Professional Documents
Culture Documents
Edited by R. Kurt Barnhart, Douglas M. Marshall, and Eric J. Shappee - Introduction To Unmanned Aircraft Systems (2021)
Edited by R. Kurt Barnhart, Douglas M. Marshall, and Eric J. Shappee - Introduction To Unmanned Aircraft Systems (2021)
Introduction to Unmanned
Aircraft Systems
ii
iii
Introduction to Unmanned
Aircraft Systems
Third Edition
Edited by
R. Kurt Barnhart, Douglas M. Marshall,
and Eric J. Shappee
iv
Contents
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Acknowledgments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
About the Editors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
List of Contributors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
1 History. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Douglas M. Marshall and Benjamin Trapnell
2 UAS Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Mark Patrick Collins
v
vi
vi Contents
Epilogue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Douglas M. Marshall
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
vii
Preface
It is with great pleasure that we present this greatly expanded third edition of Introduction
to Unmanned Aircraft Systems. The unmanned aircraft systems (UAS) industry continues to
be a highly dynamic and constantly evolving industry with the advancement of science
and technological enablement. With that in mind, the aim of this expanded edition is to
identify and survey the fundamentals of UAS operations, which will serve both as a basic
orientation to UAS and as a foundation for further study. Content herein is suitable for
both introductory and advanced systems studies. This work was originally birthed out
of an unsuccessful search for suitable texts for such a course. As in the first two editions,
the chapters have been individually contributed by some of the nation’s foremost experts
in UAS operations from all corners of both higher education and industry; therefore, the
reader may note some variation in writing style. It was decided to leave the contributions
in this form in the interest of preserving the author’s intent, thereby improving the quality
of information contained herein.
It is the editors’ suggestion that introductory students focus on Chapters 1–7, 9, 15, 17,
19, and 20 for a total of 12 chapters. The remainder can be used at the instructor’s discre-
tion and for advanced technical study.
This publication would not have been possible without the close cooperation of all
the editors and contributors; a heartfelt thank you to all who gave of your time to make
this possible. Your feedback is welcomed as a basis for future editions of this book as the
industry continues to advance.
vii
viii
ix
Acknowledgments
As editors we would first like to thank our contributing authors for their valuable time and
expertise. Without you, this book would simply not have nearly the breadth and depth that
it does with your input.
We also would like to thank Beth Drescher, who spent many hours on first read-throughs
and working on format consistency. Beth, your expertise made the burden of such a large
text manageable.
We would also like to send out a note of thanks to our spouses, Anita, Sandi, and Lisa,
who let us give up hours of our time and in some cases helped us with syntax and flow.
We thank you!
ix
x
xi
Dr. R. Kurt Barnhart is Professor and currently the Associate Dean of Research at
Kansas State University Salina, in addition to serving as the executive director of the
Applied Aviation Research Center, which established and now oversees the Unmanned
Aerial Systems program office. Most recently, Dr. Barnhart was the Head of the Aviation
Department at Kansas State University. He is a member of the graduate faculty at K-State
and holds a commercial pilot certificate with instrument, multiengine, seaplane, and glider
ratings. He also is a certified flight instructor with instrument and multiengine ratings
and also holds an airframe and powerplant certificate with inspection authorization.
Dr. Barnhart holds an AS in Aviation Maintenance Technology from Vincennes University,
a BS in aviation administration from Purdue University, an MBAA from Embry-Riddle
Aeronautical University, and a PhD in educational administration from Indiana State
University. Dr. Barnhart’s research agenda is focused in aviation psychology and human
factors as well as the integration of Unmanned Aircraft Systems into the National Airspace
System. His industry experience includes work as an R&D inspector with Rolls Royce
Engine Company, where he worked on the RQ-4 Unmanned Reconnaissance Aircraft devel-
opment program, as well as serving as an aircraft systems instructor for American Trans-
Air airlines. Formerly, Dr. Barnhart was an Associate Professor and Acting Department
Chair of the Aerospace Technology at Indiana State University, where he was responsible
for teaching flight and upper division administrative classes. Courses taught include
Aviation Risk Analysis, Citation II Ground School, King Air 200 Flight, Air Navigation, Air
Transportation, Instrument Ground School, and many others.
Douglas M. Marshall, J.D., is the founder and owner of TrueNorth Consulting LLC, a
UAS support and service organization founded in 2007. He enjoyed an appointment as
an Adjunct Professor of Law, DePaul University College of Law, where he developed
and delivered the first drone law course in an American law school. Previously, he was
a division manager, UAS Regulations & Standards Development at the Physical Science
Laboratory, New Mexico State University, and professor of aviation at the University of
North Dakota. He has been engaged full time on UAS-related activities for over 15 years,
is the co-editor of two books related to aviation, and is the author of numerous published
articles on aviation law, regulations, and remotely piloted aircraft. He has served on RTCA
SC-203, ASTM F-38, and SAE G-10 Committees; the AUVSI Advocacy Committee; the
Arctic Monitoring and Assessment Program UAS Expert Group; the Small UAS Aviation
Rulemaking Committee; and the Part 91 Working Group supporting a second UAS Aviation
Rulemaking Committee. He chaired the ASTM F38.02.01 Task Group on Standards for
Operations Over People; was a member of the Steering Committee, Civil Applications of
Unmanned Aerial Systems Conference, Boulder, Colorado, and several other committees
dedicated to the development of UAS; and has delivered presentations on international
aviation regulations and airspace issues at symposia and conferences around the world.
Eric J. Shappee is a Professor of Aviation at Kansas State University Polytechnic. He has
served as the Director of Flight Operations, Acting Department Head, and Professional
Pilot Program Lead for Aviation. He is a member of the Aviation Accreditation Board
International (AABI) and has served on the Board of Trustees for the University Aviation
Association (UAA). Eric teaches numerous aviation courses, which include: Introduction
xi
xii
to Aviation, Commercial Pilot Ground School, Aviation Safety, and Aviation Accident
Investigation. He holds a commercial pilot certificate with instrument, multiengine, and
glider ratings. He is also a certified flight instructor with gold seal and a Master CFI. Eric
holds two associate degrees from Antelope Valley College (Lancaster, California): a bach-
elor degree in aeronautical science and a master degree in aeronautical science and safety
from Embry-Riddle Aeronautical University. His main area of focus is in aviation safety. He
has developed several risk assessment tools for K-State and other aviation organizations.
Further, he is a member of the International Society of Air Safety Investigators and has
attended the NTSB Academy. He has been active in the field of aviation since 1986, and
teaching since 1995. Eric has given over 3000 hours of dual given. During his career in
aviation, Professor Shappee has also spent time working with unmanned aerial systems.
xii
Contributors
xiii
xiv
xiv Contributors
30 years, primarily in service to America’s armed forces at home and overseas. He serves
on multiple national-level boards, committees, and steering groups. He is the executive
vice chairman and the strategic planning committee chairman of the National Board of
Directors for the Association of Unmanned Vehicle Systems International (AUVSI), the
world’s largest nonprofit organization devoted exclusively to advancing the unmanned
systems and robotics community. He cochairs the federal multiagency UAS Sense and
Avoid Science and Research Panel, supporting the FAA, the DoD, NASA, and DHS to
identify and solve key sense-and-avoid challenges. He is also a member of the FAA’s UAS
Aviation Rulemaking Committee and serves on the Executive Council of the FAA’s UAS
Center of Excellence.
Joshua Brungardt is the executive vice president for PARADIGMisr in Bend, Oregon. He
is also a courtesy faculty member of Oregon State University’s College of Forestry. He
has served as the Unmanned Aircraft System (UAS) director for Kansas State University
helping to grow one of the largest and top renowned UAS Academic programs in the
United States. Brungardt served on the Kansas Governor’s Aviation Advisory Council from
2010 to 2012 and is currently a member of the board of directors for the Oregon Aviation
Industries Board. In 2010, Brungardt attended senior officer training on the Predator UAS
at Creech AFB with the 11th Reconnaissance SQ. In his positions, and as a consultant to
numerous UAS companies, Brungardt has written over 80 approved UAS Certificates of
Authorization from the FAA. Brungardt has also been chief pilot for High Performance
Aircraft Training, EFIS Training, and Lancair Aircraft. He holds ATP & CFII ratings with
over 4000 hours, as well as having raced at the Reno National Air Races. In addition to
completing over 75 first flights on experimental aircraft, he has served as an instructor
and test pilot to the U.S. Air Force. In 2006, Brungardt founded the pilot training company
EFIS Training, which focused on pilots transitioning to glass cockpits. Brungardt received a
bachelor’s degree in airway science and an associate’s degree in professional piloting from
Kansas State University in 2002. In 2013, Brungardt was awarded the Alumni Fellow of the
Year Award from KSU’s College of Technology and Aviation.
Kurt J. Carraway, a retired Colonel with 25 years of service in the United States Air Force,
is K-State Polytechnic’s Unmanned Aircraft Systems (UAS) Research Executive Director.
In this capacity, he provides strategic leadership in advancing Kansas State University’s
UAS program goals. He directs the execution of research activities involving UAS through
the Applied Aviation Research Center (AARC). Carraway also directs flight operations
development and maturation of the UAS training program through direct supervision
of the flight operations staff. He manages highly skilled UAS professionals who perform
hundreds of UAS flights per year in civil airspace. He sets policies and procedures for
unmanned flight operations. He serves as Principal Investigator (PI) on UAS activities
through the AARC and is the University PI representative to ASSURE, the FAA’s UAS
Center of Excellence. In that role, Carraway also serves as the UAS training focal point
lead. He is a professor, an instructor, and a mentor to students. Before arriving at K-
State Polytechnic, Carraway was stationed at Camp Smith in Oahu, Hawaii, where he
served first as Joint Operations Director and then Division Chief of Current Operations,
both for the U.S. Pacific Command. Carraway worked with the Global Hawk UAS, as an
evaluator and instructor pilot, and later became commander of the Global Hawk squadron.
Carraway established standard operating procedures and composed technical manuals
for the military’s use of the Global Hawk. A native of St. Louis, Missouri, Carraway
received a Bachelor of Science in Mechanical Engineering at Missouri University of Science
and Technology in Rolla, prior to entering the Air Force. During his service, Carraway
xv
Contributors xv
also completed a Master of Science in Systems Engineering at the Air Force Institute of
Technology on the Wright-Patterson Air Force Base in Dayton, Ohio, and a Master of Arts
in Management from Webster University in St. Louis, Missouri. He is married to Pamela
(nee) Savage and has two daughters, ages 19 and 15.
Mark Patrick Collins is an Associate Professor and Director of Unmanned Systems (UMS)
at Indiana State University (ISU). His responsibilities include instructing UMS courses to
undergraduate students, developing new courses, advising students, developing grant
opportunities, researching ways unmanned cargo aircraft (UCA) can operate in the national
airspace, and working with the community. He is a Doctoral Student at Unmanned Vehicle
University in Unmanned Systems Engineering, has a MS in Aviation & Transportation
from Lewis University, a BS in Industrial Technology from Southern Illinois University
(SIU), and A.S. in Aviation Maintenance from SIU. His FAA certifications include remote
drone pilot, private pilot, airframe, and powerplant certificates. It is his long-term goal to
start the first large unmanned cargo airline (LUCA) in the National Airspace System (NAS).
He has received international recognition from the Platform of Unmanned Cargo Aircraft
for his research in LUCA in the NAS. He is a business owner and entrepreneur. He owns a
sign manufacturing business in Elkader Iowa called Signs N Frames. He and his wife also
manage a property management business across three states and two countries. Before
starting these businesses, he worked at Atlas Air Cargo Airline from 1999 to 2003 as an
aircraft heavy check site representative and as a purchasing manager. His responsibilities
at Atlas Air included purchasing labor and fuel for 50+Boeing 747 aircraft from places such
as Singapore, Netherlands, Hong Kong, Germany, and mainland China. Before Atlas Air,
he worked at AAR Allen Aircraft in Wood Dale, Illinois as Site Representative from 1995
to 1999 and was in the Army Illinois National Guard from 1990 to 1996. Besides his career
goals, Professor Collins is happily married, is a 4th Degree Knight of Columbus member
at his church, is working on his instrument rating, and plans on purchasing a Lancair IVP
airplane someday.
Stephen P. Cook is a principal safety engineer in the Navigation and Unmanned
Aircraft Systems (UAS) Department at the MITRE Center for Advanced Aviation System
Development in McLean, Virginia. In this role he supports multiple efforts to integrate
civil and military unmanned aircraft into the National Airspace System (NAS). Dr. Cook
currently cochairs the UAS Science and Research Panel (SARP). The SARP is responsible
for identifying research gaps related to integrating UAS into the NAS, recommending
solutions, and promoting alignment of research efforts across the government agencies
represented in the UAS Executive Committee. Before joining MITRE, Dr. Cook served
as the UAS airworthiness certification lead at the Naval Air Systems Command and led
the NATO Technical Working Group charged with developing an airworthiness standard
for military fixed-wing UAS. Dr. Cook earned his PhD in aerospace engineering from the
University of Maryland in 2003, having previously earned an MS and a BS in aerospace
engineering from North Carolina State University in 1993 and 1990, respectively.
Graham Feasey is the Technical Director of Design Verification at General Atomics
Aeronautical Systems, Inc. (GA- ASI). Feasey is the lead Mechanical Engineering
Airworthiness Compliance Verification Engineer with authority in Propulsion Systems,
Fuel System, Landing Gear, Fire Protection, and Mechanical Systems. Since 2005, he has
worked in the field of unmanned aviation where he has worked on MQ-1 Predator A, MQ-
1C Gray Eagle, MQ-9A Predator B, and MQ-9B Sky Guardian. In addition to Airworthiness,
Feasey manages the Performance Simulation Team and the Material and Process Group.
xvi
xvi Contributors
Contributors xvii
Center, focusing on sensor design, testing, and building data for a UAS-based collection
system for CO2 and water vapor eddy correlation. Continuing at NASA Goddard while
working on his master’s thesis research on UAS applications in precision agriculture, he
collaborated with the AeroScience lab to design and build data collection and processing
systems for small UAS as well as ground sampling equipment. After graduate school,
Ladd worked at the Washington, DC area consulting firm Enegis, where he led the UAS
consulting efforts and developed geospatial computer models to answer national-level
policy questions for the U.S. and foreign governments. He is currently an independent
consultant, working with industry leading UAS operators to create camera systems and
data workflows to help them collect, process, and analyze UAS data. Among his clients
are industry leaders such as American Aerospace Technologies Inc. (AATI). Ladd’s work
with AATI is pioneering applications, data workflows, and automation processes for data
collected from Medium Altitude Long Endurance (MALE) UAS Beyond Line of Sight
(BLOS) operations in the National Air Space (NAS).
Robert D. Love is an aircraft conceptual design engineer at General Atomics Aeronautical
Systems, Inc. (GA- ASI), focused on multidisciplinary UAS design optimization, life-
cycle cost estimation, and mission analysis. He also runs AirMorph LLC to provide
engineering consulting services. Previously, he worked as a project engineer for technology
development, as an airframe design engineer at GA-ASI, and supported F-2 composites
production at Lockheed Martin. He serves on the American Institute of Aeronautics and
Astronautics (AIAA) Aircraft Design Technical Committee and has authored more than
12 reviewed papers and multiple patents. Dr. Love earned his PhD and MS in Aerospace
Engineering at the University of Florida in 2011 after obtaining his Bachelor of Science in
Aerospace & Materials Engineering from Auburn University.
Nathan Maresch is a Kansas State University alumnus, graduating summa cum laude
with a Bachelor of Science in electronic and computer engineering technology. Maresch
holds private pilot and UAS remote pilot licenses, and has industry experience in industrial
controls and automation. He served as an instructor for various electronics labs at K-State
Polytechnic before joining the Applied Aviation Research Center (AARC) full time in
2009 to begin research in avionics development and miniaturization. Subsequent research
projects include a sense and avoid project, with the creation of a two-dimensional obstacle
avoidance system, a wireless power transmission project in conjunction with engineering
technology faculty resulting in a patent granted, and an indoor UAS flight navigation
research project. Maresch oversees maintenance operations and supervises maintenance
staff at the AARC while researching new technologies, developing, integrating, and
repairing unmanned aircraft electronics systems, and tuning control systems. He is deeply
involved with RF components and performs comprehensive command and control analysis
to predict link range performance prior to flight operations in new topography. Maresch
also instructs students in advanced fixed-wing UAS labs, from the simulator experience to
real-world advanced flight and field operations flights.
Eric McClafferty is a partner and the head of the 35-person International Trade Practice
Group at the international law firm Kelley Drye & Warren LLP in Washington, DC. The
group was recognized by Law 360 as U.S. International Trade Practice of the Year in 2013
and 2014. He helps universities, large and small companies, individuals, and industry
associations comply with U.S. regulations on international trade, particularly those
relating to exports of unmanned systems. He earned a BA and an MA from the University
of Michigan and JD from the University of Virginia.
xvi
xviii Contributors
Benjamin Miller is the Director at Colorado Center of Excellence for Advanced Technology
Aerial Fire Fighting. Ben began his public service career at Mesa County Sheriff’s Office
(MCSO). Among many accomplishments in his 15 years with MCSO, Ben founded and
served as program director of the first operational unmanned aerial system (UAS) program
for a nonfederal public safety agency in the United States. The MCSO UAS program has
been featured in prestigious print media—such as National Geographic, Time, and Smithsonian
Air & Space—and has been covered by numerous news organizations around the world,
including Fox News, CNN, MSNBC, NPR, The New York Times, and The Washington Post.
Ben has more than 500 sUAS flight hours and 700 mission deployments. He has flown
many types of unmanned operations, including flights over armed gunmen, crime scene
reconstruction missions, search and rescue, and fire operations, all within the National
Airspace System. Ben also had the opportunity to train game wardens in the African
nation of Namibia in support of their antipoaching efforts. Throughout the industry,
Ben is regarded as a thought leader on the applications of small-unmanned aircraft in
public safety. His perspective has been shared in presentations across the United States
and Canada, including testimony to the United States Senate Judiciary Committee, as well
as to other members of Congress at both the state and national levels. His expertise has
been sought by prestigious organizations—such as the National Aeronautics and Space
Administration, the Federal Bureau of Investigation, the United States Secret Service, the
United States Department of Justice, and the FAA’s NextGen Institute—and numerous
other entities in the unmanned aircraft systems space, including academia and industry.
Over the last decade, Ben has had the great pleasure of serving on the Board of Directors for
the Association of Unmanned Vehicle Systems International (AUVSI), as a voting member
of ASTM’s committee F38 on Unmanned Aircraft Systems, and as a special advisor to the
NIST response robotics working group. Ben has also held advisor positions on five start-up
UAS-related companies and spent 2 years working for Draganfly Innovations who began
building multicopters in 1999. Ben is now the Director of the Colorado Center of Excellence
for Advanced Technology Aerial Firefighting. Ben’s team is the lead UAS organization for
the Colorado Department of Public Safety. Focusing on the fire service, Ben’s team is also
solving problems for public safety UAS users by creating solutions for real-time geospatial
intelligence sharing, counter-UAS, management of airspace above wildland fires, and
numerous other public safety-related challenges.
Michael T. Most, PhD, is an academic lead of the Unmanned Aircraft Systems Program
at Kansas State University, prior to which he was an associate professor and chair of the
Department of Aviation Technologies at Southern Illinois University. He has authored
numerous articles for technical and refereed journals on aviation, aircraft design, and
the use of GIS to investigate aviation-related environmental externalities and delivered
several peer-reviewed papers on these same topics. Dr. Most holds FAA private pilot and
A&P technician certificates, ASTM National Center for Aerospace and Transportation
Technologies avionics certification, and a PhD in environmental resources and policy with
an emphasis in remote sensing and geographic information systems.
