Abbreviations and Acronyms

ABBREVIATIONS: ACRONYMS [REV 91A] 01232021 C1 – C10

The following terms are common to the UAS / UUV industries, defense / airline / marine industries / general literature, conferences on UAS/UAV/Drone/UUV systems and / or specific to Professor Nichols’ five (5) textbooks in the series on UAS / drones / UAV / UUVs.

 

A-STAR          Heuristic search algorithm discussed in chapter 9.

A2 / AD          Anti-access / Area Denial

A /Aref            Amplitudes of source and reference points, see Eq-20-6,7.

AA                  Anti-aircraft / Adaptive Antennas

AAA               Anti-aircraft artillery

AAIB              Air Accidents Investigation Board
AAM              Air-to-air missile

AAV               Autonomous air vehicle

ABI                 Aviation Block Infrastructure

ABMS             Advanced battle management system

ABS                American Bureau of Shipping

A/C                 Aircraft
ACAS             Airborne collision avoidance system / Assistant Chief of the Air Staff
ACL                Agent communication language / Autonomous control levels

ACOUSTIC    Detects drones by recognizing unique sounds produced by their motors.

ACRP             Airport Cooperative Research Project
ACS                Airbome (defense) control station (system)

ACTD             Advanced Concept Technology Demonstration

AD                 Air Defense / Ansar Dine terrorist group.

A/D                 Attack / Defense Scenario Analysis

ADAC            Automated Dynamic Airspace Controller

ADAPs           Adaptive compute acceleration platforms
ADC               Air data computer

ADCP             Acoustic Doppler Current Profiler

ADF               Automatic direction finder/finding.

ADMS            Air defense missile (radar) system

ADS                Air Defense System (USA)

ADS-B            Automatic Dependent Surveillance – Broadcast systems

ADT                Air Data Terminal

AE                   Artificial Employee

AESA             Active electronically scanned array
AEW              Airbome early warning

AF                   Adaptive Filtering

AFCS              Automatic flight control system

AFRICOM     US Africa Command

AGL                Above ground level

AGM               Air- to- surface missile
AGARD         Advisory Group for Aerospace Research and Development (NATO)

AGM-65         Maverick (USA) is an air-to-surface missile (AGM) designed for close air support. It is the most widely produced precision-guided missile in the Western world, and is effective against a wide range of tactical targets, including armor, air defenses, ships, ground transportation and fuel storage facilities.

AGV               Autonomous Guard Vehicle

AHA               Autopilot Hardware Attack

AHD               Analog high definition
AHRS             Attitude and heading reference system
AI                    Artificial intelligence: “1. a branch of computer science dealing with the

simulation of intelligent behavior in computers and 2: the capability of a machine

to imitate intelligent human behavior.” (Merriam-Webster, 2020)

AIAA              American Institute of Aeronautics and Aerospace
AIC                 Aeronautical Information Circular

AIP                 Aeronautical Information Publication

AIS                 Automated Identification System for Collision Avoidance

AJ                    Anti-Jam

AKM               Autonomous Key Management

ALB                Air Land Battle

ALERT           Advanced Low-observable Embedded Reconnaissance Targeting system.

AM                  Amplitude Modulation / al-Mourabitoun terrorist group

AMB               Agile Multi-Beam

AMRAAM     Advanced Medium-Range Air-to-Air Missile

ANSP              Air Navigation Service Provider

ANO               Air Navigation Order (UK)

AO                  Area of Operations

AoA                Angle of Attack

APEC              Asia Pacific Economic Cooperation

APG                Asia-Pacific Gateway

APKWS          Advanced precision kill weapon system

AQ                  Al-Qaida Terrorist Group – “the Base”

AOA               Aircraft operating authority

AQIM             al-Qaeda in the Islamic Maghreb

Ar                            Receive antenna effective area, m2

AR                   Aspect ratio

AR drone        AR stands for “Augmented Reality” in AR droneAR Drone can perform tasks like object recognition and following, gesture following.

ARM               Anti-Radiation Munitions

ARS                Airborne Remote Sensing

ART                Autonomous Rail Transport

ARW               Anti-radiation weapons

AS                   Airborne Sensing Systems

ASB                Advisory Service Bulletin  / Air Sea Battle

ASBM             Anti-ship ballistic missile

ASCM             Anti-ship cruise missile

ASEA             Active electronically scanned arrays

ASEAN          Association of Southeastern Asian Nations

ASC                ALEXA /SIRI /CORTANA

ASICs             Application specific integrated Circuits & circuit boards

ASL                Airborne Systems Laboratory

ASMS             Automated Separation Management System

ASR                Chinese Air Silk Road

ASOS              Automated surface weather observation system

ASTM             American Society of Testing and Materials (ASTM)

ASTER           Agency for Science, Technology and Research

ASuW             Anti-surface unit warfare

ASW               Anti-submarine warfare

AT                  Aerial target

ATC               Air Traffic Control

ATHENA       Lockheed Martin Advanced Test High Energy Asset

ATM               Air Traffic Management

ATN                Aids to Navigation  (aka ATON)

ATR                Automatic Target Recognition

ATS                Air Traffic Service

AUDS             Anti-UAV Defense System

AUV               Autonomous Underwater Vehicle

Avionics          Aviation electronics in manned or unmanned aircraft

AUVSI            Association for Unmanned Vehicle Systems International

AV                  Air Vehicle

AWB               Application White Boxing

AWOS            Automated weather observation system

AWSAS          All Weather Sense and Avoid System

B                     IF equivalent bandwidth, Hz

Backhauling    Intermediate links between core network or internet backbone and small subnets at the edge of the network

BA                  Bacterial agent

BAMS             Broad Area maritime surveillance

BATS              Bermuda Atlantic Time-series Study

Bandwidth       Defined as the Range within a band of wavelengths, frequencies, or energy.

Think of it as a range of radio frequencies occupied by a modulated carrier wave, assigned to a service over which a device can operate. Bandwidth is also a capacity for data transfer of electrical communications system.

BDA                Battle Damage assessment

BER                Bit error rate

Black Swan     Black Swan Event- A black swan is an unpredictable event that is beyond what is.

normally expected of a situation and has potentially severe consequences. Black

swan events are characterized by their extreme rarity, severe impact, and the

widespread insistence they were obvious in hindsight.

(Black Swan Definition, 2020)

BLOS              Beyond line-of-sight

BMI                Buried Mine Identification

BNF                Bind and Fly – with custom transmitter.

BOSS              Buried Object Scanning Sonar

BPAUV          Battlespace preparation autonomous underwater vehicle

BRI                 Chinese Belt and Road Initiative

BR&T             Boeing Research and Technology

BT                   Biological toxins

BTA                Biological Threat Agent

BSR                Bilinear Signal Representation

BSs                  Base Stations

BVR                Beyond visual range

BW                  Biological weapons

c                      Speed of light ~ (3 x 108 m/s) [186,000 miles per sec] in vacuum named after Celeritas     the Latin word for speed or velocity.

c                      speed of sound (344 m/s) in air

C                     Combined methods of CR

C2 / C2W        Command and control / Command and Control Warfare

C3I                  Command, control, communications, and Intelligence

C4                   Command, control, communications, and computers

C4I                  Command, control, communications and computers, intelligence

C4ISR             Command, control, communications, computers, intelligence, surveillance &  reconnaissance

C4ISTAR        Command, control, communications, computers, intelligence, surveillance, target

acquisition and reconnaissance

CA                  Collision Avoidance / Clear Acquisition (GPS) / Cyber Assault (aka CyA)

C/A                 Civilian acquisition code for GPS

CAA               Control Acquisition cyber attack

CAS                Close Air Support / Common situational awareness

CASA             Civil Aviation Safety Authority

CASIC            China Aerospace Science and Industry Corporation

C of A             Certificate of Airworthiness

CAP                Civil Air Publication

CAT                Collision Avoidance Threshold /Connectivity & automation in transport

CC / CyC        Cyber Crime

CCCI/II          Classical Cryptography Course Volume I/II (Nichols R. K., Classical Cryptography Course Volume I / II, 1996)

CCE                Cyber Counter Espionage

CCI                 Command control interface / Cyber Counterintelligence

CCMCPS        Cooperative Cognitive Maritime Cyber Physical System

CCS                Cyber Counter Sabotage

CCT                Cyber Counter Terrorism

CC-UAS         Counter-Counter Unmanned Aircraft Systems

CD                  Conflict Detection

CDL                Common datalink

CDMA            code division multiple access

CDN               Content Distribution Network

CDR                Collision detection and resolution systems (automated SAA in UAS)

CEA                Cyber electromagnetic activities (Cyber, EW, Spectrum warfare)

CEO                Chief Executive Officer

CETC              Chinese Electronics Technology Group

CF                   Computer Forensics

CFTA              Continental Free Trade Area

CFT                Certificate of flight trials / Cross-functional teams

CHIMERA     Counter-electronic HPM Extended range base air defense

CI / CyI           Cyber Infiltration

CIA                 Confidentiality, Integrity, Availability / Central Intelligence Agency

CIAD              Cyber- Multi-layered Integrated Air Defense Systems

CIED              Computer improvised explosive device.

CIN                 Common Information Network

CIR                 Color Infrared – artificial standard where NIR bands shifted so that humans can see the infrared reflectance.

CISA               Cybersecurity & Infrastructure Security Agency

CLE                Airport code for Cleveland

C/N                 Carrier to Noise ratio in HAPS, => C/ N0

C/NA              Communication / Navigation Aid

CM / CyM       Countermeasure / Cyber Manipulation

CN3                Communications / navigation network node

CNI                 Critical National Infrastructure

CNKI              China-North Korea-Iran technical weapons cooperation agreements

CNO               Chief Naval Operations

CNPC             Control and non-payload links

CO2                      Carbon dioxide emissions

COA               Certificate of Waiver or Authorization

COB                Chief of the Boat

COMINT        Communications intelligence

COMJAM       Communications Jamming

COMSEC       Communications Security

CONOP(S)      Concepts of Operations

CONUS          Continental United States

COOP             Cooperative Observer Program

COS                Continued Operational Safety

COTS              Commercial off-the-shelf

CPA                Closest Point of Approach

CPA Spoof      CPA spoof involves faking a possible collision with a target ship.

CPL                 Commercial pilot’s license

CPNI               Center for Protection of National Infrastructure (UK)

CPRC              Communist Party of the Republic of China

CPS                 Cyber-physical systems

CR                   Conflict Resolution / Close range / Cyber Raid (aka CyR)

CRH                Coaxial rotor helicopter

CRX                      Received Signal Power, watts

CS                   Control station

CSDP              Common Security and Defense Policy missions (EU)

CSR                Compact Surveillance Radar

CSfC               Commercial Solutions for Classified Program

CSIRO            Commonwealth Scientific and Industrial Research Organization

CT                   Counter Terrorism / Counter Terrorism Mission

CTOL             Conventional take-off and landing

C-UAS            Counter Unmanned Aircraft Systems (defenses / countermeasures)

CUAS             CSIRO Unmanned Aircraft Systems

CV                  Collision Volume

CW / CyW      Cyber Warfare

D-STAR          Variation of A-STAR algorithm suitable for solving path planning problems in

unknown environments

D                     distance from transmitter in Range equation (Adamy D. -0., 2015)

DA                  Danger area

Danger Close

Definition www.benning.army.mil/infantry/magazine/issues/2013/May-June/Myer.html Nov 14, 2013 – 1) danger close is included in the “method-of-engagement” line of a call-for-fire request to indicate that friendly forces are close to the target. … Danger close is a term that is exclusive from risk estimate distance (RED) although the RED for 0.1 percent PI is used to define danger close for aircraft delivery.  Pi = Probability of incapacitation. 2) Definition of “danger close” (US DoD) In close air support, artillery, mortar, and naval gunfire support fires, it is the term included in the method of engagement segment of a call for fire which indicates that friendly forces are within close proximity of the target.

