Preface |
|
xi | |
Acknowledgments |
|
xiii | |
1 The Drone Threat Landscape |
|
1 | (50) |
|
|
1 | (1) |
|
|
2 | (5) |
|
|
7 | (5) |
|
|
12 | (5) |
|
1.4.1 Climate Change Direct Action |
|
|
12 | (3) |
|
|
15 | (2) |
|
1.5 Hostile Reconnaissance and Rogue Drone Surveillance |
|
|
17 | (5) |
|
1.5.1 Theatres of Conflict |
|
|
18 | (2) |
|
|
20 | (2) |
|
1.6 Adoption of Drones for Organized Crime |
|
|
22 | (6) |
|
1.6.1 Drone Drug Trafficking |
|
|
23 | (3) |
|
|
26 | (2) |
|
1.7 Terrorist Threat from Drones |
|
|
28 | (6) |
|
|
29 | (5) |
|
1.8 Adaption of Drones for Cyberattack |
|
|
34 | (6) |
|
1.8.1 Cyber Threats Take Flight |
|
|
35 | (2) |
|
1.8.2 Cyber Drone-Jacking |
|
|
37 | (2) |
|
1.8.3 Malicious Drone Malware |
|
|
39 | (1) |
|
|
40 | (2) |
|
|
42 | (9) |
2 Understanding Drone Technologies |
|
51 | (16) |
|
|
51 | (2) |
|
2.2 The Most Common UAV Applications |
|
|
53 | (3) |
|
|
56 | (2) |
|
2.4 Categories of UAVs and Their Classifications |
|
|
58 | (6) |
|
|
58 | (2) |
|
2.4.2 Classification According to Size |
|
|
60 | (4) |
|
|
64 | (3) |
3 Know Your Enemy |
|
67 | (28) |
|
|
67 | (1) |
|
|
68 | (2) |
|
3.3 UAV Propulsion System |
|
|
70 | (3) |
|
3.4 Navigation Systems for Drones |
|
|
73 | (8) |
|
|
73 | (1) |
|
3.4.2 Satellite Navigation |
|
|
74 | (4) |
|
3.4.3 Non-GPS-Based Navigation |
|
|
78 | (3) |
|
|
81 | (8) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (2) |
|
3.5.4 Communication Systems for Military UAVs |
|
|
84 | (2) |
|
3.5.5 Communications for Swarm of UAVs |
|
|
86 | (3) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (4) |
4 The C-UAV Problem |
|
95 | (16) |
|
|
95 | (5) |
|
4.2 Comprehensive Approach to C-UAV and C2 Platforms |
|
|
100 | (8) |
|
|
108 | (3) |
5 C-UAV Sensors and Situation Awareness |
|
111 | (48) |
|
|
111 | (4) |
|
5.2 Radars as C-UAV Sensors |
|
|
115 | (15) |
|
5.2.1 Introduction to Radars and Radar Systems |
|
|
115 | (2) |
|
|
117 | (9) |
|
5.2.3 Radars in C-UAV Systems |
|
|
126 | (2) |
|
|
128 | (2) |
|
|
130 | (15) |
|
5.3.1 SkyArcher (ST Engineering, Singapore) |
|
|
139 | (1) |
|
5.3.2 SKYPERION (METIS Aerospace, United Kingdom) |
|
|
139 | (3) |
|
5.3.3 Drone Hunter DHS-PRO (Fortunio, Hungary) |
|
|
142 | (2) |
|
5.3.4 AIRFENCE (Sensofusion, Finland) |
|
|
144 | (1) |
|
5.4 Optical Detection Systems |
|
|
145 | (8) |
|
5.4.1 Types of Optical Detection Systems |
|
|
145 | (2) |
|
5.4.2 Optical Detection with Al |
|
|
147 | (3) |
|
5.4.3 Detection Algorithm Overview |
|
|
150 | (1) |
|
5.4.4 Classification Algorithm Overview |
|
|
151 | (2) |
|
|
153 | (2) |
|
|
155 | (4) |
6 Countermeasures |
|
159 | (20) |
|
|
159 | (1) |
|
6.2 The C-UAV Neutralization Chain |
|
|
160 | (3) |
|
|
163 | (6) |
|
|
163 | (4) |
|
6.3.2 Jamming Systems from Russia |
|
|
167 | (2) |
|
|
169 | (1) |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (3) |
7 Standardization and Regulatory Activities on C-UAV Systems |
|
179 | (10) |
|
7.1 C-UAV Standardization by NATO and EDA |
|
|
180 | (2) |
|
7.2 Standardization in EUROCAE and RTCA |
|
|
182 | (4) |
|
|
186 | (2) |
|
|
188 | (1) |
8 A Strategic Approach to Counter Rogue Drone Threats |
|
189 | (34) |
|
|
189 | (2) |
|
|
191 | (4) |
|
8.3 Counter-Drone Strategy |
|
|
195 | (5) |
|
|
200 | (1) |
|
8.5 Regulatory Frameworks |
|
|
201 | (1) |
|
8.6 International Challenge |
|
|
202 | (3) |
|
|
205 | (2) |
|
|
207 | (2) |
|
|
209 | (2) |
|
8.10 Counter-Drone Innovation |
|
|
211 | (1) |
|
|
212 | (3) |
|
|
215 | (2) |
|
8.13 Critical Success Factors |
|
|
217 | (2) |
|
|
219 | (4) |
About the Authors |
|
223 | (2) |
Index |
|
225 | |