Abbreviations and Acronyms
ABBREVIATIONS, ACRONYMS AND DEFINITIONS [1] [2]
The following terms are common to the UAS / CUAS /UUV /SPACE industries, general literature, or conferences on UAS/UAV/Drone/UUV/ SPACE systems. A majority of the technical abbreviations come from DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); (Nichols & Sincavage, 2022) (Nichols R. K. et al., Unmanned Aircraft Systems in the Cyber Domain, 2019) and (Nichols R. al., Counter Unmanned Aircraft Systems Technologies, and Operations, 2020) (Nichols & et al., 2020) (Nichols R.et al., Unmanned Aircraft Systems (UAS) in Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd Edition, 2019) (Nichols R. K., Chapter 14: Maritime Cybersecurity, 2021) (Nichols & Sincavage, Disruptive Technologies with Applications in Airline, Marine, and Defense Industries, 2021) (Nichols & Ryan, Unmanned Vehicle Systems & Operations on Air, Sea & Land, 2020) (Adamy D. L., Space Electronic Warfare, 2021) (Nichols & Sincavage, 2022)
ABM Anti-ballistic missile
A/C Aircraft (Piloted or unmanned) also A/C
ACAS Airborne Collision Avoidance System
A/CFD Aircraft Flood Denial jamming
ACOUSTIC Detects drones by recognizing unique sounds produced by their motors.
A/D Attack / Defense Scenario Analysis
ADS Air Defense System (USA) / Area Denial System
ADS-B Automatic Dependent Surveillance-Broadcast systems
A/C FD Aircraft flood denial
AFRL Air Force Research Lab
A-GPS Assisted GPS
AGL Above ground level
AHI Anomalous Health Incidents
AI Artificial intelligence: “1. a branch of computer science dealing with the
simulation of intelligent behavior in computers, and 2: the capability of a machine
to imitate intelligent human behavior.” (Merriam-Webster, 2020)
AIS Automated Identification System for Collision Avoidance
AMAZE EU’s Additive Manufacturing Aiming Towards Zero Waste and Efficient Production of High-Tech Metal Products project
AMS Autonomous Mobile Sword (SCREAMER) uses sound to disrupt the brain before cutting the enemy to pieces.
AO Area of Operations
AOA Angle of Arrival of signals to GPS receivers / Angle of Attack
AOCS Cooperative Attitude and Orbit Control System takeover
APC Armored personnel carrier
APDS Armor-piercing discarding sabot projectile
APFSDS Armor-piercing fin-stabilized discarding sabot projectile
APHIS Animal and Plant Health Inspection Service
AR Augmented reality
ARW Anti-radiation weapons
ASAT Anti-satellite weapons / Anti-satellite missile system
ASREN Association of Geospatial Industries, the Arab States Research and Education Network
ASW Anti-Satellite Weapons
ATC Air Traffic Control / Air traffic Control Signals
ATCC Air Traffic Control Center
ATM Air Traffic Management
ATS Air Traffic Services
ATSAW Air Traffic Situational Awareness
AUV Autonomous underwater vehicle
Azimuth The angle between true North and the treat location, in a plane at the satellite perpendicular to the vector from the SVP [Sub-vehicle Point]
Bandwidth is Defined as the Range within a band of wavelengths, frequencies, or energy.
Think of it as a range of radio frequencies occupied by a modulated carrier wave, assigned to a service over which a device can operate. Bandwidth is also a capacity for data transfer of electrical communications systems.
B&B Branch & bound
B.C. Before Christ
BC Ballistic Coefficient
BEAR Battlefield Extraction-Assist Robot
Black Swan Black Swan Event- A black swan is an unpredictable event beyond what is.
Normally expected of a situation and has potentially severe consequences. Black
swan events are characterized by their extreme rarity, severe impact, and the
widespread insistence they were obvious in hindsight.
(Black Swan Definition, 2020)
BLOS Beyond line-of-sight
BPAUV Battlespace Preparation Autonomous Underwater Vehicle
BrO bromine oxide
BSL-4 Biosafety Level #
BTWC Biological & Toxin Weapons Convention
BVLOS Beyond Visual Line-of-Sight operations
BVR Beyond visual range
BW Biological weapons
BYOD Bring your device
C/No Carrier to Noise ratio
c Speed of light ~ (3 x 108 m/s) [186,000 miles per sec] in vacuum named after Celeritas, the Latin word for speed or velocity.
C CLAW Combat Laser assault weapon
cs speed of sound (344 m/s) in air
C2 / C2W Command and control / Command and Control Warfare
C3 Command, control, communications
C3I Command, control, communications, and Intelligence
C4 Command, control, communications, and computers
C4I Command, control, communications and computers, intelligence
C4ISR Command, control, communications, computers, intelligence, surveillance & reconnaissance
C4ISTAR Command, control, communications, computers, intelligence, surveillance, target
acquisition and reconnaissance
C5I Command, control, communications, computers, Collaboration & Intelligence
CA Collision Avoidance / Clear Acquisition (GPS) / Cyber Assault (aka CyA)
C/A GPS Satellite Course Acquisition unique code
CAA Control Acquisition cyber attack
CAMS Copernicus Atmosphere Monitoring Service
CAS Close Air Support / Common situational awareness
CBRN Chemical, Biological, Radiation & Nuclear critical infrastructure facilities
CBRNE Chemical, Biological, Radiation, Nuclear & Explosives attacks critical infrastructure facilities or assets
CBRNECy Chemical, Biological, Radiation, Nuclear, Explosives & Cyber-attacks on critical infrastructure facilities or assets
CBW Chemical, Biological Weapons
CCC Circular Cross-Correlation in classical GPS receivers
CC&D Camouflage, Concealment, and Deception
CCTV Closed Circuit Television
CD Collective detection maximum likelihood localization approach (Eichelberger, Robust Global Localization using GPS and Aircraft Signals, 2019)
CD Charge diameters
Cd Drag coefficient
CDC Center for Disease Control
CDMA Code division multiple access protocol
CD Collective detection maximum likelihood localization approach (Eichelberger, 2019)
CE Circular economy
CEA Cyber-electromagnetic activities
CEP Circular error probable
CETC Chinese Electronics Technology Group Corporation
CEW Cyber electronic warfare / Communications electronic warfare
CGA Coast Guard Administration – Singapore
CFSPH Center for Food Security and Public Health (CFSPH)
CHAMP Counter-Electronics High Power Microwave Advanced Missile Project
CHS Cyber-Human Systems
CIA Confidentiality, Integrity & Availability ( standard INFOSEC paradigm)
CI / CyI Critical Infrastructure / Cyber Infiltration
CIA Confidentiality, Integrity, Availability / Central Intelligence Agency
CIRCIA Cyber Incident Reporting for Critical Infrastructure Act
CIS Critical Infrastructure Sector
CISA Critical Infrastructure Security Agency
CJNG Cártel de Jalisco Nueva Generación
CM / CyM Countermeasure / Cyber Manipulation
CMADS China’s Microwave Active Denial System
C/NA Communication / Navigation Aid
CNA Computer network attack
CND Computer network deception
CNE Computer network exploitation
CNO Computer network operations
CNS Central nervous system
CO-ASAT Co-orbital (Co-ASAT) missile system
COMINT Communications intelligence
COMJAM Communications Jamming
COMINT Communications Intelligence
COMSEC Communications Security
CONOP(S) Concepts of Operations
CONUS Continental United States
CONV Convergent Technology Dynamics
CONV-CBRN Convergent Technology Dynamics – Chemical, Biological, Radiation & Nuclear
COP Common operating picture
COTS Commercial off-the-shelf
CM Apollo Command Modules
CNPC Control and non-payload links
CPB Charged particle beam
CPS Cyber-physical systems
CR Conflict Resolution / Close range / Cyber Raid (aka CyR)
CSI Crime scene investigation
CSIS Center for strategic and International Studies
CT Counter-Terrorism / Counter-Terrorism Mission
CTN Course -Time Navigation , A-GPS technique which drops the requirement to decode the HOW timestamps from the GPS signals. CTN also refers to a snapshot receiver localization technique measuring sub-millisecond satellite ranges from correlation peaks, like classical GPS receivers.
