Table of Contents -Detailed
Title Page
Cover Art (Brenda Andrews, Suzanne Sincavage, Candice Carter)
Copyright / Publication Page
Books also by Professor Randall K. Nichols and the Wildcat Team
Dedications
Disclaimers (Lonstein)
Foreword (Harding)
Preface (Nichols)
Acknowledgments
List of Contributors
Abbreviations and Acronyms (Reduced to only Book 6)
Table of Contents
Table of Figures
Table of Tables
Table of Equations
Chapters
Section 1: Chemical, Biological, Radiation, Nuclear, Explosive (CBRNE) Weapons / Payloads
- Drone’s Capabilities to Deliver Weapons of Mass Destruction / Disruption (WMDD) – a Global Perspective (Slofer)
Learning goals
Weaponization Brief history Major types of Drones/Robots
Aquatic drones
Surface vessels
Submergible
Robots/drones
Unmanned Aerial Vehicle (UAV),
Conclusions
Bibliography
- Chemical Weapons (Hood)
Student Objectives
Introduction
Case Study 1: The Potential for Chemical Weapons Release in Ukraine
Case Study 2: Chemical Weapons Release in Syria and the Organization for the Prohibition of Chemical Weapons
Ghouta: The Ieper of the 21st Century
False Declaration and Chemical Weapons Attacks
Deepening Chemical Weapons Crisis
OPCW Response to Widening Chemical Weapons Use
The Fight for a Future Free of Chemical Weapons
The intersection of Drones and Chemical Weapons
A Parting Nightmare
Bibliography
- Biological Weapons (Sincavage & Carter)
Student Objectives
Introduction
Early Unmanned Biological Weapon
Attack
Terrorist Groups
Democratic People’s Republic Of Korea (DPRK) (North Korea)
Drone Swarms
Detection
Conclusions
Bibliography
4. Radiological, Electromagnetic, Drone & Metaverse Risks and Issues (McCreight)
Introduction 2
Radiological Threats—Everything Old is New Again
The Nature of Radiological, Electromagnetic, and Drone Risk Inside the Metaverse
Radiological and Electromagnetic Risks and the Era of Cognitive Warfare
Threat Dynamics—Radiological and Electromagnetic Issues Post 2021
Grasping the Non-Kinetic Aspects of CONV-CBRN
Special Delivery of Death and Destruction: Adding Drone Risk Factors Post 2021
CONV-CBRN Drone Augmented Threat and Risk Possible Scenarios
CONV-CBRN–Onward Security and Risk Challenges Post 2021
Conclusions
- Nuclear Weapons (Carter)
Student Objectives
Introduction
State Actors
Russia
Soviet Union
Russian Federation
Посейдон And Белгород
Nuclear Alert Status
China
Other Countries
Conclusions
Bibliography
Endnotes
- Explosives Delivered by Drone (Hood)
Student Objectives
Introduction
Case study 6.1:
Case Study 2: Ukraine Adapting Drones to Drop Improvised Explosives
Case Study 3: Anti-Personnel Munitions
Point shooting with a drone
Case Study 6.4: Loitering Munitions
Conclusions
Bibliography
- Deception (Nichols)
Student objectives
Introduction
Vulnerabilities of modern societies to UAS attack
Basic terminology
Perspectives of deception
Deception maxims
Surprise
Four Fundamental Principles
Three examples of UAS Attacks that could be Destruction, Disruption, or Deception (D/D/D)
Taxonomy of Technical Methods of Deception
Technical Sensor Camouflage, Concealment, and Deception (CC&D)
CEA
Information Operations (IO)
Signal and Information Systems (IS) Denial and Deception
Electronic Warfare (EW)
EW Generalities
Legacy EW definitions
Spoofing – GPS Spoofing
Spoofing techniques
Eichelberger’s CD – Collective Detection Maximum Likelihood Localization Approach (ECD)
Signals Intelligence (SIGINT)
Conclusions
Bibliography
Endnotes
Section 2: Directed Energy Weapons (DEW) / Payloads
- DEW Primer (Nichols)
Student Objectives
Introduction
Common Framework
Effects Of Directed Energy Weapons (Dew)
The Beloved Btu Gives Way To Joules
Energy Required For Damage
Ice Cube
10,000 Joules
Energy Alone Sufficient For Hard Damage?
