122 research outputs found
Malicious Digital Penetration of United States Weaponized Military Unmanned Aerial Vehicle Systems: A National Security Perspective Concerning the Complexity of Military UAVs and Hacking
The United States’ (US) military unmanned aerial vehicle (UAV) has seen increased usage under the post 9/11 military engagements in the Middle East, Afghanistan, and within American borders. However, the very digital networks controlling these aircrafts are now enduring malicious intrusions (hacking) by America’s enemies. .
The digital intrusions serve as a presage over the very digital networks the US relies upon to safeguard its national security and interests and domestic territory. The complexity surrounding the hacking of US military UAVs appears to be increasing, given the advancements in digital networks and the seemingly inauspicious nature of artificial intelligence and autonomous systems. Being most victimized by malicious digital intrusions, the US continues its military components towards growing dependence upon digital networks in advancing warfare and national security and interests. Thus, America’s netcentric warfare perspectives may perpetuate a chaotic environment where the use of military force is the sole means of safeguarding its digital networks
Terrorist and Insurgent Unmanned Aerial Vehicles: Use, Potentials, and Military Implications
This manuscript focuses on the present threat posed by terrorist and insurgent use of unmanned aerial vehicles (UAVs) as well as associated future threat potentials. This work presents a counterintuitive analysis in the sense that armed drones are typically viewed as a component of America’s conventional warfighting prowess—not a technology that would be used against U.S. troops deployed overseas or against civilians back home. The emerging threat of such UAV use against the United States is investigated, and the unique analysis and creative approach related to the threat scenario variants generated are very informative. Hopefully, the larger implications posed by this analysis related to semi-autonomous and autonomous UAV type robotic systems will be of benefit.https://scholarship.claremont.edu/cgu_facbooks/1050/thumbnail.jp
A Deep CNN Framework for UAV Intrusion Detection in Intelligent Systems
Unmanned Ariel Vehicle (UAV) s are dealing with several safety and protection issues including internal hardware/software and potential attacks. In addition, detecting UAV anomalies will be a crucial responsibility to defend against hostile enemies and prevent accidents. In this research, we present a UAV and an Automatic Dependent (AD) system using surveillance and Machine Learning (ML) algorithms to analyze data from their detectors in real-time. Proposed Improved Region based Convolutional Neural Network (IRCNN) model used to generate and acquire the characteristics of untreated sensor information and characteristics to facilitate AD. The proposed model creating an Inertial Measurement Unit (IMU) & UAV sensors dataset using cyber security simulation system and Active Learning (AL) identifies aggressions based on the least probable interrogation method. This proposed model enables the identification to efficiently improve the occurrences of unexplained aggressions discovered of IRCNN at reduced labeling cost. A thorough trial showed that IRCNN-AL is effective at detecting unknown threats with frequency improvements of between 9% and 30% on comparison approaches. The AL methodology presented with as few as 1% of a labeled unexpected aggressions
Artificial Intelligence and Cyber Power from a Strategic Perspective
Artificial intelligence can outperform humans at narrowly defined tasks and will enable a new generation of autonomous weapon systems. Cyberspace will play a crucial role in future conflicts due to the integration of digital infrastructure in society and the expected prevalence of autonomous systems on the battlefield. AI cyber weapons create a dangerous class of persistent threats that can actively and quickly adjust tactics as they relentlessly and independently probe and attack networks
Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph
Police SWAT teams and Military Special Forces face mounting pressure and
challenges from adversaries that can only be resolved by way of ever more
sophisticated inputs into tactical operations. Lethal Autonomy provides
constrained military/security forces with a viable option, but only if
implementation has got proper empirically supported foundations. Autonomous
weapon systems can be designed and developed to conduct ground, air and naval
operations. This monograph offers some insights into the challenges of
developing legal, reliable and ethical forms of autonomous weapons, that
address the gap between Police or Law Enforcement and Military operations that