DARO            Defense Airborne Reconnaissance Office

DARPA          Defense Advanced Research Projects Agency

DAS                Detection by Acoustical Signature

dB                   decibels

DC                  Direct Current

DCL                Drone Champions League

DCPA             Distance between vessels approaching CPA.

DDD               Dull, dangerous, and dirty

DDOS             Distributed Denial of Service cyber attack

DE                   Directed Energy

DEF CON       DEF CON is the world’s longest running and largest underground hacking conference.

DE / EP           Directed energy / Electromagnetic pulse.

DEM               Digital elevation model

DEW               Directed energy weapons.

DF                   Direction finding

DFCS              Digital Flight Control System

DHS                Department of Homeland Security

DIME              Diplomatic, information, military, and economy

DIRCM           Directed Infrared Countermeasures

DIY                 Do-it-yourself (amateur built drones or modified racing drones)

D j                    Jammer location – to-target receiver location distance, in km, FM 34-40-7

DJ                    Data Jamming / Drone Jammer

DJI                  Popular and functional Chinese made drone series: Mavic, Phantom, Ryze, Matrix, Spark, Enterprise, Inspire, Tello {However, banned by USA Army} (Newman, 2017)

DL                   Downlink in HAPS

DLA                Date last accessed (usually a web reference)

DLI                 Datalink interface

DME               di-methyl ether

DNA               Deoxyribonucleic acid

DoD                Department of Defense

DOF                Degrees of Freedom

DOS                Denial of Service cyber attack

DOT                Department of Transportation

DPM               Direct power management / Dynamic Power Management

DPRK             Democratic People’s Republic of Korea

D-R-O-N-E     FAA Guidance: Direct, Report, Observe, Notice &Execute

DROV            Remote operating vehicle

DSA                Detect, sense and avoid / Dynamic Sense-and-Act.

DSR                Chinese Digital Silk Road

DSS                 Decision Support System

DSSS              Direct sequence spread spectrum.

D t                   Enemy transmitter location -to- target receiver location, in km, FM 34-40-7

DT                   Directional transmission / Department of Transport (UK)

DTDMA         Distributed Time Division Multiple Access (DTDMA) network radio system

DTED             Digital terrain evaluation data

DTF                 Drug Task Force

DTH                Direct-To-Home

DTI                 Direct Track & Identify

DTRA             Defense Threat Reduction Agency

DUO               Designated UAS operator

DVL                Doppler Velocity Log

EA                   Electronic Attack

EARSC           European Association of Remote Sensing Companies

EAS                Equivalent airspeed

EAU                East Africa union comprising of Israel and six East African states, Kenya, Ethiopia, Tanzania, Uganda, Rwanda, and South Sudan

(Eb / No)         Thermal noise power spectral density ratio

ECCM / EP     Electronic counter-countermeasures / Electronic Protection

ECM               Electronic countermeasures

ECR                Electronic combat reconnaissance

EDC                Estimated Date of Completion

EDEW            Effects of Directed Energy Weapons

EEDI               Energy efficiency design index

EEZP              Exclusive economic Zone protection

EFF                 Electronic Frontier Foundation

EHS                Enhanced surveillance

EIRP               Effective isotopic radiated power

Electrolaser     Electroshock weapon that is also a DEW. Uses lasers to form electrically conductive laser-induced plasma charge.

ELINT            Electronic Intelligence

ELT                Emergency locator transmitter

ECM               Electromagnetic compatibility

EM                  Electromagnetic

EMC               Electromagnetic compatibility

EME                Electromagnetic environment

EMI                Electromagnetic interference

EMO               Electromagnetic operations

EMP               Electromagnetic pulse

EMR               Electromagnetic Radiation

EMS                Electromagnetic Spectrum

EMSVIS         Electromagnetic Spectrum Visible Light

EMW              Electromagnetic Waves

EO                  Electro-optical (sensing) / Earth Observation

EOI                 Electro-Optical Imager

EOTS              Electro-optical targeting system

EPIRB            Emergency Positioning -Indicating Radio Beacon

EQUAS          Explainable question answering system.

ERPJ                Effective radiated power of the jammer, in dBm

ERPS                Effective radiated power of the desired signal transmitter, in dBm

ESC                 Electronic still camera

ESM / ES        Electronic support measures / Electronic warfare support / Earth station  &             ESM                         Electronic Signal Monitoring

EU                   European Union

EUNAVFOR  European Union Naval Force’s anti-piracy naval mission

EUTM             Somalia Military training mission in Somalia

EVTOL           Electric Vertical Take-off and Landing

EW                  Electronic warfare, see 9-15 & footnotes.

F                      Field theory methods of CR

F                      Fundamental frequency is defined as the lowest frequency of a periodic waveform

f                       Frequency, cycles / second RRE)

Fo                    Resonant frequency of string, Hz see Eq. 20-5

F                      Frequency in MHz, FM 34-40-7

FAA                Federal Aviation Administration

FACE              Future Airborne Capability Environment

FAME             Fatty acid methyl esters

FAR                False Alarm Rates

FB                   Facebook©

FBL                 Fly-by-Light, a type of flight-control system where input command signals are sent to the actuators through the medium of optical-fiber.

FBW               Fly-by-wire

FCC                Federal Communications Commission

FCS                 Flight control systems / Flight Control Station

FDF                 Frequency Domain Filtering

FDM               frequency division multiplexing

FHSS              Frequency hopping spread spectrum.

FIIP                 Floating Integrated Information Platforms

FIR                  Far Infrared (25-40) to (200-350) um

FIRES             definition (US DoD – JP 3-0) the use of weapon systems to create a specific lethal or nonlethal effect on a target.

FL                   Flight Level

FLIR               Forward-looking infrared

Fly-by-Wire     Predetermine flight mission path based on GPS coordinates.

Floats              Floating sensors (USN)

FMS                Flexible manufacturing system

Follow-Me      UAS autopilot automatically follows operator.

Fom                 HAPS Figure of merit in upload /download link

FoV                 Field of view

FFOV              Forward Field of View

FRAGO          Fragmentary Order – to send timely changes of existing orders to a subordinate.

FPV                 First Person View – live streaming video used in racing drones.

FPGA              Field programmable gate array

FS                    Fixed service

FSS                 Fixed satellite service

FW                  Fixed wing

FY                   Fiscal year

G                     Geometric methods of CR

G5S                 G5 Sahel (G5S) Joint Force, has membership of five states: Burkina Faso, Mali, Mauritania, Niger, and Chad

GAO               General Accounting Office USA

gAR                Receiving Antenna Gain as a Factor

GBU               Guided Bomb Unit

GCHQ            Government Communications Headquarters (Britain)

GCS                Ground control station

GDP                Gross Domestic Product (USA)

GDPR             European Union’s (EU) General Data Protection Regulation

GDT                Ground data terminal

GENie             General Electric Network for Information Exchange

GEO                Geostationary Earth orbit satellite

GEOINT         Geospatial-Intelligence

GeoFence        A geo-fence is a virtual perimeter for a real-world geographic area

GIGO              Garbage in, garbage out

GLOW            Gross lift-off weight for a missile / rocket

GLONASS     Global Satellite Navigational System

GNL                Galveston National Laboratory

GNSS              Global Navigation Satellite System

GPS                 Global Positioning System / Geo Fencing

GPS/INS         Use of GPS satellite signals to correct or calibrate a solution from an inertial navigation system (INS). The method is applicable for any GNSS/INS system.

GPSSPOOF    Hack of GPS system affecting UAS commands.

GPWS             Ground proximity warning system

G R                     The receiving antenna gain in the direction of the desired signal transmitter, dBi.

G RJ                    Receiving antenna gain in the direction of the jammer, in dBi.

GS                   Ground segment of HAPs

GSAA             Government Services Administration – audit division

GSE                Ground support equipment

GSHM            Ground Station Handover Method

GSM               Global System for Mobile Communications

GT                   Game Theory methods of CR

G/T                  ratio of the receive antenna gain to system noise temperature.

(G /Ts) dB      Represents the figure of merit of the HAPS receiver, in dB.

GT                          Gain of the transmit antenna, dB.

GTA                Ground -to -Air Defense

Hard damage   DEW complete vaporization of a target

Harmonic        Frequency, which is an integer multiple of the fundamental frequency.

H                     Elevation of the jammer location above sea level, feet, FM 34-40-7

HAE                High altitude endurance

HALE             High altitude – long endurance

HAPS              High Altitude Platforms (generally for wireless communications enhancements)

HAPS UAVs  UAVs dedicated to HAPS service (example to communicate via CNPC links)

HCE                Highly contested environment

HEAT             High-explosive anti-tank warhead

HELWS          High energy laser weapon system

HITL               Human in-the-loop

HMI                Human machine interface

HO                  Home Office (UK)

HPA                High power amplifier

HPL                High powered laser weapon

HPM               High powered microwave defense

HSM               Hardware Security Module

H t                          Elevation of enemy transmitter location above sea level, in feet, FM 34-40-7

HUD               Heads-up display

Human            “a bipedal primate mammal (Homo sapiens), a person” (Merriam-Webster, 2020); Humanity        “the quality or state of being human.” (Merriam-Webster, 2020)

Humanoids     “a humanoid being: a nonhuman creature or being with characteristics (such as the ability to walk upright) resembling those of a human.”

HUMINT        Human intelligence (spy’s)

HVT                High value target (generally, for assassination)

I                       Sound intensity, W x m-2 [Source strength S / 4πr2] (Uni-Wuppertal, 2019)

IA                    Information Assurance / Intentional cyber warfare attack

I-actors            Intentional Cyber Actors

IACS               Industrial automation and control systems

IADS              Multi-layered integrated air defense systems

IAI                  Israeli Aerospace Industries

IAS                 Indicated airspeed

IBM                International Business Machines

ICAO              International Civil Aviation Organization

I.C.B.C           International Center for Boundary Cooperation (China)

ICBM              Intercontinental Ballistic Missiles

ICGs               Information centers of gravity

ICS                  Internet Connection Sharing / Industrial control systems

ICT                  Information & Communications Technology

ID                    Information Dominance / Inspection and Identification /Identification

IEC 62443       International standard for industrial automation and control systems

IEDs                Improvised Explosive Devices

IEEE               Institute of Electrical and Electronics Engineers

IETM              Interactive Electronic Maintenance Manuals

IEWS              Intelligence, electronic warfare, and sensors

IFF                  Identification, friend, or foe

IFR                  Instrument flight rules

I&I                  Interchangeability and Interoperability

IIT                   Intentional Insider Threats

Imaging Sensors ARS sensors that build images

IL                    Intensity level of sound measured, dB, Eq. 20-2

IMINT            Imagery intelligence

IMM/IM&M   Interacting-multiple-models tracker / Integrity Management & Monitoring

IMO                International Maritime Organization

IMU                Inertial Measurement Unit

INS                 Inertial navigation system

INFOSEC       Information Security

IO                    Information Operations, see Figure 9-11 & footnotes.

IOB                 Internet of bodies

IOC                 Intergovernmental Oceanographic Commission

IOR                 India Ocean Region

IoT                  Internet of things

IIoT                 Industrial Internet of things

IPL                  Insitu Pacific Limited

IR                    Infrared Sensors

IRST               Infrared search and tracking

IS                    Information Superiority

ISCS               Integrated shipboard control systems

ISIS                 Islamic State of Iraq and al Sham (ISIS)

ISR                  Intelligence, Reconnaissance and Surveillance UAS Platform

ISTAR            Intelligence, surveillance, target acquisition and reconnaissance

IT/OT              Information Technology/ Operational Technology

ITU                 International Telecommunications Union – Standards Organization

ITU-R             International Telecommunications Union – Radio Sector

IW                   Information Warfare

JADC2 Joint all-domain command & control

JADO              Joint all-domain operations (Thatcher, 2020)

JAGM             Joint-Air-to-Ground Missile

JAUS              Joint architecture for UAS

JDAM             Joint direct attack munitions

JFO                 Joint fires observer

JP                    Joint Publication – followed by military identifier.