Rose Mooney is an executive director of the Mid-Atlantic Aviation Partnership (MAAP),
which is the FAA-awarded UAS Test site in Virginia, New Jersey, and Maryland. Mooney’s
career started with developing manufacturing robots, and then progressed to medical
devices, wireless communications, and UAS. Prior to her current position, she spent over
30 years working in industry in engineering. Mooney’s interest in aviation began as a
young child living in Queens NY in the approach path of LaGuardia Airport. She spent
her nights watching the aircraft and being intrigued by flight. It seemed a natural fit when
xix
Contributors xix
she began working in UAS. She earned her B.A. in information systems management
from Notre Dame University of Maryland after completing studies in computer science at
University of Baltimore County.
Randall K. Nichols is Professor of Practice in Unmanned Aircraft Systems (UAS) –
Cybersecurity at Kansas State University. Nichols serves as the Director, graduate
UAS-Cybersecurity Certificate program at KSUP. Nichols is author of nine textbooks,
internationally respected, with 50 years of experience in leadership roles in cryptography,
counterintelligence, INFOSEC, and sensitive computer applications. Nichols has provided
counsel to the United States government. He is certified as a federal subject matter expert
in both cryptography and computer forensics. He created five master and certificate
programs for KSU and Utica College. To wit:
xx Contributors
He has been with GA-ASI since 1992. Recently, Stroup took roles conceptualizing UAS
configurations, aerodynamic flow paths, and airfoil, flap, and slat designs. His duties
range from external stores/ pod shape creation, overall aircraft layout, and shaping,
to Chief Engineer on subscales and small UASs. During Stroup’s 28 years, he has had
substantial roles engineering 17 GA-ASI aircraft, including exportable versions of the
GNAT-750, MQ-1 Predator A, MQ-9 Predator B, Predator C Avenger, MQ-1C Grey Eagle,
and many variations of those aircraft. Shortly, after achieving a Bachelor of Science degree
in Mathematics from Fresno State University, Stroup began employment with Leading
Systems, Inc., under Abe Karem, widely regarded as the “father of the UAV.” Mike has a
passion for flying drones and giant scale RC models in his spare time.
Brandon Suarez currently serves as the Technical Director for UAS Civil Airspace
Integration for General Atomics Aeronautical Systems, Inc. (GA-ASI), where he leads the
company’s effort to integrate Remotely Piloted Aircraft Systems (RPAS) into domestic,
foreign, and international airspace. Previously, at GA-ASI, Suarez led a collaborative
team of experts from the FAA, NASA, and several industry partners to bring together
the technology needed for a Detect and Avoid (DAA) system on a Predator® B RPAS.
He currently serves as the Co-Chairman of RTCA Special Committee (SC-228) and as
an advisor to the ICAO RPAS Panel. Suarez is the author or coauthor of numerous
journal and conference papers. He also served on the FAA’s UAS in Controlled Airspace
Aviation Rulemaking Committee and as the Vice Chairman of NATO Industrial Advisory
Group (NIAG) Study Group 205, which provided industry recommendations to the
NATO specialist team standardizing DAA capabilities for military forces worldwide.
Suarez holds both Bachelor’s and Master’s degrees in Aerospace Engineering from the
Massachusetts Institute of Technology (MIT). He is also an instrument-rated private pilot.
Adam Trojanowski is an economic and policy analyst for the State of Colorado’s Center for
Excellence Advanced Technology Aerial Firefighting, where he advises on complex policy
and regulatory issues related to aerial firefighting, drones, and public safety aviation.
Adam has attended a range of leadership schools and courses, including ones sponsored
by the FBI, Colorado Department of Public Safety, and International Association of Chiefs
of Police. He has also received specialized training in investigations, firearms, wildland
firefighting, incident management, tactical casualty care and first aid, contract writing,
pursuit driving, and defensive tactics and arrest control techniques. Adam is a life-long
public servant. He received a Juris Doctor degree from the University of Colorado Law
School in 2004 and began his career serving the Honorable Morris B. Hoffman as a judicial
law clerk. Adam coinstructed a practical civil procedure course for attorneys, assisted the
judge with legal research, and drafted opinions. Adam earned a POST certificate from the
State of Colorado after attending the Jefferson County Sheriff’s Office Police Academy,
and served his community as a police officer and sergeant. In these roles, he trained law
enforcement officers in patrol tactics, law, and firearms, and led a motorcycle patrol team.
More recently, Adam developed state policies on public safety Unmanned Aerial Systems
and has been working with the Colorado Attorney General’s Office and the United States
Department of Justice on novel counter-UAS questions. Adam is fluent in Polish and
English, and holds a DHS Secret clearance. When not busy with public safety work, he
enjoys skiing, cycling, reading about world history and human behavior, and supporting
his children’s passion for dance and ballet.
Benjamin Trapnell is an associate professor of aeronautics at the University of North
Dakota. He holds a Bachelor of Science in physical sciences from the United States Naval
newgenprepdf
xxi
Contributors xxi
1
History
1
2
brothers), unmanned flying contrivances utilized the technologies of the day to pave a way
forward for the development of manned aircraft. The technical revolution embodied in
manned aircraft did not mean that unmanned aircraft were rendered obsolete. On the con-
trary, the modernization of systems developed for manned aircraft, coupled with advances
in electronic systems, power sources, artificial intelligence, and nanotechnology, enabled
the integration of automation that refined, if not defined, the capabilities of both manned
and unmanned aircraft systems.
In modern times, the term “unmanned aircraft” has come to mean an autonomous or
remotely piloted vehicle that is used to navigate in the air. Even the name assigned to
unoccupied aircraft has changed over the years, as viewed by aircraft manufacturers, civil
aviation authorities, and the military. Aerial torpedoes, drones, pilotless vehicles, radio-
controlled aircraft, remotely controlled aircraft, remotely piloted aircraft (RPA), autono-
mous aircraft, unmanned aerial vehicles (UAVs), unmanned aircraft systems (UAS) and
others, are but a few of the terms used to describe a flying machine operated without a
pilot onboard.
In progressing through this chapter, the perceptive reader will observe that all aircraft,
manned or unmanned, followed essentially the same iterative process involving the devel-
opment of aerodynamic forces by wings or rotors that offset the weight of the craft, allowing
it to fly. This progression involved the introduction of aircraft control, allowing the pilot
to maneuver the aircraft in pitch and bank, effecting safe, aerodynamic control. When
more than gliding was desired, the evolution of aircraft design included the creation of
suitable propulsion systems, lightweight and powerful enough to drive the craft through
the air. As the ability to fly greater distances became desirable, the need for proper navi-
gational systems arose, and the resulting development of flight and navigation automa-
tion systems reduced the pilot workloads in flight. None of these innovations were trivial
matters, as each relied upon the unique adaptation of immature existing technologies to
create the new ones that were needed. Advancements in the sciences of aerodynamics,
structures, propulsion, flight control systems, stabilization systems, navigation systems,
communications and the integration of all in flight automation systems made the nearly
parallel development of manned and unmanned aircraft systems possible. It continues
today with refinements made feasible by the advancements in computer technologies and
potential energy systems.
In the early years of aviation, the idea of flying an aircraft with no one onboard had the
obvious advantage of removing the risk to life and limb presented by these highly experi-
mental contraptions.1 As a result, several mishaps are recorded where advances were
made without injury to an onboard pilot. Although such approaches to remove people
from the equation were used, the lack of a satisfactory method to affect control limited the
use of these relatively primitive unmanned aircraft. Early aviation developmental efforts
soon turned to the employment of the first “test pilots” to fly these groundbreaking craft.
Further advances beyond unmanned gliders often had tragic results, as even pioneer Otto
Lilienthal was killed flying an experimental glider in 1896.
As seen with the current uses of unmanned aircraft, unmanned aircraft historically
often followed a consistent operational pattern, described today as the “three Ds”, which
stands for dangerous, dirty, and dull. Dangerous means that someone is either trying to
bring down the aircraft or where the life of the pilot may be at undue risk operationally.
Dirty is where the environment may be contaminated by chemical, biological, or radio-
logical hazards precluding human exposure. Finally, dull is where the task requires long
hours in the air, making manned flight fatiguing, stressful, and therefore, not desirable or
safe for the pilot.
3
History 3
device to help tame unstable manned aircraft, and to assist the pilot in maintaining his or
her bearings in bad weather. Sperry began adopting his system of control on early aircraft
with the help of airframe designer Glenn Curtiss. Together they made a perfect team of
flyer-designer and automation inventor. Following excellent prewar progress on the idea,
the demand during WWI to find new weapons to combat Germany’s battleships combined
the inventions of the radio, airplane, and mechanical autopilot to field the first practical
unmanned aircraft, an aerial (or air-dropped) torpedo.
History 5
FIGURE 1.1
U.S. Army Liberty Eagle (Kettering Bug).
The Kettering aerial bomb, dubbed the Bug (Figure 1.1), demonstrated impressive dis-
tance and altitude performance, having flown some tests at 100 miles distance and 10,000
ft altitudes. To prove the validity of the airframe components, a model was built with a
manned cockpit so that a test pilot could fly the aircraft. Unlike the Navy aerial torpedo,
which was never put into service production, the aerial bomb was the first mass-produced
unmanned aircraft. While too late to see combat in WWI, the aircraft served in testing roles
for some 12–18 months after the war. The aerial bomb had a supporter in the person of then
Colonel Henry “Hap” Arnold, who later became a five-star general in charge of the entire
U.S. Army Air Forces in World War II (WWII). The program garnered significant attention
when Secretary of War Newton Baker observed a test flight in October 1918. After the war,
some 12 Bugs were used alongside several aerial torpedoes for continued test flights at
Calstrom Field in Florida.
these demonstrations was that a fully manned ship armed with antiaircraft guns would
easily shoot down attacking aircraft. The British used unmanned target drones flown over
such armed warships to test the validity of the argument. In 1933, to the surprise of all, a
target drone flew over 40 missions above Royal Navy warships armed with the latest anti-
aircraft guns without being shot down. Unmanned aircraft technology played a key role
in formulating air power doctrine and provided key data that contributed to America,
England, and Japan concluding that aircraft carriers, which played such a vital role in
upcoming WWII, were a good investment.
In the United States, the target drone effort was influenced by the development of the
Sperry Messenger, a lightweight biplane built in both manned and unmanned versions as
a courier for military applications, and as a possible torpedo carrier. Some 20 of these air-
craft were ordered. The U.S. Army identified this class of aircraft in 1920 as a Messenger
Aerial Torpedo (MAT). The effort waned in the early 1920s, however, and Sperry Aircraft
Corporation withdrew from active unmanned aircraft design with the untimely death of
Lawrence Sperry, the son of the founder and victim of an aircraft accident.
As the U.S. Army lost interest in the MAT program, the service turned its attention to
target drones. By 1933, Reginald Denny, a British-born actor and an avid model aviation
enthusiast, using an aircraft obtained from aviation modeler Walter Righter, perfected a
radio-controlled airplane only 10 ft long and powered by a single-cylinder 8 hp engine.
Having been an observer/gunner in the Royal Flying Corps in WWI, Denney saw the
possibility of creating a radio-controlled target drone for the U.S. Army to allow gunners
to actually shoot at an airborne target, known as the “Dennyplane.” With this aircraft,
Denny won an Army contract and produced the target drone, as well as later models, in a
shop located in Southern California. The Army designated this craft the OQ-1 Radioplane,
and subsequent versions continued with the OQ (subscale target) designation. The Navy
bought the aircraft, designated Target Drone Denny 1 (TDD-1). Some 15,000 of all variants
were produced and they served throughout WWII as the world’s most popular target
drone. The company was eventually sold to Northrop in 1952.
In the late 1930s, the U.S. Navy returned to the unmanned aircraft arena with the devel-
opment of the Navy Research Lab N2C-2 Target Drone (Figure 1.2). This 2,500-pound
radial engine biplane was instrumental in identifying the deficiencies in Naval anti-
aircraft prowess. Much like the earlier Royal Air Force experience with the Royal Navy,
where drones survived numerous passes on well-armed warships, the U.S. Navy battle-
ship Utah failed to shoot down any N2C-2 drones that were making mock attacks on the
ship. Curiously enough, the U.S. Navy added yet another title by describing this class of
unmanned drones as No Live Operator Onboard (NOLO).2
During the same interwar years, the British Royal Navy attempted to develop an
unmanned aerial torpedo and an unmanned target drone, both utilizing the same fuselage.
Several attempts were made to launch these aircraft from ships, with little success. The
Royal Aircraft Establishment (RAE) finally gained a measure of success with a “Long
Range Gun with Lynx engine” called together the “Larynx.” This program was followed
by the Royal Air Force automating an existing manned aircraft as its first practical target
drone. This effort involved utilizing the Fairey Scout 111F manned aircraft converted as
a gyrostabilized radio-controlled plane, now referred to as the Queen. Of the five aircraft
built, the first four crashed on their first flight. The fifth aircraft, however, proved more
successful and succeeded in subsequent gunnery trials.
The next evolution was to take the Fairey flight control system and combine it with the
excellent, and highly stable, DeHavilland Gypsy Moth. Dubbed the Queen Bee, this aircraft
7
History 7
FIGURE 1.2
Curtiss N2C-2 target drone.
proved much more reliable than the earlier Queen, with the Royal Air Force placing an
order for 420 target drones. This led to the designation of an unmanned aircraft being
described by the letter Q to denote unmanned operation. This protocol was also adopted
by the U.S. Military. Although unverified by research, the term drone is believed by some
to have originated with the Queen name as meaning “a bee or drone.” Between WWI and
WWII, almost all nations with an aviation industry embarked on some form of unmanned
aircraft research. These efforts were mainly in the form of target drones.3
FIGURE 1.3
Naval aircraft factory TDN-1 “Assault Drone.”
Air Task Force (SATFOR) was organized and sent to the Pacific Theater. It used the tech-
nology against the Japanese during the Bougainville Island Campaign in 1944 with limited,
but definable, success. Operationally, a Navy Avenger Torpedo Bomber was flown as the
guiding aircraft. Equipped with radio transmitters to affect radio control, a TV receiver
was also installed that enabled an operator to guide the drone to its target from as far
as 25 miles away. Approximately 50 aircraft were thus employed against various targets,
attaining roughly a 33% success rate.
The U.S. Navy and Army Air Forces then turned to outfitting older four-engine bombers
into unmanned aircraft to be deployed in the European Theater to destroy highly defended,
high-priority targets such as V-1 Buzz Bomb bunkers in Siracourt and the heavily fortified
U-boat pens in Heligoland. Operation Aphrodite, as it was called, consisted of stripping
out Navy PB4Y-2 Privateers (the Navy version of the Consolidated B-24) and B-17s and
packing them with high explosives. They were equipped with a Sperry-designed, three-
axis autopilot for stabilization, radio control links for remote control, and RCA TV cameras
in the cockpit. The concept of the operation was for pilots in the aircraft to control it during
takeoff. Once established in remote-controlled cruising flights, these pilots would arm the
explosives and parachute from the “flying bomb” over friendly England, while the air-
craft, controlled by an operator in a nearby manned bomber, would be guided to its target.
Operations commenced in August 1944, with rather dubious results. On the first mission,
the aircraft spun out of control after the pilots left the plane. Subsequent flights ended
similarly with loss of control of the aircraft or lack of suitable visibility to fly the aircraft
accurately to the target. On August 12, 1944, a BQ-8 “robot” (converted B-24 Liberator)
aircraft with two pilots at the controls detonated prematurely, killing Navy Lieutenants
Wilford J. Wiley and Joseph P. Kennedy. The latter was President John F. Kennedy’s older
brother and son of the former U.S. Ambassador to England, Joseph Kennedy. Continued
failures with equipment and/or operational weather-related incidents, combined with
the rapid advancement of Allied forces in Europe, forced the cancellation of the program.
In retrospect, this could be considered the first use of unmanned aircraft as an offensive
weapon.
9
History 9
FIGURE 1.4
Fieseler FI 103 (V-1) German Buzz Bomb.
10
fuel valve, thereby terminating powered flight. The aircraft would then assume a nose-
down attitude, with the warhead detonating on contact with the ground. It was neces-
sary therefore to have accurate intelligence to determine where these bombs landed so
that proper preflight preparation would allow for some modicum of accuracy. Though
a meager 25% were considered successful, when compared to its fairly low cost, and the
reportedly devastating effect it had on public morale, the V-1 was considered to be an
effective weaponized unmanned aircraft. Mass produced, and employing many firsts for
autonomously flown aircraft, it influenced future designs and provided the historical con-
text to fund many more sophisticated unmanned programs during the following Cold
War.4 The U.S. Navy built a reverse-engineered copy for use in the invasion of Japan and
launched improved versions from submarines on the surface, gaining yet another title as
the world’s first naval-launched, jet-powered, unmanned cruise missile.
History 11
more recently, commercial payload delivery.. The main reasons unmanned aircraft were
not employed in WWII for reconnaissance had more to do with the imagery technology
and navigation requirements than the aircraft platforms themselves. Cameras in the 1940s
required relatively accurate navigation to gain the desired areas of interest, and navigation
technology of the day could not compete with a trained pilot with a map. This changed in
the postwar years with the advent of radar mapping, better radio navigation, Loran-type
networks, and global and inertial navigation systems, all enabling an unmanned aircraft to
fly autonomously to and from the target area with sufficient accuracy.
One of the first reconnaissance high-performance unmanned aircraft to be evaluated
was the Radio Plane YQ-1B high-altitude target drone modified to carry cameras, sub-
sequently GAM-67. This turbojet-powered aircraft was primarily air launched from B-47
aircraft and was proposed to be used in the suppression of enemy antiaircraft destruction
(SEAD) role. Cameras were also proposed, but the program was canceled after only about
20 aircraft were built. Poor range and high cost were given as the reasons for cancellation.
FIGURE 1.5
AQM Lightning Bug.
into supporting a wide array of tasks, from suppression of enemy air defenses to weapons
delivery. The Ryan model 147, later renamed the AQM-34 Lightning Bug and Firebee
series, has the longest service record for an unmanned aircraft. Designed as an initiative of
the Ryan Aircraft Company in the late 1950s from an earlier target drone, the aircraft was
powered by a turbojet, employed low drag wing and fuselage configuration and could
reach altitudes in excess of 50,000 ft and speeds of 600 knots (high subsonic).
The “Bug,” as it was called by its operators, had a long career and flew in a wide range
of highland low- altitude profiles performing electronic signal- gathering intelligence,
camera reconnaissance, and various decoy radar signal transmissions. A frequent violator
of hostile airspace, many were shot down, but sufficient numbers successfully completed
their missions to justify their use. The aircraft underwent many modifications over its
operational life spanning the early 1960s to 2003. Many unique and groundbreaking
technologies were employed in the Bug unmanned aircraft, including air launch from
the wing store of modified DC-130 aircraft to midair parachute snag recovery from H-
2 “Jolly Green Giant” helicopters. The AQM-34 performed high-priority missions of great
national importance, such as reconnaissance missions during the 1960s Cuban Missile
Crisis, to relatively mundane tasks as a target drone for fighter aircraft air-to-air missiles
(Figure 1.5).
