Table of Contents -Detailed

Title Page

Cover Art (Brenda Andrews, Suzanne Sincavage, Candice Carter)

Copyright / Publication Page

Books also by Professor Randall K. Nichols and the Wildcat Team

Dedications

Disclaimers  (Lonstein)

Foreword (Harding)

Preface    (Nichols)

Acknowledgments

List of Contributors

Abbreviations and Acronyms (Reduced to only Book 6)

Table of Contents

Table of Figures

Table of Tables

Table of Equations

 

Chapters

Section 1: Chemical, Biological, Radiation, Nuclear, Explosive (CBRNE) Weapons / Payloads

 

  1. Drone’s Capabilities to Deliver Weapons of Mass Destruction / Disruption (WMDD) – a Global Perspective (Slofer)

 

Learning goals

Weaponization Brief history Major types of Drones/Robots

Aquatic drones

Surface vessels

Submergible

Robots/drones

Unmanned Aerial Vehicle (UAV),

Conclusions

Bibliography

 

  1. Chemical Weapons (Hood)

 

Student Objectives

Introduction

Case Study 1: The Potential for Chemical Weapons Release in Ukraine

Case Study 2: Chemical Weapons Release in Syria and the Organization for the Prohibition of Chemical Weapons

Ghouta: The Ieper of the 21st Century

False Declaration and Chemical Weapons Attacks

Deepening Chemical Weapons Crisis

OPCW Response to Widening Chemical Weapons Use

The Fight for a Future Free of Chemical Weapons

The intersection of Drones and Chemical Weapons

A Parting Nightmare

Bibliography

 

  1. Biological Weapons (Sincavage & Carter)

 

Student Objectives

Introduction

Early Unmanned Biological Weapon

Attack

Terrorist Groups

Democratic People’s Republic Of Korea (DPRK) (North Korea)

Drone Swarms

Detection

Conclusions

Bibliography

 

4. Radiological, Electromagnetic, Drone & Metaverse Risks and Issues (McCreight)

 

Introduction                                                                                                                            2

Radiological Threats—Everything Old is New Again

The Nature of Radiological, Electromagnetic, and Drone Risk Inside the Metaverse

Radiological and Electromagnetic Risks and the Era of Cognitive Warfare

Threat Dynamics—Radiological and Electromagnetic Issues Post 2021

Grasping the Non-Kinetic Aspects of CONV-CBRN

Special Delivery of Death and Destruction: Adding Drone Risk Factors Post 2021

CONV-CBRN Drone Augmented Threat and Risk Possible Scenarios

CONV-CBRN–Onward Security and Risk Challenges  Post 2021

Conclusions 

 

  1. Nuclear Weapons (Carter)

Student Objectives

Introduction

State Actors

Russia

Soviet Union

Russian Federation

Посейдон And Белгород

Nuclear Alert Status

China

Other Countries

Conclusions

Bibliography

Endnotes

  1. Explosives Delivered by Drone (Hood)

 

Student Objectives

Introduction

Case study 6.1:

Case Study 2: Ukraine Adapting Drones to Drop Improvised Explosives

Case Study 3: Anti-Personnel Munitions

Point shooting with a drone

Case Study 6.4: Loitering Munitions

Conclusions

Bibliography

 

  1. Deception (Nichols)

 

Student objectives

Introduction

Vulnerabilities of modern societies to UAS attack

Basic terminology

Perspectives of deception

Deception maxims

Surprise

Four Fundamental Principles

Three examples of UAS Attacks that could be Destruction, Disruption, or Deception (D/D/D)

Taxonomy of Technical Methods of Deception

Technical Sensor Camouflage, Concealment, and Deception (CC&D)

CEA

Information Operations (IO)

Signal and Information Systems (IS) Denial and Deception

Electronic Warfare (EW)

EW Generalities

Legacy EW definitions

Spoofing – GPS Spoofing

Spoofing techniques

Eichelberger’s CD – Collective Detection Maximum Likelihood Localization Approach (ECD)

Signals Intelligence (SIGINT)

Conclusions

Bibliography

Endnotes

 

Section 2: Directed Energy Weapons (DEW) / Payloads

 

  1. DEW Primer (Nichols)

 

Student Objectives

Introduction

Common Framework

Effects Of Directed Energy Weapons (Dew)

The Beloved Btu Gives Way To Joules

Energy Required For Damage

Ice Cube

10,000 Joules

Energy Alone Sufficient For Hard Damage?