Energy Delivery Rate
Thermal Conduction
Constant Surface Temperature Case
Convection
Wind V Temperature Convection Heat
Vacuum Black Body Radiation
Implications
Fluence And Intensity
All-Purpose Damage Criteria
Energy Spread And Loss In Propagation
Energy Spread
Conclusions
Bibliography
Endnotes
- DE Weapons, Projectiles, Damage (Nichols)
Student Objectives
Introduction
Common Framework (Chapter 8 Recap)
Fundamentals Of Kew
Hunting Wild Boars
At The Boar Skin
Damage
Sacrificial Drones
Propagation In An Atmosphere
Sir Isaac Newton (1643-1727)
Newton’s First Law
Newton’s Second Law
Newton’s Third Law
Shooting In The Air
Drone Vs. Drone In Air – Complexity
Flight Equations With Forces
Thrust
Vertical Location
Vertical Descent
Velocity
Acceleration
Vertical Ascent
Horizontal Location
Summary: Propagation In The Atmosphere
Interaction With Targets – Damage
Pressure And Impulse
Angle Of Attack (AoA)
Target Material And Shape
What Is Damage?
Sabot Projectile Design
Shaped Charges
Modern Military
Shape Charge Functions
Summary: Target Interaction
Bibliography
10: DE Weapons, MASERS/LASERS (Mai)
Student Objectives
Laser Pointer
Can A Laser Pointer Be Used To Bring Down A Drone?
Infrared Interference
Bright Lights
Heat Damage
Is Taking A Drone Down With A Laser Illegal?
Rafael Drone Dome
Raytheon Drone-Killing Laser
Athena
Evasive Measures Used By Drones
Which Laser Colors Are The Most Dangerous And Why?
Hy Are Blue Laser Pointers More Dangerous?
What Laser Pointer Color Is The Most Powerful?
Classes Of Laser Pointers
Class 1 Laser Pointers
Class 2 Laser Pointers
Class 3 Laser Pointers
Class 4 Laser Pointers
Laser Pointer Summary
A Little History
Military Interests
Weaponizing The Laser
Moore’s Law Implications
Nanotechnology
Fair-Weather Lasers
Power Issues
For The Geeks
New Threats
A Solution Waiting For A Conflict
Laser Weapons Of Potential Adversaries
Other Considerations
Conclusion
Bibliography
Endnotes
- DE Weapons, Microwaves (Mai)
Student Objectives
Back to Microwave Ovens
Microwave Weapon
U.S. Microwave Weapons Antipersonnel Microwave Weapons
Neurological Microwave Weapons
Hello, Goodbye, and Goodnight
The PANDORA Project
Biological Microwave Weapons
Skin Irritation
Frey Effect Weapons
CHAMP
Russian Microwave Weapons
Chinese Microwave Weapons
Detecting And Disabling Drones
Drone Detection Radar
Detecting Drones Using RC
Detection and Jamming Ranges
Deploying CUAV Systems
Conclusions
Managing Editor’s Opinion
Bibliography
- Hypersonic Drone Missiles (Slofer)
Student Objectives
The Speed spectrum
Subsonic
Supersonic
Hypersonic
Speed and Distance
Types of Hypersonic missiles
Types of Launch Platforms
Stationary Land Based
Sea/ocean based
Power Plants/ Propulsion systems
Supersonic-combination ramjet aka scramjet
Technology considerations for hypersonic
Navigation, guidance, and control systems
Other considerations
Military application and threats
Time is everything
Doctrines, Policies, and Strategies in an era of hypersonic weapons
Summary
Bibliography
- Acoustic Weapons (Nichols, Carter, McCreight)
Student Learning Objectives
Disclaimer
Detection Signatures Review
Essentials of Audiology
Audiology Fundamentals
The intensity and Inverse Square Law
Decibels
The Nature of Sound
Other Parameters of Sound waves
Complex waves
Standing Waves and Resonance
In terms of UAS. Countermeasures, why are Acoustics so important?