History 13
could detect a submarine at ranges of over 20 miles, but could only launch weapons at less
than 5 miles from the target. This small, compact, unmanned helicopter only needed to fly
off to the maximum detection range and drop its homing torpedoes over the submerged
submarine. The QH-50 DASH used remote control via a pilot on the fantail of a ship to
take off and land, and then employed a gyrostabilizer autopilot to direct the aircraft to
a location that was tracked by the launching ship’s radar. More than 700 DASH aircraft
were built and were used from 1960s to the mid-1970s, when they finished up their career
as towing targets for antiaircraft gunnery. Several countries, including France and Japan,
operated the DASH aircraft.
further simplified by a twin boom tail (such as the RQ-7 Shadow). Although “delta pusher”
designs were attempted, most notably the Lockheed MQM-105 Aquila UAS, this aero-
dynamic configuration made weight and balance a more challenging proposition, since
the elevator moment arms were generally fixed, whereas the twin booms could be easily
extended.
In the late 1970s, capitalizing on the Marine Corps Bikini configuration, the Israelis
developed a small tactical battlefield surveillance UAS called the “Scout,” built by Israel
Aerospace Industries (IAI). The Scout was accompanied by IAI Decoy UAV-A and the
Ryan-built Mabat. The decoys were designed to be flown against SAM batteries to fool
their radar into activating early or even firing a missile on the drone itself. The Mabat
was designed to collect antiaircraft radar signals associated with SAM batteries. Finally,
the Scout was designed to exploit the actions of the other two in order to put eyes on the
SAM batteries for targeting information and damage assessment after a strike. In addition,
the Scout provided close-up battlefield imagery to maneuvering ground commanders, a
first for unmanned aircraft. This approach differed greatly from all the previous recon-
naissance UAS platforms, in that their imagery was more operational and strategic, with
film being developed afterward or even electronically transmitted to a collection center
for analysis. The advances in small-sized computers enabled this real-time bird’s-eye view
to a maneuvering leader on the ground directly influenced the decision process on small
groups of soldiers or even individual tank movement.
Israeli forces made significant advances in battlefield situational awareness during the
June 1982 Bekaa Valley conflict between Israeli and Syrian forces. “Operation Peace for
Galilee,” as it was called by Israel, involved an Israeli ground offensive against Hezbollah
terrorists occupying southern Lebanon. Syria, allied with Hezbollah, occupied a large
portion of the Bekaa Valley with a sizable ground force consisting of large numbers of new
Soviet tanks and heavy artillery. Syrian forces were supported by sophisticated Soviet-
built SAM batteries. Israel used a combination of jet-powered decoys and Mabat signal-
gathering UASs to detect and identify the Syria SAM battery-operating frequencies, and
then using the Scout with other manned assets quickly destroyed most of the SAM threat,
enabling the Israeli ground forces to maneuver with close air support. The Scout UAS,
with its twin boom pusher configuration, flew along the sand dunes of the Bekaa Valley
and identified Syrian tanks with near real-time data feed to maneuvering Israeli small-unit
commanders. This eye-in-the-sky advantage enabled a smaller force to move with greater
speed, provided excellent targeting data to Cobra attack helicopters, and directed very
effective artillery fire. The Scout UAS was too small to be picked up and tracked by Syrian
Soviet-designed radar and proved to be too difficult to observe by fast-moving Syrian jet
fighters. The 1982 Bekaa Valley experience initiated a worldwide race to develop close-
battle unmanned aircraft.
History 15
FIGURE 1.6
AAI RQ2 Pioneer.
RQ-2 “Pioneer” (Figure 1.6). The Pioneer aircraft, essentially an upgraded “Scout,” was a
joint Israeli–U.S. effort that was powered by a 27 hp snowmobile engine, flew via a remote
control joystick on the ground, had a range of about 100 miles, and required an altitude
of 2,000 ft to maintain a line-of-sight transmission data link. Fully autonomous flight was
technically possible, but operators of these aircraft opted to have a manned pilot remotely
piloting the aircraft to achieve more responsive battlefield maneuvering at a desired point
of interest. GPS and computer power were not yet sufficiently integrated to enable ground
operators to simply designate waypoints on short notice. Also, imagery feeds via satellite
links were not sufficiently developed at that small dimension to affect transmission of data.
During Desert Storm, U.S. forces flew some 500 UAS sorties. The Pointer and Pioneers
guided artillery, even directing the heavy 16-inch gunfire from the battleship Iowa. There is
a documented case in which a group of Iraqi soldiers attempted to surrender to a Pointer
flying low over the desert.
After the Desert Storm experience most militaries around the world concluded that
UAS platforms did indeed have a role to play in spotting enemy locations and directing
artillery fire. Conversely, many military analysts concluded that the vulnerable data links
precluded UAS use across the board as a replacement for most manned aircraft missions
and roles. This opinion was based in part on the limitations of the line-of-sight data link of
the Pointer and Pioneer, and a deep-seated cultural opposition from manned aircraft pilots
and their leadership. A large segment of a nation’s defense budget is dedicated to the pro-
curement of military aircraft and the training and employment of large numbers of pilots,
navigators, and other crew members. Most air forces choose their senior leaders after years
of having proved themselves in the cockpit flying tactical aircraft. The very idea of cheaper,
unmanned aircraft replacing manned platforms ran against what President Eisenhower
warned as the self-fulfilling “military–industrial complex.”
of a more accurate GPS signal. However, the barrier to widespread acceptance laid with
manned aircraft platforms and the pilots who saw UAS technology as replacing their
livelihoods. When 9/11 occurred, the U.S. Army had only 30 unmanned aircraft. By 2010,
that number grew to more than 2,000. The argument against unmanned aircraft had finally
given way to the low cost, the reduced risk, and the practicality of a drone, as the press,
the regulators and the general public still call them today, performing the long, boring
missions of countless hours of surveillance in both Iraq and Afghanistan. With a person
still in the loop of any lethal missile leaving the rails of an Air Force Predator UAS, the
“responsibility” argument has for the time being been addressed.
History 17
link enabling a pilot to remotely fly the aircraft with, of course, any number of variations
in between. A fully autonomous aircraft could, in theory, fly without the effects of signal
jamming and carry out a variety of complex missions. The disadvantage is that a fully
autonomous flight control system can be simulated in a computer, enabling a hostile actor
to develop counters to the system much in the same way that video gamers do with autono-
mous opponents. Once the program flaws are identified, defeating the autonomous system
becomes a simpler task. Additionally, fully autonomous systems would most likely not be
allowed to employ lethal force in a military or law enforcement setting, since the chain of
responsibility is nearly nonexistent (someone has to initiate the mission, but after that all
bets are off). At the other end of the spectrum, an aircraft that depends on an outside signal,
no matter how well it is encrypted, has the potential to be jammed, or worse, directed by
the enemy through a false coded message. Even if true artificial intelligence is developed
enabling an unmanned aircraft to act autonomously with the intuitiveness of a human
being, the responsibility factor will prevent the UAS from fully replacing manned aircraft.
This is even more true with civil applications of passenger travel where at least one “con-
ductor” on board will be required to be held accountable for the actions of the aircraft
and to exercise authority over the passengers. A truly autonomous passenger aircraft, one
without a pilot on board or “in the loop” is now science fiction, but as computers become
more capable and other improvements are made in the fields of structural dynamics, air-
space management, and human-machine interfaces, it would be foolish to declare that
such a concept will never happen.
It becomes clear, then, that all of the limitations and risks that are manifest in military
applications of unmanned systems are no less significant when applied to non-military,
law enforcement, governmental, civilian, and commercial uses of autonomous or semi-
autonomous UAS. Hacking, misdirection, spoofing, system disruptions or failures, oper-
ator error, and a multitude of other potential mishaps are all factors that must be addressed
by regulators, developers, manufacturers, end users and recipients of services when con-
templating the substitution of UAS for other forms of consumer services. These challenges
and issues are the subjects of the following chapters in this book.
Discussion Questions
1.1 Sir George Caley, Otto Lilienthal, Samuel Pierpont Langley, and the Wright Brothers: All
used unmanned aircraft in the development of their concepts of manned aircraft. What
might their reasoning have been and what might some of the advantages have been in
so doing?
1.2 Some have argued that the Wright Brothers’ greatest accomplishment was figuring out
how to provide a method to control an aircraft about the lateral axis. The Kettering Bug
did not use wing warping or Curtiss’ ailerons for such control. How might this have
facilitated or hindered the early unmanned aircraft’s success?
1.3 Replacing the human in the manned aircraft with a suitable mechanical system proved
to be a daunting problem in the past, and even, in some ways, to this day. How did the
efforts of Tesla and Sperry serve to pave the way to an automated system?
1.4 What was the most significant unmanned aircraft of WWII? What influenced your
choice?
18
1.5 A lack of accuracy in automated navigation systems prevented nearly all militarized
unmanned aircraft from being effective strategic weapons prior to the Gulf War. What
technological advancements changed this situation?
1.6 Many can point to myriad reasons that allowed the successful development of UAS.
Which technologies played a major role in the development of commercial UASs?
What technology advancements will provide the next great leap in the capabilities
of UAS?
Notes
1 The German aviation pioneer Otto Lilienthal, circa 1890s, employed unmanned gliders as experi-
mental test beds for main lifting wing designs and the development of lightweight aerostructures.
So, too, did the Wright Brothers, flying their first gliders as kites, to unlock the mathematics of
lift and drag, and working out the details of aircraft control, all the while remaining safely on the
ground.
2 The Navy target drone program of the late 1930s developed the technique of controlling an
unmanned aircraft from a manned aircraft in flight. Used with some success during WWII, the
technique was rediscovered and used in Vietnam and too [no! “to” is the correct word]much
greater effect in the Iraq conflict.
3 Germany, however, was an exception. Paul Schmidt, who pioneered the pulse jet as a low-cost,
simple, high-performance thrusting device in 1935, found his work being considered by Luftwaffe
General Erhard Milch, who recommended the new pulse jet be adapted to unmanned aircraft,
which later took the form of the Fieseler Fi 103 flying bomb; better known to the Allies as the
“Buzz Bomb.”
4 The operational capabilities of the V-1 and its ability to carry a large weapon across international
borders unmanned are [should probably be “were”] likely the impetus for the inclusion of the
following statement in the initial charter of the International Civil Aviation Organization’s
Chicago Convention of 1944: “No aircraft capable of being flown without a pilot shall be flown
without a pilot over the territory of a contracting State without special authorization by that State
and in accordance with the terms of such authorization. Each contracting State undertakes to
insure that the flight of such aircraft without a pilot in regions open to civil aircraft shall be so
controlled as to obviate danger to civil aircraft.” Convention on International Civil Aviation, Art.
8. Chicago, 1944.
19
2
UAS Applications
2.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.2 Basic Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.2.1 Control Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.2.1.1 Manual Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.2.1.2 Stabilized Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.2.1.3 Automated Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.3 Payloads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.3.1 Remote Sensing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.3.2 Passive Electro-Optical Sensors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.3.2.1 Electro-Optical Imaging System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.3.2.2 Visible RGB Sensors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.3.2.3 Full-Motion Video Sensors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.3.2.4 IR/NIR/SWIR Sensors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.3.2.5 MWIR/LWIR Sensors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.3.3 Active Sensors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.3.3.1 LiDAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.3.3.2 Radar and Synthetic Aperture Radar. . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.4 UAS Software for Commercial Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.4.1 UAS Fleet Management Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.4.2 Autopilot Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.4.3 Sensor Data Asset Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.4.4 Analytical Photogrammetry Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.4.5 Change Detection and Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.4.6 Computer Vision. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.4.6.1 Autonomous Flight Path Algorithms. . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.5 Commercial Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.5.1 Building and Roof Inspections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.5.2 Aircraft Inspections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.5.3 Oil, Gas, Power Lines, and Nuclear Power Plants . . . . . . . . . . . . . . . . . . . . . . . 34
2.5.4 Industrial Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.5.5 Civil Infrastructure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.5.6 Electric Power Industry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.5.7 Wind Turbine Inspection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.5.8 Tower/Antenna Inspection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.5.9 Oil and Gas Inspection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.5.10 Photogrammetric Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
19
newgenprepdf
20
2.5.11
Aerial Mapping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.5.12
Aerial Surveying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.5.13
Volumetrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.5.14
Precision Agriculture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.5.15
Natural Resource Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.5.16
Aerial Filming and Photography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.5.17
Filmmaking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.5.18
Real Estate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
2.5.19
Marketing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
2.5.20
News Reporting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
2.5.21
Intelligence, Surveillance, Reconnaissance, and Emergency Response. . . . . . 45
2.5.22
Law Enforcement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.5.23
Search and Rescue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.5.24
Signals Intelligence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
2.5.25
Communications Relay. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.5.26
Atmospheric Information Collection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.5.27
Meteorology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.5.28
Hazardous Material Detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
2.5.29
Radioactive Material Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
2.5.30
Applications Requiring Physical Interaction with Substances,
Materials, or Objects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
2.5.31 Aerial Chemical Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
2.5.32 Water Sampling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
2.5.33 Small Unmanned Cargo Aircraft Delivery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
2.5.34 Large Unmanned Cargo Delivery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
2.6 Additional Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
2.6.1 Mission Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
2.6.2 Data Processing and Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
2.7 Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Discussion Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
2.1 Introduction
Unmanned technology, and robotics in general, is a revolutionary technology that has
applications in nearly every industry. There are new unmanned systems applications
discovered on a daily basis that can improve the efficiency or safety of countless tasks. This
chapter will provide an overview of some of the most common applications for unmanned
aircraft systems (UAS) at various stages of maturity. Additionally, the basic technology that
differentiates applications and operational considerations will be explored.
The UAS applications range from simple video capture to precise scientific measure-
ment. The knowledge UAS operators need to complete their missions varies dramatic-
ally from very few prerequisites to extensive specialized training in a scientific discipline.
This range in expertise is a clear demonstration that unmanned aerial vehicles (UAVs) are
tools used to collect specific information for a particular application. Outside of the flight
training environment, the operation of an unmanned system is rarely conducted solely for
21
UAS Applications 21
the purpose of flying an aircraft. Therefore, it is critical to know the purpose of the mission
and the type of data collection required prior to the actual launch of the UAS.
The applications discussed in this chapter all have their own set of challenges and
variables. The best practices associated with each application could cover an entire book.
This chapter provides only a broad cross section of the industries and missions.
FIGURE 2.1
Example of an external pilot (EP) console that can be used to manually control the aircraft. (Courtesy of Kansas
State University Polytechnic.)
wings level or a vertical take-off and landing (VTOL) aircraft returns to hover. Some VTOL
aircraft are equipped with a magnetometer that designates a single direction as “away”
from the operator so that away, left, right, and toward the operator remains constant,
regardless of the aircraft’s orientation. Stabilized control greatly reduces the level of skill
required for the operator to effectively and safely control the aircraft while still providing
dynamic control of the flight path. Most VTOL systems are capable of stabilized control.
This ease of aircraft operation has resulted in significant growth in the VTOL market.
However, stabilized control means that the operator must be able to see the aircraft clearly
enough to determine the precise orientation of the aircraft in relation to the object(s) being
observed. Applications that require repetitive, precise positioning of the aircraft over an
area of interest, such as aerial mapping, are difficult to conduct from the ground-level per-
spective of an operator.
UAS Applications 23
FIGURE 2.2
The Mission Planner software is an example of a graphical interface used for automated missions. (Courtesy of
Kansas State University Polytechnic.)
operator input for every possible variable in the mission and can take a significant time
to learn. Regardless of the interface, automated control can greatly increase the efficiency
and reduce the workload required for a particular mission. Repetitive flight paths, such as
orbits and mapping missions, are particularly well suited to automated control.
2.3 Payloads
Payload is defined as the total weight a drone or UAV can carry. It does not include the
weight of the drone, but is anything that can be added to the drone. This includes cameras,
sensors, military armament, packages for delivery, or even passengers. Larger payloads
over longer distances give more commercial operational capability. One example is light
detection and ranging (LiDAR) technology with infrared (IR), RGB, and video cameras on
large unmanned cargo aircraft (LUCA) to deliver cargo. However, larger payloads require
larger UAVs and have greater power requirements.
Varying factors must be considered to decide which payload is needed. The most
important variants are the mission goals and customer requirements, which set the
parameters for the payload and aircraft type. This allows the operator to calculate the
total payload weight and power requirements and choose the optimal equipment for each
mission. When a mission requires that multiple types of payloads be combined on one
UAV, the available space, mounting hardware, overall peak power requirements, shared
data links, stabilization requirements, and other factors must also be taken into account.
The most common types of payload currently used on small UAS (sUAS) are electro-
optical (EO) and IR referred to as EO/IR. The EO/IR sensors are operated on gimbals and
turrets or can be laid flat with the nadir pointing down.
24
1 pm 1 nm 1 um 1 mm 1m 1 km
10–4 um 10–3 um 103 um 104 um 105 um
Visible
light
FIGURE 2.3
The electromagnetic spectrum describes the various types of electromagnetic energy based on wavelength
(Protherm, n.d.).
25
UAS Applications 25
TABLE 2.1
Passive Electro-Optical Sensor Chart
Sensor Electromagnetic Commercial
Acronym Meaning Waveband Applications
Visible (RGB) Daytime imaging using charged 0.4–0.75 µm Filming, photography, construction,
coupled device detector (CCD) engineering, inspection,
arrays, Provides the friendliest navigation, scientific and medical
image to the human observer. research, surveillance, search, and
Dependent on reflected light rescue.
energy Mapping, surveying,
military
UV Measures the intensity of UV 0.4–0.001 µm Scientific and medical research,
radiation. archeology, geology, artistic
photography
NIR Most NIR sensors will see out to 0.75–1.1 µm Agriculture, forestry, infrastructure
1 µm. Can enable visible sensors inspection, construction,
to see better at dawn and dusk or engineering, research,
poor visibility. Example devices military, geology, search and rescue,
include night vision, image mapping, surveying
intensifiers, low light level TV, etc.
SWIR EO sensors operating in this region They operate Agriculture, forestry, infrastructure
will produce quality images between 1.1 µm inspection, engineering,
using reflected light. It has some and about 2.5–3 construction, research, geology,
capability to see temperature µm (author-/ search & rescue, surveillance,
emission. This enables SWIR to text-dependent) military
penetrate haze and poor visibility
conditions much better than MWIR
& LWIR
MWIR Temperature thermal emissivity They operate Agriculture, forestry, infrastructure
capture is dominant in these sensor between 3 and5 inspection, engineering,
types; reflected light energy is less µm construction, research, geology,
dominant. search & rescue, surveillance,
military
LWIR Temperature thermal emissivity They operate Agriculture, forestry, infrastructure
between 8 and inspection, engineering,
12 µm construction, research, geology,
search & rescue, surveillance,
military
used for surveillance or to take pictures and video of infrastructure or agriculture. Many
visible RGB sensors are able to capture both still pictures and full-motion video (FMV).
These pictures can be used to create 2-D or 3-D representations with photogrammetry
programs like Pix4dMapper or Drone Deploy.
UAS Applications 27
2.3.3.1 LiDAR
YellowScan and Velodyne LiDAR are manufacturing commercial LiDAR sensors for UAS
use that are lightweight and are built to withstand extreme environments. One example
is the Velodyne HDL-32E LiDAR sensor pictured in Figure 2.4. It is small, lightweight,
ruggedly built and features up to 32 lasers across a 40° vertical field of view. The power
consumption is typically 12 W, including the interface box and regulated power supply.
The HDL-32E is rated to operate in temperatures from –10 to +60 °C. It measures only 5.7″
high × 3.4″ in diameter, weighs less than 2 kg, and was designed to exceed the demands of
the most challenging real-world autonomous navigation, 3D mobile mapping, and other
LiDAR applications. The HDL-32 E generates a point cloud of up to 695,000 points per
second with a range of up to 100 m and a typical accuracy of ±2 cm (Velodyne Lidar, n.d.).