C-UAS Counter Unmanned Aircraft Systems (defenses/countermeasures)
CUAV Counter Unmanned Aircraft Vehicle (defenses/countermeasures)
CUES Code for unplanned encounters at sea
CW / CyW Cyber Warfare
CWC Chemical Weapons Convention
CWMD Countering Weapons of Mass Destruction Community
CYBER WEAPON Malicious Software and IT systems that, through ICTS networks,
manipulate, deny, disrupt, degrade, or destroy targeted information systems or
networks. It may be deployed via computer, communications, networks, rogue
access points, USBs, acoustically, electronically, and airborne/underwater
unmanned systems & SWARMS. Alternatively, cyber weapons:
- A campaign that may combine multiple malicious programs for espionage, data theft, or sabotage.
- A stealth capability that enables undetected operation within the targeted system over an extended time.
- An attacker with apparent intimate knowledge of details for the workings of the targeted system.
- A special type of computer code to bypass protective cybersecurity technology.
DA-ASAT Direct Accent or Hit-to-Kill (DA-ASAT) missile system
Danger Close
Definition www.benning.army.mil/infantry/magazine/issues/2013/May-June/Myer.html Nov 14, 2013 – 1) danger close is included in the “method-of-engagement” line of a call-for-fire request to indicate that friendly forces are close to the target. … Danger close is a term that is exclusive from risk estimate distance (RED) although the RED for 0.1 percent PI is used to define danger close for aircraft delivery. Pi = Probability of incapacitation. 2) Definition of “danger close” (US DoD) In close air support, artillery, mortar, and naval gunfire support fires, it is the term included in the method of engagement segment of a call for fires which indicates that friendly forces are within close proximity of the target.
DARPA Defense Advanced Research Projects Agency
Dazzle Cause temporary blindness with Laser
DCPA Distance between vessels approaching CPA
D&D Denial & deception
DDD Dull, dangerous, and dirty
D/D/D Destruction, Disruption, Deception
DDOS Distributed Denial of Service cyber attack
DEFCON Defense condition
DEW Directed energy weapons (also, DE) (Nichols & Sincavage, 2022)
DF Direction-finding
DHS Department of Homeland Security
DOF Degrees of Freedom
DOS Denial of Service attack
DPRK Democratic People’s Republic of Korea
DTRA Defense Threat Reduction Agency
DUST Dual-use Science & Technology threat
1090ES – 1090 Extended Squitter Data Link
EA Electronic Attack
Earth Trace The Earth Trace is the locus of latitude and longitude of the SVP as the satellite moves through its orbit
EARSC European Association of Remote Sensing Companies
EBO Effects-based operations
ECCM / EP Electronic counter-countermeasures / Electronic Protection
ECD Dr. Manuel Eichelberger’s advanced implementation of CD to detect & mitigate spoofing attacks on GPS or ADS-B signals (Eichelberger, 2019)
ECCO Estimating the Circulation and Climate of the Ocean
ECM Electronic countermeasures
ECMWF European Centre for Medium-Range Weather Forecasts
EHC Extra high voltage
ELINT Electronic Intelligence
ELSA-D Twin small satellite launched in 2020 for End-of-Life-Servicing & Long-Term orbital sustainability
EM Electromagnetic waves
EMC Electromagnetic compatibility
EMD Electromagnetic deception
EMF Electromagnetic field
EMI Electromagnetic interference
EMP Electromagnetic pulse – electromagnetic energy.
EMR Electromagnetic radiation
EMS Electromagnetic spectrum
EO Electro-optical system
EOS Earth Observation Satellites
ESA European Space Agency
ESOC European Space Operations Center located in Darmstadt, Germany
EW Electronic warfare[Legacy EW definitions: EW was classically divided into (Adamy D., EW 101 A First Course in Electronic Warfare, 2001):
- ESM – Electromagnetic Support Measures – the receiving part of EW;
- ECM – Electromagnetic Countermeasures – jamming, chaff, flares used to interfere with operations of radars, military communications, and heat-seeking weapons;
- ECCM -Electronic Counter-Counter Measures – measures are taken to design or operate radars or communications systems to counter the effects of ECM.[1]
Not included in the EW definitions were Anti-radiation Weapons (ARW) and Directed Energy Weapons (DEW).
USA and NATO have updated these categories:
- ES – Electronic warfare Support (old ESM) to monitor the R.F. environment;
- EA – Electronic Attack – the old ECM includes ASW and D.E. weapons; to deny, disrupt, deceive, exploit, and destroy adversary electronic systems.