JDAM             Joint Direct Attack Munition

JNIM               Jama’at Nusrat al-Islam wal-Muslimin

JOAC              Joint Operational Access Concept

JOPES             Joint Operation and Planning System / Execution System

JP                    Joint Publication

J / S                 = the ratio of the jammer power to the desired signal power at the input to the receiver being jammed in dB

JST                  Japan Time zone

JTAC               Joint Terminal Attack Controller.

JTIDS              Joint Tactical Information Distribution System (JTIDS) is an L band DTDMA.

K                     Boltzmann’s constant (Noise component, RRE) (1.38 x 10 -23 J/K), Kelvin

K                     2 for jamming frequency modulated receivers (jamming tuner accuracy), FM 34-40-7

KAMIKAZI   Means “Divine Wind,” Tactic best known for Japanese suicide A/C attacks on Allied Capital Vessels in WWII. UAS TEAMS or SWARMS could be directed in the same way.

KE                   Kinetic energy

KEW               Kinetic energy weapons

KM                  Katiba Macina Groups

KMS               Key Management System

KSU                Kansas State University

L                      λ / 2 in Eq. 20-5

LAANC          Low Altitude Authorization and Notification Capability

LASER           “A laser is a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation. The term “laser” originated as an acronym for “light amplification by stimulated emission of radiation”. A laser differs from other sources of light in that it emits light coherently, spatially and temporally. Spatial coherence allows a laser to be focused to a tight spot, enabling applications such as laser cutting and lithography. Spatial coherence also allows a laser beam to stay narrow over great distances (collimation), enabling applications such as laser pointers. Lasers can also have high temporal coherence, which allows them to emit light with a very narrow spectrum, i.e., they can emit a single color of light. Temporal coherence can be used to produce pulses of light as short as a femtosecond. Used: for military and law enforcement devices for marking targets and measuring range and speed.” (Wiki-L, 2018)

Laser JDAM   Laser Joint Direct Attack Munition – dumb bombs, all weather precision –guided munitions. Guided by an integrated inertial guidance system.

Laser rangefinder Scope to assist targeting of munitions. Countermeasure: laser-absorbing paint

LGWs             Laser-guided weapons

Latency           Processing difference between time interval signal is transmitted and signal is received

LCAC             Landing Craft Air Cushion Facility

LCDR             Lieutenant Commander

L/D                  Lift to drag ratio.

LDCM            Low Duty cycle methods

LEO                Low Earth Orbit Satellite / Law Enforcement Officer

LGB                Laser-guided bomb, a guided bomb that uses semi-active laser guidance to strike a designated target with greater accuracy than an unguided one.

LGTF              Liptako-Gourma task force (LGTF) established by Burkina Faso, Mali, and Niger to secure their shared border region.

LIDAR           Light (Imaging) Detection and Ranging

LFS                 Free- Space Loss as a Factor

LIPC               laser-induced plasma channel

LJ                     Propagation loss from jammer to receiver, in dBi

LMADIS        Light Marine Air Defense Integrated System (family of C-UAS systems)

LMM               Lightweight Multi-role Missile (by Thales)

LNG                Liquid natural gas

LORAN-C      Long Range Navigation, Revision C

LOS                Line-of-sight / Loss of Signal / Loss of Separation

LOSAS           Low-cost Scout UAV Acoustic System

LPA                Log periodic array

LPI                  Low Probability of Intercept

LR                   Long range

LRA                Long range artillery

LRAD             Long Range Acoustical Device (Weapon) (Yunmonk Son, 2015)

LRCS              Low radar cross section

LRE                Launch and recovery element.

LRF                 Laser rangefinder

LS                            Losses existing in the system (lumped together), dB (RRE)

LS                    The propagation loss from the desired signal transmitter, in dBm

LSDB              Laser Small Diameter Bomb

LSG                Real-time Tracking Laser Scalar Gradiometer

LST                 Laser spot trackers

LTA                Lighter than Air (airship) /Low noise amplifier

LTE /LTE+     Long Term Evolution – refers to mobile telecommunications coverage.

LUSV             Large Unmanned Surface Vehicles

LWIR              Long wave Infrared (sensor or camera)

M                     Mass in Eq. 20-5

MA                  Multi-agent methods of CR

MAC               Unique Media access control address assigned to a network interface controller                      (NIC) for use as  a network address in communication with a network segment.

MAD               Magnetic anomaly detection

MADIS           Marine Air Defense Integrated System

MAE               Medium-altitude endurance

MAGTF          Marine air-ground task force

MALDRONE Malware injected into critical SAA for UAS.

MALE             Medium-altitude, long endurance UAS

MALE-T         Medium altitude long endurance – tactical UAS

MAME            Medium altitude, medium endurance

MARIN          Maritime Research Institute Netherlands

MARPOL       Marine pollution (prevention of)

MAS               Mayflower autonomous system

MASINT         Measurement and Signal Intelligence

MATS             Mobile Aircraft Tracking System

M-AUDS        Mobile Anti-UAV Defense System

MAV               Micro-air vehicle

Maverick        AGM -65 (USA) Missile

MBES             Multi-beam Echo Sounder

MCE               Mission control element

MCM              Mine countermeasures

MCU               Master Control Unit

MCVs             Mesoscale convective vortices

MDR               Missed Detection Rates

Mesonet          network of  automated weather and environmental monitoring stations designed to

observe mesoscale meteorological phenomena.

MEB               Marine expeditionary brigade (14,500 marines and sailors).

MEMS            Micro-electromechanical systems

MEO               Medium Earth Orbit satellite

MFD               Multifunctional display

MGTOW         Maximum gross take-off weight

MHT               Multiple-hypotheses-testing

MIM                Man in the Middle cyber attack

MINUSMA    Multidimensional Integrated Stabilization Mission in Mali

MIR                Mid Infrared 5 to (25-40) um

MIT                 Massachusetts Institute of Technology

ML                  Machine learning techniques

MLRS             Multi launch rocket systems.

MLU               Mid-life upgrade

MMI                Man-machine interface

MORS             Military Operations Research Society

Modulation     Signal Modulation is the process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that typically contains information to be transmitted

MPA               Maritime patrol aircraft

MPI                 Message-passing interface

MPC                Model-based predictive control

MPO               Mission payload operator

MR                  Medium range / Maritime Reconnaissance

MRE               Medium-range endurance

MS                  Mobile service

MSL / AGL    MSL altitudes are measured from a standard datum, which is roughly equal to the average altitude of the ocean. So, an aircraft traveling 5,000 feet directly above a mountain that’s 3,000 feet tall would have an altitude of 5,000 feet Above Ground Level (AGL) and 8,000 feet MSL.

MSR                Maritime Silk Road (China)

MSSM             Multi-step optimization method to achieve re-planning for stealth UAV penetration of ADS.

MTCR             missile Technology Control Regime

MTI                 Moving target indication*

MTOM            Maximum take-off mass

MTOW            Maximum takeoff weight of an aircraft at which the pilot can attempt to take off, due to structural or other limits.

MTS                Multi Spectral Targeting System /Maritime Transportation Systems / Sector

MTTR             Multitarget tracking radar/Mean time to repair.

MUAV            Mini-UAV or maritime UAV

MUJAO          Movement for Unity and Jihad in West Africa

MUM              Manned-unmanned teaming.

MUSV            Medium Unmanned Surface Vehicles

MW                 Microwave

MWIR             Midwave Infrared

MW                 microwave towers

N                     Available Noise power, watts for HAPS

N                     Terrain and ground conductivity factor, FM 34-40-7

5 = very rough terrain with poor ground conductivity

4 = moderately rough terrain with fair to good ground conductivity

3 = Farmland terrain with good ground conductivity

2 = Level terrain with good ground conductivity[1]

The elevation of the jammer location and the enemy transmitter location does not include the height of the antenna above the ground or the length of the antenna. It is the location deviation above sea level.

NAC               Network Access Control

NACA            National Advisory Committee on Aeronautics

NAS                National Airspace (USA)

NASAMS II   National Advanced Surface to Air Missile System

NATO             North Atlantic Treaty Organization

NAV               Nano-air vehicle / NAV data message for GPS systems

NAVSEAS     Naval Sea Systems Command

NBC                Nuclear, biological, and chemical warfare

NCO               Network-centric operations

NCW               Network Centric Warfare

NDRC             National Development and Reform Commission (China)

NEC                Network enabled capability

NEMESIS       Netted Emulation of Multi-Element Signature against integrated Sensors (USN)

NGA               National Geospatial Intelligence Agency

NGO               Non-Governmental Organization

NIEM              National Information Exchange Model

NIR                 near Infrared

NLOS             Non-line-of-sight

NM                  Nautical Miles

NMAC            A NMAC is defined as an incident associated with the operation of an aircraft in which a possibility of collision occurs as a result of proximity of less than 500 feet to another aircraft, or a report is received from a pilot or a flight crewmember stating that a collision hazard existed between two or more aircraft.

NMLA            the National Movement for Liberation of Azawad (Tuareg Rebellion)

NO                  Numerical Optimization methods of CR

NOAA            National Oceanographic and Atmospheric Administration

NOLO             No onboard live operator (USN)

NOTAM         Notice to airmen

NOx                Nitrogen emissions

NPD                Near Peer Doctrine

NPS                 National Park Service

NSA                National Security Agency (US)

NSRL              New Silk Road Sea / Land routes (Chinese)

NSWC            Naval Surface Warfare Center

NSWC PCD    Naval Surface Warfare Center Panama City Division

NTIA              National Telecommunications and Information Administration

NTM/NTOM   Notice to mariners

NTSB              National Transportation Safety Board

NTT                 Non-Threat Traffic

NULLO          Not using live operator (USAF)

NUSSRC        National Unmanned Systems Shared Resource Center

O                     Other methods of CR

OEM               Original Equipment Manufacture

OIO                 Offensive Information Operations

OLOS             Out-of-the-line-of-sight

OODA            Decision Loop: Observe, Orient, Decide, Act

OoT                 Ocean of Things (USN) (DARPA)

ONR               Office of Naval Research

OPA                Optionally piloted aircraft

OPAV             Optionally piloted air vehicle (aka OPV)

OPSEC           Operations Security

OSI                 Open systems interconnection

OSS                 Office of Strategic Services (now CIA)

OT                   Operational technology

OTH                Over- the- horizon

OVPR             Office of the Vice President of Research , KSU

P                      Isotropic source of an electromagnetic pulse of peak power, Mw

PACE              Primary; Alternative; Contingency; Emergency

PANCAS        Passive Acoustic Non-Cooperative Collision Alert System

PAR                Photosynthetically Active Radiation Sensor

PB                   Particle Beams, Particle beams are large numbers of atomic or sub-atomic.

particles moving at relativistic velocities.

PBL                 Planetary boundary layer

PCAS              Persistent close air support

PCS                 Personal Communication Services

PDV                Parameter Data Vector

PEIRP             Transmitter’s effective isotropic radiated power, watts

PFMS              Predictive Flight Management System

PEMSIA         Partnership in Environmental Management of the Seas of East Asia

PGB                Precision guided bomb

PGM               Precision guided missile

PHOTINT       Photographic intelligence (usually sky – ground)

PHX                Airport code for Phoenix

PI                    Probability of Incapacitation

PID                 Proportional-Integral- Derivative

PII                   Personal Identifiable Information

PIM                 Position of intended movements/Previously intended movements

PIT                  Proximity Intruder Traffic

P j                           Minimum amount of jammer power output required, in watts, FM 34-40-7

PKI                 Public Key Infrastructure

PL                   Power level, dB, Eq. 20-1

PLA                Chinese People’s Liberation Army

PLAN             Peoples Liberation Army Navy (China)

PLC                 Programmable Logic Controllers

PLOCAN        Research facility Oceanic Platform of the Canary Islands

PMA               Post Mission Analysis

PMIAA           Permissions Management: Identification, Authentication and Authorization

PNF                 Plug and Fly with custom transmitter, receiver, battery, and charger.

