1.2 Dumpsites of reported chemical and explosive munitions from 1918-to-1980
Figure 1.3 Robot drone
Figure 1.4 Robot drone
Figure 1.5 Robot drone
Figure 1.6 DARPA funded Atlas robot developed by Boston Dynamics
Figure 1.7 Aerial drone used in movie scene filming
Figure 1.8 Image of Predator B drone
Figure 1.9 Use of synchronized swarming drones in a night display
Figure 1.10 Field assembly of a drone capable of thermal imaging and delivery of 1.5kg bombs
Figure 1.11 Drones are being used to drop Molotov cocktails against Russian troops in Ukraine.
Figure 1.12 DJI drone caring grenade in an improvised carrier made from a plastic jug
- Chemical Weapons
Figure 2.1 Soldiers in Mission Oriented Protective Posture (MOPP) Gear
Figure 2.2 Civil Defense member carries a damaged canister in Ibleen village.
Figure 2.3 Soldier in MOPP Gear Ready
Figure 2.4 Mustard gas artillery shells
Figure 2.5 Agriculture Drone is spraying pesticides on crops
Figure 2.6 DJI Agri’s T30
- Biological Weapons
Figure 3.1 Early Unmanned Bioweapons
Figure 3.2 Spraying Drone
Figure 3.3 African Swine Fever Across Asia
Figure 3.4 Democratic People’s Republic Of Korea (DPRK) (North Korea) Drone
Figure 3.5 Swarm Of Mass Destruction
- Radiological, Electromagnetic, Drone & Metaverse Risks and Issues
Figure 4.1 Common Sources of Radiation
Figure 4.2 Cognitive Key Terrain
Figure 4.3 Radiological Spectrum
Figure 4.4 Anechoic Chamber[large vs. small] example
Figure 4.5 CONV-CBRN Threat Dynamics
Figure 4.6 Setting the Stage for NV
- Nuclear Weapons
Figure 5.1 Russian President Vladimir Putin Addresses The Russian Federal Assembly
Figure 5.2 Russian Poseidon 2m39 Torpedo
Figure 5.3 A&B Belgorod – Russian Unmanned Nuclear Submarine
Figure 5.4 Belgorod – Russian Unmanned Nuclear Submarine
Figure 5.5 China Nuclear Expansion
Figure 5.6 China Drone Lineup Sharp Sword Stealth Drone And The Wing Loong Reaper
- Explosives Delivered by Drone
Figure 6.1: A Picture Taken By A Drone From Above Its Intended Target.
Figure 6.2: Ukrainians Develop Drone That Drops Molotov Cocktails
Figure 6.3: Close-Up – Ukrainians Develop Drone That Drops Molotov Cocktails
Figure 6.4: Molotov Cocktail Released
Figure 6.5: Heavy Modifications To Civil Drone Platforms Enabled To Carry Very Low Cost Yet Powerful Munitions Such As Mortars 60-81mm Rounds.
Figure 6.6: Point Shooting with a Drone
Figure 6.7: Russian KUB-BLA “Suicide Drone”
Figure 6.8: KUB-BLA Russian Loitering Munition
Figure 6.9: Russian Suicide Drone Used in Ukraine That Picks its Targets Though Advance AI
Figure 6.10: The Wreckage of Another Russian KUB-BLA Loitering Munition
Figure 6.11: US Marine firing Switchblade from a pneumatic launch tube
Figure 6.12: Switchblade 600
Figure 6.13: Artist rendition of a switchblade launch
- Deception
Figure 7.1 Operating Nuclear Power Plants within the U.S.
Figure 7.2 Cyber Electromagnetic Activities
Figure 7.3 CEA / CEW in the view of Total War
- DEW Primer
Figure 8.1 Energy Deposition from Bombs and DEW
Figure 8.2 Energy Flow and Resulting Change in Temperature
Figure 8.3 Special Case: Constant Surface Temperature
Figure 8.4 Effect of Wind v Temperature
Figure 8.5 Black Body Radiation
Figure 8.6 Fluence and Intensity
Figure 8.7 Depth Vaporized by 104 Joules v Area Engaged and Fluence
Figure 8.8 Divergence and Jitter
9: DE Weapons, Projectiles, Damage
Figure 9.1 Coyote unmanned aircraft system.
Figure 9.2 Coyote unmanned aircraft system on the tarmac of Avon Park Air Force Range in Florida.
