466 research outputs found

    Malicious Digital Penetration of United States Weaponized Military Unmanned Aerial Vehicle Systems: A National Security Perspective Concerning the Complexity of Military UAVs and Hacking

    Get PDF
    The United States’ (US) military unmanned aerial vehicle (UAV) has seen increased usage under the post 9/11 military engagements in the Middle East, Afghanistan, and within American borders. However, the very digital networks controlling these aircrafts are now enduring malicious intrusions (hacking) by America’s enemies. . The digital intrusions serve as a presage over the very digital networks the US relies upon to safeguard its national security and interests and domestic territory. The complexity surrounding the hacking of US military UAVs appears to be increasing, given the advancements in digital networks and the seemingly inauspicious nature of artificial intelligence and autonomous systems. Being most victimized by malicious digital intrusions, the US continues its military components towards growing dependence upon digital networks in advancing warfare and national security and interests. Thus, America’s netcentric warfare perspectives may perpetuate a chaotic environment where the use of military force is the sole means of safeguarding its digital networks

    The method of spectral analysis of the determination of random digital signals

    Get PDF
    The methods of spectral analysis based on the use of any model to describe the signal are considered in the article, while using them some assumptions about the behavior of the signal outside the observation interval are made.  The task of spectral analysis or evaluation, in this case, is to find the parameters of the model used, which is selected based on the available a priori information about the studied process.A new spectral analysis method is proposed, which uses the partially classical Prony method, and this method has been improved by replacing the damping sine wave with the use of damped sine wave.Replacing damped sine wave with the use of non-damped sine wave, allows you to very accurately isolate the signal and determine its characteristics against the background of very rich in interference with air space, against the background of radio devices that work legally. For the first time, a fast conversion algorithm was applied to solve the normal equations for finding variables to sequentially determine the parameters of random short-term signals such as amplitude, frequency, and phase.  It is suggested to determine not only static parameters but also the rate of change of these parameters.  Speed of change of parameters allows determining more carefully the signal of the means of silent receiving of information.Modeling of processes of determination of random short-term pulses simulating digital signals of the means of silent receiving of information is carried out, on the basis of the proposed method of spectral analysis, the simulation results are presented in the form of three-dimensional graphs.The main difference is the use not only of the analysis of the amplitude, frequency, phase, and spectrum of the signal but the main analysis of the spectral density of the signal.Analyzes of the simulation result fully confirm the advantages of the proposed method for the determination of random short-term pulses

    Intelligent-Reflecting-Surface-Assisted UAV Communications for 6G Networks

    Full text link
    In 6th-Generation (6G) mobile networks, Intelligent Reflective Surfaces (IRSs) and Unmanned Aerial Vehicles (UAVs) have emerged as promising technologies to address the coverage difficulties and resource constraints faced by terrestrial networks. UAVs, with their mobility and low costs, offer diverse connectivity options for mobile users and a novel deployment paradigm for 6G networks. However, the limited battery capacity of UAVs, dynamic and unpredictable channel environments, and communication resource constraints result in poor performance of traditional UAV-based networks. IRSs can not only reconstruct the wireless environment in a unique way, but also achieve wireless network relay in a cost-effective manner. Hence, it receives significant attention as a promising solution to solve the above challenges. In this article, we conduct a comprehensive survey on IRS-assisted UAV communications for 6G networks. First, primary issues, key technologies, and application scenarios of IRS-assisted UAV communications for 6G networks are introduced. Then, we put forward specific solutions to the issues of IRS-assisted UAV communications. Finally, we discuss some open issues and future research directions to guide researchers in related fields

    A Light-Weight Real-Time Privacy Protection Scheme for Video Surveillance by Unmanned Aircraft Systems

    Full text link
    Unmanned Aircraft Systems (UAS)have raised a great concern on privacy recently. A practical method to protect privacy is needed for adopting UAS in civilian airspace. This thesis examines the privacy policies, filtering strategies, existing techniques, then proposes a new method based on encrypted video stream and cloud-based privacy servers. In this scheme, all video surveillance images are initially encrypted, then delivered to a privacy server. The privacy server decrypts the video using the shared key with the camera, and filters the image according to the privacy policy specified for the surveyed region. The sanitized video is delivered to the surveillance operator and anyone on the Internet who is authorized. In a larger system composed of multiple cameras and multiple privacy servers, the keys can be distributed using Kerberos protocol. With this method the privacy policy can be changed on demand in real-time and there is no need for a costly on-board processing unit. By utilizing cloud-based servers, advanced image processing algorithms and new filtering algorithms, this method can be applied immediately without camera software upgrade. This method is cost-efficient and promotes video sharing among multiple subscribers, thus it can spur wider adoption

    An Examination of Long-Term Working Memory Capacity

    Get PDF
    The purpose of this research was to explore experts’ memory capacity and the strategies experts use to achieve that capacity. Expert air traffic controllers were asked to recall traffic information during two radar and two nonradar scenarios. During radar scenarios, air traffic information was communicated aurally and displayed visually. During nonradar scenarios, air traffic information was communicated aurally only. Qualitative recall data assessment revealed an average capacity of five to eight aircraft in radar scenarios and three to six in nonradar scenarios, with two to three details recalled for most recalled aircraft. Recalled details and order of detail recall were highly consistent across experts, which suggest that aircraft details were organized and stored within larger conceptual knowledge structures. Recall patterns were additionally suggestive of frames containing slots designated for holding specific data types, structures described by Klein’s Data/Frame Model of Sensemaking. The extent of information recalled and its organization are additionally consistent with the use of long term working memory to extend working memory capacity; however, they do not rule out the use of working memory alone. Differences between radar and nonradar conditions were observed. Greater overall recall and greater and earlier recall of certain data-tag elements were observed in radar scenarios. In nonradar scenarios, greater and earlier recall of assigned actions were observed. Evaluation of experts’ descriptions of their recall processes suggested primarily visuospatial information encoding in both conditions and a lack of support for differences in the use of visuospatial or verbal encoding