PNT                 Reliable communications; positioning, navigation, and timing

PO                   Psychological Operations / Performance Objectives

POS                 Position and Orientation System

POV                Point of View

PPP                 Precise Point Positioning

PPS                 Precise positioning service (GPS)

PRC                Peoples Republic of China (China)

Primum Non Nocere – First Do No Harm (Latin)

PSD                 Power Spectral Density

PREACT         Partnership for Regional East Africa Counterterrorism (PREACT)

PRF                 Pulse repetition frequency codes

PRM                Precision Runway Monitor

PS                    Pressure sensor

PSH                 Plan-symmetric helicopter

PSR                 Primary Surveillance Radar

P t                    Power output of the enemy drone, in watts, FM 34-40-7

PW/PSYWAR Psychological Warfare

PWO               Principal Warfare officer

P(Y)                Precise Signal (GPS)for military positioning

QOS                Quality of Service in HAPs

QR                  QR code is a type of matrix barcode which is machine or phone readable.

QUAS             QUT UAS

QUT                Queensland University of Technology

R                     1 /Tb is the bit rate (b/s) in link equation

R&D               Research & Development

R4                           Energy density received at detected target range, R, nm.

RA                  Resolution Advisory

RAC                Range air controller

RACC             Social media RACC Threat Matrix: Removal, Authenticity; Censorship,   Collusion

RADAR          Radio Detection and Ranging

RADINT         Radar intelligence

RAM               Radar absorbing materials.

RAS                Radar absorbing structure.

RAST              Recovery, assist, and traverse.

RB                   Rule-based methods (Conflict Resolution)

RBW               Red- breasted Woodpecker

RCE                Remote Code Execution

RCO                Remote-control operator

RCS                Radar cross-section

RCTA             Surf Radio Technical Commission for Aeronautics

RDT& E          Research, Development, Test & Evaluation

RED                Risk Estimate Distance

Remote ID      Remote ID has two meanings in this textbook. It is used as an information /

technology device to identify people from a UAV. This term is used in the UAS.

industry and the FAA as a mechanism for identifying an aircraft type and the

registrant from the ground, essentially a digital license plate and registration.

RES                 Radio electronic systems

RF                   Radio Frequency

RGB                Red Green Blue for VIS camera

RGT                Remote ground terminal

RIAS               Research Institute for Autonomous Systems -University of North Dakota

Rician PDF     Rician probability density function

RIMPAC        Rim of the Pacific Exercise – Maritime

RL                   Ramp launched

RMS                Reconnaissance management system /Root-mean-square

RN                  Ryan-Nichols Qualitative Risk Assessment Equations 17-2, 17-3

RNRA             Ryan – Nichols Attack / Defense Scenario Risk Assessment for Cyber cases

ROA               Remotely operated aircraft

ROC                Republic of China (Taiwan) / Regional Operations Center (USA)

ROV/ROUV   Remote operating vehicle / Remotely operated underwater vehicle

RPA                Remotely piloted aircraft

RPH                Remotely piloted helicopter

RPV                Remotely piloted vehicle

RR                   Radio regulations

RRE                Radar Range Equation

RSA                RSA (Rivest–Shamir–Adelman) -authors of early public –key cryptographic system

RSTA              Reconnaissance, surveillance, and target acquisition

RTA                Dubai Roads and Transport Authority

RTF                 Off- the- shelf, Ready -to -Fly

RTG                Real time Gradiometer

RTK                Real Time Kinematic

RTS                 Remote tracking station/Request to send/Release to service.

RTU                Remote Terminal Unit

RUAV            Relay UAV

RWR               Radar warning receiver

S                      Intensity at surface of sphere

S&T                 Science & Technology

SA                   Situational Awareness

SAA                Sense and Avoid &

SAA                Sense and Act Systems; replaces See and Avoid function of a human pilot.

SAASM          Selective Availability Anti-Spoofing Module

SAE                Society of Automotive Engineers

SAHRV          Semi-autonomous Hydrographic Reconnaissance vehicle

SAM               Surface to Air Missile

SAMPLE        Survivable autonomous mobile platform, long-endurance

SAP                 Systems Applications and Products also the name of a company

SAR                Synthetic aperture radar / Search and rescue- especially using helicopters.

SAS                 Safety Assurance System

SATCOM       Satellite communications

SBP                 Sub Bottom Profiler

SCADA          Supervisory Control and Data Acquisition systems

SCHEMA       Security Incident Identification

SCIF               Sensitive Compartmented Information Facility

SCS                 Shipboard control system (or station) / Stereo Camera System / South China Sea

SE                   Synthetic environment

SEA                Airport code for Seattle

SEAD             Suppression of Enemy Air Defenses

SECDEF         Secretary of Defense

Shadowing      Airframe shadowing – UAV- Ground signal degradation during maneuver

SEZ                 Special economic zones

SHM               Simple harmonic motion – represented by sign wave.

SHORAD       Short Range Air Defense systems

SIGINT           Signals Intelligence

Signature         UAS detection by acoustic, optical, thermal and radio /radar

SINS               Ships inertial navigation systems.

SJM                 Salafi-Jihad Movement

SKASaC         Seeking airborne surveillance and control.

SKYNET        Fictional artificial intelligence system that becomes self-aware

SLAM             Simultaneous localization and mapping

SLAMRAAM Surface launched AMRAAM

SM                  Separation Management

SMC                Single moving camera

SME                Subject matter expert

SMR                Single main rotor

S/N                  S / N = is one pulse received signal to noise ratio, dB: Signal to Noise ratio at HAPS receiver

SOA                Static Obstacle – Avoidance system

Soft damage    DEW disruption to a UAS computer

SOLAS           Safety of Life at Sea (International Maritime Convention) [safety conventions]

SONAR          Sound Navigation and Ranging

Sox                  Sulfur emissions

SPL                 Sound pressure level, dB = 20 Log p / po [ measured pressures to reference pressure]          see Eq. 20-3,4; 6-7

SPS                 Standard position service (GPS)

Spoofing         A Cyber-weapon attack that generates false signals to replace valid ones.

Spot sensors    ARS sensors that measure single locations without image library

SPURV           Special purpose underwater research vehicle

SQL                SQL Injection – common malevolent code injection technique

SR                   Short range

SRBM             Short range ballistic missile, ex SCUD missile

SRL                 Systems readiness level

SSA                 Static Sense-and -Act

SSBN              Ballistic missile submarine force

SSP                 Smart Skies Project

SSR                 Secondary Surveillance Radar

SST                 Self – Separation Threshold

ST&T              Submarine Track and Trail

STANAG 4856 Standard interfaces of UAV Control System for NATO UAV

STCW             Standards of training and certification

STK                 Satellite toolkit

STOL              Short take-off and landing

sUAS              Small Unmanned Aircraft System

SubT                Subterranean Challenge Urban Circuit

SUAVE          Small UAV engine

SWARM         High level, dangerous collaboration of UAS, UUV, or unmanned boats

SWAT             Special Weapons and Tactics (police / paramilitary)

SWAP             Size, weight, and power

SWIR              Shortwave infrared, 1400-3000 nm, 1.4 -3.0 um wavelength range

SZ                   Safety Zone is defined as the horizontal and vertical separation criteria which form a cylindrical airspace volume around the UAS. In figure 3-2 that volume is defined by 1000 ft. radius and 200 ft. height. It is assumed that initially the UAS is in the center with 100 ft above and below the A/C.

T                      In Range equation & environment, strength of a received signal, function of square or fourth power of distance, d, from transmitter (Adamy D. -0., 2015)

T                      Time, sec (RRE)

T                      Tension in Eq.20-5

TA                   Traffic Advisory

TAC                Target air controller

TACAN          Tactical air navigation

TAR                Antenna noise temperature, Kelvin

TAS                 True airspeed

TBO                Time between overhauls

TC                   Type certificate

TCAS              Traffic alert and collision avoidance system

TCPA              Time to reach Closest Point of Approach

Te                    Effective input noise temperature, Kelvin,

TEAM (UAS) High level, dangerous collaboration of UAS, UUV, or unmanned boats; differs from SWARM in that it has a UAS Team Leader, (TL) where SWARM does not. TL directs the UAS team and is the primary counter UAS target to disrupt.

TETRA           Terrestrial Trunked Radio for terrestrial terminals / services

Thermobaric   Metal augmented charge

THOR             Tactical high-power operational responder

TIR                  Thermal infrared = 8000 – 15000 nm, 8 -15 um

TL                   Team Leader

TLS                 Transport Layer Security

TO                   take-off

Tort                 A tort is an act or omission that gives rise to injury or harm to another and amounts to a civil wrong for which courts impose liability.

TP                    Trajectory Prediction

TRANSCOM  U.S. Transportation Command networks

TRL                 Technology readiness level: Technology readiness levels are a rating method.

developed by NASA to describe where a technology is in terms of its

development.  The lowest levels (1 – 3) are technologies that are being.

researched, the middle levels (4 – 6) are technologies that are being prototyped.

and tested, and the highest levels (7 – 9) are technologies that are being.

demonstrated and used.  (NASA, 2017)

TS                    Measured noise temperature, Kelvin units above absolute zero.

TSTCP            Trans-Sahara Counterterrorism Partnership. TSCTP partners include Algeria, Burkina Faso, Cameroon, Chad, Mali, Mauritania, Morocco, Niger, Nigeria, Senegal, and Tunisia.

TT & C           Telemetry, tracking and command.

TUAV             Tactical UAV

UA                  Unmanned Aircraft (non-cooperative and potential intruder)

U-Actors         Unintentional Cyber Actors

UAE                United Arab Emirates

UAM               Urban Air Mobility (vehicle)

UAPO             Unmanned Aircraft Program Office

UAS                Unmanned aircraft system

UASCdr          Unmanned aircraft system commander

UASIPP          UAS Integration Pilot Program

UAS-p             UAS pilot

UAV               Unmanned aerial vehicle / Unmanned autonomous vehicle.

UAV-p            UAV pilot

UBR                Uplink bit rate, Mb/s

UCAR             Unmanned combat armed rotorcraft

UCARS          UAV common automated recovery system

UCAV            Unmanned combat air vehicle

UCWA / UA   Unintentional cyber warfare attack

UG                  Underwater glider (USN)

UGCS             Unmanned Ground Control Station

UGS                Unmanned ground-based station

UGT                Unmanned ground transportation

UGV               Unmanned ground vehicle

UHF                Ultra High Frequency, 300 MHz – 3 GHz

UIT                 Unintentional Insider Threats

UK                  United Kingdom

UL                   Upload link

ULC                Uniform Law Commission

ULPCG           University of Las Palmas de Gran Canaria

UMTS             Universal Mobile Telecommunications System

U.N.                United Nations

UND               University of North Dakota

UNESCO        United Nations Educational, Scientific and Cultural Organization

UNICEF         United Nations Children’s Fund

US                   United States

USAMRIID    U.S. Army Medical Research Institute of Infectious Diseases

USBL              Responder for Surface Ultra Short Baseline

USCG             United States Coast Guard

USCGA          United States Coast Guard Auxiliary

USD                Unmanned surveillance drone / United States Dollar

USMC             United States Marine Corp

USS                 Undersea Search and Survey

USV                Unmanned surface vehicle [Boat]

UTM               Unmanned Traffic Management / Safe Uniform Traffic Management

UTV                Unmanned target vehicle

UUV               Unmanned underwater / undersea vehicle.