Figure 9.3 IAI Israeli Harop
Figure 9.4 Newtons Second Law of Motion Relationships
Figure 9.5 Projectile Distance and Velocity Coordinates
Figure 9.6 Effect Of Elevation Angle On Velocity Components
Figure 9.7 Flight Equations with Drag
Figure 9.8 Thrust
Figure 9.9 Smashing two Bricks without spacers for 2nd Degree Black Belt Test
Figure 9.10 Possible Effects Of Kinetic Energy Projectiles
Figure 9.11 SABOT APFSDS Projectile
Figure 9.12 HEAT Projectile
Figure 9.13 Charge Projectile Detail
- DE Weapons, MASERS/LASERS
Figures 10.01 & 10.02 Laser Pointers – Pilot View
Figure 10.00 Laser Pointer (small)
Figure 10.1: Charles Townes (Left) And Jim Gordon With A Beam Type Maser.
Figure 10.2: Theodore Maiman
Figure 10.3: Laser Coherence
Figure 10.4: Laser Dazzler For M-4 Rifle
Figure 10.5: Laser Dazzler In Operation
Figure 10.6: Atmospheric Influences
Figure 10.7: Laser Platform Mounted On Boeing 747
Figures 10.8 & 10.9: Laser Testing
Figure 10.10: Laser Weapon Destroying UAV
Figure 10.11: Hel (High Energy Laser) USS Ponce
Figure 10.12: Drone Being Destroyed
11: DE Weapons, Microwaves
Figure 11.1: Microwave Portion of the Electromagnetic Spectrum
Figure 11.2: Kitchen Microwave
Figure 11.3: Inside of ordinary kitchen microwave oven
Figure 11.4: Magnetron and Set-up Transformer
Figure 11.5 ADS (Active Denial System) / LRAD (Long Range Active Denial)
Figure 11.6: US embassy in Havana, Cuba
Figure 11.6A Two styles of US Marine Corps trucks are seen carrying the Active Denial System, March 9th, 2012, at the US Marine Corps Base Quantico, Virginia. The non-lethal weapon projects a strong electromagnetic beam up to 1000-meters
Figure 11.7: Frey Effect
Figure 11.8: CHAMP
Figure 11.9 DJI Phantom 4
Figure 11.10: Analyzing a Radar Pulse Using an R&S Spectrum Analyzer
Figure 11.11: Theoretical Detection Range Without Noise
Figure 11.12: Theoretical Detection Range With Noise, e.g., In An Urban Environment.
Figure 11.13: Theoretical jamming range
Figure 11.14: Jamming ration for CE-compliant remote control operating in the 2.4GHz ISM band
- Hypersonic Drone Missiles
Figure 12.1 Comparison of speeds for various aircraft and vehicles
Figure 12.2 Commercial flight time from New York City to Orlando Florida
Figure 12.3 Categories of Hypersonic missiles
Figure 12.4 HGV trajectories compared to a Ballistic Reentry Vehicle
Figure 12.5 Detection avoidance
Figure 12.6 Russia’s land-based silo launch
Figure 12.7 India Mobile Launcher
Figure 12.8 Zircon Hypersonic missile ship launch
Figure 12.9 Aircraft launched a hypersonic missile
Figure 12.10 Cutaway diagram of a basic jet engine
Figure 12.11 Cutaway diagram of scram engine
Figure 12.12 General thrust equation
Figure 12.13 Tile weights per cubic foot for the Thermal Protection System tiles used on the STS Orbiter
Figure 12.14 Cutaway diagram of the X-51A HCM with subsystems
Figure 12.15 Countries pursuing hypersonic weapon technology
Figure 12.16 Attack scenario against 3 NATO countries from a Baltic based launch
Figure 12.17 Distances between possible Chinese launch sites and targets in Korea, Japan, and Taiwan
Figure 12.18 Various Ranges for ballistic coverage from eastern Chinese missile launch facilities providing coverage in the south Pacific
Figure 12.19 Illustration of China’s hypersonic tests
Figure 12.20 The Observe. Orient. Decide. Act-Loop
Figure 12.21 Cruise missiles’ launch footprints and travel times to target
Figure 12.22 Possible target coverage ranges of a Hypersonic Glide Vehicle
- Acoustic Weapons
Figure 13.1: Inverse Square Law, Sound Intensity
Figure 13.2 shows common decibel and Intensity levels within the hearing range.