- EP – Electronic Protection measures – (old ECCM) (Adamy D., EW 101 A First Course in Electronic Warfare, 2001) to guard friendly systems from hostile attacks.[2]
EW Electronic Warfare (EW) is the art and science of denying an enemy the benefits of the electromagnetic spectrum (EMS) while preserving them for friendly forces. (Wolff, 2022)ES is different from Signal Intelligence (SIGINT). SIGINT comprises Communications Intelligence (COMINT) and Electronic Intelligence (ELINT). All these fields involve the receiving of enemy transmissions. (Adamy D., EW 101 A First Course in Electronic Warfare, 2001)
EUMETSAT European Organization for the Exploitation of Meteorological Satellites
ESA European Space Energy
FAA Federal Aviation Agency
FDM Fused Deposition Modeling technique
FHSS frequency-hopping spread spectrum
FIRES Definition (US DoD – JP 3-0) is the use of weapon systems to create a specific lethal or nonlethal effect on a target
FPS Feet Per Second
FY-4 China (FY-4) Lightning Mapping Imager
GAO Government Accountability Office
GCS Ground control station
GEE Google Earth Engine
GEO Group on Earth Observations
GIS Geographical information system
GLM Geostationary Lightning Mappers
GNSS Global Navigation Satellite System (GPS, GLONASS, Galileo, Beidou & other regional systems)
GNU GNU / Linux Operating system
GOES R-series Geostationary Operational Environmental Satellites (GOES-16 and 17)
GPM Global precipitation measurement
GPS Global Positioning System (US) [3] (USGPO, 2021)
GPS Global Positioning System / Geo-Fencing
GPS/INS uses GPS satellite signals to correct or calibrate a solution from an inertial navigation system (INS). The method applies to any GNSS/INS system
GRU Russian military intelligence branch
GS Ground Station
gSSURGO Gridded Soil Survey Geographic Database
GSFD Ground station flood denial
GSM Global system for mobile communications
GTA Ground-to-Air Defense
Hard damage DEW complete vaporization of a target
HAPS High Altitude Platforms (generally for wireless communications enhancements)
HAPS UAVs UAVs dedicated to HAPS service (example to communicate via CNPC links)
HCM Hypersonic cruise missile
HGV Hypersonic glide vehicle
HEAT High-explosive anti-tank warhead
HEL High energy Laser
HPM High powered microwave
HOW Hand-over-word satellite data timestamp defined in (IS-GPS-200G, 2013)
HTV Hypersonic test vehicle
HUMINT Human Intelligence
HVM Hostile vehicle mitigation
IAEA International Atomic Energy Agency
IC Intelligence community ~ 17 different agencies
ICAO International Civil Aviation Organization
ICBM Intercontinental ballistic missile
ICS Internet Connection Sharing / Industrial control systems
ICT Information & Communications Technology
ICTS Information & Communications Technology Services
ID Information Dominance / Inspection and Identification /Identification
IDEX International Defense Exhibition and Conference
IDS Intrusion detection system
IED Improvised Explosive Device
IFF Identify Friend or Foe
IIIM International, Impartial, and Independent Mechanism
IMU Inertial Measurement Unit
IND Improvised nuclear device
INS Inertial navigation system
INSA Intelligence and National Security Alliance
INFOSEC Information Security
IO /I.O. Information Operations
IoT Internet of things
IIoT Industrial Internet of things
IP Internet protocol
IR Infrared
IS Information security / Islamic State
ISO International Organization Standardization
ISM In-space manufacturing
ISS International Space Station
ISIS Islamic State of Iraq and al-Sham (ISIS)
ISR Intelligence, Reconnaissance and Surveillance UAS Platform
ISTAR Intelligence, surveillance, target acquisition, and reconnaissance
IT Information Technology
IT/OT Information Technology/ Operational Technology
ITE Installation, Training, Expense
ITP In trail procedure
IW Information Warfare
JIM Joint Investigative Mechanism
JPL NASA Jet Propulsion Laboratory
JSR Jamming-to-signal ratio
KE Kinetic energy
KEW Kinetic energy weapon
K’IHAP Short Shout in Tae Kwon Do
KKW Kinetic Kill Weapon/Warhead
LASER “A laser is a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation. The term “laser” originated as an acronym for “light amplification by stimulated emission of radiation.” A laser differs from other light sources in that it emits light coherently, spatially, and temporally. Spatial coherence allows a laser to be focused on a tight spot, enabling laser cutting and lithography applications laser cutting and lithography. Spatial coherence also allows a laser beam to stay narrow over great distances (collimation), enabling applications such as laser pointers. Lasers can also have high temporal coherence, which allows them to emit light with a very narrow spectrum, i.e., they can emit a single color of light. Temporal coherence can produce pulses of light as short as a femtosecond. Used: for military and law enforcement devices for marking targets and measuring range and speed.” (Wiki-L, 2018)
LaWS Laser weapon system
LED- Light emitting diodes
LENS Laser-engineered net shaping
LDEF Long Duration Exposure Facility
LGF Low Gradient Furnace
LiDAR Light Detection and Ranging – a RS method using light in the form of a pulsed laser to measure ranges
LOS Line-of-sight / Loss of Signal / Loss of Separation
LLTR Low-level transit route
LM or L.M. Loitering munitions
LMM Lightweight Multi-role Missiles
LPI Low Probability of Intercept
LRAD Long Range Acoustic Device / Long-Range Area Denial [4]
LWSI Livestock weather safety index
M&S Modeling and simulation technologies
Mach 1 Speed of sound, 761.2 mph
MAD Mutually assured destruction
M-ATV Mine-resistant ambush-protected vehicle
MAME Medium altitude medium endurance
MASER Microwave Amplification Stimulated Emission of Radiation
MAST Micro Autonomous Systems & Technology
MEDUSA (Mob Excess Deterrent Using Silent Audio)
MEMS micro-electro-mechanical systems
MIM Man-in-middle attack
MIRV Multiple independently targetable reentry vehicles
ML Machine learning
MLAT Multilateration System
MMEVR Multi-Mission Extra Vehicular Robot
MMOD Micrometeoroids and orbital debris
MND Ministry of National Defense
MOA Minute of angle in degrees
MOPP Mission Oriented Protective Posture (MOPP) Gear
MoU Memorandum of Understanding
MRVs Multiple Re-entry Vehicles
mTBI mild Traumatic Brain Injury
MRG Europe – Meteosat Third Generation Lightning Imager
MSFC NASA Marshall Space Flight Center
MTI Moving target indicator
MUM-T Manned-unmanned teaming (MUM-T)
NAS National Academy Of Sciences
NATO North Atlantic Treaty Organization
NASA National Aeronautical and Space Administration
NCSS National Cooperative Soil Survey
NDM Navigation data modification spoofing attack
NDVI Normalized Difference Vegetation Index
NEB New Economic Block soldier
NERC North American Electric Reliability Corporation
NGB National Guard Board
NGO Nongovernmental organization
NHTSA National Highway Traffic Safety Administration
NIEHS National Institute of Environmental Health Sciences
NIR Near Infrared
NKW non-kinetic warfare
NMA Navigation Message Authentication