UV                  Unmanned Vehicle

UUNs/DUNSs Urgent / deliberate universal needs statements

UXO               Unexploded Ordinance

V                     Visible

VCR                Video Camera Recorder

VFR                Visual flight rules

VHS                Very High Frequency Radio

VIKI               Virtual Interactive Kinetic Intelligence

VLA                Very light aircraft

VLJ                 Very Light Jet

VLAR             Vertical launch and recovery

VLOS             Visual Line of Sight

VMC               Visual Meteorological Conditions

VNIR              Visible light and near infrared 400 – 1400 nm, 0.4 – 1.4 um wavelength range

VOA               Voice of America

Voloport          Landing site for Volcopter.

VTC                Vessel traffic control

VTM               Vessel traffic management

VTOL             Vertical take-off and landing

VTUAV          Vertical take-off UAV

WABN            wide available broadband networks

WARM           identify war reserve mode emissions.

WEF                World Economic Forum

WEZ               Weapon Engagement Zone

WMD              Weapons of Mass Destruction /Weapons of Mass Disruption

WMDD           Weapons of Mass Destruction Directorate

WRC               World Radio Conference Standards Organization

XLUUV          Extra-large unmanned undersea vehicle

XO                  Executive Officer of Naval vessel

ZIGBEE or KILLERBEE      Sniffing / penetration tools specific to UAS.

 

Greek / Mathematical Symbols

λ                      Wavelength in Hz, c / f where c= speed of light 344 m/s and f = frequency, Hz.

Σ                      Radar Cross Sectional Area, m2

υ                      UAV velocity vector and UAV speed (ms -1)

θ                      Horizontal angle in inertial axes (rad)

Ψ                     Vertical angle in inertial axes (rad)

x,y,z                 Inertial position coordinates (m)

κ                      Curvature (m-1)

τ                       Torsion, (m-1)

r(q)                  Path, with path variable (q)

h                      Path length (m)

e                       Basis axes vector set.

P(x, y, z, θ, Ψ) UAV pose where: where x, y, z, is the UAV location or waypoint and (θ, Ψ) are.

the horizontal and vertical angles , respectively

Ps                    Starting pose for UAV moving to

Pf                    Finish pose

Џ                     Path constraint in (9.4)

a                      lateral acceleration proportional to curvature k

∞                     vector operator in (9.6)

f(n)                  Path cost function in (9.9)

g(n)                  cost of path from start node n to the goal.

h(n)                 Heuristic function which estimates the distance from the next node n on the path.

to goal in (9.9)

h(X)                 represents actual journey cost from goal X.

g(X,E)             represents the estimate journey cost from state X to the current position of the

stealth UAV in (9.10)

N                     Length of the prediction domain in (9.11) & N steps in (9.12)

W                    length of the control domain in (9.11)

qi                     Output prediction error

qj                     Is the weighting coefficient of the control variable in (9.11)

k                      Kth node for prediction of cost of predicted flight path in MPC (9.12)

3-D                  three dimensional

 

 

Special Definitions

 

Asymmetric warfare can describe a conflict in which the resources of two belligerents differ in essence and, in the struggle, interact and attempt to exploit each other’s characteristic weaknesses. Such struggles often involve strategies and tactics of unconventional warfare, the weaker combatants attempting to use strategy to offset deficiencies in quantity or quality of their forces and equipment. (Thomas, 2010) Such strategies may not necessarily be militarized. (Steponova, 2016)

 

This is in contrast to symmetric warfare, where two powers have comparable military power and resources and rely on tactics that are similar overall, differing only in details and execution. (Thomas, 2010)

Sources plus Bibliography below: (Nichols R. K., Unmanned Aircraft Systems In the Cyber Domain: Protecting USA’s Advanced Air Assets. 2nd Ed. Manhattan, KS: New Prairie Press., 2019) and (Nichols, et al., Counter Unmanned Aircraft Systems Technologies and Operations, 2020) (Nichols & et.al, 2020)

Austin, R, (2010) Unmanned Aircraft Systems: UAVS Design, Development and Deployment, West Sussex, UK: Wiley, [Condensed with additions from eleven-page “Units and Abbreviations Table.” Pp. ix-xxix] Additional sources generated from / specific to Chapter development / discussion. A few definitions taken from Wikipedia.

Cyber terminology from: Nichols, R. K. (Sept. 5, 2008) Cyber Counterintelligence & Sensitive Compartmented Information Facility (SCIF) Needs – Talking Points & (Randall K. Nichols J. J., 2018) & (Nichols R. K., Hardening US Unmanned Systems Against Enemy Counter Measures, 2019) & (Randall K. Nichols D. , Chapter 20 Acoustic CM & IFF Libraries V SWARMS Rev 1 05142019, 2018) & (Randall K. Nichols and Lekkas, 2002)& (NIST, September 2012)

Alford, L. D., Jr., USAF, Lt. Col. (2000) Cyber Warfare: Protecting Military Systems Acquisition Review Quarterly, spring 2000, V.7, No. 2, P, 105, (Nielsen, 2012)

Nichols, Randall K.; Mumm, Hans C.; Lonstein, Wayne D.; Ryan, Julie J.C.H.; Carter, Candice; and Hood, John-Paul, “Unmanned Aircraft Systems in the Cyber Domain” (2019). NPP eBooks. 27. https://newprairiepress.org/ebooks/27

Http://Www.Dtic.Mil/Dtic/Tr/Fulltext/U2/A487951.Pdf

Appendix 1: Standard Acoustic Principal Physical Properties (Entokey, 2019)

and (Gelfand S. A., 2009)

 

A majority of the technical abbreviations come from (Nichols R. K., et al., Unmanned Aircraft Systems in the Cyber Domain, 2019) and (Nichols, et al., Counter Unmanned Aircraft Systems Technologies and Operations, 2020) (Nichols & et.al, 2020) (Nichols, et al., Unmanned Aircraft Systems (UAS) in Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd Edition, 2019) Nichols, R. K., Ryan, J., Mumm, H., Lonstein, W., Carter, C., Hood, J., . . . & Jackson, M. (2020). Unmanned Vehicle Systems & Operations on Air, Sea, Land. Manhattan, KS: New Prairie Press #35. Nichols, R. K., Sincavage, S., Mumm, H., Lonstein, W., Carter, C., Hood, J., . . . & Shields, B. (2021). Disruptive Technologies With Applications In Airline, Marine, Defense Industries. Manhattan, KS: New Prairie Press, #TBA.

Other definitions from the following references:

References

49 U.S. Code § 40103, 49 U.S. Code § 40103 Sovereignty and use of airspace (U.S. Code July 5, 1994).

Abramson, E. (2016). Ethical Dilemmas in the Age of AI. Retrieved from Abramson, E. – knowmail.me/blog: https://www.knowmail.me/blog/ethical-dilemmas-age-ai/

Adamy, D. -0. (2015). EW 104 EW against a New Generation of Threats. Boston: Artech House.

Adamy, D. (2001). EW 101 A First Course in Electronic Warfare. Boston, MA: Artech House.

Adamy, D. (2001). EW 101 A First Course in Electronic Warfare. Boston: Artech House.

Adamy, D. (2004). EW 102 A Second Course in Electronic Warfare. Boston: Artech House.

Adamy, D. (2009). EW 103 Tactical Battlefield Communications Electronic Warfare. Boston: Artech House.

Adamy, D. (2009). EW 103 Tactical Battlefield Communications Electronic Warfare. Boston, MA: Artech House.

Adamy, D. (2015). EW Against a New Generation of Threats. Boston: Artech House.

Adamy, D. L. (2004). EW 102 A Second Course in Electronic Warfare. Boston: Artech House.

Adamy, D.-9. (1998, Jan). Lesson 4: the basic link for all EW functions. (electronic warfare)(EW Reference & Source Guide). Journal of Electronic Defense, Jan 1998 Issue.

Administrator. (2015, June 15). Standing Wave and Fundamental Frequency. Retrieved from Electronics Hub: https://www.electronicshub.org/?s=fundamental+frequency

Administrator. (2019, May 17). Harmonic Frequencies. Retrieved from electronicshub.org: https://www.electronicshub.org/harmonic-frequencies/

Alejandro Aragon-Zavala, J. L.-R.-P. (2008). High-Altitude Platforms for Wireless Communications. Chichester, West Sussex, UK: John Wiley & Sons.

Alford, L. (2000). Cyber Warfare: Protecting Military Systems. Acquisition Review Quarterly.

Angelov, P. (2012). Sense and avoid in UAS research and applications. Hoboken: NJ.

Anon. (2019). Saudi Arabia grants citizenship to robot Sophia. Retrieved from dw: Saudi Arabia grants cihttps://www.dw.com/en/saudi-arabia-grants-citizenship-to-robot-sophia/a-41150856

Army, U. (1992, November 23). US Army Field Manual FM 34-40-7. Communications Jamming Handbook.

Asimov, I. (1950). “Runaround”. I, Robot (The Isaac Asimov Collection ed.). New York City: Doubleday.

Atherton, K. D. (2019). Can the Pentagon sell Silicon Valley on AI as ethical war? . C4ISRNET.

Austin, R. (2010). “Design for Stealth”, Unmanned Aircraft Systems UAVS Design Development and Deployment. New York: John Wiley and Sons.

Barnhart, R. K. (2012). Introduction to Unmanned Aircraft Systems. New York: CRC Press.

Beaudoin, L. e. (2011). Potential Threats of UAS Swarms and the Countermeasures Need. ECIW.

Bernstein, R. A. (29 June 2012). MUNITIONS DETECTION USING UNMANNED UNDERWATER VEHICLES EQUIPPED WITH ADVANCED SENSORS. Panama City, FL: NSWC PCD ESTCP Project Number MR-201103 Ver 7a.

Black Swan Definition. (2020, December 16). Retrieved from https://www.investopedia.com/terms: https://www.investopedia.com/terms/b/blackswan.asp#:~:text=A%20black%20swan%20is%20an,they%20were%20obvious%20in%20hindsight.

Bluefin Robotics. (2020, December 15). Retrieved from gdmissionsystems.com/underwater-vehicles/bluefin-robotics: https://gdmissionsystems.com/underwater-vehicles/bluefin-robotics

Brown, E. F. (Dec 2008). Airborne Communication Networks for Small Unmanned Aircraft Systems. Proc. IEEE, vol 96, no 12, pp. 2008-17.

Burch, D. (2015). RADAR for Mariners. New York: McGraw-Hill.

Cameron, J. &. (Director). (1991). Terminator 2: Judgement Day [Motion Picture].

Chapman, A. (2019, May 31). GPS Spoofing. Retrieved from Tufts University – Tech Notes 2017: https://sites.tufts.edu/eeseniordesignhandbook/files/2017/05/Red_Chapman.pdf

Cornell University Legal Information Institute. (2019, June 5). But-for test. Retrieved from law.cornell.edu: https://www.law.cornell.edu/wex/but-for_test

Cornell University Legal Information Institute. (2019, June 5). Intervening Cause. Retrieved from law.cornell.edu: https://www.law.cornell.edu/wex/intervening_cause

Cornell University Legal Information Institute. (2019, June 5). Personal Jurisdiction. Retrieved from law.cornell.edu: https://www.law.cornell.edu/wex/personal_jurisdiction

Crouch, T. (2014, March). history-of-flight/wright-brothers-first-flight-photo. Retrieved from www.airspacemag.com: https://www.airspacemag.com/history-of-flight/wright-brothers-first-flight-photo-annotated-180949489/

D, G. a. (2010). Broadband Communications via High Altitude Platforms. New York City, NY: John Wiley & Sons.

Dalamagkidis, K. V. (2012). On Integrating Unmanned Aircraft into the National Airspace System, 2nd edition. Denver, CO: Springer.

Daniel-Cornel TĂNĂ, S. (2018). The Impact of the Development of Maritime Autonomous Systems on the Ethics of Naval Conflicts. Annals: Series on Military Sciences(2), 118-130.