FIGURE 2.4
Velodyne Lidar HDL-32E Lidar Sensor for UAS applications (Velodyne Lidar, n.d.).
28
UAS Applications 29
and UAS maintenance programs. Users are also able to generate reports showing incidents
and historical graphs of previous missions.
The amount of data that are being collected and stored is immense. Traditionally, the
information was stored on individual computers that were not accessible to every user.
This made it difficult to transfer files, maps, or reports to users of the system. Fortunately,
the UFMS can generate mission analytic reports that are easy to access, read, and use.
These programs are now using machine learning and change detection to enhance the
safety of the missions and make it easier for human users to identify areas of interest.
One other significant advantage of using UFMS is that stakeholders can grant user
permissions based on their role in the company. Administrators oversee the entire oper-
ation and the fleet by assigning roles for each user; pilots, pilot training, pilot certifications,
data analysts, data administrators, asset managers, resource managers, and captains.
Users can schedule flight missions and assign drone assets to individual teams or remote
pilots. This allows companies to manage numerous flight teams, resources, maintenance
processes, and share sensor data with all the stakeholders of the company in locations
throughout the world. This enables more people to access the data as they need it to make
informed decisions about the missions they operate.
FIGURE 2.5
Impossible Aerospace US-A with FLIR sensor (Cozzens, T., 2019).
requirement is for users to be able to access the data that are needed, when and where it
is needed, and to be sure that the data integrity is maintained or guaranteed in the pro-
cess. The two main processes for sharing sensor data are through the web or through a file
system.
The Geospatial Intelligence Standards (GIS) group has helped to establish important
standards that are used to record imagery. Each image collected contains unique (GIS)
metadata about that image that may include time of collection, platform, Geo-location,
speed, altitude, roll, pitch, yaw, and other important data specific to where and when the
picture was taken. This information helps provide context and meaning to the image and
is sometimes called ancillary data. The ancillary data are extremely useful for managing,
analyzing, and distributing the data.
UAS Applications 31
are capitalizing on this by pivoting their businesses away from just manufacturing drones
to providing enterprises with on-demand aerial intelligence. They collect information in
five main areas: construction, insurance, energy, government, and agriculture markets
(PrecisionHawk, 2017). PrecisionHawk is taking the data collected and merging it with
data science, 2-D and 3-D modeling, deep learning, computer vision, and automation to
provide its customers with actionable intelligence. For example, PrecisionHawk partnered
with Florida Power and Light (FPL) to help inspect its power lines. They use UAS to fly
precisely programmed flight plans along its power line infrastructure, which makes the
data they collect more consistent in terms of height and flight path than is possible from a
helicopter (Skylogic Research, 2019).
One recent problem that has come up in recent years is how to handle the volume of
pictures, data points, and video collected. FPL Project Manager Eric Schwartz said at AUVSI
Xponential keynote address, “This data represents thousands of miles of inspections and
millions of pictures just sitting on multiple share points across multiple locations of its com-
pany. This data is the true gold that has yet to be mined.” The value of using drones with
machine learning, image recognition, and Artificial Intelligence (AI) is that the enhanced
system can help notify the human user that something has changed in a specific area over
a certain time period. This saves companies the cost of hiring trained image experts to
review all the images and videos for defects and, since human errors are generally greater
than AI errors, it increases accuracy. Image recognition software can help identify and cat-
egorize machines, parts, and infrastructure –another way to conserve resources.
FIGURE 2.6
Intel RealSense Tracking Camera T265.
32
UAS Applications 33
FIGURE 2.7
UgCS Façade scanning software tool (UgCS, n.d.).
34
angle to the vertical or horizontal axis of the building. Each picture is georeferenced so
that users can create 2-D or 3-D orthomosaic maps of the building in much the same way
as for surveying and mapping missions. Postprocessing of the data can include object
identification software to count and identify objects on the building, and change detection
algorithms to identify what has changed over time. The drones that would be best suited
for this type of inspection would be the Yuneec H520, DJI Mavic 2 Enterprise, DJI M200,
DJI Inspire 1 or 2, DJI Matrice 600, Lockheed Martin Indago UAS, or a Mavlink compatible
multicopter. An advantage of the DJI Mavic 2 is the spotlight that can light up shadowed
architectural recesses for a more thorough inspection.
UAS Applications 35
emergency response. They use drones to inspect areas that are difficult or hazardous to
access on foot, for project and pre-bid planning, and for emergency response to areas
affected by weather or flooding. MPL integrates video and images with its GIS software to
create 2-D and 3-D maps that provide immediate information, plus an historical look at its
flights, pictures, and video. The latest addition to the MPL fleet is a SwellPro SplashDrone,
a waterproof drone that can be used in wet weather for quick data access during floods
(Kezdi, 2018).
Oil and gas companies are starting to use drones to locate traces of hydrocarbon or
methane emission, track land owner property encroachment (right of way monitoring),
search out damage to the pipeline or infrastructure that is above ground, find hazardous
spills, identify unauthorized machinery parked or operated near pipeline areas, and look
for water shedding and land erosion issues. Areas where the pipeline crosses above or
below a river or culvert require special attention; land erosion in these areas is more likely
and may be severe.
The GIS software used for these tasks makes stakeholder access to the data easy
and fast. The data are stored on the World Wide Web in one location in a standardized
format. Stakeholders can log-in from anywhere to access all the LiDAR data, SAR
data, video and image data that have been collected, and the 2-D and 3-D maps that
were produced from the data analysis. This system also makes it much easier to export
reports and files.
• Bridge inspection: Small VTOL UASs can fly underneath and beside bridge structures
to look for cracks in structural members, excessive weathering, loose hardware, or
other defects. Most bridge inspections use FMV or a combination of FMV and still
imagery. UASs are much safer than in-person bridge inspections, significantly redu-
cing the risks generated when a person is hoisted and suspended high above the
ground during an inspection. Additionally, UASs can often inspect more quickly and
cost-effectively than other methods currently available.
36
• Road condition monitoring: UASs are effective for identifying deteriorating road
conditions on both paved and unpaved surfaces (Zhang, 2011). Paved road deteri-
oration in the form of cracks, cupping, or potholes leads to further surface failures
and hazards for drivers. Unpaved roads also deteriorate and become hazardous,
often more dynamically than paved roads. Fixed-wing and VTOL aircraft can be
used to map road condition with visual or LiDAR sensors. Typically, VTOL aircraft
are used in applications where a short stretch of road needs an extremely detailed
inspection and fixed wings are used for longer road lengths that do not require as
much resolution. One challenge with road inspection is the potential safety hazard of
flying a UAS over a road that is concurrently being travelled by motorists. U.S. avi-
ation regulations require that no traffic be on the roads during an inspection, which
necessitates the shutdown of the road. This limits some of the utility of a UAS for this
application.
• Levee and dam inspection: As the levee and dam system ages across much of the globe,
there is an increasing need to monitor the deterioration of these structures. UASs are
particularly effective at mapping levees for erosion (USACE, 2015) and inspecting
dam faces for cracking. Levee erosion detection requires significant terrain modeling
precision that is difficult to obtain from a manned aircraft that flies at higher altitudes
than most UASs. Additionally, a VTOL aircraft flying close to the face of the dam to
inspect it for cracks is much less risky than a human rappelling down the dam face
for the same purpose.
• Detailed structure inspection: Small UASs are capable of delivering extremely high-
quality, close-up imagery of electric power structures hardware components such
as transmission poles, transformers, and insulators. Loose hardware, damaged
insulators, and reduced structural integrity can all be detected by a small UAS flying
with an FMV or still imagery payload. A UAS has the unique ability to get a “top
down” view of energized transmission components without the hazards associated
with a lineman climbing the pole or using a bucket truck. This means that a detailed
UAS inspection can be completed faster and with less human risk than traditional
inspection methods.
• Long distance transmission line inspection: Many UASs, including small gas-powered
aircraft, are capable of extraordinarily long endurance. This long endurance makes
the UAS ideal for flying long distances over transmission lines to quickly reveal any
major damage to structures or lines. Some UASs can fly for 8+ hours and inspect
hundreds of miles of line in a single flight. However, the current U.S. regulatory
environment prohibits most Beyond Visual Line-of-Sight (BVLOS) operations, which
prevents this application from being fully exploited. Also, receiving streaming video
37
UAS Applications 37
or imagery from a low-flying aircraft that is many miles from the ground control
station may be a challenge because of terrain obstruction of the radio link.
• Right- way encroachment and management: Electric power companies must con-
of-
tinuously monitor the right- of-
way (ROW) around their transmission lines for
encroachment of vegetation or man-made structures. Falling objects in the ROW of
a transmission line have the potential to cause damage if they are near or on the
lines or poles. Private landowners may build structures on an ROW that can hinder
access for the electric power company maintaining the lines. The UAS can rapidly fly
down an ROW and map encroachments to assist with the electric power company’s
ROW management. It also provides documentation of ROW encroachments that may
become contentious issues with landowners.
• Corona inspections: Electrical coronas can waste large amounts of transmission grid
energy and have been known to ignite devastating fires. Special cameras that are sen-
sitive to the UV light spectrum are able to detect the “corona discharge” that occurs
when there is a significant ionization of the air around an arcing electric power com-
ponent. A corona camera sees a corona discharge as a flash of light that is often over-
laid on visual imagery. Recent developments in sensor technology have reduced the
size of corona cameras to the point where they can be mounted on a small UAS and
used for routine inspections.
FIGURE 2.8
Radio towers are one example of infrastructure benefiting from UAS inspection methods. (Courtesy of Kansas
State University Polytechnic.)
• Pipeline patrol and inspection: Similar to electric power transmission line inspection,
pipelines can be patrolled by a UAS to identify leaks or damage to the pipeline.
Pipeline inspection is still primarily conducted using low-flying manned aircraft, but
there is increasing pressure to perform these patrols with unmanned aircraft. A low-
flying UAS can detect leaks or damage by looking for the effects of a leak on the
surrounding vegetation. The visible browning of nearby vegetation will often be the
first indication of a leak in a buried gas pipeline. Oil leaking from an above-ground
pipeline will have similar detrimental effects on vegetation. Therefore, inspection of
pipelines is often conducted using either FMV or still imagery that is streamed back
to an operator or processed into an aerial map.
• Flare stack inspection: Flare stacks are used to burn off the excess gas that accumulates
during oil extraction or refinement. These stacks are often mounted on tall towers to
mitigate the risk of an open flame burning close to the ground. Historically, inspec-
tion of flare stacks for deterioration and damage has required that the stack and the
extraction or refinement process be shut down while a human climbs up to visually
inspect the hardware. Unmanned aircraft can inspect flare stacks without shutting
them down and without risking human life to accomplish the inspection. The
39
UAS Applications 39
FIGURE 2.9
A 3-D model of a corn field as generated from a point cloud. (Courtesy of Kansas State University Polytechnic.)
The model that results from the structure from motion process is often exported to other
software suites for further processing or analysis depending upon the type of applica-
tion. For example, a precision agriculture application that utilizes NIR or multispectral
imagery might use additional software to calculate a vegetation index assessing crop
health. Regardless of the application, aerial mapping relies on proper collection of aerial
imagery. Poorly collected imagery, blurry images, or inadequate image overlap will result
in low-quality maps that may contain significant inaccuracies or holes in the data.
UAS Applications 41
geodetic, geologic, topographic, hydrographic, land, geophysical, soil, mine, and engin-
eering surveys.” Many aerial surveys begin with an aerial map of an area of interest, but
the process of surveying implies that characteristics are being measured beyond simple
aerial imagery.
Topographical maps are a good example of an aerial map that is actually a type of
survey. The process of creating a topographical (elevation) map from UAS data begins
with the collection of imagery as described in Section 2.3.1, which is then processed into
a 3-D model. This 3-D model can then be exported into Geographic Information System
(GIS) software to create contour lines for elevation changes. The contour lines can either be
overlaid on top of the imagery or they can form their own map, often with shading to indi-
cate elevation or reliefs. A topographic map allows for rapid identification of the elevation
of any point on the map.
2.5.13 Volumetrics
Measuring the volume of physical objects or empty spaces is critical to numerous indus-
tries, particularly those that rely on knowing the quantity of stockpiled materials or
the amount of material removed from an area. The same 3-D model derived by aerial
surveying applications can be used to measure the volume that lies below or above objects
in the model. This is especially useful for the mining industry, which must know precisely
how much material is removed from a mine to ensure regulatory compliance and assess
productivity. A coal power plant that must maintain a certain number of burn days in
stockpiled coal must know exactly how much coal is stored on site. Topographical land
surveys have traditionally been used to calculate the amount of stockpiled coal, but a UAS
can fly over stockpiles and mines in a relatively short time, build a 3-D model of the area,
and estimate the volume. The process of creating this volume calculation is the same as
discussed earlier, although volumetric surveys are particularly sensitive to errors in the
3-D model. Even small errors can result in significant differences in the calculated volume.
• Crop health assessment: Every crop is capable of producing a certain yield when it is
100% healthy, so farmers must carefully manage their crop’s health to ensure max-
imum yields. This includes supplying the crops with adequate nutrients and water
and limiting the harmful effects of pests and weeds. However, it is common for nat-
ural and man-made factors to reduce the crops’ health and subsequent yield potential.
UASs can assist in the assessment of crop health by remotely sensing the photosyn-
thetic activity of the plants. One way to determine this photosynthetic activity is by
42
FIGURE 2.10
An example of an NDVI analysis done on a corn field. (Courtesy of Kansas State University Polytechnic.)
43
UAS Applications 43
• Impact of the Elwha dam removal: In the summer of 2012, the USGS collaborated with
the Bureau of Reclamation and the National Park Service to assess the impact of
the Elwha dam removal in the state of Washington. An AeroVironment Raven UAS
was flown over the site during and after the removal of the dam. The Department
of Interior used the subsequent 3- D models to evaluate sediment distribution
throughout the river basin and the effects it may have on wildlife and the environ-
ment (USGS, 2012).
• Census of ground-nesting pelicans: The USFWS and USGS tested UASs as a means for
collecting population data for pelicans nesting in south-central North Dakota in
Summer 2014. Manned aircraft had been used previously for this application, but
they often delivered sub-par image resolution and were flown at potentially haz-
ardous low altitudes. The test showed that small UASs could deliver accurate bird
population counts without disturbing the animals and provide the documentation
needed to assess population trends over time (USGS, 2014).
2.5.17 Filmmaking
The filmmaking industry captured headlines in the latter part of 2014 as it received the
first approved commercial application for small UAS under the FAA’s exemption process
in Section 333 of the FAA Modernization and Reform Act of 2012. Filmmakers have long
used aerial video from manned helicopters and airplanes to capture unique perspectives
for a movie scene. UASs enable aerial shots to be taken from lower altitudes than ever
before, even to the extent of flying a camera into or out of a building. They can produce
stable, “movie quality” video without the complications of cranes and jibs or the risk of
low altitude helicopter flight. Most filmmakers have chosen to fly large multirotor air-
craft with professional cameras mounted on stabilized gimbals. These aerial shots are
often conducted with the UAS operator flying the aircraft in a stabilized control mode,
while a camera operator controls the camera through a live video feed to obtain the shot
desired.
44
FIGURE 2.11
Aerial views of scenes can now be captured using low-cost, relatively easy-to-use UAS. (Courtesy of Kansas
State University Polytechnic.)
2.5.19 Marketing
UASs are now being used to market everything from cars to homes to concerts. The adver-
tising and marketing industry has quickly learned that an aerial perspective can be a strong
persuader to consumers of their products. Marketing with a UAS can range from aerial
filming to banner towing. In June 2014, a start-up company flew a 3-foot × 12-foot adver-
tising banner from a multirotor aircraft on the Las Vegas strip (Velotta, 2014). It is possible
that banner towing that is currently done by manned aircraft may someday be conducted
almost entirely by UASs.
UAS Applications 45
their own manned helicopters that they use to report on live events, but UASs bring this
same capability closer to earth and at a cost that almost every news station could afford.
However, by their very nature, most events reported by news stations routinely have many
people at the scene. This poses a problem since the FAA has yet to establish protocols for
operation of unmanned systems over large groups of people. If even a small UAS were to
fall out of the sky into a crowd, there is a substantial risk of injury to those on the ground.
Therefore, most of these operations are not currently permitted.
• Accident and crime scene reconstruction: The same photogrammetric process that is used
in aerial surveying can be applied to accident and crime scenes to create accurate 3-
D models of the scene for later analysis. Determining the causal factors behind an
automotive accident can be extremely challenging, but the aerial perspective of a
UAS image and/or a 3-D model of the scene can help investigators identify where
the accident first began and who may have been responsible. Additionally, there has
been some initial work using 3-D models derived from UAS data to reconstruct crime
scenes and use them to figure out what occurred during the crime (Miller, 2013).
• Tactical operations support: Conducting a tactical operation is both stressful and dan-
gerous for law-enforcement officers (see Figure 2.12). Circumstances like an active
shooter in a shopping mall or a hostage taker require police to assess the situation
rapidly and precisely. A UAS provides another tool that can be used to enhance situ-
ational awareness during these events. They could potentially save lives by identi-
fying dynamics in the scene that cannot be seen or understood from a ground-based
perspective. Tactical operations support applications typically require live-streaming
FMV that is distributed to those on the scene who need to make rapid decisions to
support the mission.
FIGURE 2.12
Obtaining an aerial perspective provides a strategic advantage. (Courtesy of Kansas State University
Polytechnic.)
quickly by sensing their body heat in the ambient surroundings. Manned aircraft can also
cover ground rapidly during a search and rescue mission, but it often takes significant
time for them to be dispatched from a local airport and fly to the scene. Small UASs can
be deployed immediately by those on the scene, saving precious time that may make the
difference between rescuing a victim or recovering a body.
The Royal Canadian Mounted Police demonstrated a vivid example of the lifesaving
capability a UAS provides when they utilized a small UAS in May 2013 to save the life of
a driver who was injured in an automotive accident and then stranded in the cold. In this
instance, the officers responding to the accident were unable to locate the driver, although
they were able to communicate with him via a cell phone. The officers obtained a GPS
location from the driver’s phone, but still could not locate him. They ultimately launched
a small multirotor aircraft and were able to identify the driver’s heat signature within
minutes. They found him unresponsive but alive at the base of a tree (RCMP, 2013).
UAS Applications 47
2.5.27 Meteorology
In 2010, NASA conducted the first unmanned flights over a tropical cyclone as part of their
research on new ways to predict the path and strength of tropical storms (NASA, 2010). This
is a prime example of how UASs are being used to further the understanding of weather,
including dangerous weather conditions. The information collected from NASA’s Global
Hawk UAS provided much higher resolution data than is obtainable from satellite-based
sensors. Other meteorological applications capture data variables such as temperatures,
wind speeds, and ozone content to better understand how weather patterns may be chan-
ging. The primary benefit of a UAS versus manned aircraft and balloons is its ability to be
launched quickly, operate for long durations, and maintain precise control of the sensors’
positioning. A UAS can also fly into weather phenomena, like tornados, which are too dan-
gerous for other aircraft. For example, the University of Colorado Boulder’s Research and
Engineering Center for Unmanned Vehicles (RECUV) has performed significant research
into the use of UASs to understand tornado development and prediction (Elston, 2011).