NO2 Nitrogen dioxide
NOAA National Oceanic & Atmospheric Agency
NV Neurological vulnerability
OCONUS Outside Continental United States
OLI Operational Land Imager
OMAR On-Orbit Manufacture, Assembly and Recycling
OMI Ozone Monitoring Instrument
OODA Observe, Orient, Decide, and Act decision loops
OPCW Organization for the Prohibition of Chemical Weapons
OPSEC Operational Security
OSINT Open-source intelligence (also OSI)
OTH Over-the-horizon
PFMI Pore formation and mobility investigation furnace
PETMAN Humanoid robot developed for US Army -Protection Ensemble Test Mannequin
Phigital Digital and human characteristics & patterns overlap
PII Private identifying information and credentials
PLA Peoples Liberation Army (Chinese)
PLAN Peoples Liberation Army & Navy (Chinese)
PMU Phasor Measurement Unit
PNT Positioning, navigation, and timing systems
POV Point of view
PRAM Photovoltaic Radio-frequency Antenna Module technology
PRN Pseudo-Random Noise
PSA Protective security advisors
PSR Primary Surveillance Radar
PSYOPS Psychological warfare operations
RC Radio communications signals
RCS Radar cross-section
RDD Radiological dispersion device
RF Radio Frequency
RF-EMF Radiofrequency – Electromagnetic field
RFID Radio-frequency identification (tags)
RID Remote identification of ID
RIMPAC Tim of the Pacific
RKA Chinese Relativistic Klystron Amplifier
RN Ryan-Nichols Qualitative Risk Assessment
RNRA Ryan – Nichols Attack / Defense Scenario Risk Assessment for Cyber cases
ROA Remotely operated aircraft
ROC Republic of China
ROV/ROUV Remote operating vehicle / Remotely operated underwater vehicle
RPA Remotely piloted aircraft
RPAS Remotely piloted system
RPO Rendezvous and proximity operations
RPV Remotely piloted vehicle
RS Remote sensing
RSS Received signal strength / Remote Sensing & Surveillance
RTU Remote terminal units
RV Re-entry vehicle
SA Situational Awareness
SAA Sense and Avoid
SAM Surface to Air missile
SAR Synthetic aperture radar
SATINT Satellite intelligence
SATCOM Satellite communications
SBLM Submarine-launched ballistic missile
SCADA Supervisory Control and Data Acquisition systems
SCS Shipboard control system (or station) / Stereo Camera System / South China Seas
SDA Space Domain Awareness
SDR Software-defined radio
SEAD Suppression of enemy defenses
SECDEF Secretary of Defense (USA)
SIC Successive Signal Interference Cancellation
SIGINT Signals Intelligence
Signature UAS detection by acoustic, optical, thermal, and radio /radar
SMART Strategic Arms Reduction Treaty
SML Space mobility and logistics area support
S/N S / N = is one pulse received signal to noise ratio, dB: Signal to Noise ratio at HAPS receiver (also, SNR)
SO2 Sulfur dioxide
Soft damage DEW disruption to a UAS computer
SOCOM U.S. Army Special Operations Command
SOLAS Safety of Life at Sea (International Maritime Convention) [safety conventions]
SQF Solidification Quench Furnace
Spoofing is A Cyber-weapon attack that generates false signals to replace valid ones. GPS Spoofing is an attack to provide false information to GPS receivers by broadcasting counterfeit signals similar to the original GPS signal or by recording the original GPS signal captured somewhere else at some other time and then retransmitting the signal. The Spoofing Attack causes GPS receivers to provide the wrong information about position
and time. (T.E. Humphrees, 2008) (Tippenhauer & et.al, 2011) (Eichelberger, Robust Global Localization using GPS and Aircraft Signals, 2019) (Nichols & Sincavage, 2022)
Spoofing Alt Def: A Cyber-weapon attack generates false signals to replace valid ones.
SSBN Strategic nuclear-powered ballistic missile submarine
SSLT Seamless satellite-lock takeover spoofing attack
SSN Space Surveillance Network
SSR Secondary Surveillance Radar
STEALTH to resist detection
STM Space traffic management
sUAS Small Unmanned Aircraft System
SUBSA Solidification using a Baffle in Sealed Ampoules
SVP Sub-vehicle point – Point on earth’s surface right below the Satellite
SWARM High level, a dangerous collaboration of UAS, UUV, or unmanned boats
T2AR T2 Augmented Reality project
Taiwan ROC Taiwan is officially the Republic of China
TCAS Traffic collision avoidance system
TDOA Time difference of arrival
TEAM (UAS) High-level, a dangerous collaboration of UAS, UUV, or unmanned boats; differs from SWARM in that it has a UAS Team Leader (TL) where SWARM does not. TL directs the UAS team and is the primary counter UAS target to disrupt.
TIROS Television InfraRed Observational Satellite
TNT Trinitrotoluene
TO Theater of Operations
TOA Time of arrival
ToF Time of flight
TRANSEC Transmission security
TTFF Time to first fix (latency)
TTPs Tactic, Technique, and Procedures
Tx Transmit signal
UA Unmanned Aircraft (non-cooperative and potential intruder)
UAM Urban Air Mobile (vehicle)
UAS-p UAS pilot
UAS Unmanned aircraft system (popularly but incorrectly referred to as drones)
UAT Universal access transceiver
UAV Unmanned aerial vehicle / Unmanned autonomous vehicle.
UAV-p UAV pilot
UCAR Unmanned combat armed rotorcraft
UCARS UAV common automated recovery system
UCWA / UA Unintentional cyber warfare attack
UGCS Unmanned Ground Control Station
UGS Unmanned ground-based station
UGT Unmanned ground transport
UGV Unmanned ground vehicle
UHF Ultra-high frequency
UNOOSA The United Nations Office for Outer Space Affairs
USDA US Department of Agriculture
USV Unmanned Surface Vessel
UUV Unmanned underwater vehicle
UWB Ultrawideband
VBN Visual-based navigation
VBN LiDAR Visual-based navigation: Light Detection and Ranging – a RS method using light in the form of a pulsed laser to measure ranges
VDL VHF Data link
VI Vegetation Indices
VIEW Virtual Interface Environment Workstation
VIIRS Visible Infrared Imaging Radiometer Suite
VIS Visible
VPL Visual Programming Languages
VR Virtual reality
VRT Variable rate technology
VLOS visual line of sight
VTOL Vertical take-off and landing
VX Deadly nerve agent
WAM Wide area multilateration
WFOV Wide field of view
WFUL Wake Forrest University Laboratory
WLAN Wide Local area network
WMD Weapons of Mass Destruction
WMDD Mini-Weapons of Mass Destruction and Disruption
WMO World Meteorological Organization
XR Extended reality
Special Definitions (Nichols & Carter, 2022) (Nichols R. K., 2020)
Asymmetric warfare can describe a conflict in which the resources of two belligerents differ in essence and, in the struggle, interact and attempt to exploit each other’s characteristic weaknesses. Such struggles often involve strategies and tactics of unconventional warfare, the weaker combatants attempting to use strategy to offset deficiencies in quantity or quality of their forces and equipment. (Thomas, 2010) Such strategies may not necessarily be militarized. (Steponova, 2016)
This contrasts with symmetric warfare, where two powers have comparable military power and resources and rely on similar tactics, differing only in details and execution. (Thomas, 2010)
False Flag Operation – organized spreading of misinformation or disinformation.