Deloitte Center for Government Insights analysis. (2018, June 18). The future of regulation. Principles for regulating emerging technologies. Retrieved from Deloitte Insights: https://www2.deloitte.com/insights/us/en/industry/public-sector/future-of-regulation/regulating-emerging-technology.html

Dewey, D. (2017, July 14). Drone crashes into LDS temple in Utah; raises questions of airspace rules. Retrieved from eastidahonews.com: https://www.eastidahonews.com/2017/07/drone-crashes-lds-temple-utah-raises-questions-airspace-rules/

Diversity of citizenship; amount in controversy; costs, 28 U.S. Code § 1332 (United States Congress June 25, 1948).

DJI. (2019, June 5). DJI Enterprise. Retrieved from Enterprise DJI.com: https://enterprise.dji.com/civil-protection

DLSR Pros. (2019, June 3). Best Drones (UAVs) for Firefighting in 2019. Retrieved from dlsrpros.com: https://www.dslrpros.com/dslrpros-blog/best-drones-firefighting-2019/

DoD. (2018). Dictionary of Military Terms. Retrieved from JCS.Mil: http://www.jcs.mil/doctrine/dod_dictionary/

DoD. (2018). Joint Publication (JP) 3-01 Countering Air and Missile Threats. Washington, DC: DoD.

DoD-01. (2018). JP 1-02. Retrieved from Department of Defense Dictionary of Military and Associated Terms: www.dtic.mil/doctrine/new_pubs/jp1_02.pdf

DoD-02. (2018). Information Operations (IO) in the United States. Retrieved from JP 3-13 : http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf

DoD-03. (2015). Unmanned Systems Roadmap 2013 to 2038. Retrieved from DTIC: http://www.dtic.mil/dtic/tr/fulltext/u2/a592015.pdf

Drones, Q. S. (2017, July 11). quadcopters-have-hit-the-sound-barrier/. Retrieved from quadstardrones.com: https://quadstardrones.com/2017/07/11/quadcopters-have-hit-the-sound-barrier/

DTRA. (2019, October 18). Private Communication re Aviation Vulnerabilities. (Nichols, Interviewer) Retrieved from https://www.dtra.mil/

Durham, W. (2013). Aircraft Flight Dynamics and Control. The Atrium, Chesterton, UK: Wiley.

EARSC. (2015). A Taxonomy for the EO Services Market: enhancing perception and performance of the EO service industry. EARSC Issue 2.

EIA. (2019, June 20). The Strait of Hormuz is the world’s most important oil transit chokepoint. Retrieved from EIA – US Energy Information Administration: https://www.eia.gov/todayinenergy/detail.php?id=39932

Entokey, a. G. (2019, May 16). entokey.com/acoustics-and-sound-measurement/. Retrieved from entokey.com/acoustics-and-sound-measurement/: https://entokey.com/acoustics-and-sound-measurement/

ESA-ESTEC Contract 162372/02/NL/US. (September 2005). STRATOS: Stratospheric Platforms a definition study for ESA Platform, Final Report, 1-34. ESA-ESTEC .

Eshel, T. (2019, September 14). AFRL to Test a Drone-Swarm Killer HPM. Retrieved from Defense Update: https://defense-update.com/20190923_hpm.html

European Union. (2019, May 2019). About the regulation and data protection. Retrieved from ec.europa.eu: https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en

FAA. (2018, February 1). Part 107 Rule for sUAS. Retrieved from Fly under the Special Rule for Model Aircraft: https://www.faa.gov/uas/getting_started/model_aircraft/

Federal Question, 28 U.S. Code § 1331 (United States Congress June 25, 1948).

FEMA. (2013). Lessons Learned from the Boston Marathon Bombings: Preparing for and Responding to the Attack. Retrieved from www.fema.gov: http://www.fema.gov/media-library-data/20130726-1923-25045-1176/lessons_learned_from_t

Filbert, F. &. (2014, (July – August). Joint Counter Low, Slow, Small Unmanned Aircraft Systems Test. Fires PB644-14, no 4. Washington: DoD.

Filippo Santoni de, S. &. (2018). Meaningful Human Control over Autonomous Systems: A Philosophical Account. Frontiers in Robotics and AI. doi:10.3389/frobt.2018.00015

Fitts, R. (1980). The Strategy of Electromagnetic Conflict. Los Altos, CA: Peninsula Publishing.

Fleetwood, J. (2017). Public Health, Ethics, and Autonomous Vehicles. American Journal of Public Health, 107(4), 632-537.

Fortuna, C. (2017, 12 02). Autonomous Driving Levels 0–5 + Implications. Retrieved from cleantechnica.com: https://cleantechnica.com/2017/12/02/autonomous-driving-levels-0-5-implications/

  1. Sulzberger, J. B. (2009). Hunting Sea Mines with UUV-Based Magnetic and Electro-Optic Sensors. Retrieved from algebra.sci.csueastbay.edu/: http://algebra.sci.csueastbay.edu/~grewe/pubs/DistSensorNetworkBook2011/Atmosphere/UnderWaterSeaMineHunt.pdf

Gallagher, S. (2019, September 16). Missiles and drones that hit Saudi oil fields: Made in Iran, but fired by whom? Retrieved from Arstechnica.com: https://arstechnica.com/tech-policy/2019/09/missiles-and-drones-that-hit-saudi-oil-fields-made-in-iran-but-fired-by-whom/

Gelfand. (2004). “Physical Concepts”, Hearing an Introduction to Psychological and Physiological Acoustics, 4th ed. New York City.

Gelfand, S. A. (2009). Essentials of Audiology, 3rd Edition. Stuttgart, DE: Thieme.

Giordano, N. (2009). College Physics: Reasoning and Relationships. New York City, NY: Cengage Learning. pp. 421–424.

Guardbaum, S. (1994). The Nature of Preemption. Cornell Law Review, 767, 771.

Harris Aerial. (2019, June 5). Carrier HX8 Sprayer Drone. Retrieved from harrisaerial.com: https://www.harrisaerial.com/carrier-hx8-sprayer/

Hartman, K. a. (2013). The Vulnerability of UAVs to Cyber Attacks – An Approach to the Risk Assessment. 2013 5th International Conference on Cyber Conflict . Tallin: NATO CCD COE Publications.

Heinman, C. (2019). Hearing Loss Tests Patient D v-105. Carlisle, PA: Brown Optical Hearing Aid Service.

Henderson, T. (2017). The Doppler Effect – Lesson 3, Waves. Physics tutorial. The Physics Classroom. Retrieved from Henderson, Tom (2017). “The Doppler Effect – Lesson 3, Waves”. Physics tutorial. The Physics Classroom. Retrieved September 4, 2017.: Henderson, Tom (2017). “The Doppler Effect – Lesson 3, Waves”. Physics tutorial. The Physics Classroom. Retrieved September 4, 2017.

Hern, A. (2017, 1 12). Give robots ‘personhood’ status, EU committee argues. Retrieved from The Guardian: www.theguardian.com/technology/2017/jan/12/give-robots-personhood-status-eu-committee-argues

Horowitz, E. (1978). Fundamentals of Computer Algorithms. Potomac, MD: Computer Science Press.

Howard, C. (2019, June 21). What is the Strait of Hormuz, where Iran shot down US Navy drone? Retrieved from Fox News: https://www.foxnews.com/world/whats-the-strait-of-hormuz-iran-shot-us-navy-drone

Hubbard, R. K. (1998). Boater’s Bowditch. Camden, MA: International Marine.

Ibrahim, A. (2019). Optimization Methods for User Admissions and Radio Resource Allocation for Multicasting over High Altitude Platforms . Memorial University of Newfoundland , Canada: River Publications.

IEEE . (2017). The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems Announces New Standards Projects. Telecom Standards, 27(11), pp. 4-5. .

Jesus Gonzalo, D. L. (2018, March 15). On the Capabilities and Limitations of High Altitude Pseudo-Satellites. Progress In Aerospace Sciences, 37-56. doi:https://doi.org/10.1016/j.paerosci.2018.03.006

Johnson, O. &. (2012). Ethics: Selections from Classic and Contemporary Writers. Boston, MA: Cengage Learning.

Jones, T. (2017). International Commercial Drone Regulation and Drone Delivery Services. Santa Monica: The Rand Corporation.

Kania, E. (2017, July 6). Swarms at War: Chinese Advances in Swarm Intelligence. China Brief Volume: 17 Issue 9. China Brief Volume: 17 Issue 9.

Kanowitz, S. (2019, 05 15). Toward the deployment of ethical AI. Retrieved from Government Computer News. : Kanowitz, S. (2019). Toward the dephttps://gcn.com/articles/2019/05/15/ethical-ai-idc.aspx?s=gcntech_200519

Kaye, T. a. (2001, September 30). ACHIEVING INFORMATION DOMINANCE:. Retrieved from DODCCRP-Space and Naval Warfare Systems Center San Diego: http://www.dodccrp.org/events/2002_CCRTS/Tracks/pdf/026.PDF

Kim, A. G. (2012, June). Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles. Retrieved from Infotech@Aerospace.com: https://www.researchgate.net/publication/268571174_Cyber_Attack_Vulnerabilities_Analysis_for_Unmanned_Aerial_Vehicles

Kirk, J. (2015, August 5). sounds-can-knock-drones-sky. Retrieved from www.computerworld.com.au/article/581231: https://www.computerworld.com.au/article/581231/sounds-can-knock-drones-sky/

Knight, W. (2018). Nine charts that really bring home just how fast AI is growing. MIT Technology Review .

Kovacs, T. (1998). Micromachined Transducers Sourcebook. NYC: McGraw-Hill.

Leasko, R. (2014). Munitions Detection Using Unmanned Underwater Vehicles Equipped with Advanced Sensors. Scotts Valley, CA: CreateSpace Independent Publishing Platform (Amazon Media on Demand).

Legal Information Institute – Cornell University. (2019, May 31). Strict Liability . Retrieved from Legal Information Institute: https://www.law.cornell.edu/wex/strict_liability

Lipschutz, M. (1969). Schaums Outline for Differential Geometry. NYC: McGraw-Hill .

Lister, T. (2019, September 16). Attack is a game-changer in Gulf confrontation. Retrieved from CNN: https://www.cnn.com/middleeast/live-news/saudi-oil-attack-dle-intl/h_3e647100fa720927c962d7643472b12d

LRAD. (2019, May 189). LRAD 450XL Datasheet. Retrieved from LRADX: http://www.lradx.com/wp-context/uploads/2015/05/LRAD_datasheet_450XL.pdf

MacGregor, D. S. (2018). Colorado Causes of Action: Elements, Defenses, Remedies, and Forms. Denver: Bradford Publishing Co. .

Macnamara, T. M. (2010). Introduction to Antenna Placement & Installation. New York City, NY : John Wiley & Sons.

Mahon, J. (2012). Classical Natural Law Theory St. Thomas Aquinas (1227-1274) — the “Angelic Doctor” Lecture. Retrieved from Mahon, J. (2012). Classical Natural Law Theory St. Thomas Aquinas (1227-1274) — the Philosophy of Law. : Mahon, J. (2012). Classical Natural Law Theory St. Thomas Aquinas (1227-http://home.wlu.edu/~mahonj/PhilLawLecture1NatLaw.htm

Marbury v. Madison, 5 U.S. 137 (United States Supreme Court February 23, 1803).

Marshall, D. M. (2016). Introduction to Unmanned Aircraft Systems, 2nd Edition. New York: CRC Press.

Matolak, R. S. (April 2015). Initial Results for Airframe Shadowing in L-band and C-band Air -Ground Channels. Proc. Integrated Commun,, Navigation, and Surveillance Conf, (pp. pp. 1-8).

McCullogh v. Maryland, 17 U.S. 316 (United States Supreme Court March 6, 1819).

Merriam-Webster. (2019, May 17). Merriam-Webster Online Dictionary.