48
UAS Applications 49
notes that “in Japan more than 2,500 RMAX helicopters are being used to spray 40 percent
of the fields planted to rice—that country’s number one crop” (UC Davis, 2013). These
aircraft are much larger than the current “small UAS” category for which the FAA has
promulgated regulations in the United States. Larger UASs will likely require some type
of certification under regulations similar to those that currently apply to manned aircraft.
Without additional regulations, integration of large UASs into the National Airspace is not
likely to be viable in the United States.
The only other company so far to receive Part 135 drone airline certification is Wing.
However, Wing can only operate with one pilot and one sUCA in the United States so far
(Garcia, 2019). Wing is a company within Alphabet, Google’s parent company. Alphabet’s
Wing spokesperson, Jonathan Bass, says that Wing expects to share its key project findings
publicly. In a mature market, Wing estimates delivery by drone could increase sales in
metropolitan areas by up to 27.4% per year for participating businesses. There are also
environmental benefits. Assuming a high adoption rate across the metropolitan area, Wing
estimates that replacing cars with drones for delivery services could reduce carbon dioxide
emissions by 40 tons per year (Sondgeroth, 2020).
UAS Applications 51
FIGURE 2.13
LUCAuture LUCA concept by students of the Technical University of Delft (PUCA, 2017).
public confidence in manned airplanes; it is crucial that the integration of LUCA abides by
the same regulations.
2.7 Conclusion
The applications presented in this chapter are only a small sample of the multitude of
uses for UAS. New applications are developed every day that demonstrate the poten-
tial for UAS to affect almost every industry around the globe. With time and use, many
applications will become commonplace, while others will prove to be less useful in the
long run. The rapid development of advanced aircraft systems, improved sensors, and
favorable regulations are likely to increase the value of UAS in everyday life.
Discussion Questions
2.1 Describe the three basic methods of control discussed in this chapter and discuss
how the mission, application, and type of data to be acquired may determine
which method is used.
2.2 Describe each of the sensors discussed in this chapter and list the various
applications for which each would be used.
53
UAS Applications 53
2.3 Discuss in detail each of the applications covered in this section. What do you
believe is the best platform design and payload package for each one? Support
your answer.
2.4 Operations known as 3-D missions are discussed in this chapter. Give examples
of applications that would be considered 3-D operations.
2.5 Provide examples of applications requiring physical interaction with substances,
materials, or objects.
2.6 List and describe in detail those items that must be considered prior to conducting
any UAS mission. Mention why you believe each is significant.
2.7 Reflecting on the types of applications discussed, which do you believe would
be most likely rely on extensive data processing? Which would likely to be the
least data dependent?
2.8 List the EM spectrum wavebands for EO sensors and discuss the commercial
applications of each available type.
2.9 Discuss the pros and cons of using UAS fleet management software for both civil
and commercial applications. Describe the software systems available for this
purpose and how they are different from each other.
2.10 Describe how to safely plan and operate an UAV mission that will be autono-
mously operated, beyond visual line of sight, in an urban environment, and
where a GPS signal would not be guaranteed.
Note
1 According to Oliver (2010, 4) the term, “precision agriculture,” was first used in 1990, a quarter
century ago, “… as the title of a workshop held in Great Falls, Montana.” When viewed in the his-
torical context of the evolution of the art, science, and practice of farming, which has been funda-
mental to the maintenance of civilization for millennia, the use of precision agriculture is, indeed,
a very recent development.
References
Associated Press. (2005, August 31). Katrina outages reveal phone system quirks. NBCNews.com.
www.nbcnews.com/id/9120503/ns/technology_and_sciencetech_and_gadgets/t/katrina-
outages-reveal-phone-system-quirks/#.VT1D6842ybE.
Association for Unmanned Vehicle Systems International. (2013). The economic impact of unmanned
aircraft systems integration in the United States. Arlington, VA.
Carr, D. F. (2009, April 13). Communications Relay Grows with Expansion of UAV Missions. Defense
Systems. http://defensesystems.com/articles/2009/07/29/c4isr-1-uav-relay.aspx.
Central Intelligence Agency. (2013). The World Factbook 2013– 2014. Washington, DC: Central
Intelligence Agency. www.cia.gov/library/publications/the-world-factbook/.
Chua, A. (2019). ST Engineering and Air NZ trial drones for aircraft inspections. FlightGlobal.
Retrieved from www.flightglobal.com/news/articles/st-engineering-and-air-nz-trial-
drones-for-aircraft-458985/
54
Collins, M. P. (2017). The future market for large unmanned cargo aircraft in the national airspace system.
Platform of Unmanned Cargo Aircraft. Retrieved from www.platformuca.org/wp-content/
uploads/2018/01/LUCA-market-research-thesis-by-Mark-Patrick-Collins-v7.pdf
Coptrz.com. (2016). Understanding drone payloads. Coptrz.com commercial drone experts.
Retrieved from www.coptrz.com/understanding-drone-payloads/
Cozzens, T. (2019). Auterion enables Impossible Aerospace to launch new US- 1 drone
for first responders. GPS World. Retrieved from www.gpsworld.com/auterion-
enables-impossible-aerospace-to-launch-new-us-1-drone-for-first-responders/
Dictionary.com. (2015). Remote Sensing. Dictionary.com Unabridged. Random House, Inc. Retrieved
from http://dictionary.reference.com/browse/remote%20sensing.
DroneCode. (n.d.). Open source drone end to end solutions. Retrieved from www.dronecode.org/
Elston, J. S. (2011). Semi-autonomous small unmanned aircraft systems for sampling tornadic supercell
thunderstorms. PhD dissertation. University of Colorado. http://tornadochaser.colorado.edu/
data/publications/2011-[elston]-dissertation.pdf.
Esri. (2015). Surveying—GIS Dictionary. Esri GIS Dictionary. Retrieved from http://support.esri.
com/en/knowledgebase/GISDictionary/term/surveying.
Garcia, S. E. (2019, October 2). F.A.A. Allows U.P.S. to Deliver Medical Packages Using Drones. The
New York Times. Retrieved from www.nytimes.com/2019/10/02/us/UPS-drone-deliveries.
html
Gerhardt, N., Clothier, R., & Wild, G. (2014). Investigating the practicality of hazardous material
detection using unmanned aerial systems. Conference held 29– 30 May 2014. Metrology
for Aerospace (MetroAeroSpace) (pp. 133– 137). Benevento, Italy: IEEE. doi: 10.1109/ Metro
AeroSpace.2014.6865908.
Heerkens, H. (2017). Unmanned cargo aircraft: From anywhere to everywhere. London: IET Publishing,
The Institution of Engineering and Technology.
Kezdi, M. (2018). A new perspective: Drone technology taking flight over pipeline rights of
way. North Amercian Oil & Gas Pipelines. Retrieved https://napipelines.com/new-
perspective-drone-pipeline/
Merriam-Webster.com. (2015). Photogrammetry. Merriam-Webster, Inc. Retrieved April 26, 2015
from www.merriam-webster.com/dictionary/photogrammetry.
Miller, B. (2013). The future of drones in America: Law enforcement and privacy considerations. Before
the Committee on the Judiciary. United States Senate. (Written testimony of Benjamin Miller,
Unmanned Aircraft Program Manager, Mesa County Sheriff’s Office and Representative of the
Airborne Law Enforcement Association).
National Aeronautics and Space Administration. (2019). FAQs: NASA’s Drone Traffic Management
Research in Reno and Corpus Christi. NASA. Retrieved from www.nasa.gov/feature/ames/
faqs-nasa-s-drone-traffic-management-research-in-reno-and-corpus-christi
National Aeronautics and Space Administration. (2020). Unmanned Aircraft System (UAS) Traffic
Management (UTM). Retrieved from https://utm.arc.nasa.gov/index.shtml
National Aeronautics and Space Administration. (2010). NASA’s Global Hawk Drone Aircraft flies
over Frank on the GRIP Hurricane Mission. Retrieved from www.nasa.gov/mission_pages/
hurricanes/missions/grip/news/frank-flyover.html.
Naval Air Systems Command. (2012). Marines find first deployed Cargo Unmanned Aerial System
“Reliable.” NAVAIR News. Retrieved from www.navair.navy.mil/index.cfm?fuseaction=home.
NAVAIRNewsStory&id=5073.
Oliver, M. A. (2010). An overview of geostatistics in precision agriculture. In M. A. Oliver (ed.),
Geostatistical applications for precision agriculture (pp. 1–34). New York: Springer.
Pöllänen, R., Toivonen, H., Peräjävi, K., Karhunen, T., Ilander, T., Lehtinen, J., … Juusela, M. (2009).
Radiation surveillance using an unmanned aerial vehicle. Applied Radiation and Isotopes 67 (2),
340–344. doi:10.1016/j. apradiso.2008.10.008.
PrecisionHawk. (2017). Michael Chasen lifts PrecisionHawk to next level by expanding drone
platform into new markets. PrecisionHawk. Retrieved from: www.precisionhawk.com/
blog/media/topic/michael-chasen-lifts-precisionhawk-to-next-level-by-expanding-drone-
platform-into-new-markets
55
UAS Applications 55
57
3
The “System” in UAS
3.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
3.1.1 What Makes Up an Unmanned Aircraft System. . . . . . . . . . . . . . . . . . . . . . . . . 57
3.2 UAS/RPA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
3.2.1 Fixed Wing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
3.2.2 Vertical Takeoff and Landing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
3.2.3 Hybrid Platforms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.3 Command and Control Element . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.3.1 Autopilot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.3.2 Ground Control Station. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3.4 Communication Data Link. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.4.1 Radio Line-of-Sight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.4.2 Beyond Radio Line-of-Sight. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.5 Payload. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.5.1 Electro-Optical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
3.5.2 Thermal Infrared. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
3.5.3 Spectral. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
3.5.4 Laser. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
3.6 Launch and Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
3.7 Human Element. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Discussion Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
3.1 Introduction
3.1.1 What Makes Up an Unmanned Aircraft System
In this chapter, we will briefly discuss the elements that combine to create an unmanned
aircraft system (UAS). Most unmanned systems consist of an unmanned aircraft (UA) or
remotely piloted aircraft (RPA), human pilot, payload, control elements, and data link
communication architecture. Figure 3.1 illustrates a common UAS and how the various
elements are combined to create the system.
57
58
Human
element
Unmanned
system
Unmanned
Payload
aircraft
Communication
data link
FIGURE 3.1
Elements of the unmanned aircraft system (UAS).
3.2 UAS/RPA
The term “UA” means an aircraft that is operated without the possibility of direct human
intervention in or on the aircraft. In more recent years in some sectors, particularly in some
branches of the military, there has been a push to change the term UA to RPA or remotely
piloted vehicle (RPV). UA is really a misnomer considering how much human involve-
ment is crucial to the operation of the system.
UASs are categorized into five groups by the U.S. Department of Defense as seen in
Table 3.1. The Federal Aviation Administration (FAA) has traditionally differentiated small
UAS (sUAS) (under 55 lbs) from other larger UASs. In the future, the FAA will likely clas-
sify UAS into risk-based classifications depending on their potential impact on public
safety. The sUAS will be the first to be integrated into the National Airspace System (NAS),
a process that is underway now.
TABLE 3.1
U.S. Department of Defense UAS Classification System
UAS Category Max Gross Takeoff Weight Normal Operating Altitude (feet) Airspeed
Group 1 < 20 pounds <1,200 above ground level (AGL) <100 knots
Group 2 21–55 pounds <35,00 AGL <250 knots
Group 3 < 1,320 pounds <18,000 mean sea level (MSL)
Group 4 > 1,320 pounds Any airspeed
Group 5 >18,000 MSL
Note: If a UAS has even one characteristic of the next higher level, it is classified in that level.
for reconnaissance and the Q classifies it as an unmanned aerial system. In recent years,
however, the Predator’s designation has been changed to MQ-1, with the M standing for
multirole. This means that it can complete ISR missions, and may also be used to deliver
Hellfire missiles.
Fixed-wing UAS platforms are often capable of long flight durations that can maxi-
mize their time in the air and their range. Northrop Grumman’s RQ-4 Global Hawk™ has
completed flights of more than 30 hours covering more than 8200 nautical miles. Fixed-
wing platforms also offer the ability to conduct flights at much higher altitudes; high
enough that the vehicle is not visible from the ground with the naked eye.
The disadvantages of fixed-wing UAS platforms are that the logistics required for launch
and recovery (L&R) can be very substantial (known as a large logistical “footprint”). Some
require runways to land and take off, and others require takeoff catapults to reach flying
speed and are recovered with a net or capture cable. Not all aircraft have complicated L&R
procedures, though. Some small fixed-wing platforms like AeroVironment’s Raven™ are
hand-launched, and are recovered by stalling the aircraft over the intended landing spot
or by deploying a parachute.
FIGURE 3.2
Piccolo™ SL autopilot unit. (Copyright Cloud Cap Technology, a UTC Aerospace Systems Company.)
autopilot will fly the mission profile as long as it remains in radio contact with the ground
control station. If contact with the ground station is lost while the aircraft is in the air, the
autopilot will execute its preprogrammed lost-link profile.
The lost-link procedures for the vehicle can include:
Most commercially available technology default procedures require that the aircraft return
to the starting point and land immediately if the link is not reestablished within a given
time frame.
FIGURE 3.3
General Atomics MQ-1 Predator GCS. (Copyright General Atomics.)
FIGURE 3.4
(a) Piccolo™ Command Center GCS. (Copyright Cloud Cap Technology, a UTC Aerospace Systems Company.)
(b) AeroVironment handheld GCS. (Copyright AeroVironment.)
64
ISM frequency bands are widely used. This makes them susceptible to frequency con-
gestion and signal interference, which can cause the UAS to lose communication with the
ground station. Rapid frequency hopping has emerged as a technology that minimizes
this problem. Frequency hopping is a basic signal modulation technique that spreads the
signal across the frequency spectrum. With this technology, the transmitter operates in
synchronization with the receiver, so both are tuned to the same frequency at the same
time. During frequency hopping, a short burst of data is transmitted on a narrow band,
then the transmitter tunes to another frequency and transmits again, and the process
repeats. The hopping pattern can be from several times per second to several thousand times
per second. The FCC has allowed frequency hopping on the 2.45 GHz unlicensed band. It is
this repeated switching of frequencies during radio transmission that minimizes the effect-
iveness of unauthorized interception or jamming.
Current sUAS commercial operations are primarily operated with RLOS systems. This
has been driven by FAA regulations that restrict the aircraft to the VLOS of the pilot or a
designated visual observer. This form of link is the most affordable.
3.5 Payload
Outside of research and development, most UASs are aloft to accomplish a mission and
most missions require an onboard payload. The most common payload for the commer-
cial industry is some form of optical sensor, which may include a COTS camera, electro-
optical (EO) camera, or thermal infrared (IR) camera. Some platforms offer dual sensor
options that allow the integration of both an EO and IR sensor. These may be operated in a
coordinated fashion, or may be controlled independently.
65
Optical sensor packages can be permanently mounted on the UAS aircraft, giving the
sensor operator a fixed view only; or they can use a mounting system called a gimbal or
turret (Figure 3.5). A gimbal or turret mounting system gives the sensor a predetermined
range of motion, usually in three axes. The gimbal or turret receives input either through
the autopilot system or through a separate receiver. Some gimbals are also equipped with
vibration isolation, which reduces the amount of aircraft vibration that is transmitted to
the camera (image stabilization) and produces a clearer image or video. Vibration isolation
can be performed by an elastic/rubber mounting, or with an electronic gyrostabilization
system.
Other types of payload sensors can include hyperspectral sensors, synthetic aperture
radars (SARs), or light detection and ranging sensors. For military platforms, laser range
finder/designators are also common.
The payload can used for surveillance, weapons delivery, communications, aerial
sensing, cargo, or many other applications. UASs are often designed around the intended
payload(s) they will carry; the size and weight of payloads are two of the largest con-
siderations for UAS design. Most commercial application sUAS platforms have relatively
small payloads, generally less than 5 lbs. Some sUAS are designed to have interchangeable
payloads that can be quickly removed and replaced.
3.5.1 Electro-Optical
EO cameras are so named because they use electronics to pivot, zoom, and focus the image.
These cameras operate in the visible light spectrum and the imagery they yield can be in
the form of full-motion video, still pictures, or even blended still and video images. Most
sUAS payload EO cameras use narrow-to mid-field-of-view (FOV) lenses. Larger UAS
camera payloads can also be equipped with wide or ultrawide FOV (WFOV) sensors. EO
sensors can be used for many types of missions and can be combined with different types
of other sensors to create blended images. They are most frequently operated during day-
light hours for optimal video quality.
FIGURE 3.5
(a) Multispectral Targeting System-B (MTS-B) sensor pod. (Copyright Raytheon Co.) (b) General Atomics MQ-9
Reaper (formerly called “Predator B”). (Copyright General Atomics.)
67
3.5.3 Spectral
One class of payloads has become particularly useful for missions that involve plant growth.
A myriad of multi-and hyperspectral imaging payloads can detect energy wavelengths
that exist outside of visible light as detected by the naked eye (visible light = 400–799 nm
on the electromagnetic spectrum). The energy spectra most often needed for plant-based
analysis applications are the blue/green/red band (450–690 nm) or the IR band (700 nm–
1 mm). The IR band can be further divided into near-IR (NIR, 800 nm–2.5 μm), short-wave
IR (SWIR, 0.9–1.7 μm), medium-wavelength IR (MWIR, 3–8 μm), LWIR (8–15 μm), and far-
IR (FIR, 15–1,000 μm). Ultraviolet light (UV, 100–400 nm) can also be useful in these types
of applications, and there are other bands that can also be studied. Scientists involved in
agricultural and plant-based applications often study the amount of the target energy that
is either absorbed or reflected by plant vegetation. This information is then analyzed to
make plant health and status determinations, depending on the specific type of informa-
tion that is needed. One much-used formula is the normalized-difference vegetation index
(NDVI): NDVI = (NIR -RED)/(NIR + RED). Knowing the NDVI, scientists can make deter-
minations about the need for crop chemical application, plant drought and disease stress,
and overall plant health.
3.5.4 Laser
A laser range finder uses a laser beam to determine the distance to an object, whereas a
laser designator uses a laser beam to designate a target. The laser designator sends a series
of invisible coded pulses that reflect back from the target and are detected by the receiver.
There are, however, drawbacks to using a laser designator on an intended target. The laser
may not be accurate if atmospheric conditions are not clear due to rain, clouds, blowing
dust, or smoke. The laser can also be absorbed by special paints, reflect incorrectly, or not
reflect at all on materials like glass.
FIGURE 3.6
Soldier hand-launching a Raven RQ-11. (Copyright AeroVironment.)
Discussion Questions
3.1 Why have some elements of the military gravitated away from using the term
“unmanned?”
69
FIGURE 3.7
(a) Insitu ScanEagle™ catapult launcher. (b) Insitu ScanEagle™ arresting cable the “SkyHook™.” (Copyright
Insitu Inc. a Boeing Company.)
FIGURE 3.8
AAI Aerosonde vehicle-top launch cradle. (Copyright AAI Aerosonde a Textron Systems Company.)
71
4
UAS Sensing –Theory and Practice
Gabriel B. Ladd
71
newgenprepdf
72
in concert to achieve the overall goal of the flight. For example, aircraft dynamics may be
used in conjunction with the gas analysis to allow researchers to account for the motion of
the vehicle and the air in their analysis.
FIGURE 4.1
UAS (Drone) Silhouette chart for scale comparison (Griffiths 2013).
74
are counted, the majority of UAS are small (weighing less than 55 lbs.). An idea of scale of
choices for different UAS platforms can be found in Figure 4.1.