What are the Acoustic Detection Issues?
Can UAS acoustic signatures be reduced?
Is Acoustic Quieting possible?
What is an Acoustical attack on the UAS’s Gyroscope?
How has the Long-Range Acoustic Device (LRAD) been used as a sonic weapon?
LRAD
NATO Autonomous Mine Sweepers (ATM)
MEMS
Resonance Effects on MEMS – we have arrived at the NUB of this section
What is Resonance Tuning?
What is the “so what” for Acoustics?
Are there Countermeasures for Acoustic attacks on gyroscope?
South Korean Experiment
NOISE
UAS Collaboration – SWARM
Remember the Problem the Wildcat team has addressed in every book of our series.
A Problem Solution Not The ONLY Problem Solution:
Switching to A Dangerous Theater of Operations (TO) – Chinese Drones in the Spratly Islands, and Chinese Threats to USA forces in the Pacific
Location of the Spratly Islands and Their Strategic Importance
Target Drones
Shark Swarm and Wanshan Marine Test Field
Fast Drone Ship
Long-Range UUV
Crisis Watch
Red Drones over Disputed Seas
BZK -005
DRONESEC Report April 2022
Acoustic Dynamics: Havana Syndrome and Neurological Vulnerability
Acoustics and Havana Syndrome Illustrate our Collective Neurological Vulnerability
Acoustic Technologies
SCREAMERS
Bibliography
- Satellite Killers [Jackson]
Student Learning Objectives
Satellites
Introduction
Classification of Satellites
Satellite Orbits
Centric classifications
Altitude classifications
Inclination classifications
Eccentricity classifications
Synchronous classifications
Satellite Killers
Introduction
Denying space
Satellite Killers: China
Satellite Killers: Russia
Space Awareness and Space-Based Weapons
Questions
Bibliography
Informative Readings and Additional Bibliography
Satellite Killing and Denying Space
Space Awareness and Space-based Weapons
Space Breakthroughs and Inventions
- Cyber Weapons and CBRNE (Nichols)
Student Objectives
Problem – The Risk of Terrorist Attack vs. U.S. Air Defense System or CBRN Facilities
CBRN Infrastructure Attacks
Contributing Technologies
Attack / Defense Scenarios
Description of the sUAS/UAS Landscape – What’s available for Deployment against CBRNE Assets?
Autonomy v Automation Levels
UAS Collaboration
Cyber Related CBRNE Attacks
Drones as Rogue Access Points
CBRNE Attack Scenarios
What Is the Counter-UAS Problem?
Operational Protection from Hostile UAS Attacks – A Helicopter View
Countering UAS Air Threats
Vulnerabilities Perspective
Conventional Vulnerabilities of Air Defense Systems (ADS), Attacks By sUAS, and Countermeasures
Conventional Countermeasures Against sUAS / UAS
Passive Measures
Conclusions
Discussion Topics
US Navy Official Response
The Case for a Cyber Weapon
Discussion Question
Bibliography
Endnotes
Section 3: Policy Considerations
- Assessing the Drone Delivery Future WMDD / DEW Threats and Risks (Mumm / Lonstein)
Student Learning Objectives
A Look Back at the Traditional Delivery Systems
Stack Integration-Emerging Technologies Offers New Tactics, Techniques, and Procedures (TTPs)
Assessment of Emerging Threats of Mini-WMD
Does the World Have an Answer to These Emerging Threats?