Merriam-Webster. (2020, August 5). Definition of human (Entry 2 of 2). Retrieved from Merriam-Webster.com: https://www.merriam-webster.com/dictionary/human#h2

Merriam-Webster. (2020, August 11). humanity noun. Retrieved from Merriam-Webster.com: https://www.merriam-webster.com/dictionary/humanity

Merriam-Webster, Inc. (2019). Definition of Ethics. online: Merriam-Webster, Inc. Retrieved from Definition of Ethics. (2019a). Online: Merriam-Webster, Incorporated.: Definition of Ethics. (2019a). Online: Merriam-Webster, Incorporated.

Middleton, C. (2018). SAP launches ethical A.I. guidelines, expert advisory panel. Retrieved from internetofbusiness.com: Middleton, C. (2018). SAP launches ethical A.I. guidelines, expert advisory panel. Retrieved from https://internetofbusiness.com/sap-publishes-ethical-guidelines-for-a-i-forms-expert-advisory-panel/

Misselhorn, C. (2018). Artificial Morality. Concepts, Issues and Challenges. Society, 55(2), 161-169.

Mohorcic, D. G. (2010). Broadband Communications via High Altitude Platforms. New York City, NY: John Wiley & Sons.

Moir, I. a. (2006). Military Avionics Systems. New York: Wiley Aerospace Series.

Monahan, K. (2004). The Radar Book: Effective Navigation and Collision Avoidance. Anacortes, WA: Fineedge Publications.

Muspratt, A. (2018, November 22). New global drone standards proposed. Retrieved from Defense iQ: https://www.defenceiq.com/defence-technology/news/new-global-drone-standards-proposed

Myer, G. (2013, May-June). Danger Close Definition. Retrieved from US Army Magazine: www.benning.army.mil/infantry/magazine/issues/2013/May-June/Myer.html

  1. Goddemeir, K. D. (June 2015). Role-based Connectivity Management with Realist Air to Ground Channels for Future Applications. IEEE Vehic. Tech. Mag. Vol 10, no 2, pp. 79-85.

N/A. (2020, July 25). Cambridge Dictionary on line. Retrieved from dictionary.cambridge.org/us/: https://dictionary.cambridge.org/us/

NASA. (2018). Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) Project. Retrieved from NASA: https://www.nasa.gov/feature/autonomous-systems

National Conference of State Legislatures. (2018, September 10). Current Unmanned Aircraft State Law Landscape. Retrieved from NCSL.org: http://www.ncsl.org/research/transportation/current-unmanned-aircraft-state-law-landscape.aspx

Naval Mines. (2020, December 16). Retrieved from en.wikipedia.org: https://en.wikipedia.org/wiki/Naval_mine#cite_note-minewar-83

NBC Today Show. (2018, May 9). How peeping drones could be spying on you without you knowing it. Retrieved from Today.com: https://www.today.com/video/how-peeping-drones-could-be-spying-on-you-without-you-knowing-it-1229001795967

Newman, L. H. (2017, August 7). THE ARMY GROUNDS ITS DJI DRONES OVER SECURITY CONCERNS. Retrieved from WIRED: https://www.wired.com/story/army-dji-drone-ban/

Nichols, R. K. (1996). Classical Cryptography Course Volume I / II. Laguna Hills, CA: Aegean Park Press.

Nichols, R. K. (1996). Classical Cryptography Course, Volume I. Laguna Hills, CA: Aegean Park Press.

Nichols, R. K. (2008, September 05). Counterintelligence & Sensitive Compartmented Information Facility . (SCIF) Needs – Talking Points.

Nichols, R. K. (2018). Unmanned Aircraft Systems (UAS) In the Cyber Domain: Protecting USA’s Advanced Air Assets. 1st Ed. Manhattan, KS: New Prairie Press.

Nichols, R. K. (2019, March 14). Hardening US Unmanned Systems Against Enemy Counter Measures. 7th Annual Unmanned Systems Summit. Alexandria, VA, USA: PPTX presentation , self.

Nichols, R. K. (2019, October 15). Randall Nichols (October 15, 2019) Implications from Attack by Iran on Saudi Arabian Oil Fields (implications-from-attack-iran-saudi-Arabian-oil-fields-Nichols. Retrieved from www.linkedin.com/pulse/: https://www.linkedin.com/pulse/implications-from-attack-iran-saudi-arabian-oil-fields-nichols/

Nichols, R. K. (2019). Unmanned Aircraft Systems In the Cyber Domain: Protecting USA’s Advanced Air Assets. 2nd Ed. Manhattan, KS: New Prairie Press. Manhattan, KS: New Prairie Press.

Nichols, R. K., & et.al. (2020). Unmanned Vehicle Systems & Operations on Air, Sea, Land. Manhattan, KS: NPP #35.

Nichols, R. K., Mumm, H. C., Lonstein, W. D., Ryan, J. J., & and Carter, C. (2018). Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA’s Advanced Air Assets. Manhattan, KS: New Prairie Press (NPP) eBooks. 21.

Nichols, R. K., Mumm, H. C., Lonstein, W. D., Ryan, J. J., Carter, C. M., & & Hood, J. P. (2020). Counter Unmanned Aircraft Systems Technologies & Operations. Manhattan, KS: New Prairie Press #31.

Nichols, R. K., Mumm, H. C., Lonstein, W. D., Ryan, J. J., Carter, C., & and Hood, J.-P. (2019). Unmanned Aircraft Systems in the Cyber Domain. Manhattan, KS: NPP eBooks. 27.

Nichols, R. K., Mumm, H. C., Lonstein, W. D., Ryan, J. J., Carter, C., & and Hood, J.-P. (2019). Unmanned Aircraft Systems in the Cyber Domain, 2nd Edition. Manhattan, KS: NPP eBooks. 27. Retrieved from www.newprairiepress.org/ebooks/27

Nichols, R. (Nov 28-30, 2006). Cyber Terrorism, Critical Infrastructure, & SCADA Presentation. In R. Nichols (Ed.), Defense Threat Reduction Agency Conference. Shirlington VA: Utica College, Utica NY.

Nichols, R., Ryan, J., Mumm, H., Carter, C., Lonstein, W., & Hood, &. J. (2020). Counter Unmanned Aircraft Systems Technologies and Operations. Manhattan, KS: New Prairie Press #31.

Nichols, R., Ryan, J., Mumm, H., Lonstein, W., Carter, C., & & Hood, J. (2019). Unmanned Aircraft Systems (UAS) in Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd Edition. Manhattan, KS: New Prairie Press #27 .

Nichols, R.-0. (2016, March 29). NCIE UAS SAA Final Rev 4. 2016 INFOWARCON conference presentation April 4-7, Nichols, R.K. et. al. (3-29-2016) Presentation to INFOWARCON April 4-7 on NCIE UAS SAA Final Rev 4, presented to 2016 INFOWARCON conference, Memphis TN. Available as PPTx presentation download from author or in CANVAS. Memphis, TN, USA: INFOWARCON16.

Nielsen, P. E. (2012). Effects of Directed Energy Weapons. Middletown, DE: CreateSpace Independent Publishing Platform.

NIST. (September 2012). Guide for Conducting. Washington, DC: GPO.

North Carolina Department of Transportation. (2019, May 30). Law & Regulations. Retrieved from NCDOT.GOV: https://www.ncdot.gov/divisions/aviation/uas/Pages/laws-regulations.aspx

NSWC. (2020, December 15). Warfare Centers NSWC Panama City. Retrieved from www.navsea.navy.mil: https://www.navsea.navy.mil/Home/Warfare-Centers/NSWC-Panama-City/What-We-Do/

Ocean Studies Board, N. R. (2012). Oceanography and Mine Warfare. Washington, DC: Ocean Studies Board, National Research Council ISBN 0-309-51587-4.

Osborn, K. (2019, October 15). Swarm Hell: Can the U.S. Army Stop Hundreds of Drones Armed with Explosives? Retrieved from National Interest: https://nationalinterest.org/blog/buzz/swarm-hell-can-us-army-stop-hundreds-drones-armed-explosives-88206

Osseiran, A. (Dec 2014). Scenarios for 5G Mobile and Wireless communications: the vision of the METIS Project. IEEE Communications Magazine, Vol 52, no 5, pp. 26-35.

O’Sullivan, J. L. (1845). The Great Nation of Futurity. United States Magazine and Democratic Review Vol 6 Issue 23, pp. 426-430.

Pierson. (2019, May 16). tuning-fork-waves-sound. Retrieved from airfreshener.club – Pierson Education: https://airfreshener.club/quotes/tuning-fork-waves-sound.html

Porter, J. D. (2019, June 8). jdporterlaw.com/intellectual-property-law/. Retrieved from jdporterlaw.com: http://www.jdporterlaw.com/intellectual-property-law/

Possel, M. (2017). Waves, motion and frequency: the Doppler effect. Einstein Online, Vol. 5. Max Planck Institute for Gravitational Physics, Potsdam, Germany.

Price Waterhouse Coopers, LLP. (2018). Skies without limits – Drones- taking the UK’s economy to new heights. London: Price Waterhouse Coopers, LLP.

PROTECTION OF CERTAIN FACILITIES AND ASSETS FROM UNMANNED AIRCRAFT, H. R. 302 (United States Congress January 3, 2018).

Proyas, A. (Director). (2004). I, Robot. In. Hollywood, CA. [Motion Picture].

Ramzy, A. &. (2008). Tainted-Baby-Milk Scandal in China. Retrieved from content.time.com/time/world/article/: http://content.time.com/time/world/article/0,8599,1841535,00.html

Randall K. Nichols and Lekkas, P. C. (2002). Wireless Security: Threats, Models, Solutions. New York City, NY: McGraw Hill.

Randall K. Nichols, D. (2018). Chapter 20 Acoustic CM & IFF Libraries V SWARMS Rev 1 05142019. In R. K. Nichols, H. C. Mumm, W. D. Lonstein, & J. S. Hood, Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd ed. Manhattan, KS: NPP Press.

Randall K. Nichols, D. (2019 for publication). Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd ed. In H. M. Randall K. Nichols, Chapter 18 Audiology, Acoustic Countermeasures against Swarms and Building IFF Libraries (p. 2nd ed.). Manhattan, KS: For Publication, NPP.

Randall K. Nichols, D. J. (2000). Defending Your Digital Assets against Hackers, Crackers, Spies and Thieves. New York: RSA Press.

Randall K. Nichols, J. J. (2018). Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA’s Advanced Air Assets. Manhattan, KS: New Prairie Press.

Rani, C. M. (2015). Security of unmanned aerial vehicle systems against cyber-physical attacks. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology.

Rappaport, T. (2014). Millimeter Wave Wireless Communications. New York City, NY: Prentice Hall.

Reklaitis, G. R. (1983). Engineering Optimization: Methods and Practices. Boston: Wiley.

Reklaitis, G. R. (1983). Engineering Optimization: Methods and Practices. Boston: Wiley.

REMUS -1. (2020, December 15). REMUS 100 Technical Brochure (2017). Retrieved from www.hydroid.com: https://www.hydroid.com/sites/default/files/product_pages/New_Generation_REMUS_100_%20Brochure_2017.pdf

REMUS -2. (2020, December 15). REMUS 600 Technical Data. Retrieved from www.hydroid.com/remus-600-defense-applications: https://www.hydroid.com/remus-600-defense-applications

REMUS. (2020, December 15). REMUS 100 for Defense Applications Data Sheet. Retrieved from https://www.hydroid.com/new-generation-remus-100-defense-applications: https://www.hydroid.com/new-generation-remus-100-defense-applications

REMUS -3. (2020, December 15). REMUS 600 Technical Data Sheet. Retrieved from www.hydroid.com/: https://www.hydroid.com/sites/default/files/product_pages/REMUS_600_Brochure_2017_0.pdf

REMUS -4. (2020, December 15). REMUS 6000 . Retrieved from www.hydroid.com/: https://www.hydroid.com/sites/default/files/product_pages/REMUS_6000_Brochure_2017.pdf

REMUS -5. (2020, December 15). REMUS 6000 Brochure. Retrieved from www.hydroid.com/: https://www.hydroid.com/sites/default/files/product_pages/REMUS_6000_Brochure_2017.pdf

Ricker, D. (2017, July 1). Navigating drone laws has become a growing and lucrative legal niche. Retrieved from ABA Journal: http://www.abajournal.com/magazine/article/drone_law_attorneys

Roland, A. (1977). Bushnell’s Submarine: American Original or European Import? Technology and Culture: The Johns Hopkins University Press, Vol. 18, No. 2 (Apr., 1977), pp. 157-174 (18 pages).