The emitted or reflected particles or waves most often associated with airborne remote
sensing are sunlight or what is called on the EM visible light spectrum (VIS). For the
purposes of this discussion, we are working within a paradigm where its behavior is well
known, so we will leave the debate on the nature of light as a particle or wave to the
physicists.
To illustrate how light works in remote sensing, consider what happens when you
take a photograph outside on a sunny day. Perhaps you use your phone or a point and
click camera or even an “old fashioned” film camera; in any case, you are capturing and
recording sunlight. In the case of electro-optical (EO), or digital cameras, as the consumer
market calls them, the light comes through the lens and strikes a sensor. In the case of film
cameras, light strikes a thin piece of sensitive material commonly referred to as film. For
most applications, this film is a thin piece of plastic with a light sensitive coating (Wolf and
Dewitt 2000). By pointing the camera at the individual, you are, in fact, turning the light
receiving lens toward the individual and collecting the sunlight they are reflecting. The fact
that you are capturing and measuring the reflected light for the purpose of understanding
what is going on with the distant person is the critical difference between remote sensing
and in situ measurement methods.
In the example of a digital picture of a person taken outside, the light entering the
camera is measured by an array of light-sensitive sensors. These sensors react to the light,
and that reaction is measured and stored as the fundamental building block of the image.
The digital image you are used to seeing on your phone or computer screen is constructed
by the image sensor based upon the array’s reaction. Not enough reaction and the image
is too dark; too much reaction and the image is washed out. The sensor reaction can be
modified and adjusted in many ways, which can be broken down into two general cat-
egories: physical and software. The physical modification methods are what most people
would think of as traditional photographic methods, such as aperture, focus, and ISO
(or light sensitivity). The software modifications include what would have been done in
the darkroom when developing the film, but digital image manipulation can go much
beyond that. It should be noted here that the UAS remote sensing community has almost
exclusively embraced digital imaging, and thus, film-based remote sensing will not be
discussed further here.
TABLE 4.1
EM Spectrum and What Is Measured
Spectrum Wavelength Radiation Source Property Measured
calibration. Once a sensor is calibrated for a band of the EM spectrum, the sensor response
can be tied directly to a small range of the EM spectrum being reflected by the object.
The ability to determine the spectral reflectance of an object can be very powerful,
but depending on your application, it may not be required. Knowing the range of the
sensor’s EM sensitivity may suffice to answer the question without pinning down specific
wavelengths.
One of the most powerful aspects of remote sensing is spatial continuity, which is the
ability to know what is going on at an individual location and every surrounding location
for a substantial distance. Spatially contiguous data enable all sorts of analyses not pos-
sible without the perspective provided by continuous coverage. Going back to the example
of a picture you have taken, it is possible, even without the camera being radiometrically
calibrated, to tell that the person in the picture is wearing a red knit winter hat and a wind-
breaker. The nature of both objects you can guess at from the texture of the object and the
fact that it is being worn as an article of clothing. This is done by observing the subtle
variation, or lack thereof, in the material texture, along with the overall context derived
from having the spatial continuity of the image. Thus, the image can provide a lot of infor-
mation, in some cases more than a thousand words of information. There is an underlying
assumption of resolution. The assumption is that the person in the picture is close enough
to have the sensor record the level of detail needed to express the texture. If the image
were of too low a resolution or the person is too far away, you might be able to tell they
are wearing a red cap and some sort of jacket, but you may not have enough contextual
information to say more.
Another important advantage to spatial data is the complete or nearly complete sam-
pling. This is illustrated very clearly in crop monitoring. When an agronomist goes
out into a cornfield to pick corn ears and use them to predict crop yield, they will look
at between 10 and 100 individual ears from a small number of individual locations
across a field. This is a very small fraction of the ears of corn growing in the field.
The agronomist then predicts what the rest of the plants are doing based upon some
assumptions of what a statistically normal population of corn would do. When you use
remote sensing, data will be collected on every plant. The downside to this is that by
collecting information on literally every plant in the area of interest (AOI) and beyond,
you must develop ways of excluding things you are not interested in analyzing. An
additional wrinkle in remote sensing analysis is that you measure analogs, not the
actual value you are trying to calculate. The agronomist uses a handful of sample points
to project yield across the AOI. Remote sensing uses reflectance to project yield and
capture all the spatial variation in the field. Nonetheless, reflectance must be converted
into yield based upon some assumptions. It also means the analyst has to use a different
form of analysis. Rather than doing analysis from a position of having measured a small
subset and making assumptions of population normalcy, one must approach the ana-
lysis with an understanding of what is representative and what is not, which leads very
quickly into spatial statistical analysis.
that are spatially aligned in many spectrums. Instead of one three-band color image (red,
green, blue), you end up with a many-channel image. According to the ASPRS Manual
of Photogrammetry, Fifth Edition Chapter 5 pg. 404, to be a truly hyperspectral imager,
a system must have 100 or more spectral channels per image (McGlone et al. 2004). This
results in a highly multiband image, also called a “hypercube,” which can be thought
of as many pictures all taken at the same time with each pixel in spatial alignment. The
large number of spatially aligned but spectrally different pixels is what differentiates a
hyperspectral imaging system from a normal VIS spectrum camera or even a many-band
multispectral camera (McGlone et al. 2004). The requirements for spectral resolution tend
to drive the weight and price of the hyperspectral imagers above cameras with fewer spec-
tral bands, even the multispectral cameras.
The power of hyperspectral imaging systems lies in their spectral, not spatial resolution.
A hyperspectral data cube can be analyzed in the 2-D image-based analyses discussed
above or by looking at the spectral signature of each band for each pixel position on the
ground. Per pixel spectral signature produces a unique response in each spectral band, and
thus, each pixel can be used to uniquely identify material by spectral signature. Depending
on the spectral resolution, hyperspectral image analysis can differentiate between real and
fake vegetation, or go so far as to identify specific materials and/or soil types (Landgrebe
2002, Exelis 2015). The problem with hyperspectral cameras on UAS is the required size
and vibrational sensitivity. Because of the need to address so many different spectral bands,
the camera has to have additional components, which add to size and weight. To reduce
the unit size, manufactures either keep the sensor array size small or they use a pushbroom
design (Resonon 2015, Rikola 2015). Either option is a viable solution, but they affect how
the system is operated to collect data and how much it costs. The small size of the array
affects how much spatial resolution each image has, which, in turn, means that the camera
system and thus the aircraft needs to be flown at very different altitudes depending on
desired ground resolution in the image or application. A pushbroom hyperspectral camera
can potentially have the same resolution issues, coupled with the additional need of very
high-precision position and orientation system (POS) data to align the individual single-
pixel tall image slices. Past work in this area has revealed that autopilot orientation and
positioning data were not good enough for seamless image creation (Hruska et al. 2012).
The need for high-precision POS data means a substantially increased cost, additional
weight, and power consumption, which on the medium and large UAS can be justified.
It will be some time until that level of complex hardware is operated on the entry-level
quadcopters.
4.3.3.4 LiDAR
LiDAR has changed the face of remote sensing since its wide acceptance in the 1990s.
LiDAR uses a laser beam and a receiver to measure the distance to the ground. A simple
way to think of LiDAR is to imagine what happens when you take a laser pointer into a
dark room and rapidly shine it back and forth in front of you. You can quickly build up
an idea of where all the furniture is and how far away it is. The actual sensor systems
are more complex and can discriminate between multiple return reflections of a single
light pulse. There are several ways of doing this. The early systems used a line scanner
method with optically coupled laser and receiver that sent pulses out over a fixed arc and
waited to see a return reflectance from the ground (Wehr and Lohr 1999). Later systems
used separate scanners and emitters. The latest evolution of sensors uses a single instant
point source emission variant called flash LiDAR (Gelbart et al. 2002). The technology has
80
currently settled into two types: Geiger-mode LiDAR (GML) and single-photon LiDAR
(SPL). Both types have different advantages and are being rapidly developed. Both GML
and SPL are mechanically simpler, but potentially spatially less accurate (Higgins 2017).
The technology is evolving rapidly.
As one might expect, all these systems require a very accurate measurement of time,
sensor pointing angles, and sensor spatial location. LiDAR sensor ground resolution is
dependent on attitude and point density. The higher a system is flown, the further apart
the individual pulses are spaced on the ground, which reduces the data resolution. The
lower the power of the LiDAR system, the shorter the range. Power is a limiting factor
for UAS systems. The midsized and large UAS systems running combustion or turbine
engines can produce their own electrical power, so they are less limited than the small
systems using electric motors, which are dependent upon their battery packs.
The manned aircraft LiDAR systems can operate at altitudes of 10,000 m above ground
level. The smaller units used for the midsized UAV systems over the last few years have a
useful range of a few hundred meters or less. For example, the Regal VUX-1UAV specifies
an operational ceiling of 1,000 ft. or about 333 m (Regal 2015). The smallest systems can be
deployed on small multirotor systems (Wallace 2012) and have a still shorter range, usually
on the order of 100 m (Velodyne 2019).
FIGURE 4.2
NANO SAR Circa 2008 (Microsystems 2015).
The area of SAR remote sensing from UAS is unique in UAS remote sensing now because
technology exists, but there is little published work about it being used in the academic
fields, and even less in the commercial fields. Assuming the systems are being employed
by the world’s militaries as advertised by their vendors, it is unclear why the UAS research
community and commercial sectors are not using the technology more. Still, it remains a
powerful data collection technique, and as UAS utilization increases, one can only assume
that the use of such systems will likewise grow.
FIGURE 4.3
Example file structure.
84
FIGURE 4.4
Data file structure template.
systems and operating systems simpler. In place of spaces, use underscores or camel case
if underscores do not work.
Cloud storage is a highly useful tool for both large data storage and collaboration.
If done right, it can meet all common industry standards and often many government
ones as well. Treat cloud storage as you would any other Internet accessible system: Use
strong passwords, change them frequently, use multifactor authentication, make sure
you set up the system correctly, and understand how interesting the data you are
storing there is to others. Strong passwords are at the root of what makes your system
secure; if your password is easily guessed, someone will, and you only have yourself to
blame. Changing those passwords completely, not just changing one number at the end,
makes them harder to guess. Make them as different as possible. Multifactor authentical
(MFA) is a process that uses more than the username and password to authenticate the
person trying to log in. Often this is a text sent to your phone. This is more secure. The
12-year-old kid who correctly guesses your password was 12345 is probably not also
going to have access to your phone (you hope). Spend the time to learn about your
cloud storage system. All systems have basic primers that will tell you about how to
make them secure, and most are defaulting to no access to anyone other than the creator
unless granted, but how you grant that access and to whom you are granting it varies
based on service and your needs. Spend the few hours it will take to learn enough to do
it correctly.
A study on proposals to a multistate cloud GIS services contract RFI showed that data
access and security were important considerations, but suggested that alignment with the
Federal Information Security Management Act and the Random Antiterrorism Measures
Program mitigated such issues. The report specifically cited the use of access restriction
such as “customer isolation through VLANs and containers and intrusion detection/
prevention” (Montana et al. 2011, p. 15). Having some idea of the value of your data to
a hacker is important. Most of the malicious hacking is geared toward either disrupting
something or making money for the hacker. Odds are the people hacking out there on the
Internet have no interest in Farmer Joe’s cornfield where you flew last week. Industrial
infrastructure, such as power lines, power plants, cell phone towers, oil fields, refineries,
etc., have a national security value and that data should be secured. Any contract you sign
should specify how the data would be secured.
4.7 Applications
There are many applications to which UAS remotely sensed data can be put. The usability
of the data is highly dependent on the airframe, and on how the sensors are configured. It
86
is generally true that anything that is built is designed for a primary purpose, and if it is
used for some other purpose, it does not work as well as was intended. This seems to be
doubly true for small UAS, which are more often than not sensors with wings as much as
they are aircraft. In designing and/or using a UAS, it is imperative to keep in mind what it
is meant to do, and why it is flying. This will make operations and data processing much
easier.
What follows is an overview of UAS applications, largely derived from academic research
and the writer’s personal experience. It is not all-inclusive, nor is it meant to be.
As a trend, what we are seeing from UAS remote sensing is an expansion of the discip-
line into new niches, rather than a radical change in the capability of the technology. This
means, as a rule, if you think an operation can be done conventionally, odds are there is a
way to collect your remote sensing data with a UAS. The only remaining question is, given
current technology and regulations, is it economical?
FIGURE 4.5
TASE 500 Gimbal with VIS, MWIR, and LWIR cameras. (CloudCap 2015.)
FIGURE 4.6
TASE 400 Gimbal with VIS, LWIR, and slot for laser range finder on an Aerosonde. (Keller 2011.)
87
FIGURE 4.7
Small UAS Gimbal. (Staff 2012.)
FIGURE 4.8
Entry-level quad copter with gimbal. (Staff 2015c.)
the teams (Rohde, 2018). Several attempts have been made to integrate sensing systems
beyond the initial ISR applications (Choi and Lee 2011), but few have come into wide-
spread use. It is expected that the results will improve rapidly as the community finds the
best ways to utilize the platform and sensing systems for SaR.
Disaster response is about determining the current situation after some catastrophic
event and communicating it to supporting teams to improve responses initially, then shifts
to smaller area specific tasks like evaluating the conditions of an infrastructure or indi-
vidual houses. This is a rapidly changing field, with applications for small-and mid-sized
drone systems depending on what event is being responded to. The area assessment tasks
on small-scale events like tornados lend themselves to small platforms, while larger events
like hurricanes and fires are often covered by larger drones (Mahoney 2016). After the
assessment phase is over and detailed inspection commences, small-scale platforms are
used, as detailed in the other sections of this chapter.
FIGURE 4.9
Monopole light.
using an SFM software package. The model is used to perform an overall assessment and
find detailed areas to investigate, using the raw imagery tied to the 3D model. Most SFM
packages allow you to click on a spot in the model and then quickly find that location in
the collected imagery. This allows for analysis of native resolution in the spatial context of
the model (see Figure 4.9).
( NIR − Re d)
NDVI = (4.1)
( NIR + Re d)
90
GNDVI equation:
( NIR − Green)
GNDVI = (4.2)
( NIR + Green)
Once created, the VI maps can be analyzed and used to develop a variety of data
products. The NDVI and GNDVI are health analogs. As such they can be used to inform
many types of analyses such as prescription maps for fertilizing and seeding crops, as well
as crop yield estimates, so that farmers can maximize their profits (Ladd 2007, Prasad et al.
2006). In forestry, they are used for, among other things, change detection and biomass esti-
mation (Vogelmann 1990, Spruce et al. 2011, Sader and Winne 1992).
FIGURE 4.10
Multi-spectral images of the Monteboro vineyard (left) false color image at 5 cm of spatial (Primicerio
et al. 2012).
FIGURE 4.11
CIR image made from bands NIR, green, and blue (Hunt et al. 2010).
92
FIGURE 4.12
GNDVI Ccreated from NIR, green, and blue image (Hunt et al. 2010).
a few (Sadler et al. 2000). It seems only logical that UAS will feed data into the PA systems
to help inform the predictive models, and this has been a matter of academic study for
some time (Ladd et al. 2006, Nagchaudhuri et al. 2006), but the large-scale adoption prob-
ably will not happen until the major agricultural equipment manufactures start making
turnkey systems that incorporate data from multiple sources. Even then, odds are there will
be a human in the loop for some time to adjust and modify the model recommendations,
as many agronomists do now.
The AUVSI report (Jenkins and Vasigh 2013) projects, from the proliferation of com-
panies targeting this market sector, and the wide range of applications across almost all
vegetation types (Barnes 1996, Pinter et al. 2003, Sullivan 2005, Lehmann et al. 2015) that
this industry will rapidly move toward the automation that enables widespread UAS use
beyond the university.
FIGURE 4.13
Decreasing point density affects tree height measurements. Point density changes from 70 points per meter for a
to 10 points per meter in (c). (L. O. Wallace 2012.)
4.8 Conclusions
UAS sensing as a subset of airborne remote sensing is still in its adolescence. The range of
choices of operational airframes is so large (see Figure 4.1) that on the large end of the spec-
trum, the technology used in manned aircraft can be directly integrated into unmanned
airframes, while on the smallest end, systems can carry only the smallest of sensors. The
large airframes can carry a payload nearly to the edge of space, while the smallest scale
quadcopters fly out of range after a few hundred yards.
Advances in manufacturing processes have allowed for miniaturization of sensors
and alternate methods for making measurements. Microelectricalmechanical systems
(MEMS) technology has enabled the smaller, higher resolution microbolometer arrays.
95
Discussion Questions
4.1 Does the following definition apply to LiDAR, SAR, both, or neither? Please
explain your reasoning. “An instrument capable of measuring distance and
direction to an object by emitting timed pulses of electromagnetic energy in a
measured direction and converting to equivalent distance the measured interval
of time between when a pulse was emitted and when the echo was received.”
4.2 Unmanned or manned, the aircraft has proven its viability as a platform for
remote sensing time and time again. Given the myriad issues one faces when
attempting to utilize unmanned aircraft in non-segregated airspace, discuss
reasons why a research team would choose an unmanned aircraft platform over
its manned counterpart?
4.3 When an agronomist evaluates images of a particular section of land (one square
mile), noting the reflectance of a particular wavelength of EM can yield a measure
of emergence of a desired crop. Explain how just using the percent presence of
reflected EM might lead to errors in an accurate percentage of emergence of a
desired crop.
4.4 Near Infrared and Infrared EM are both outside the visible band of the EM spec-
trum. Though they sound similar in name, they are very different with respect to
96
the nature of the data they collect. Discuss how they are both similar and different
while differentiating between the useful natures of the collected data of each.
4.5 Emissivity is the measure of the amount of long-wave radiation given off by a
particular material at a specific temperature. How might an object’s emissivity
make it more difficult to see even if it is hot?
4.6 In order for radar systems to distinguish between two objects in close prox-
imity to each other, the wavelength of the transmitted signal needs to be rela-
tively short. SAR, however, can use very long wavelengths and get remarkable
“photolike” images. In simple terms, try to explain how this capability of SAR
might be possible.
4.7 Still imagery and video—both are common forms of data collection used on
small unmanned aircraft. Compare and contrast both collection methodologies
and describe situations where each might be more appropriate than the other.
4.8 A gimbal camera mount usually allows a camera to be moved in the vertical dir-
ection while stabilizers maintain the camera level with the ground. Explain why
it might not be necessary to provide a pan function on a gimbal mount when
affixed to a quadrotor.
4.9 Prior to the use of unmanned aircraft to gather aerial imagery, satellite imagery
was used by agronomists to help determine plant health. What might some of
the benefits be in using unmanned aircraft systems to gather this imagery versus
satellites?
4.10 Explain the surface-level differences between the “multi-frame mosaic” systems
and the “pushbroom” systems concentrating which type of system is most likely
to be found on small UAS and why.
Bibliography
Anderson, John D. 2001. Fundamentals of Aerodynamics, 3rd ed. Boston: McGraw Hill.
ASCE, ACSM, and ASPRS. 1994. Glossary of the Mapping Sciences. Edited by Stephen R. DeLoach.
Bethesda, MD: American Society for Photogrammetry and Remote Sensing; American Congress
on Surveying and Mapping; American Society of Civil Engineers.
Atomics, General. 2015. Lynx Multi- Mode Radar. Poway, CA: General Atomics Aeronautical
Systems, Inc.
Barnes. 1996. “Remote Sensing and Precision Agriculture.”
Bendig, Juliane, Andreas Bolten, and G. Bareth. 2012. “Introducing a low-cost mini-UAV for thermal-
and multispectral-imaging.” International Archives of the Photogrammetry, Remote Sensing and
Spatial Information Sciences 39:345–349.