is growing exponentially small. National adversaries are today in many
instances hybrid threats, that manifest criminal and military traits, these
often require deployment of hybrid-capability autonomous weapons imbued with
the capability to taken on both Military and/or Security objectives. The
Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of
Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that
required military response and police investigations against a fighting cell of
the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade
Unmanned Vehicle Systems & Operations on Air, Sea, Land
Unmanned Vehicle Systems & Operations On Air, Sea, Land is our fourth textbook in a series covering the world of Unmanned Aircraft Systems (UAS) and Counter Unmanned Aircraft Systems (CUAS). (Nichols R. K., 2018) (Nichols R. K., et al., 2019) (Nichols R. , et al., 2020)The authors have expanded their purview beyond UAS / CUAS systems. Our title shows our concern for growth and unique cyber security unmanned vehicle technology and operations for unmanned vehicles in all theaters: Air, Sea and Land – especially maritime cybersecurity and China proliferation issues. Topics include: Information Advances, Remote ID, and Extreme Persistence ISR; Unmanned Aerial Vehicles & How They Can Augment Mesonet Weather Tower Data Collection; Tour de Drones for the Discerning Palate; Underwater Autonomous Navigation & other UUV Advances; Autonomous Maritime Asymmetric Systems; UUV Integrated Autonomous Missions & Drone Management; Principles of Naval Architecture Applied to UUV’s; Unmanned Logistics Operating Safely and Efficiently Across Multiple Domains; Chinese Advances in Stealth UAV Penetration Path Planning in Combat Environment; UAS, the Fourth Amendment and Privacy; UV & Disinformation / Misinformation Channels; Chinese UAS Proliferation along New Silk Road Sea / Land Routes; Automaton, AI, Law, Ethics, Crossing the Machine – Human Barrier and Maritime Cybersecurity.Unmanned Vehicle Systems are an integral part of the US national critical infrastructure The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. Unmanned Vehicle (UV) Systems & Operations On Air, Sea, Land discusses state-of-the-art technology / issues facing U.S. UV system researchers / designers / manufacturers / testers. We trust our newest look at Unmanned Vehicles in Air, Sea, and Land will enrich our students and readers understanding of the purview of this wonderful technology we call UV.https://newprairiepress.org/ebooks/1035/thumbnail.jp
Counter Unmanned Aircraft Systems Technologies and Operations
As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field.
In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures.
As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere.
Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December)
Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp
A Survey on Cellular-connected UAVs: Design Challenges, Enabling 5G/B5G Innovations, and Experimental Advancements
As an emerging field of aerial robotics, Unmanned Aerial Vehicles (UAVs) have
gained significant research interest within the wireless networking research
community. As soon as national legislations allow UAVs to fly autonomously, we
will see swarms of UAV populating the sky of our smart cities to accomplish
different missions: parcel delivery, infrastructure monitoring, event filming,
surveillance, tracking, etc. The UAV ecosystem can benefit from existing 5G/B5G
cellular networks, which can be exploited in different ways to enhance UAV
communications. Because of the inherent characteristics of UAV pertaining to
flexible mobility in 3D space, autonomous operation and intelligent placement,
these smart devices cater to wide range of wireless applications and use cases.
This work aims at presenting an in-depth exploration of integration synergies
between 5G/B5G cellular systems and UAV technology, where the UAV is integrated
as a new aerial User Equipment (UE) to existing cellular networks. In this
integration, the UAVs perform the role of flying users within cellular
coverage, thus they are termed as cellular-connected UAVs (a.k.a. UAV-UE,
drone-UE, 5G-connected drone, or aerial user). The main focus of this work is
to present an extensive study of integration challenges along with key 5G/B5G
technological innovations and ongoing efforts in design prototyping and field
trials corroborating cellular-connected UAVs. This study highlights recent
progress updates with respect to 3GPP standardization and emphasizes
socio-economic concerns that must be accounted before successful adoption of
this promising technology. Various open problems paving the path to future
research opportunities are also discussed.Comment: 30 pages, 18 figures, 9 tables, 102 references, journal submissio
- …