Preface

This is our fourth textbook in a series previously covering the world of Unmanned Aircraft Systems (UAS) and Counter Unmanned Aircraft Systems (CUAS). Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition and Counter Unmanned Aircraft Systems Technologies and Operations have seen considerable global recognition in the field.  (Nichols R. , et al., 2019) (Nichols R. , et al., 2020)

The authors have expanded our purview beyond UAS / CUAS systems. Our title shows our concern for growth and unique operations for all unmanned vehicles in all theaters: Air, Sea and Land. Three different factors have spurred the authors into expanding our textbook offerings. First, unmanned technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones / UUVs / UDV / UGTs (hereafter referred to as a group as UVs). There is a huge global growing market and entrepreneurs know it. Small UV companies have been reproducing like rabbits. Many companies are exploring / creating new, unique, and profitable unmanned technologies for  all military branches, LEO, commercial, high-mountain and deep-sea rescue, and recreational purposes. Covid-19 has brought a new dimension to UV planning and designs for medical and rescue missions.

Second, hostile use of UVs is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behaviors in the air, over land and a new threat of underwater.  The influence of IoT, AI and Cyber technologies has complicated the defense planning mission.

Third, UV technology has outpacing our first and second editions plus our textbook on CUAS. Everyday our writers group read / discussed new UAS / UV developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS ( and replacement technologies) elements, SCADA protections, privacy invasions, legislation, big-data usage, terrorist uses, cryptographic protections, pressure protection for deep water exploration, maintenance, rescue or intelligence gathering; ASW, and defense; specialized software and security protocols and more. As authors we felt compelled to address at least the edge of some of these new UV developments. It was clear that we would be lucky if we could cover some of the more interesting and priority technology updates for the various UV AOs.

Expanded purview means more experience was needed to write our newest work. We are privileged to add to original writing team of Nichols, Ryan, Mumm, Lonstein, Carter, and Hood new SMEs in the various UV technologies: Mai, Jackson, and Shay. Their extensive backgrounds are found in our tribute to the authors in a latter section.

Here is an outline of topics in our latest work:

SECTION 1: UNMANNED AIRCRAFT SYSTEMS

 

Chapter 1 Information Advances, Remote ID, & Extreme Persistence ISR [Ryan]

Chapter 2 : Unmanned Aerial Vehicles & How They Can Augment Mesonet Weather Tower Data Collection [Mai]

Chapter 3 Tour de Drones for the Discerning Palate [Nichols]

 

SECTION 2: UNMANNED UNDERWATER SYSTEMS

 

Chapter 4 Underwater Autonomous Navigation & other UUV Advances [Mumm]

Chapter 5 Autonomous Maritime Asymmetric Systems [Hood]

Chapter 6 UUV Integrated Autonomous Missions & Drone Management [Mumm]

Chapter 7 Principles of Naval Architecture Applied to UUV’s [Jackson]

 

SECTION 3: UNMANNED VEHICLES FOR GROUND / LAND OPERATIONS & Penetration of ADS

 

Chapter 8 : Unmanned Logistics Operating Safely & Efficiently Across Multiple Domains [Lonstein]

Chapter 9 Chinese Advances in Stealth UAV Penetration Path Planning in Combat Environment [Nichols]

 

SECTION 4: UNMANNED VEHICLES WEAPONS FOR C4ISR & POPULATION TRACKING  & CONTROL

 

Chapter 10 UAS, the Fourth Amendment and Privacy [Shay]

Chapter 11 UV & Disinformation / Misinformation Channels [Ryan]

 

SECTION 5: UV GEOPOLITICAL & LEGAL ADVANCES

Chapter 12  Chinese UAS Proliferation along New Silk Road Sea / Land Routes [Carter]

 

Chapter 13 Automaton, AI, Law, Ethics, Crossing the Machine – Human Barrier [Lonstein]

Chapter 14 Maritime Cybersecurity [Nichols]

 

 

We trust our newest look at Unmanned Vehicles in Air , Sea and Land  will enrich our students and readers understanding of the purview of this wonderful technology we call UV.

 

Best

Randall K Nichols
Professor of Practice
Director, Unmanned Aircraft Systems (UAS) –

Cybersecurity Certificate Program

Managing Editor / Co-Author
Kansas State University Polytechnic Campus &
Professor Emeritus – Cybersecurity, Utica College

 

 

LinkedIn Profile:
http://linkedin.com/in/randall-nichols-dtm-2222a691
Illi nunquam cedunt.
“We Never Yield”

 

References

Nichols, R. K. (2008). Cyber Counterintelligence & Sensitive Compartmented Information Facility (SCIF) Needs – Talking Points,. Utica College, Chair Cybersecurity. Utica New York: Private Memo to R. Bruce McBride. Retrieved September 5, 2008

Nichols, R., Ryan, J., Mumm, H., Carter, C., Lonstein, W., & Hood, J. (2020). Counter Unmanned Aircreaft Systems Technologies and Operations. Manhattan, KS: New Prairie Press, #31.

Nichols, R., Ryan, J., Mumm, H., Lonstein, W., Carter, C., & Hood, J. (2019). Unmanned Aircraft Systems in Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition. Manhattan, KS: https://newprairiepress.org/ebooks/27/.

US-CERT. (2015, August 27). Computer Forensics. Retrieved from US-CERT: https://www.us-cert.gov/sites/default/files/publications/forensics.pdf

 

 

 

 

License

Share This Book