Bodeen, Christopher. 2014. “Volunteers step up in China’s response to quake.” Associated Press
Accessed 4/15/15. https://news.yahoo.com/volunteers-step-chinas-response-quake-125026
145.html.
Calderón, R., Juan Antonio Navas- Cortés, C. Lucena, and Pablo J. Zarco- Tejada. 2013. “High-
resolution airborne hyperspectral and thermal imagery for early detection of Verticillium wilt
of olive using fluorescence, temperature and narrow-band spectral indices.” Remote Sensing of
Environment 139:231–245.
Chaerle, Laury, Dik Hagenbeek, Erik De Bruyne, Roland Valcke, and Dominique Van Der Straeten.
2004. “Thermal and chlorophyll-fluorescence imaging distinguish plant-pathogen interactions
at an early stage.” Plant and Cell Physiology 45(7):887–896.
97
Choi, Kyoungah, and Impyeong Lee. 2011. “A UAV-based close-range rapid aerial monitoring
system for emergency responses.” International Archives of the Photogrammetry, Remote Sensing
and Spatial Information Sciences 38:247–252.
CloudCap. 2015. “TASE 500 Gimbal.” www.cloudcaptech.com/gimbal_tase500.htm.
Dubayah, Ralph O., and Jason B. Drake. 2000. “Lidar remote sensing for forestry.” Journal of Forestry
98(6):44–46.
Dukowitz, Zacc. 2019. “Drones in Search and Rescue: 5 Stories Showcasing Ways Search and
Rescue Uses Drones to Save Lives.” UAV Coach Accessed 3/1/20. https://uavcoach.com/
search-and-rescue-drones/
ESRI. 2015. “Planimetric.” ESRI Accessed 4/22/15. http://support.esri.com/en/knowledgebase/
GISDictionary/term/planimetric%20map.
ENNA, Black Channel, and DJI Enterprise. 2018. “Drone Efficacy StudyEvaluating the Impact of
Drones for Locating Lost Persons in Search and Rescue Events.” Accessed on 2/28/20. https://
eena.org/document/eena-dji-programme-drone-efficacy-study/
Exelis. 2015. “Basic Hyperspectral Analysis Tutorial.” Accessed 4/7/15. www.exelisvis.com/docs/
HyperspectralAnalysisTutorial.html.
Fischer, Robert L., Brian G. Kennedy, Mitchell Jones, Jeffrey Walker, Darian Muresan, Gregory Baxter,
Mark Flood, Brian Follmer, Xiuhong Sun, and William Chen. 2008. “Development, integration,
testing, and evaluation of the US Army Buckeye System to the NAVAIR Arrow UAV.” SPIE
Defense and Security Symposium.
Gelbart, Asher, Brian C. Redman, Robert S. Light, Coreen A. Schwartzlow, and Andrew J. Griffis.
2002. “Flash LiDAR based on multiple-slit streak tube imaging LiDAR VII.” Proceedings of SPIE
4723, Laser Radar Technology and Applications.
Grenzdörffer, G.J., A. Engel, and B. Teichert. 2008. “The photogrammetric potential of low-cost UAVs
in forestry and agriculture.” The International Archives of the Photogrammetry, Remote Sensing and
Spatial Information Sciences 31(B3):1207–1214.
Griffiths, Sarah. 2013. “Drone Survival Guide.” Daily Mail, 12/24/2013. www.dailymail.co.uk/
sciencetech/article-2528902/21st-century-bird-watching-Drone-guide-lets-sky-gazers-spot-
flying-military-robots-silhouettes.html.
Higgins, Sean. 2017. “The Future of Aerial LiDAR What You Need to Know about Geiger-Mode and
Single-Photon LiDAR.” International LiDAR Mapping Forum Accessed 3/1/20. https://ilmf-
static.s3.amazonaws.com/uploads/2017/01/Free-Report-Future-of-LiDAR-2017.pdf
Hruska, Ryan, Jessica Mitchell, Matthew Anderson, and Nancy F. Glenn. 2012. “Radiometric and
geometric analysis of hyperspectral imagery acquired from an unmanned aerial vehicle.”
Remote Sensing 4(12):2736–2752. doi: 10.3390/rs4092736.
Hugenholtz, Chris H., Ken Whitehead, Owen W. Brown, Thomas E. Barchyn, Brian J. Moorman,
Adam LeClair, Kevin Riddell, and Tayler Hamilton. 2013. “Geomorphological mapping with
a small unmanned aircraft system (sUAS): feature detection and accuracy assessment of a
photogrammetrically-derived digital terrain model.” Geomorphology 194:16–24.
Hunt, E. Raymond, W. Dean Hively, Stephen J. Fujikawa, David S. Linden, Craig S.T. Daughtry, and
Greg W. McCarty. 2010. “Acquisition of NIR-green-blue digital photographs from unmanned
aircraft for crop monitoring.” Remote Sensing 2(1):290–305.
Jackson, C.R., and J.R. Apel. 2004. Synthetic Aperture Radar Marine User’s Manual. Washinton,
DC: National Oceanic and Atmospheric Administration, U.S. Department of Commerce.
Jang, Gab-Sue, Kenneth A. Sudduth, Suk Young Hong, Newell R. Kitchen, and Harlan L. Palm. 2006.
“Relating hyperspectral image bands and vegetation indices to corn and soybean yield.” Korean
Journal of Remote Sensing 22(3):153–197.
Jenkins, Darryl, and Bijan Vasigh. 2013. The Economic Impact of Unmanned Aircraft Systems Integration
in the United States. Arlington: Association for Unmanned Vehicle Systems International
(AUVSI).
Keller, John. 2011. “Stabilized camera gimbal for day and night surveillance for UAVs introduced by
Goodrich Cloud Cap Technology.” Military & Aerospace Electronics, October 19, 2011.
98
Ladd, Gabriel B. 2007. “Assessing soil pH impacts on corn yield through aerial imaging and ground
measurements.” Master of Science Research, Marine Estuarine Environmental Sciences
Graduate Program, University Of Maryland, Eastern Shore Campus.
Ladd, Gabriel B., Abhijit Nagchaudhuri, Tracy J. Earl, Madhumi Mitra, and Geoffrey L. Bland. 2006.
“Rectification, georeferencing, and mosaicking of images acquired with remotely operated
aerial platforms.” Proceedings of the American Society for Photogrammetry and Remote Sensing
Annual Conference (ASPRS).
Ladd, Gabriel, Geoffery Bland, Mathew Fladeland, Ted Miles, Jim Yungel, and Matt Linkswiler.
2011. “Microspectrometer instrument suite results from NASA SIERRA flights in July 2009.”
Milwaukee 2011 ASPRS Annual Conference, Milwaukee.
Laliberte, A.S., Albert Rango, J.E. Herrick, Ed L. Fredrickson, and Laura Burkett. 2007. “An object-
based image analysis approach for determining fractional cover of senescent and green vegeta-
tion with digital plot photography.” Journal of Arid Environments 69(1):1–14.
Landgrebe, David. 2002. “Hyperspectral image data analysis as a high dimensional signal processing
problem.” IEEE Signal Processing Magazine 19(1):17–28.
Lehmann, Jan Rudolf Karl, Felix Nieberding, Torsten Prinz, and Christian Knoth. 2015. “Analysis
of unmanned aerial system-based CIR images in forestry—A new perspective to monitor pest
infestation levels.” Forests 6(3):594–612.
Liu, Lingyun, Ioannis Stamos, Gene Yu, George Wolberg, and Siavash Zokai. 2006. “Multiview geom-
etry for texture mapping 2d images onto 3d range data.” 2006 IEEE Computer Society Conference
on Computer Vision and Pattern Recognition.
Mahoney, Brian. 2016. “American Aerospace Completes 1st- ever Drone-Based Hurricane
Response Exercise” American Aerospace Techonlogie Inc. Accessed on 2/ 10/
20. https://
americanaerospacenews.wordpress.com/ 2 016/ 1 0/ 1 7/ a merican- a erospace- c ompletes-
1st-ever-drone-based-hurricane-response-exercise/
McGlone, J. Chris, Edward M. Mikhail, James S. Bethel, Roy Mullen, and American Society for
Photogrammetry and Remote Sensing. 2004. Manual of Photogrammetry. 5th ed. Bethesda,
MD: American Society for Photogrammetry and Remote Sensing.
Microsystems, Barnard. 2015. “Synthetic Aperture RADAR.” Barnard Microsystems Accessed 3/30/
15. www.barnardmicrosystems.com/UAV/features/synthetic_aperture_radar.html.
Mitchell, Jessica J., Nancy F. Glenn, Matthew O. Anderson, Ryan C. Hruska, Anne Halford, Charlie
Baun, and Nick Nydegger. 2012. Unmanned Aerial Vehicle (UAV) Hyperspectral Remote Sensing
for Dryland Vegetation Monitoring. Washington, DC: US Department of Energy, Idaho National
Laboratory.
Moges, S.M., W.R. Raun, R.W. Mullen, K.W. Freeman, G.V. Johnson, and J.B. Solie. 2005. “Evaluation
of green, red, and near infrared bands for predicting winter wheat biomass, nitrogen uptake,
and final grain yield.” Journal of Plant Nutrition 27(8):1431–1441.
Montana, Oregon, Utah, and Colorado. 2011. “Multi-State GIS Cloud Services Assessment Team
RFI Response Assessment, Business Case & Recommendation” Montana State Government
Accessed on 2/28/2020. www.mngeo.state.mn.us/councils/stategovt/GIS_Cloud_BC_Rec.pdf
Nagchaudhuri, A., M. Mitra, C. Brooks, T.J. Earl, G. Ladd, and G. Bland. 2005. “Initiating environ-
mentally conscious precision agriculture at UMES.” Proceedings of 2005 Annual Conference of
American Society of Engineering Education, Portland Oregon.
Nagchaudhuri, A., M. Mitra, C. Brooks, T.J. Earl, G. Ladd, and G. Bland. 2006. “Integration of mecha-
tronics, geospatial information technology, and, remote sensing in agriculture and environ-
mental stewardship.” 2006 ASME International Mechanical Engineering Congress and Exposition,
Chicago, IL, USA, November 5–10.
Pinter, Paul J., Jerry L. Hatfield, James S. Schepers, Edward M. Barnes, M. Susan Moran, Craig S.
Daughtry, and Dan R. Upchurch. 2003. “Remote sensing for crop management.” Photogrammetric
Engineering & Remote Sensing 69(6):647–664.
Popescu, Sorin C., Randolph H. Wynne, and Ross F. Nelson. 2003. “Measuring individual tree crown
diameter with lidar and assessing its influence on estimating forest volume and biomass.”
Canadian Journal of Remote Sensing 29(5):564–577.
99
Prasad, Anup K., Lim Chai, Ramesh P. Singh, and Menas Kafatos. 2006. “Crop yield estimation
model for Iowa using remote sensing and surface parameters.” International Journal of Applied
Earth Observation and Geoinformation 8(1):26–33.
Primicerio, Jacopo, Salvatore Filippo Di Gennaro, Edoardo Fiorillo, Lorenzo Genesio, Emanuele
Lugato, Alessandro Matese, and Francesco Primo Vaccari. 2012. “A flexible unmanned aerial
vehicle for precision agriculture.” Precision Agriculture 13(4):517–523.
Regal. 2015. “RIEGL VUX-1UAV Specifications.” www.riegl.com/products/uasuav-scanning/riegl-
vux-1uav/.
Resonon. 2015. “Hyperspectral Imaging Cameras.” www.resonon.com/data-sheets/Resonon
HyperspectralCameras.Datasheet.pdf.
Rhode, Steve. 2018 “Drone search- and-rescue study reveals potential, limits.” AOPA Accessed
on 2/25/2020. www.aopa.org/news-and-media/all-news/2018/october/01/drone-study-
reveals-potential-and-limits
Rikola. 2015. “Snapshot Hyperspectral Camera is Airborne”. Accessed on 10/20/2020. www.rikola.
fi/Hyperspectral_camera.pdf.
Rogalski, Antoni. 2002. “Infrared detectors: An overview.” Infrared Physics & Technology 43:187–210.
Sader, S.A., and J.C. Winne. 1992. “RGB-NDVI colour composites for visualizing forest change
dynamics.” International Journal of Remote Sensing 13(16):3055–3067.
Sadler, E.J., B.K. Gerwig, D.E. Evans, W.J. Busscher, and P.J. Bauer. 2000. “Site-specific modeling of
corn yield in the SE coastal plain.” Agricultural Systems 64(3):189–207.
Schowengerdt, Robert A. 2007. Remote Sensing: Models and Methods for Image Processing, 3rd ed.
Amsterdam: Academic Press Publications.
Spruce, Joseph P., Steven Sader, Robert E. Ryan, James Smoot, Philip Kuper, Kenton Ross, Donald
Prados, Jeffrey Russell, Gerald Gasser, and Rodney McKellip. 2011. “Assessment of MODIS
NDVI time series data products for detecting forest defoliation by gypsy moth outbreaks.”
Remote Sensing of Environment 115(2):427–437.
Staff. 2012. “New sensor payload for Raven UAV unveiled.” Unmanned Ground, Aerial, Sea and Space
Systems.
Staff. 2015a. Camera. In Merriam Websters Online Dictionary. www.merriam-webster.com/dictionary/
camera: Merriam-Webster.
Staff. 2015b. In Situ. In Merriam Websters Online Dictionary. www.merriam-webster.com/dictionary/
in%20situ: Merriam-Webster.
Staff. 2015c. “IRIS+.” 3D Robotics Accessed 4/22/15. https://store.3drobotics.com/products/IRIS.
Stark, R., A.A. Gitelson, U. Grits, D. Rundquist, and Y. Kaufman. 2000. “New technique for remote
estimation of vegetation fraction: principles, algorithms, and validation.” Aspects of Applied
Biology 60:241–247.
Sullivan, John. 2005. “Small UAV’s for agricultural applications.” Unmanned Science: The Science
Behind Unmanned Systems.
Velodyne. 2019. “Puck Lite Data Sheet”. Accessed on 10/20/2020. https://velodynelidar.com/
products/puck-lite/.
Vogelmann, J.E. 1990. “Comparison between two vegetation indices for measuring different types of
forest damage in the north-eastern United States.” Remote Sensing 11(12):2281–2297.
Vygodskaya, N.N., I.I. Gorshkova, and Ye V. Fadeyava. 1989. “Theoretical estimates of sensitivity in
some vegetation indices to variation in the canopy conditions.” International Journal of Remote
Sensing 10:1857–1872.
Wallace, L.O., A. Lucieer, and C.S. Watson. 2012. “Assessing the feasibility of UAV-BASED LiDAR
for high resolution forest change detection.” International Archives of the Photogrammetry, Remote
Sensing and Spatial Information Sciences, Melbourne, Australia.
Wallace, Luke, Arko Lucieer, and Christopher S. Watson. 2014. “Evaluating tree detection and seg-
mentation routines on very high resolution UAV LiDAR Data.” IEEE Transactions on Geoscience
and Remote Sensing 52(12):7.
Wehr, Aloysius, and Uwe Lohr. 1999. “Airborne laser scanning—An introduction and overview.”
ISPRS Journal of Photogrammetry & Remote Sensing 54:68--82.
100
Westoby, M.J., J. Brasinton, N.F. Glasser, M.J. Hambrey, and J.M. Reynolds. 2012 “ ‘Structure-from-
motion’ photogrammetry: A low-cost, effective tool for geoscience applications.” Geomorphology
179:300–314.
Wolf, Paul R., and Bon A. Dewitt. 2000. Elements of Photogrammetry: With Applications in GIS. Vol.
1. Boston: McGraw Hill.
Zarco-Tejada, Pablo J., R. Diaz-Varela, V. Angileri, and P. Loudjani. 2014. “Tree height quantification
using very high resolution imagery acquired from an unmanned aerial vehicle (UAV) and auto-
matic 3D photo-reconstruction methods.” European Journal of Agronomy 55:89–99.
Zhang, Chunhua, and John M. Kovacs. 2012. “The application of small unmanned aerial systems for
precision agriculture: A review.” Precision Agriculture 13(6):693–712.
Other Sources
Chimpanu, Catalin. 2018. “AWS rolls out new security feature to prevent accidental S3 data
leaks” ZDNet Accessed 9/16/19. www.zdnet.com/article/aws-rolls-out-new-security-
feature-to-prevent-accidental-s3-data-leaks/
iRevolution. 2014. “Humanitarian UAV Missions During Balkan Floods.” irevolution.net Accessed
4/15/15. http://irevolution.net/2014/07/07/humanitarian-uav-missions-during-balkan-
floods/.
Mortimer, Gary. 2014. “sUAS News has 9840 followers on Twitter Gene Robinson of RP Search Services
Wins First Annual Spectra Award at SUSB Expo.” sUAS News, 5/12/14. www.suasnews.com/
2014/05/29116/gene-robinson-of-rp-search-services-wins-first-annual-spectra-award-at-susb-
expo/.
newgenprepdf
101
5
UAS Regulations, Standards, and Guidance
Douglas M. Marshall
5.1 Introduction
This chapter discusses the developing system of laws, regulations, standards, and guidance
that has evolved since the introduction of unmanned aircraft systems (UASs) in the United
States and elsewhere around the world. Starting with the creation of the International
Civil Aviation Organization (ICAO) at the Chicago Convention of 1944, and stimulated by
technological advances that were, until recently, largely the result of efforts by government
military organizations, developers of affordable and user-friendly unmanned systems have
put unprecedented pressure on National Civil Aviation Authorities (CAAs) to respond to
the onslaught of small UAS (sUAS) consumers and to take measures to protect the public
from reckless and irresponsible uses of those systems. All 193 Member States of ICAO have
developed aviation regulations to manage manned aviation activities in their respective
sovereign airspaces, while honoring their commitments to ICAO to avoid creating rules
that are in conflict with ICAOs Standards and Recommended Practices (SARPs). This
chapter introduces the reader to the history and structure of the aviation regulatory system
in the United States, the methods by which the Federal Aviation Administration (FAA)
makes and enforces those rules, followed by a discussion of community-based standards
and the standards development process, and then pivots to the international arena with
an analysis of international rulemaking and standards making bodies, focusing on a
101
102
selection of representative countries and how they have dealt with the introduction of UAS
or Remotely Piloted Aircraft Systems (RPAS) into their territories. Lastly, a look into the
future is offered with commentary on where these regulatory efforts are going or should be
going, with a word of encouragement to those wishing to enter this dynamic and exciting
field of aviation technology. At the risk of creating confusion, the terms “UAS,” “sUAS,”
“UAV,” “UA,” “RPAS,” and “drones” are used interchangeably throughout the chapter,
as different nations and regulatory bodies prefer different terminology. They all basically
mean the same thing: a small unmanned aircraft, a UAS, or a remotely piloted aircraft
(RPA). These terms necessarily include the support systems that enable the aircraft to fly
without a pilot on board.
publication of a final rule. A five to seven year journey to create a new or amended rule
in aviation is therefore not unusual. Emergency rules can be implemented in a few days
or weeks, as circumstances warrant. Similar processes are found in other countries, to be
discussed in Section 5.7. Some proposed rules can take significantly less time if they are not
controversial and do not generate many adverse comments from the public. Why is this
process apparently so cumbersome? The short answer is found in the U.S. Constitution
and its Amendments, and a more comprehensive treatment is beyond the scope of this
discussion, but essentially, Americans are guaranteed participation in all aspects of gov-
ernment, and have a fundamental right to have their voices heard when it comes to laws,
rules, and regulations that may affect them. For example, as this chapter was being revised
and updated for the Third Edition, the FAA published a draft new rule for Remote ID
describing the framework for identifying ssUAS and model aircraft in flight by requiring
them to transmit a serial number or alphanumeric code and position data to ground
surveillance systems via the Internet. Different equipment requirements are proposed,
depending upon the type and use of the sUAS. When the comment period closed, the draft
rule had provoked over 45,000 comments. Under the rules set forth in the APA, all of these
comments must be adjudicated and resolved, which is a complex and lengthy process.6
The introduction of a new technology or procedure into the National Airspace System
(NAS) requires a comprehensive safety analysis before the FAA can allow the change.