Eichelberger Collective Detection (ECD) Definitions / Counter Spoofing Concepts
Acquisition – Acquisition is the process in a GPS receiver that finds the visible satellite signals and detects the delays of the PRN sequences and the Doppler shifts of the signals.
Circular Cross-Correlation (CCC) – In a GPS classical receiver, the circular cross-correlation is a similarity measure between two vectors of length N, circularly shifted by a given displacement d:
N-1
Cxcorr (a, b , d) = ∑ ai dot bI + d mod N Eq. 3-1
I=0
The two vectors are most similar at the displacement d, where the sum (CCC value) is maximum. The vector of CCC values with all N displacements can be efficiently computed by a fast Fourier transform (FFT) in Ớ ( N log N ) time. [3](Eichelberger, Robust Global Localization using GPS and Aircraft Signals, 2019)
Like classical GPS receivers, coarse-Time Navigation (CTN) is a snapshot receiver localization technique that measures sub-millisecond satellite ranges from correlation peaks. (IS-GPS-200G, 2013) [See also expanded definition above.]
Collective Detection (CD) is a maximum likelihood snapshot receiver localization method, which does not determine the arrival time for each satellite but combines all the available information and decides only at the end of the computation. This technique is critical to the (Eichelberger, Robust Global Localization using GPS and Aircraft Signals, 2019) invention to mitigate spoofing attacks on GPS or ADS-B.
Coordinate System – A coordinate system uses an ordered list of coordinates to uniquely describe the location of points in space. The meaning of the coordinates is defined concerning some anchor points. The point with all coordinates being zero is called the origin. [ Examples: terrestrial, Earth-centered, Earth-fixed, ellipsoid, equator, meridian longitude, latitude, geodetic latitude, geocentric latitude, and geoid. [4]
Localization – Process of determining an object’s place concerning some reference, usually coordinate systems. [aka Positioning or Position Fix]
Navigation Data is the data transmitted from satellites, which includes orbit parameters to determine the satellite locations, timestamps of signal transmission, atmospheric delay estimations, and status information of the satellites and GPS as a whole, such as the accuracy and validity of the data. (IS-GPS-200G, 2013) [5]
Pseudo-Random Noise (PRN) sequences are pseudo-random bit strings. Each GPS satellite uses a unique PRN sequence with a length of 1023 bits for its signal transmissions. aka as Gold codes, they have a low cross-correlation with each other. (IS-GPS-200G, 2013)
Snapshot GPS Receiver– A snapshot receiver is a global positioning satellite (GPS) receiver that captures one or a few milliseconds of raw GPS signal for a location fix. (Diggelen, 2009)
Classification of Satellites
Satellites are classified in terms of their purpose and are classified as follows:
Astronomical satellites – observation of distant planets and galaxies;
Biosatellites – carry living organisms to aid scientific experiments;
Communication satellites – communications satellites use geosynchronous or Low Earth orbits to communicate with each other and other systems;
Earth observation satellites (EOS) are satellites intended for non-military uses such as environmental monitoring, meteorology, and producing maps;
Killer satellites are designed to destroy warheads, satellites, and space-based objects;
Navigational satellites use radio time signals transmitted to enable mobile receivers on the ground to determine their exact location. The relatively clear line of sight between the satellites and receivers on the ground allows satellite navigation systems to measure location to accuracies on the order of a few meters in real-time;
Reconnaissance satellites are communications satellites deployed for military or intelligence applications;
Recovery satellites provide a recovery of reconnaissance, biological, space-production, and other payloads from orbit to Earth;
Space stations are orbital structures designed for human beings to live in space. A space station is distinguished from other crewed spacecraft by its lack of major propulsion or landing facilities. Space stations are designed for medium-term living in orbit;
Tether satellites are connected to another satellite by a thin cable called a tether; and
Weather satellites are used to monitor Earth’s weather and climate.
Satellite Orbits
The most common type of orbit is a geocentric orbit, with over 3,000 active artificial satellites orbiting the Earth. Geocentric orbits may be further classified by their altitude, inclination, and eccentricity.
The commonly used altitude classifications of the geocentric orbit are Low Earth Orbit (LEO), Medium Earth Orbit (MEO), Geosynchronous Orbit (GEO), and High Earth Orbit (HEO). Low Earth Orbit is any orbit below 2,000 km, Medium Earth Orbit is any orbit between 2,000 and 36,000 km, and High Earth Orbit is greater than 36,000 km. LLO: low lunar orbit is approximately 100 km above the lunar surface. L1 and L2: “Lagrange points are caused by the balance between the gravitational fields of two large bodies; equilibria between two pulling forces.
Centric classifications
A galactocentric orbit is an orbit around the center of a galaxy.
A heliocentric orbit is an orbit around the Sun. In our Solar System, all planets, comets, and asteroids are in such orbits, as are many artificial satellites and pieces of space debris.
Geocentric orbit is an orbit around Earth, such as the Moon or artificial satellites. Currently, there are over 2,500 active artificial satellites orbiting the Earth.
Altitude classifications
Low Earth Orbit (LEO): Geocentric orbits ranging in altitude from 180 km – to 2,000 km;
Medium Earth Orbit (MEO): Geocentric orbits ranging in altitude from 2,000 km – to 20,000 km;
Geosynchronous Orbit (GEO): Geocentric circular orbit with an altitude of 36,000 km. The orbit period equals one sidereal day, which coincides with the Earth’s rotation period. The speed is 3,075 m/s (10,090 ft/s).
High Earth orbit (HEO): Geocentric orbits above the altitude of a geosynchronous orbit (GEO) > 36,000 km (~ 40,000 km).