Energy Delivery Rate

Thermal Conduction

Constant Surface Temperature Case

Convection

Wind V Temperature Convection Heat

Vacuum Black Body Radiation

Implications

Fluence And Intensity

All-Purpose Damage Criteria

Energy Spread And Loss In Propagation

Energy Spread

Conclusions

Bibliography

Endnotes

 

  1. DE Weapons, Projectiles, Damage (Nichols)

 

Student Objectives

Introduction

Common Framework (Chapter 8 Recap)

Fundamentals Of Kew

Hunting Wild Boars

At The Boar Skin

Damage

Sacrificial Drones

Propagation In An Atmosphere

Sir Isaac Newton (1643-1727)

Newton’s First Law

Newton’s Second Law

Newton’s Third Law

Shooting In The Air

Drone Vs. Drone In Air – Complexity

Flight Equations With  Forces

Thrust

Vertical Location

Vertical Descent

Velocity

Acceleration

Vertical Ascent

Horizontal Location

Summary: Propagation In The Atmosphere

Interaction With Targets – Damage

Pressure And Impulse

Angle Of Attack (AoA)

Target Material And Shape

What Is Damage?

Sabot Projectile Design

Shaped Charges

Modern Military

Shape Charge Functions

Summary: Target Interaction

Bibliography 

 

10: DE Weapons, MASERS/LASERS (Mai)

 

Student Objectives

Laser Pointer

Can A Laser Pointer Be Used To Bring Down A Drone?

Infrared Interference

Bright Lights

Heat Damage

Is Taking A Drone Down With A Laser Illegal?

Rafael Drone Dome

Raytheon Drone-Killing Laser

Athena

Evasive Measures Used By Drones

Which Laser Colors Are The Most Dangerous And Why?

Hy Are Blue Laser Pointers More Dangerous?

What Laser Pointer Color Is The Most Powerful?

Classes Of Laser Pointers

Class 1 Laser Pointers

Class 2 Laser Pointers

Class 3 Laser Pointers

Class 4 Laser Pointers

Laser Pointer Summary

A Little History

Military Interests

Weaponizing The Laser

Moore’s Law Implications

Nanotechnology

Fair-Weather Lasers

Power Issues

For The Geeks

New Threats

A Solution Waiting For A Conflict

Laser Weapons Of Potential Adversaries

Other Considerations

Conclusion

Bibliography

Endnotes

 

  1. DE Weapons, Microwaves (Mai)

 

Student Objectives

Back to Microwave Ovens

Microwave Weapon

U.S. Microwave Weapons Antipersonnel Microwave Weapons

Neurological Microwave Weapons

Hello, Goodbye, and Goodnight

The PANDORA Project

Biological Microwave Weapons

Skin Irritation

Frey Effect Weapons

CHAMP

Russian Microwave Weapons

Chinese Microwave Weapons

Detecting And Disabling Drones

Drone Detection Radar

Detecting Drones Using RC

Detection and Jamming Ranges

Deploying CUAV Systems

Conclusions

Managing Editor’s Opinion

Bibliography 

 

  1. Hypersonic Drone Missiles (Slofer)

 

Student Objectives

The Speed spectrum

Subsonic

Supersonic

Hypersonic

Speed and Distance

Types of Hypersonic missiles

Types of Launch Platforms

Stationary Land Based

Sea/ocean based

Power Plants/ Propulsion systems

Supersonic-combination ramjet aka scramjet

Technology considerations for hypersonic

Navigation, guidance, and control systems

Other considerations

Military application and threats

Time is everything

Doctrines, Policies, and Strategies in an era of hypersonic weapons

Summary

Bibliography

 

  1. Acoustic Weapons (Nichols, Carter, McCreight)

 

Student Learning Objectives

Disclaimer

Detection Signatures Review

Essentials of Audiology

Audiology Fundamentals

The intensity and Inverse Square Law

Decibels

The Nature of Sound

Other Parameters of Sound waves

Complex waves

Standing Waves and Resonance

In terms of UAS. Countermeasures, why are Acoustics so important?