Airspace-Freedom of Movement of Autonomous Systems
Risks to Access in Time and Space? How Over The Horizon Capability Limits the Usefulness of Freedom of Movement Policies
Legal Considerations for Autonomous Systems as WMD/DEW Delivery Platforms
Assessment of the State of Readiness for the Legal Community to Prosecute Cases with Autonomous Systems Use in the WMD/DEW space
Legal and Cyber Considerations While Building the Legal Framework Towards Peaceful Containment/Use of Autonomous Systems in the Future
Conclusions
Questions
References
- Unique Challenges of Responding to Bioterrorism and Chemical Threats and Attacks delivered by Drones (Sincavage & Carter)
Student Objectives
Introduction
Advanced Robotics
Robotics: Technology Overview
3D Printing
Bioprinters
The Risks
The Opportunities
Conclusions
Bibliography
- Practical Crime Scene Investigation (CSI) Using Autonomous Systems (Mumm / Lonstein)
Student Learning Objectives
A Look Back at the Science of Crime Scene Investigation (CSI)
Challenges of CSI in Hot Zones-Why Not Use Robots?
Autonomous Systems Technology to Augment Human CSIs
Legal Considerations for Autonomous Systems Use at a Crime Scene
Autonomous Evidence: If You Can’t Explain It, Courts Will Not Allow It
Prosecutorial Evidence Collection by Human CSI VS. Autonomous Systems
Evidence Preservation Via Chain of Custody-Technical and Cyber Considerations
Augmenting and Integrating Artificial Employees/Autonomous CSIs-The Changing -Horizon of Scene Collection and Justice for All?
Conclusions
Questions
- Navigation Spoofing and ECD (Nichols)
Student Objectives
Summary
Definition: Spoofing
Introduction
Spoofing
GPS Signal
Classic Receivers
A-GPS – Reducing The Start-Up Time
Course – Time Navigation
Snapshot Receivers
Collective Detection
ECD
Research To 2016: Survey Of Effective GPS Spoofing Countermeasures
Spoofing Techniques
A-F Analysis
GPS Spoofing Research: Out Of The Box Brilliance To ECD Defense
Maximum Likelihood Localization
Spoofing Mitigation
Successive Signal Interference Cancellation
GPS Signal Jamming
Two Robust GPS Signal Spoofing Attacks and ECD
Seamless Satellite-Lock Takeover
Navigation Data Modification
ECD Algorithm Design
Branch And Bound
ADS-B Security
ADS-B Standards
ADS-B Security Requirements
Vulnerabilities In ADS-B System
Broadcast Nature of RF Communications
No Cryptographic Mechanisms
ADS-B Cots
Shared Data
Asterix Data Format
Dependency On The On-Board Transponder
Complex System Architecture And Passthrough Of GNSS Vulnerabilities
Threats To ADS-B System
Eavesdropping
Data-Link Jamming
Two Types Of Jamming Threats For ADS-B
Ground Station Flood Denial
Aircraft Flood Denial
ADS-B Signal Spoofing
Ground Station Target Ghost Injection / Flooding
Aircraft Target Ghost Injection / Flooding
ADS-B Message Deletion
ADS-B Message Modification
Circling Back To ECD
Indoor Localization With Aircraft Signals Using ECD Vs. Competitive Technologies
ECD Vs. Minimum Us Government GPS Standards
Related Work
WiFi [T]
Ultrasound [I]
Light [T,E]
Bluetooth [T, I]
RFID [I]
Sensor Fusion
HAPS
Security Of GNSS
Conclusions
Definitions
Bibliography
Endnotes
Section 4: Tools of the Trade
- Social Network implications for WMDD (Lonstein)
Student Learning Objectives
Social Media Networks as a Weapon of Mass Destruction, Distraction, and Division
Consumer and Commercial Drone Technology as a Tool of Espionage, Command, and Kinetic attacks
Questions for Students to Consider
Bibliography
- Tools of The Trade (Monnik & Neo)
Student Objectives
Introduction
Accuracy
Reliability
Timeliness
Tools for UAS Threat Intelligence
Open-Source Tools
Closed-Source Tools
Collection data types
Tools for historical and current UAS threat intelligence
Configuring Google (Open-Source, free)
Configuring LiveUAMap (Open-Source, paid)
Tools for current and future UAS threat intelligence
Configuring Slack (Closed-Source, free)
DroneSec Notify (Open/Closed-Source, free/paid)
Stolen Drone Info (Open/Closed-Source, free/paid)
Conclusions
Bibliography
Endnotes