Agroterrorism / Bioterrorism Definitions
Agroterrorism is a subset of bioterrorism and is defined as the deliberate introduction of an animal or plant disease to generate fear, causing economic losses and/or undermining stability. (O.S. Cupp, 2004)
Bioterrorism is the threat or use of biological agents by individuals or groups motivated by political, religious, ecological, or other ideological objectives.
Earth Observation Epidemiology or tele-epidemiology is defined as ‘using space technology with remote sensing in epidemiology. (Wiki, 2022)
MASINT – Measurement and signature intelligence (MASINT) is a technical branch of intelligence gathering that detect, track, identify or describe the distinctive characteristics (signatures) of fixed or dynamic target sources. This often includes radar, acoustic, nuclear, chemical, and biological intelligence. MASINT is scientific and technical intelligence derived from the analysis of data obtained from sensing instruments to identify any distinctive features associated with the source, emitter, or sender, to facilitate the latter’s measurement and identification. (Wiki, 2022)
OSI, short for OPEN-SOURCE Intelligence (also known as OSINT), is defined as any intelligence produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience to address a specific intelligence requirement. (Bazzell, 2021)
Remote Sensing (RS) uses non-ground-based imaging systems to obtain information about processes and events on Earth. It is unique among the detection and diagnostic methods discussed herein in its ability to offer passive monitoring for the disease at scale rather than active sampling. (Silva & et.al, 2021)
References
Accuracy, G. G.-G. (2021, July 16). Official U.S. government information about the Global Positioning System (GPS) and related topics. Retrieved from https://www.gps.gov/: https://www.gps.gov/systems/gps/performance/accuracy/#problems
Adamy, D. -0. (2015). EW 104 EW against a New Generation of Threats. Boston: Artech House.
Adamy, D. (2001). EW 101 A First Course in Electronic Warfare. Boston, MA: Artech House.
Adamy, D. (2001). EW 101: A First Course in Electronic Warfare. Boston: Artech House.
Adamy, D. L. (2004). EW 102 ASecond Course in Electronic Warfare. Norwood, MA: Artech House.
Adamy, D. L. (2009). EW 103: Tactical Battlefield Communications Electronic Warfare. Norwood, MA: Artech House.
Adamy, D. L. (2015). EW 104: EW against a new generation of threats. Norwood, MA: Artech House.
Adamy, D. L. (2021). Space Electronic Warfare. Norwood, MA: Artech House.
Adamy, D.-9. (1998, Jan). Lesson 4: the basic link for all EW functions. (electronic warfare)(EW Reference & Source Guide). Journal of Electronic Defense, Jan 1998 Issue.
Airports Authority of India. (2014). Security Issues of ADS-B Operations. ICAO. Hong Kong, China: ICAO.
Alejandro Aragon-Zavala, J. L.-R.-P. (2008). High-Altitude Platforms for Wireless Communications. Chichester, West Sussex, UK: John Wiley & Sons.
Ali, e. a. (2014). ADS-B system failure modes and models. The Journal of Navigation, 67: 995-1017.
Anonymous. (2021, July 16). GPS newsgroup. Retrieved from http://gpsinformation.net/main/gpspower.htm: http://gpsinformation.net/main/gpspower.htm
Anonymous. (2014). Timing & Synchronization for LTE-TDD & LTE-Advanced Mobile Networks; Technical Report, Microsemi. Retrieved from www.microsemi.com: https://www.microsemi.com/document-portal/doc_download/133615-timing-sync-for-lte-tdd-lte-a-mobile-networks
Austin, R. (2010). “Design for Stealth”, Unmanned Aircraft Systems UAVS Design Development and Deployment. New York: John Wiley and Sons.
Axelrod, P., & al, e. (2011). Collective Detection and Direct Positioning Using Multiple GNSS Satellites. Navigation, pp. 58(4): 305-321.
Bazzell, M. (2021). Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 8th edition. Bazzell.
Bissig, P., & Wattenhoffer, M. E. (2017). Fast & Robust GPS Fix using 1 millisecond of data . 16 ACM / IEEE Int Conf on Information Processing in Sensor Networks (pp. 223-234). Pittsburg, PA: IPSN.
Burch, D. (2015). RADAR for Mariners. New York: McGraw-Hill.
Burgess, M. (2017, September 21). When a Tanker Vanishes, all evidence points to Russia. Retrieved from https://www.wired.co.uk/: https://www.wired.co.uk/article/black-sea-ship-hacking-russia
Busyairah, S. A. (2019). Aircraft Surveillance Systems: Radar Limitations and the Advent of the Automatic Dependent Surveillance Broadcast. New York: Routledge.
Cheong, J., & al., e. (2011). Efficient Implementation of Collective Detection. In IGNSS Symposium, 15-17.
Closas, P., & al., e. (2007). Maximum likelihood estimation of position in GNSS. IEEE Signal processing Letters (pp. 14(5): 359-362). IEEE.
Cornell – LII. (2021, July 16). ADS-B law. Retrieved from https://www.law.cornell.edu/: https://www.law.cornell.edu/cfr/text/14/91.227#e
- McCallie, e. a. (2011). Security analysis of the ADS-B Implementation in the NEXT generation Air transport system. Inter J. of Critical Infrastructure Protection, 4: 78-87.
Diggelen, F. V. (2009). A-GPS: Assisted GPS, GNSS, and SBAS. NYC: Artech House.
DoD. (2008). Global Positioning System Performance Standard 4th edition (GPS SPS PS). Washington, DC: DoD.
Eichelberger, M. (2019). Robust Global Localization using GPS and Aircraft Signals. Zurich, Switzerland: Free Space Publishing, DISS. ETH No 26089.
Eichelberger, M., & Tanner, S. L. (2017). Indoor Localization with Aircraft Signals. ACM -Sen Sys -17, ISBN: 978-1-4503-5459-2.
EUROCONTROL. (2016, June). part_1_-_eurocontrol_specification_asterix_spec-149. Retrieved from https://www.eurocontrol.int/sites/: https://www.eurocontrol.int/sites/default/files/2019-06/part_1_-_eurocontrol_specification_asterix_spec-149_ed_2.4.pdf
FAA. (2018, April 27). FAA Safety Management . Retrieved from https://www.faa.gov/: https://www.faa.gov/regulations_policies/handbooks_manuals/aviation/risk_management/media/20180427_FAASRMGuidance5StepProcess_signed_508.pdf
FAA. (2019). ATO-SMS-Manual. Retrieved from https://www.faa.gov/: https://www.faa.gov/air_traffic/publications/media/ATO-SMS-Manual.pdf
FAA. (2021). SRM Safety Management Quick Reference Guide. Washington: FAA Manual Sections 3.5.4 & ff.