    Process query systems : advanced technologies for process detection and tracking

    Get PDF
    Vrijwel alles wat rondom ons heen gebeurt is van nature proces georienteerd. Het is dan niet verbazingwekkend dat het mentale omgevingsbeeld dat mensen van hun omgeving vormen hierop is gebaseerd. Zodra we iets waarnemen, en vervolgens herkennen, betekent dit dat we de waarneming begrijpen, ze bij elkaar kunnen groeperen, en voorspellen welke andere waarnemingen spoedig zullen volgen. Neem bijvoorbeeld een kamer met een televisie. Zodra we de kamer binnenkomen horen we geluiden, misschien stemmen, mischien muziek. Als we om ons heen kijken zien wij spoedig, visueel, de televisie. Omdat we het "proces" van TV goed kennen, kunnen we mentaal de geluiden bij het beeld van de televisie voegen. Ook weten we dat de telvisie aan is, en daarom verwachten we dat er nog meer geluiden zullen volgen. Zodra we de afstandsbediening oppakken en de televisie uitzetten, verwachten we dat het beeld verdwijnt en de geluiden ophouden. Als dit niet gebeurt, merken we dit direct op: we waren niet succesvol in het veranderen van de staat van het "proces TV". Over het algemeen, als onze waarnemingen niet bij een bekend proces passen zijn wij verbaasd, geinteresseerd, of zelfs bang. Dit is een goed voorbeeld van hoe mensen hun omgeving beschouwen, gebaseerd op processen classificeren we al onze waarnemingen, en zijn we in staat te voorspellen welke waarnemingen komen gaan. Computers zijn traditioneel niet in staat om herkenning op diezelfde wijze te realiseren. Computerverwerking van signalen is vaak gebaseerd op eenvoudige "signatures", ofwel enkelvoudige eigenschappen waar direct naar gezocht wordt. Vaak zijn deze systemen heel specifiek en kunnen slechts zeer beperkte voorspellingen maken inzake de waargenomen omgeving. Dit proefschrift introduceert een algemene methode waarin omgevingsbeschrijvingen worden ingevoerd als processen: een nieuwe klasse van gegevensverwerkende systemen, genaamd Process Query Systems (PQS). Een PQS stelt de gebruiker in staat om snel en efficient een robuust omgevingsbewust systeem te bouwen, dat in staat is meerdere processen en meerdere instanties van processen te detecteren en volgen. Met behulp van PQS worden verschillende systemen gepresenteerd zo divers als de beveiliging van grote computer netwerken, tot het volgen van vissen in een vistank. Het enige verschil tussen al deze systemen is de procesmodellen die ingevoerd werden in de PQS. Deze technologie is een nieuw en veelbelovend vakgebied dat het potentieel heeft zeer succesvol te worden in alle vormen van digitale signaalverwerking.UBL - phd migration 201

    Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport security

    Get PDF
    In this paper we describe a pervasive game, Blowtooth, in which players use their mobile phones to hide virtual drugs on nearby airline passengers in real airport check-in queues. After passing through airport security, the player must find and recover their drugs from the innocent bystanders, without them ever realizing they were involved in the game. The game explores the nature of pervasive game playing in environments that are not, generally, regarded as playful or “fun”. This paper describes the game’s design and implementation as well as an evaluation conducted with participants in real airports. It explores the players’ reactions to the game through questionnaire responses and in-game activity. The technologies used in Blowtooth are, intentionally, simple in order for the enjoyment of the game to be reliant more on the physical environment rather than the enabling technologies. We conclude that situating pervasive games in unexpected and challenging environments, such as international airports, may provide interesting and unique gaming experiences for players. In addition, we argue that pervasive games benefit most from using the specific features and nature of interesting real-world environments rather than focusing on the enabling technologies

    Making the Most of United States v. Jones in a Surveillance Society: A Statutory Implementation of Mosaic Theory

    Get PDF
    article published in law journalIn the Supreme Court's recent decision in United States v. Jones, a majority of the Justices appeared to recognize that under some circumstances aggregation of information about an individual through governmental surveillance can amount to a Fourth Amendment search. If adopted by the Court, this notion sometimes called "mosaic theory"-could bring about a radical change to Fourth Amendment jurisprudence, not just in connection with surveillance of public movements-the issue raised in Jonesbut also with respect to the government's increasingly pervasive record-mining efforts. One reason the Court might avoid the mosaic theory is the perceived difficulty of implementing it. This article provides, in the guise of a model statute, a means of doing so. More specifically, this article explains how proportionality reasoning and political process theory can provide concrete guidance for the courts and police in connection with physical and data surveillance

    Review of radar classification and RCS characterisation techniques for small UAVs or drones

    Get PDF
    This review explores radar-based techniques currently utilised in the literature to monitor small unmanned aerial vehicle (UAV) or drones; several challenges have arisen due to their rapid emergence and commercialisation within the mass market. The potential security threats posed by these systems are collectively presented and the legal issues surrounding their successful integration are briefly outlined. Key difficulties involved in the identification and hence tracking of these `radar elusive' systems are discussed, along with how research efforts relating to drone detection, classification and radar cross section (RCS) characterisation are being directed in order to address this emerging challenge. Such methods are thoroughly analysed and critiqued; finally, an overall picture of the field in its current state is painted, alongside scope for future work over a broad spectrum
    corecore