What are the Acoustic Detection Issues?

Can UAS acoustic signatures be reduced?

Is Acoustic Quieting possible?

What is an Acoustical attack on the UAS’s Gyroscope?

How has the Long-Range Acoustic Device (LRAD) been used as a sonic weapon?

LRAD

NATO Autonomous Mine Sweepers (ATM)

MEMS

Resonance Effects on MEMS – we have arrived at the NUB of this section

What is Resonance Tuning?

What is the “so what” for Acoustics?

Are there Countermeasures for Acoustic attacks on gyroscope?

South Korean Experiment

NOISE

UAS Collaboration – SWARM

Remember the Problem the Wildcat team has addressed in every book of our series.

A Problem Solution Not The ONLY Problem Solution:

Switching to A Dangerous Theater of Operations (TO) – Chinese Drones in the Spratly Islands, and Chinese Threats to USA forces in the Pacific

Location of the Spratly Islands and Their Strategic Importance

Target Drones

Shark Swarm and Wanshan Marine Test Field

Fast Drone Ship

Long-Range UUV

Crisis Watch

Red Drones over Disputed Seas

BZK -005

DRONESEC Report April 2022

Acoustic Dynamics:  Havana Syndrome and Neurological Vulnerability

Acoustics and Havana Syndrome Illustrate our Collective Neurological Vulnerability

Acoustic Technologies

SCREAMERS

Bibliography 

 

  1. Satellite Killers [Jackson]

Student Learning Objectives

Satellites

Introduction

Classification of Satellites

Satellite Orbits

Centric classifications

Altitude classifications

Inclination classifications

Eccentricity classifications

Synchronous classifications

Satellite Killers

Introduction

Denying space

Satellite Killers: China

Satellite Killers: Russia

Space Awareness and Space-Based Weapons

Questions

Bibliography

Informative Readings and Additional Bibliography

Satellite Killing and Denying Space

Space Awareness and Space-based Weapons

Space Breakthroughs and Inventions

 

  1. Cyber Weapons and CBRNE (Nichols)

 

Student Objectives

Problem – The Risk of Terrorist Attack vs. U.S. Air Defense System or CBRN Facilities

CBRN Infrastructure Attacks

Contributing Technologies

Attack / Defense Scenarios

Description of the sUAS/UAS Landscape – What’s available for Deployment against CBRNE Assets?

Autonomy v Automation Levels

UAS Collaboration

Cyber Related CBRNE Attacks

Drones as Rogue Access Points

CBRNE Attack Scenarios

What Is the Counter-UAS Problem?

Operational Protection from Hostile UAS Attacks – A Helicopter View

Countering UAS Air Threats

Vulnerabilities Perspective

Conventional Vulnerabilities of Air Defense Systems (ADS), Attacks By sUAS, and Countermeasures

Conventional Countermeasures Against sUAS / UAS

Passive Measures

Conclusions

Discussion Topics

US Navy Official Response

The Case for a Cyber Weapon

Discussion Question

Bibliography

Endnotes 

 

Section 3: Policy Considerations

 

  1. Assessing the Drone Delivery Future WMDD / DEW Threats and Risks (Mumm / Lonstein)

 

Student Learning Objectives

A Look Back at the Traditional Delivery Systems

Stack Integration-Emerging Technologies Offers New Tactics, Techniques, and Procedures (TTPs)

Assessment of Emerging Threats of Mini-WMD

Does the World Have an Answer to These Emerging Threats?