Fan, Y., & al., e. (2015). A Cross layer defense mechanism against GPS spoofing attacks on PMUs in Smart Grid . IEEE Trans on Smart Grid, Vol 6. No. 6 November .
Fletcher, H. a. (1933). Loudness, its definition, measurement and calculation. Journal of the Acoustical Society of America , 5, 82-108 .
- Lopez-Risueno & Seco-Granados, G. (2005). Cn/sub 0/ estimation and near far mitigation for GNSS indoor receivers. In 2005 IEEE 61st Vehiclar Technology Conf., V4: 2624-2628.
Global Security.Org. (2022, July 16). Chapter 3 Intelligence, Surveillance, and Reconnaissance Planning. Retrieved from https://www.globalsecurity.org/: https://www.globalsecurity.org/military/library/policy/army/fm/3-21-31/c03.htm
Goward, D. (April 21, 2020). GPS circle spoofing discovered in Iran. GPS World.
GPSPATRON. (2022, July 9). GNSS Interference in wildlife. Retrieved from GPSPATRON.com: https://GPSPATRON.com/gnss-interference-from-wildlife/
Haider, Z., & Khalid, &. S. (2016). Survey of Effective GPS Spoofing Countermeasures. 6th Intern. Ann Conf on Innovative Computing Technology (INTECH 2016) (pp. 573-577). IEEE 978-1-5090-3/16.
Hubbard, R. K. (1998). Boater’s Bowditch. Camden, MA: International Marine.
Humphreys, T., & al., e. (2008). Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Radionavigation Laboratory Conf. Proc.
ICAO. (2021, June 2). atm_security_manual 9985. Retrieved from http://www.aviationchief.com/: http://www.aviationchief.com/uploads/9/2/0/9/92098238/icao_doc_9985_-_atm_security_manual_-_restricted_and_unedited_-_not_published_1.pdf
ICAO. (2021, June 2). Aviation Security Manual Document 8973/8. Retrieved from https://www.icao.int/Security/: https://www.icao.int/Security/SFP/Pages/SecurityManual.aspx
IS-GPS-200G. (2013, September 24). IS-GPS-200H, GLOBAL POSITIONING SYSTEMS DIRECTORATE SYSTEMS ENGINEERING & INTEGRATION: INTERFACE SPECIFICATION IS-GPS-200 – NAVSTAR GPS SPACE SEGMENT/NAVIGATION USER INTERFACES (24-SEP-2013). Retrieved from http://everyspec.com/: http://everyspec.com/MISC/IS-GPS-200H_53530/
ITU. (2019, July 19). ARTICLE 2 – Nomenclature – Section I – Frequency and Wavelenght Bands. Retrieved from ITU Radio Communication Edition 2008: https://web.archive.org/web/20111001005059/http://life.itu.int/radioclub/rr/art02.htm
J.Liu, & et.al. (2012, November). Energy Efficient GPS Sensing with Cloud Offloading. Proceedings of 10 ACM Conference on Embedded Networked Sensor Signals (SenSys) , pp. 85-89.
Jafarnia-Jahromi, A., & al., e. (2012). Detection and mitigation of spoofing attacks on a vector-based tracking GPS receiver. ION ITM .
Jia, Z. (2016). A Type of Collective Detection scheme with improved pigeon-inspired optimization. Inter. J. of Intelligent Computing and Cybernetics, 9(1):105-123.
Jovanovic, A., & Botteron, C. (2014). Multi-test Detection and Protection Algorithm against Spoofing Attacks on GNSS Receivers. PLANS IEEE/ION Position, Location and Navigation Symposium (pp. 5-8 May). Monterey, CA 5-8 May: IEEE/ION.
Kahn, S. Z., & M. Mohsin, &. W. (2021, May 7). On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions. Comp Sci, p. 507 ff.
Kuhn, M. G. (2015). An Asymmetric Security Mechanism for Navigation Signals. 6th Info Hiding Workshop. Toronto, CA: Univ of Cambridge. Retrieved from https://www.cl.cam.ac.uk/~mgk25/ih2004-navsec.pdf
M.Eichelberger, v. H. (2019). Multi-year GPS tracking using a coin cell. In Proc.of 20th Inter.Workshop on Mobile Computing Systems & Applications ACM , 141-146.
M.L. Psiaki & Humphreys, T. (2016). GNSS Spoofing and Detection. Proc. of the IEEE, 104(6): 1258-1270.
Madhani, P., & al., e. (2003). Application of successive interference cancellation to the GPS pseudolite near far problem. IEEE Trans, on Aerospace & Elect. Systems, 39(2):481-488.
Magiera, J., & Katulski, &. R. (2015). Detection and Mitigation of GPS Spoofing Based on Antenna Array Processing. J. of Applied Research & Technology, Vol 13. pp 45-47.
MIT R&D. (2022, July 16). ISR SYSTEMS AND TECHNOLOGY. Retrieved from https://www.ll.mit.edu/r-d/isr-systems-and-technology: https://www.ll.mit.edu/r-d/isr-systems-and-technology
Monahan, K. (2004). The Radar Book: Effective Navigation and Collision Avoidance. Anacortes, WA: Fineedge Publications.
Nichols, & Carter, H. J. (2022). Space Systems: Emerging Technologies and Operations. Manhattan, KS: New Prairie Press.
Nichols, R. K. (2020). Counter Unmanned Aircraft Systems Technologies & Operations. Manhattan, KS: www.newprairiepress.org/ebooks/31.
Nichols, R. K., & Sincavage, S. M. (2022). DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD). Manhattan, KS: New Prairie Press #46.
Nichols, R. K.-P. (2019). Unmanned Aircraft Systems in the Cyber Domain, 2nd Edition. Manhattan, KS : www.newprairiepress.org/ebooks/27.
Nichols, R., & al., e. (2020). Unmanned Vehicle Systems and Operations on Air, Sea, and Land. Manhattan, KS: New Prairie Press #35.
O.S. Cupp, D. W. (2004). Agroterrorism in the U.S.: key security challenge for the 21st century. Biosecurity and Bioterrorism: Biodefense Strategy, Practice and Science 2, 97–105., pp. 2, 97–105. Retrieved from https://pubmed.ncbi.nlm.nih.gov/15225403/: https://pubmed.ncbi.nlm.nih.gov/15225403/
Ochin, E., & Lemieszewski, &. L. (2021). Chapter 3 Security of GNSS. In G. P. PETROPOULOS, & &. P. SRIVASTAVA, GPS and GNSS Technology in the Geosciences (pp. 51-73). NYC: Elsevier.