Said Emre Alper, Y. T. (December 2008). A Compact Angular Rate Sensor System Using a Fully Decoupled Silicon-on-Glass MEMS Gyroscope. JOURNAL OF MICROELECTROMECHANICAL SYSTEMS, VOL. 17, NO. 6.

Sanchez, M. (2019, June 4). No Drones. Retrieved from Unspalsh.com: https://unsplash.com/photos/oMqswmrie4Y

Schroeder, A. (2018, February 1). Localizing Humanitarian Drones: Robotics & Disaster Response from the Maldives to Malawi. Retrieved from medium.com: https://medium.com/radiant-earth-insights/localizing-humanitarian-drones-robotics-disaster-response-from-the-maldives-to-malawi-a1f362432cb1

SERDP-ESTCP. (2012). Munitions-Response/Munitions-Underwater/MR-201103-IR. https://www.serdp-estcp.org/Program-Areas/Munitions-Response/Munitions-Underwater/MR-201103: NSWC PCD.

Sheena McKenzie, M. W. (2019, September 17). Saudi attacks send oil prices soaring. Retrieved from CNN: https://www.cnn.com/middleeast/live-news/saudi-oil-attack-dle-intl/h_1ab7e8469e98525f887c3a4e588dde8a

Signia. (2019, May 16). Signia Hearing Aids. Retrieved from Signia Hearing Aids – Hear across America: www.signiausa.com

Singer v. City of Newton, 284 F. Supp. 3d 125 (U.S. District Court Massachusetts September 21, 2017).

Singer, P. W. (2010, February 25). Will Foreign Drones One Day attack the US? . Newsweek.

Skolnik, M. (2008). Radar Handbook, 3rd Edition. Boston: McGraw Hill.

slideshare.net. (2019, May 16). Proud Paras/sound-waves-loudness-and-intensity, slide 12. Retrieved from slideshare.net: https://www.slideshare.net/ProudParas/sound-waves-loudness-and-intensity

Sood A.K. & Enbody, R. (2014, December 19). https://www.georgetownjournalofinternau-s-military-defense-systems-the-anatomy-of-cyber-espionage-by-chinese-hackers. Retrieved from georgetownjournalofinternationalaffairs.org/online-edition: https://www.georgetownjournalofinternationalaffairs.org/online-edition/u-s-military-defense-systems-the-anatomy-of-cyber-espionage-by-chinese-hackers

Sovereignty and use of airspace, 49 U.S. Code § 40103 (United States Congress July 5, 1994).

Staff. (2008). FINAL ACTS WRC-07. World Radiocommunication Conference. Geneva: ITU.

Staff. (2012). FINAL ACTS WRC-12. World Radiocommunication Conference. Geneva: ITU.

Staff. (2016, April 17). Equal Loudness Contours. Retrieved from Gutenberg Organization: http://central.gutenberg.org/article/WHEBN0001046687/Equal-loudness%20contour

Staff. (2019). FINAL ACTS WRC-15. World Radiocommunication Conference. Geneva.

Staff. (2019, May 6). wikipedia.org/wiki/Doppler_effect. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Doppler_effect

Staff, W. (2019, May 04). 5G. Retrieved from Wikipedia: www.wikipedia.org

Steponova, E. (2016). 2008 Terrorism in Asymmetrical Conflict. SIPRI Report 23.

Stone, Z. (2007, 11 7). Stone, Z. (2017). Everything You Need To Know About Sophia, The World’s First Robot Citizen. Retrieved from https://www.forbes.everything-you-need-to-know-about-sophia-the-worlds-first-robot-citizen. Retrieved from Forbes: https://www.forbes.com/sites/zarastone/2017/11/07/everything-you-need-to-know-about-sophia-the-worlds-first-robot-citizen/#1667784246fa

Stratfor. (2019, October 20). strait-of-Hurmuz-chokepoints. Retrieved from https://www.stratfor.com: https://www.stratfor.com/sites/default/files/styles/wv_small/public/strait-of-hormuz-chokepoints.jpg?itok=xSgx6Hhi

Studios, D. D. (2017). Boaters Ref. USA.

sUAS News. (2018, March 2). RAS Consulting & Investigations hire Jeff Parisse to offer sophisticated UAS security and surveillance services. Retrieved from suasnews.com: https://www.suasnews.com/2018/03/ras-consulting-investigations-hire-jeff-parisse-offer-sophisticated-uas-security-surveillance-services/

Sun, W. M. (June 2015). Unmanned Aircraft Systems: Air-Ground Channel Characterization for future applications. IEEE Vehic. Tech Mag. Vol 10, No 2 , pp. 79-85.

T.C. Dozer, D. A. (2008). High Altitude Platforms for VHDR in-theater communications. IET Seminar on Military Satellite Communications Systems.

Teledynemarine. (2020, December 16). Q-Boat_1250. Retrieved from www.teledynemarine.com: http://www.teledynemarine.com/Q-Boat_1250?BrandID=13

Teledynemarine-1. (2020, December 16). Z-Boat1800T_Trimble. Retrieved from www.teledynemarine.com: http://www.teledynemarine.com/Z-Boat1800T_Trimble?BrandID=13

Tewari, A. (2011). Advanced Control of Aircraft, Spacecraft and Rockets. Chichester, UK: Wiley.

Thatcher, M. K. (2020, August 9). Integrated Joint All-Domain Operations Full Spectrum Operations. Retrieved from www.lockheedmartin.com: https://www.lockheedmartin.com/content/dam/lockheed-martin/aero/documents/mdo/Integrated_JADO_Solution_Whitepaper.pdf

The Shepard News Team. (2018, September 12). Liteye Receives Follow-on Contract for C-AUDS – DB – Digital Battlespace. Retrieved from Aerospace, Defense and Security News and Analysis – Shephard Media, The Shepard Press, Ltd: www.shephardmedia.com/news/digidigital-battlespace/liteye-receives-follow-contract-c-auds

Thomas, R. (2010). Relearning Counterinsurgency Warfare. Parameters, PDF.

Toomay, J. (1982). RADAR for the Non – Specialist. London; Lifetime Learning Publications. London: Lifetime Learning Publications.

TRS, S. (2018, July 10). Tontechnic-Rechner-Sengpielaudio. Retrieved from Tontechnic-Rechner-Sengpielaudio Calculator: www.sengspielaudio.com/calculator-wavelength.htm

Tsourdos, A. &. (2011). Cooperative Path Planning of Unmanned Aerial Vehicles . Reston, VA: American Institute of Aeronotics and Astronautics, Vol #235.

UAV Coach. (2019, May 30). Drone Laws in South Carolina (2019). Retrieved from UAVcoach.com: https://uavcoach.com/drone-laws-south-carolina/

United States Constitution Article VI, Sec.2 (United States of America September 17, 1787).

Uni-Wuppertal. (2019, May 15). Inverse Square Law, General. Retrieved from hydrogen.physik.uni-Wuppertal.de/hyperphysics/: http://hydrogen.physik.uni-Wuppertal.de/hyperphysics/hyperphysics/hbase/forces/isq.html

Urban, T. (2018). Teach Your Robots Well: Will Self-Taught Robots Be the End of Us? Retrieved from www.worldsciencefestival.com: Urban, T. (2018). Teach Your Robots Well: Will Self-Taught Robots Be the End of Us? Retrieved from https://www.worldsciencefestival.com/programs/teach-robots-well-will-self-taught-robots-end-us/

Usenix.org. (2019, 6 9). MEMS, Drones, & Sound Sourcing. Retrieved from Usenix.org: www.usenix.org

WebFinance, Inc. (2019). Definition of Ethics. (2019b). online: Online: WebFinance, Inc.

Weise, E. (2017, August 23). could-hackers-behind-u-s-navy-collisions. Retrieved from USATODAY: https://www.ruidosonews.com/story/tech/news/2017/08/23/could-hackers-behind-u-s-navy-collisions/594107001/

Wiki-E. (2018, August 26). Equal Loudness Contours. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Equal-loudness_contour

Wiki-L. (2018, August 27). Laser. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Laser

Wikipedia. (2018, August 26). Human Hearing Range. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Hearing_range

Wikipedia. (2019, May 6). wikipedia.org/wiki/Doppler_effect. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Doppler_effect

Wikipedia. (2020, July 26). A* Algorithm. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/A*_search_algorithm

Wiley, R. G. (1993). Electronic Intelligence: The Analysis of Radar Signals, 2nd ed. Norwood, MA: Artech House.

Wilson, M. (2012). The Use of Low-Cost Mobile Radar Systems for Small UAS Sense and Avoid. Sense and Avoid in UAS Research and Applications.

Wong, C. (2017). Top Canadian researcher says AI robots deserve human rights. Retrieved from Wong, C. (2017). Top Canadian researcher says AI robots deserve human rights. Retrieveitbusiness.ca: Wong, C. (2017). Top Canadian researcher says AI robots deserve human rhttps://www.itbusiness.ca/news/top-canadian-researcher-says-ai-robots-deserve-human-rights/95730

Wordpress. (2012, 08 29). The True Sign of Intelligence. Retrieved from deepthinkings.wordpress.com: http://deepthinkings.wordpress.com/2012/08/29/the-true-sign-of-intelligence/

Wright, T. (2017, August 11). You’ve Been Warned: Keep Your Drones Away From Military Bases. Retrieved from Air & Space, Smithsonian: https://www.airspacemag.com/daily-planet/keep-your-drones-away-military-base-180964451/

Wyvern, T. (2018). National Critical Intelligence Estimate: Counter Unmanned Aircraft Systems (C-UAS) in the US. Salina, KS: KSUP.

Xiaoyang Liu, C. L. (2016). High Altitude Platform Station Network and Channel Modeling Performance Analysis. Mathematics and Computer Science. Vol. 1, No 1, pp. 10-16. doi: Xiaoyang Liu, Chao Liu, Wanping Liu, Xiaoping Zeng. High Altitude Platform Station Network and Channel Modeling Performance Analys10.11648/j.mcs.20160101.13

  1. Zeng, R. Z. (May 2016.). Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Communications Magazine. Vol. 54, no.5, pp. 36-42.

Yong Zeng, R. Z. (2016). Wireless Communications with Unmanned Aerial Vehicles: Opportunities and Challenges. IEEE Communications Magazine, 36-42.

Yu, X. &. (2015). Sense and avoid technologies with applications to unmanned aircraft systems: Review and prospects. Progress in Aerospace Sciences, 74, 152-166.

Yunmonk Son, H. S. (2015, August 12-14). Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. Proc. 24th Usenix Security Symposium. Washington, DC: USENIX. Retrieved from https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/son

Zetter, K. (2015). So, The NSA Has An Actual SKYNET Program . WIRED Magazine(Online). . Retrieved from Zetter, K. (2015). So, The NSA Has An Actual SKYNET Program WIRED Magazine(Online).

Zhang, Z. W. (2020). Rapid Penetration Path Planning Method for Stealth UAV in Complex Environment with POP-UP Threats. International Journal of Aerospace Engineering, TBA.

 

 

 

 

 

 

 

[1] FM 34-40-7

 

 

License

Share This Book