Airspace-Freedom of Movement of Autonomous Systems

Risks to Access in Time and Space? How Over The Horizon Capability Limits the Usefulness of Freedom of Movement Policies

Legal Considerations for Autonomous Systems as WMD/DEW Delivery Platforms

Assessment of the State of Readiness for the Legal Community to Prosecute Cases with Autonomous Systems Use in the WMD/DEW space

Legal and Cyber Considerations While Building the Legal Framework Towards Peaceful Containment/Use of Autonomous Systems in the Future

Conclusions

Questions

References

  

  1. Unique Challenges of Responding to Bioterrorism and Chemical Threats and Attacks delivered by Drones (Sincavage & Carter)

 

Student Objectives

Introduction

Advanced Robotics

Robotics: Technology Overview

3D Printing

Bioprinters

The Risks

The Opportunities

Conclusions

Bibliography

 

  1. Practical Crime Scene Investigation (CSI) Using Autonomous Systems (Mumm / Lonstein)

 

Student Learning Objectives

A Look Back at the Science of Crime Scene Investigation (CSI)

Challenges of CSI in Hot Zones-Why Not Use Robots?

Autonomous Systems Technology to Augment Human CSIs

Legal Considerations for Autonomous Systems Use at a Crime Scene

Autonomous Evidence: If You Can’t Explain It, Courts Will Not Allow It

Prosecutorial Evidence Collection by Human CSI VS. Autonomous Systems

Evidence Preservation Via Chain of Custody-Technical and Cyber Considerations

Augmenting and Integrating Artificial Employees/Autonomous CSIs-The Changing -Horizon of Scene Collection and Justice for All?

Conclusions

Questions

 

  1. Navigation Spoofing and ECD (Nichols)

 

Student Objectives

Summary

Definition: Spoofing

Introduction

Spoofing

GPS Signal

Classic Receivers

A-GPS – Reducing The Start-Up Time

Course – Time Navigation

Snapshot Receivers

Collective Detection

ECD

Research To 2016: Survey Of Effective GPS Spoofing Countermeasures

Spoofing Techniques

A-F Analysis

GPS Spoofing Research: Out Of The Box Brilliance To ECD Defense

Maximum Likelihood Localization

Spoofing  Mitigation

Successive Signal Interference Cancellation

GPS Signal Jamming

Two Robust GPS Signal Spoofing Attacks and ECD

Seamless Satellite-Lock Takeover

Navigation Data Modification

ECD Algorithm Design

Branch And Bound

ADS-B Security

ADS-B Standards

ADS-B Security Requirements

Vulnerabilities In ADS-B System

Broadcast Nature of RF Communications

No Cryptographic Mechanisms

ADS-B Cots

Shared Data

Asterix Data Format

Dependency On The On-Board Transponder

Complex System Architecture And Passthrough Of GNSS Vulnerabilities

Threats To ADS-B System

Eavesdropping

Data-Link Jamming

Two Types Of Jamming Threats For ADS-B

Ground Station Flood Denial

Aircraft Flood Denial

ADS-B Signal Spoofing

Ground Station Target Ghost Injection / Flooding

Aircraft Target Ghost Injection / Flooding

ADS-B Message Deletion

ADS-B Message Modification

Circling Back To ECD

Indoor Localization With Aircraft Signals Using ECD Vs. Competitive Technologies

ECD Vs. Minimum Us Government GPS Standards

Related Work

WiFi [T]

Ultrasound [I]

Light [T,E]

Bluetooth [T, I]

RFID [I]

Sensor Fusion

HAPS

Security Of GNSS

Conclusions

Definitions

Bibliography

Endnotes

 

Section 4: Tools of the Trade

 

  1. Social Network implications for WMDD (Lonstein)

 

 

Student Learning Objectives

Social Media Networks as a Weapon of Mass Destruction, Distraction, and Division

Consumer and Commercial Drone Technology as a Tool of Espionage, Command, and Kinetic attacks

Questions for Students to Consider

Bibliography

  

  1. Tools of The Trade (Monnik & Neo)

 

Student Objectives

Introduction

Accuracy

Reliability

Timeliness

Tools for UAS Threat Intelligence

Open-Source Tools

Closed-Source Tools

Collection data types

Tools for historical and current UAS threat intelligence

Configuring Google (Open-Source, free)

Configuring LiveUAMap (Open-Source, paid)

Tools for current and future UAS threat intelligence

Configuring Slack (Closed-Source, free)

DroneSec Notify (Open/Closed-Source, free/paid)

Stolen Drone Info (Open/Closed-Source, free/paid)

Conclusions

Bibliography

Endnotes