- Bissag, E. M. (2017, April). Fast and Robust GPS Fix Using One Millisecond of Data. Proc of the 16th ACM /IEEE International Conference on Information Processing in IPSN, pp. 223-234.
Psiaki, M., & al., e. (2013). GPS Spoofing Detection via Dual- Receiver Correlation of Military Signals. IEEE Tran of Aerospace & Electrical systems, vol 49, issue 4, pp. 2250-2260.
R.K. Nichols & Lekkas, P. (2002). Wireless Security; Threats, Models & Solutions. NYC: McGraw Hill.
R.K. Nichols, e. a. (2020). Unmanned Vehicle Systems & Operations on Air, Sea & Land. Manhattan, KS: New Prairie Press #35.
Ranganathan, A., & al., e. (2016). SPREE: A Spoofing Resistant GPS Receiver. Proc. of the 22nd ann Inter Conf. on Mobile Computing and Networking, ACM, pp. 348-360.
Ronfeldt, J. A. (1966). The Advent of Netwar. Santa Monica, CA: RAND.
Rosen, S. (2011). Signals and Systems for Speech and Hearing (2nd ed.). New York City: BRILL. p. 163.
S.A.Shaukat, & al., e. (2016). Robust vehicle localization with GPS dropouts. 6th ann Inter Conf on Intelligent and advanced systems (pp. 1-6). IEEE.
Schaefer, M., & Pearson, A. (2021). GPS and GNSS Technology in Geosciences. NYC: Elsevier.
Schmidt, D., & al, e. (2016). A Survey and Analysis of GNSS Spoofing Threat and Countermeasures. ACM Computing Surveys (CSUR), 48(4).
Shrivastava, G. P. (2021). GPS and GNSS Technology in the Geosciences. NYC: Elsevier.
Silva, G., & et.al. (2021, May 20). Plant pest surveillance: from satellites to molecules. Emerg Top Life Sci., pp. 5(2):275-287. doi:10.1042/ETLS20200300. PMID: 33720345; PMCID: PMC8166340.
Spilker, J. (1996). Fundamentals of Signal Tracking Theory. Prog in Astronautics & Aeronautics, 163:245-328.
Staff. (2016, April 17). Equal Loudness Contours. Retrieved from Gutenberg Organization: http://central.gutenberg.org/article/WHEBN0001046687/Equal-loudness%20contour
Strohmeier, M. (2015). On the security of automatic dependent surveillance- broadcast protocol. IEEE communications Surveys & Tutorials, 17:1066-1087.
System, H. K. (1942). US Patent No. 2,292,387.
T.E. Humphrees, e. (2008). Assessing the Spoofing Threat: Development of a portable GPS Spoofing Civilian Spoofer. ION (pp. Sept 16-19). Savana, GA: ION.
The Royal Academy of Engineering. (2011). Global Navigation Space Systems: Reliance and Vulnerabilities. London: The Royal Academy of Engineering.
Tippenhauer, N., & et.al. (2011). On the requirements for successful spoofing attacks. Proc. of the 18th ACM Conf. on Computing and communications security (CCS), 75-86.
Toomay, J. (1982). RADAR for the Non – Specialist. London; Lifetime Learning Publications. London: Lifetime Learning Publications.
TRS, S. (2018, July 10). Tontechnic-Rechner-Sengpielaudio. Retrieved from Tontechnic-Rechner-Sengpielaudio Calculator: www.sengspielaudio.com/calculator-wavelength.htm
USGPO. (2020, April). Global Positioning System (GPS) Standard Positioning Service (SPS) 5th ed. Retrieved from https://www.gps.gov/technical/ps/: https://www.gps.gov/technical/ps/2020-SPS-performance-standard.pdf
USGPO. (2021, June 14). What is GPS. Retrieved from Gps.gov: www.gps.gov/sysytems/gps
Warner, J. S., & Johnston, R. (2003). GPS Spoofing Countermeasures. Journ of Security Administration. Retrieved from https://www.semanticscholar.org/paper/GPS-Spoofing-Countermeasures-Warner-Johnston/36e17f723bff8d429aca4714abe54500a9edaa49
Warner, J., & Johnson, &. R. (2002). A Simple Demonstration that the system (GPS) is vulnerable to spoofing. J. of Security Administration. Retrieved from https://the-eye.eu/public/Books/Electronic%20Archive/GPS-Spoofing-2002-2003.pdf
Weise, E. (2017, August 23). could-hackers-behind-u-s-navy-collisions. Retrieved from USATODAY: https://www.ruidosonews.com/story/tech/news/2017/08/23/could-hackers-behind-u-s-navy-collisions/594107001/
Wesson, K. (2014, May). Secure Navigation and Timing without Local Storage of Secret Keys. PhD Thesis.
Wiki. (2022). Measurement_and_signature_intelligence (MASINT) definition. Retrieved from https://en.wikipedia.org: https://en.wikipedia.org/wiki/Measurement_and_signature_intelligence
Wiki. (2022, Aug 26). Tele-epidemiology. Retrieved from https://en.wikipedia.org: https://en.wikipedia.org/wiki/Tele-epidemiology
Wikipedia. (2021, June 2). Global Positioning System. Retrieved from https://en.wikipedia.org/wiki/: https://en.wikipedia.org/wiki/Global_Positioning_System
Wolff, C. (2022). Radar and Electronic Warfare Pocket Guide. Munich, Germany: Rhode & Schwarz.
- Ng & Gao, G. (2016). Mitigating jamming & meaconing attacks using direct GPS positioning. In Position, Location & Navigation Symposium (PLANS) IEEE/ION, 1021-1026.
Endnotes
[1] All Acronyms taken from (Nichols R. K., 2020) and (Nichols & Sincavage, 2022) unless otherwise noted.
[2] EM definitions from (Wolff, 2022)
[3] Ớ = Order of magnitude; dot = dot product for vectors
[4] All these systems are discussed in Chapter 2 of (Eichelberger, Robust Global Localization using GPS and Aircraft Signals, 2019)
[5] Each satellite has a unique 1023-bit PRN sequence, plus some current navigation data, D. Each bit is repeated 20 times for better robustness. Navigation data rate is limited to 50 bit / s. This also limits sending timestamps every 6 seconds, satellite orbit parameters (function of the satellite location over time) only every 30 seconds. As a result, the latency of the first location estimates after turning on a classic receiver, called the time to first fix (TTFF), can be high.