Figure 13.3: Tuning for Oscillations
Figure 13.4: Tuning fork oscillations over time
Figure 13.5: Standing wave
Figure 13.6 LRAD
Figure 13.7 NATO OTAM ATM
Figure 13.8 LRAD Ship Defense on USS ESSEX
Figure 13.9: MEMS Gyroscope
Figure 13.10 Location of Dongsha Island and Taiwan
Figure 13.11 Spratly Islands
Figure 13.12 Spratly Islands
Figure 13.13 S-100 Chinese Drone
Figure 13.14 S-100 Drone Trajectories in the Spratly Islands
Figure 13.15 BZK -005 Chinese Drone
Figure 13.16 Chinese UAS. Chinese Intelligence Assets Deployment in Spratlys
Figure 13.17 Malicious Drone Activities in SCS near Taiwan
Figure 13.18 ATS – SCREAMER
- Satellite Killers
Figure 14.1. A satellite in Low Earth Orbit (LEO) around Earth
Figure 14.2. Classification of altitude orbits and uses
Figure 14.3. Number of Russian (left) and Chinese (right) satellites in orbit between 2019 and 2021
Figure 14.4. The counter-space continuum shows the range of threats to space-based satellite services
Figure 14.5. Computer simulation of tracked objects in Earth’s orbit. Red, yellow, and green objects are representations of active satellites and debris in the GEO and MEO.
Figure 14.6. Space-based weapons
- Cyber Weapons and CBRNE
Figure 15.1 CIS Shared Threats
Figure 15.2 Infrastructure Interdependencies
- Assessing the Drone Delivery Future WMD / DEW Threats and Risks
Figure 16.1 Picture of a Sea-Air Integrated Drone
Figure 16.2 Diagram showing communications between sea-air drone and remote operator
Figure 16.3 Illustration of UMVs, UGVs, and UAVs swarms working together
Figure 16.4: Image of a soldier and a Black Hornet UAV
Figure 16.5 Timeline of Industrial Revolutions,
Figure 16.6 Future capabilities of autonomous/ AI systems
Figure 16.7 Image of Industrial Revolution and the next revolution
Figure 16.8 WWII Red Cross Prisoner of War Gift Package
Figure 16.9 United States Department of Defense
Figure 16.10 MIT Technology Review
- Unique Challenges of Responding to Bioterrorism and Chemical Threats and Attacks Delivered By Drones
Figure 17.1 Chemputer Drones
Figure 17.2 3D Printed Drone
Figure 17.3 ISIS 3D Printed Bomb
Figure 17.4 3D Bioprinter
- Practical Crime Scene Investigation (CSI) Using Autonomous Systems
Figure 18.1 A Timeline of the History of Forensic Science
Figure 18.2 Law enforcement humanoid in Dubai shopping mall
Figure 18.3. Law enforcement humanoid in a public space
Figure 18.4 UGV assisting at an IED site
Figure 18.5 Investigator using a UAV at a crime scene Examining UAV use in CSI-Crash Scene Photo Royal Canadian Mounted Police
Figure 18.6. Side by Side Comparison of DS-1A and DS-1B UAVs
Figure 18.7 A Timeline of Fingerprint Firsts
Figure 18.8 Dr. Henry Lee, examining evidence
Figure 18.9 Glove demonstration from the Simpson trial. The gloves did not fit.
Figure 18.10 Automated Speed Enforcement Technology
Figure 18.11 Scenes from the Rittenhouse courtroom
20. Social Network implications for WMDD
Figure 20.1 A third of US Tik Tok Users may be 14 or under, Raising Safety Concerns.
Figure 20.2 Drone operator flying over rooftops
Figure 20.3 Grenade launched from DJI Phantom
Figure 20.4 DJI Operator
- Tools of The Trade
Figure 21.1 A typical UAS Threat COP over one month.
Figure 21.2 Using search engines to list incident events in the past seven days.
Figure 21.3 Google.com au/ alerts
Figure 21.4 A global view of tweeted drone incidents
Figure 21.5 A collection of words for slack.
Figure 21.6 The free, weekly UAS Threat Intelligence brief Source
Figure 21.7 The UAS TIP provides global incident tracking and analysis capabilities.
Figure 21.8 The DroneSec Notify UAS TIP Dashboard
Figure 21.9 Performing a search for a specific prison Source
Figure 21.10 Viewing a running list of recent high-priority reports
Figure 21.11 Viewing a running list of UAS artifacts
Figure 21.12 A search for C-UAS related content in the Knowledge Base
Figure 21.13 The Stolen Drone Info tool dashboard
Figure 21.14 Example of a stolen drone reported on the SDI.