The safety analysis includes a review of the relevant regulation and supporting ACs or
Special Federal Aviation Regulations (SFARs) to determine whether the proposed tech-
nology or procedure can comply with current regulation. The FAA may grant exceptions
in particular cases after performing the safety review as a way to manage unique, perhaps
nonrecurring circumstances, or when the event that led to the review is determined to be
unlikely to recur.
These circumstances may lead to the rulemaking process described above, which
provides the mechanism for the FAA to fulfill its statutory mandate to ensure the safety
of the aviation environment. The rest of this chapter examines the history of domestic
U.S. and international aviation regulations; the structure of those statutes and regulations;
the purpose and intent of the rules; how rules are made, changed, and enforced; the
differences between rules and standards; how this system affects the development of UAS
technologies and operations; examines how other countries and international regulatory
bodies promulgate rules and regulations; and concludes with a look into the future of UAS
regulations.
itself, it must largely depend upon voluntary compliance with the regulatory standards.
The Fifth and Fourteenth Amendments to the U.S. Constitution require that the FAA
enforcement process provides “due process” in the procedures for ensuring compliance
with the regulations. This means that no one shall be deprived of “life, liberty, or property
without due process of law.”37 Thus, the FAA may not act arbitrarily or inconsistently in its
efforts to enforce the regulations.
The enforcement process established by the FAA is designed to be fair, reasonable, and
perceived to be fair by those who are subject to the regulations. It is a complex process that
provides a number of decision points that allow the FAA and the party being investigated
to arrive at an informal resolution rather than taking the matter to a fully litigated trial. The
FAA’s national policy is compliance before enforcement.38 The range of possible outcomes
progresses in severity from an administrative action being abandoned by the FAA after it
investigates an alleged violation, to a formal charge and trial, an outcome, and an appeal
to the U.S. Court of Appeals or even to the U.S. Supreme Court (a rare event indeed). Trials
are conducted like any other civil trial (but without a jury), and the FAA generally has the
burden of proof in establishing a violation. Short of a civil penalty or certificate revoca-
tion or suspension, the FAA may issue warning letters or letters of correction, which are
intended to bring the alleged offender into compliance with the regulations for violations
that are not deemed sufficiently serious to warrant more severe sanctions. A constructive
attitude of cooperation by the certificate holder often goes a long way toward resolving
inadvertent or nonflagrant violations by first-time offenders. Civil penalties of up to $50,000
per violation are possible in cases where there is no certificate to suspend or revoke, where
revocation would impose an undue hardship, where qualification is not at issue, or where
the violation is too serious to be handled administratively by use of remedial action. It is
important to remember that the lack of a Part 107 Remote Pilot’s certificate or other FAA-
issued airman’s certificate does not immunize a person or entity from an FAA enforcement
action backed up by imposition of a civil penalty. Civil penalties can be assessed against
someone who merely interferes with a flight or flight crew or otherwise violates FARs. The
offender does not have to be in control of an aircraft or aviation facility to be subject to a
civil penalty.
The U.S. Congress upped the enforcement ante with the passage of the FAA
Reauthorization Act of 2018,39 in “§ 39B. Unsafe Operation of Unmanned Aircraft.” The Act
amends Chapter 2, Title 18 of the United States Code to define certain offenses involving
the unsafe operation of unmanned aircraft in close proximity to other manned aircraft and
airports, and proscribes severe penalties for violations of those restrictions by imposing
substantial fines and imprisonment for a term of up to 10 years for some violations or
for life for actions causing serious bodily injury or death or conspiring to commit such
offenses.
The FAA thus has two issues to face with respect to its enforcement authority over UAS
operations. First, it must determine what it can regulate, and, second, it must decide what
it will regulate. The answer to the second challenge largely depends upon the resolution
of the first.
The FAA issues six types of regulations: mandatory, prohibitive, conditionally manda-
tory, conditionally prohibitive, authority or responsibility, and definition/explanation.41
Mandatory and prohibitive regulations are enforceable. The other four types represent
exceptions or conditions. A thorough analysis of the applicability of a regulation to a par-
ticular situation will include answering the following questions: (1) To whom does the
regulation apply? (2) What does it say in its entirety? (3) Where must the regulation be
complied with? (4) When must it be accomplished? (5) How does it apply to the situation
in question? and (6) Are there are any special conditions, exceptions, or exclusions?42
Since unmanned aircraft are now defined by statute as “aircraft,” and there is no excep-
tion found elsewhere in the regulations that excludes UASs from the definition (recre-
ational or hobby aircraft are now included in the definition, but may be exempt from some
regulatory requirements),43 the most current statutory interpretation holds that the FAA
has full regulatory authority over all aircraft that are capable of and do fly in the national,
navigable airspace. “Navigable airspace means airspace at and above the minimum flight
altitudes prescribed by or under this chapter, including airspace needed for safe take-off
and landing.”44 Minimum safe altitudes are prescribed at 1,000 feet above the ground in a
congested area, with a lateral separation from objects of 2,000 feet, and an altitude of 500
feet above the surface, except over open water or sparsely populated areas. In those cases,
the aircraft may not be operated closer than 500 feet to any person, vessel, vehicle, or struc-
ture.45 The exception is when it is necessary for takeoff or landing, in which case the navig-
able airspace goes to the surface (and along a designated approach path or airport landing
pattern).46 The 400-foot AGL altitude limit for model aircraft contained in the original AC
91-57 was probably an observance of the 500-foot minimum safe altitude for manned air-
craft operating anywhere except in Class G (uncontrolled) airspace,47 providing a 100-foot
“buffer,” in addition to the recommendation to not operate within close proximity to an
airport. The actual FAA policy history of AC 91-57 is not available for confirmation, but the
foregoing is the commonly held belief of FAA officials and individuals familiar with the
history of model aviation.48
The vast majority of the FARs are intended to provide for safe operations of aircraft that
carry people, both for the protection of the crew and passengers, and for people and prop-
erty on the ground. Although unmanned aircraft have been on the aviation scene for over
90 years, there is no evidence in any of the preambles to regulations or other historical
documents currently available for review that the authors of any regulation before about
2005 contemplated application of a specific regulation to unmanned, remotely piloted air-
craft. Moored balloons and kites,49 unmanned rockets,50 and unmanned free balloons,51
categories of objects or vehicles that are intended to occupy a place in the airspace and are
unmanned, are specifically covered by existing regulations, but there was nothing similar
for other types of unmanned aircraft.
The FAA has long maintained that it has enforcement authority under existing airspace
regulations 14 CFR §§ 91.111 and 91.113, which require that an operator of an aircraft be
able to safely operate near other aircraft and observe the right-of-way rules, but the more
difficult issue is whether such aircraft must meet certification requirements for the systems
and the qualification standards, with appropriate certificates, for pilots, sensor operators,
mechanics, maintenance personnel, designers, and manufacturers.
108
As of the publication of the First Edition of this book, there had been no formal
legal challenges to the FAA’s enforcement authority over unmanned aircraft and their
operations. Government contractors, Customs and Border Protection, the U.S. military
establishment, and other public aircraft operators had, for the most part, followed the
guidelines of AFS-400 UAS Policy 05-01, Interim Operational Approval Guidance 08-01
and AC 91-57. Likewise, there was no anecdotal evidence that the FAA had initiated any
enforcement activity against anyone who was, or was perceived to be, operating a UAS
outside of these guidelines. Until a robust set of regulations that specifically addressed
the unique characteristics of unmanned aircraft was implemented, there was always the
chance that someone would operate a commercial UAS in such an open and notorious
manner that the FAA would be compelled to respond with more than a friendly warning
letter or telephone call.
The FAA’s public position on this issue, as evidenced by the February 13, 2007, policy
statement published in the Federal Register, was that any unmanned aircraft to be operated
in the national airspace, with the exception of radio-controlled models, must comply with
the requirements for a Certificate of Authorization or Waiver (COA) if a public aircraft, or
for a special airworthiness certificate if a civil aircraft. Thus, the agency had consistently
answered the second question (what it will regulate) with a broad statement of policy that
it had the responsible authority over all of the national airspace and aviation activities
therein.
The next question, until the federal statutory responses changed things beginning in
2012, was even if the FAA exercises its declared authority over airspace and aviation and
attempts enforcement against an operator of a “small” (model size) UAS who is using the
system for some arguably commercial purpose, without an airworthiness certificate or a
licensed pilot in control, just what regulation would be enforced, and what sanction would
be appropriate to deter further violations?
There were many entrepreneurs and developers around the world whose presence and
activities in the civil small UAS market (the UASs were small, the market was not) were
putting pressure on the FAA to take the lead in UAS rulemaking. If a farmer or other com-
mercial agriculture concern were to acquire a small system and fly it over fields in what
could be characterized as “sparsely populated” areas, at an altitude where possible con-
flict with manned aircraft could occur, was there in place a regulatory mechanism to stop
this activity? Or, if a commercial photographer was to operate an ssUAS equipped with a
camera over a similar area for the purpose of photographing the land for advertising or
some similar purpose, could the FAA prevent the operation? Congress answered those
questions and mandated a regulatory response with the enactment of Public Law 112–95,
FMRA of 2012, as discussed above.
The issue for the FAA in the foregoing scenarios, and many others too numerous to name
that have since evolved, is identifying the tools in the FAA’s toolbox to allow enforcement
of any regulations the agency may deem enforceable. The vast majority of these unmanned
systems still do not have airworthiness certificates, which are required for nearly all
manned aircraft (with some exceptions). The FAA’s central mission is to promote compli-
ance with safety standards.52 FAA Order 2150.3C acknowledges that civil aviation depends
primarily upon voluntary compliance with regulatory requirements, and only when those
efforts have failed should the agency take formal enforcement action.
A certificate holder cannot be deprived of “property” (the certificate) without due pro-
cess.53 Congress has given the FAA authority to not only make the rules54 but also to enforce
them through a number of methods, including issuance of “an order amending, modi-
fying, suspending, or revoking” a pilot’s certificate if the public interest so requires.55 Any
109
other certificate issued by the FAA can be “amended, modified, suspended or revoked” in
the same manner. The problem with the aforementioned scenarios is that the “pilot” in all
likelihood would not have been an FAA-certificated pilot, because that was not required
for such operations, and the aircraft and its systems would not be certified as airworthy,
again because it was not required. As long as the operator/pilot did not interfere with the
safe operation of a manned aircraft or otherwise enter a controlled airspace (such as in an
airport environment) without permission, there arguably may not have been a violation of
any then existing regulation.
Taking the scenario a step further, if the pilot/operator inadvertently allowed the UAS to
come close enough to a manned aircraft to force the latter into an evasive maneuver (not an
unlikely event even in a sparsely populated agricultural region), a possible violation of 14
CFR §91.111 (Operating Near Other Aircraft) could ensue. In this situation, the FAA has no
certificate to revoke, and thus no statutory or regulatory authority to proceed with a formal
enforcement proceeding pursuant to 49 U.S.C. §44709(b).
This left one other mechanism: the civil penalty the administrator may impose against
an individual “acting as a pilot, flight engineer, mechanic, or repairman.”56 The FAA is
authorized to assess a civil penalty for violations of certain regulations, up to $400,000
against large entities or companies and up to $50,000 against individuals and small
businesses.57 The relevant section of the U.S. Code defines pilot as “an individual who
holds a pilot certificate issued under Part 61 of title 14, Code of Federal Regulations.”58
Again, an argument could be made that a noncertificate holder would not even be subject
to the civil penalty provisions of the U.S. Code, thus leaving the FAA with no effective or
realistic enforcement power over “unauthorized” civil unmanned aircraft operations.
These questions all came to a convergence with an enforcement action initiated by the
FAA in 2013 against an aerial videographer. The FAA’s “Order of Assessment” sought to
assess a civil penalty in the amount of $10,000 for the unauthorized operation of a powered
glider aircraft in the vicinity of a university campus. The allegations stated that the videog-
rapher did not have a pilot’s certificate, that he operated the flight for compensation, and
that he operated the aircraft at excessively low altitudes over vehicles, buildings, people,
streets, and structures between 10 and 400 feet AGL, all in a careless and reckless manner
so as to endanger the life or property of another, and many more details set forth in 11
charging paragraphs. The specific FAR that was allegedly violated was 14 CFR § 91.13(a),
which states that no person may operate an aircraft in a careless or reckless manner so as
to endanger the life or property of another.59
The videographer retained counsel and opposed the Order of Assessment. In a hard-
fought legal standoff before a National Transportation Safety Board (NTSB) administra-
tive law judge (ALJ), the videographer filed a Motion to Dismiss the Order, essentially on
the grounds that there was an absence of a valid rule for application of aviation regula-
tory authority over “model” aircraft flight operations. The FAA contested the motion, and
the ALJ assigned to the case ruled in the videographer’s favor on the grounds that the
aircraft was a “model aircraft” to which § 91.13(a) did not apply. Other arguments were
proffered with regard to the FAA’s policy-making process, and whether published pol-
icies, in this case one in particular (the 2007 Policy Memorandum referenced in endnote
30), were enforceable as rules or regulations. The FAA appealed the ALJ’s order to the full
NTSB (the first step in the appeal process from an FAA enforcement order), and the NTSB
reversed the decision, finding in favor of the FAA on the narrow issue of whether the plain
language of 49 U.S.C. § 40102(a)(6) and 14 C.F.R § 1.1 definitions of “aircraft” include any
aircraft, manned or unmanned, large or small. The Full Board found that the prohibition
on careless and reckless operation in § 91.13(a) applies to the operation of any aircraft, in
110
addition to those set forth in parts 101 and 103. The case was remanded to the administra-
tive law judge for a further factual hearing on whether the videographer actually violated
§ 91.13(a), and the parties thereafter settled their differences for a penalty reportedly sig-
nificantly less than the original $10,000 assessment.
That case, although interesting for the factual and legal issues it presented, provides
offers no binding legal authority to anyone other than the parties to that particular case,
and since the FAA essentially prevailed on the legal argument regarding its enforcement
authority, the agency continues to invoke § 91.13(a) and other relevant FARs to deal with
alleged violators of the FARs.
This history, however, has been overtaken by events, as a result of a series of federal
statutes and FAA rulemaking efforts that clearly apply to all aspects of unmanned air-
craft operations and activities in the United States. The first of the federal statutes was
the FMRA of 2012.60 The current U.S. statutes and FAA regulations are discussed in the
following section.
to be a substitute for any regulatory process, and was jointly developed by, and reflected
the consensus opinion of AFS- 400, the Flight Technologies and Procedures Division,
FAA Flight Standards Service (AFS); AIR 130, the Avionics Systems Branch, FAA Aircraft
Certification Service (AIR); and ATO-R, the Office of System Operations and Safety, FAA
Air Traffic Organization (ATO).66
The 05-01 policy recognized that if UAS operators were strictly held to the “see and
avoid” requirements of 14 CFR Part 91.113, “Right-of-Way Rules,” there would be no UAS
flights in civil airspace.67
The right-of-way rule states: “…when weather conditions permit, regardless of whether
an operation is conducted under instrument flight rules or visual flight rules, vigilance
shall be maintained by each person operating an aircraft so as to see and avoid other
aircraft. When a rule of this section gives another aircraft the right-of-way, the pilot shall
give way to that aircraft and may not pass over, under, or ahead of it unless well clear.”68
The FAA’s policy supports UA flight activities that can demonstrate that the proposed
operations can be conducted at an acceptable level of safety.69
Another collision avoidance rule states “no person may operate an aircraft so close to
another aircraft as to create a collision hazard.”70 The FAA also recognizes that a certifiable
“detect, sense, and avoid” system, an acceptable solution to the see-and-avoid requirement
for UAS, is many years away.71
Through the implementation of this policy, the FAA gave civil UAS developers and
operators two choices: (1) they could operate their systems as public aircraft and apply for
a COA that will permit operation of a specific aircraft in a specific operating environment
with specific operating parameters and for no more than one year at a time; or (2) they
could follow the normal procedures set forth in the CFRs to obtain a special airworthi-
ness certificate for their aircraft,72 operate the aircraft in strict compliance with all airspace
regulations set forth in 14 CFR Part 91, and have them flown by certificated pilots.73 The
policy also referenced AC 91-57, Model Aircraft Operating Standards, published in 1981, as
it applied to model aircraft, and stated “UA that comply with the guidance in AC 91-57 are
considered model aircraft and are not evaluated by the UA criteria in this policy.”74
The FAA furthermore declared in this policy that it would not accept applications for
civil COAs, which means that only military or public aircraft were eligible.75 A public air-
craft is defined in 14 CFR Part 1.1 as follows:
“Public aircraft means any of the following aircraft when not being used for a commercial
purpose or to carry an individual other than a crewmember or qualified non-crew member:
1. An aircraft used only for the U.S. government; an aircraft owned by the govern-
ment and operated by any person for purposes related to crew training, equipment
development, or demonstration; an aircraft owned and operated by the govern-
ment of a State, the District of Columbia, or a territory or possession of the United
States or a political subdivision of one of these governments; or an aircraft exclu-
sively leased for at least 90 continuous days by the government of a State, the
District of Columbia, or a territory or possession of the United States or a political
subdivision of one of these governments.
i For the sole purpose of determining public aircraft status, commercial purposes
means the transportation of persons or property for compensation or hire, but
does not include the operation of an aircraft by the armed forces for reim-
bursement when that reimbursement is required by any Federal statute,
112
In summary, the FAA mandated that one intending to operate an unmanned aircraft in
the national airspace must do so either under the permission granted by a COA (available
only to public entities, which includes law enforcement agencies and other government
entities), or with an experimental airworthiness certificate issued pursuant to relevant
parts of Title 14 of the CFRs. Specifically proscribed were operations that were of a com-
mercial nature, without the protection of a COA, but ostensibly under the guidelines set
forth in AC 91-57.
In recognition that some commercial for-hire UAS operators were flying their systems in
national airspace under AC 91-57 guidelines, the FAA published a second policy statement
on February 13, 2007.77 This notice was a direct response to increasing efforts by U.S. law
enforcement agencies and some ssUAS manufacturers to introduce systems into oper-
ational service on the back of model aircraft guidelines. The policy stated that the FAA
would only permit UAS operations under existing certificates of authorization and experi-
mental aircraft arrangements. This policy stated:
The current FAA policy for UAS operations is that no person may operate a UAS in
the National Airspace System without specific authority. For UAS operating as public
113
aircraft the authority is the COA, for UAS operating as civil aircraft the authority is spe-
cial airworthiness certificates, and for model aircraft the authority is AC 91-57.
The FAA recognizes that people and companies other than modelers might be flying
UAS with the mistaken understanding that they are legally operating under the authority
of AC 91-57. AC 91-57 only applies to modelers, and thus specifically excludes its use by
persons or companies for business purposes.
The FAA has undertaken a safety review that will examine the feasibility of creating a
different category of unmanned “vehicles” that may be defined by the operator’s visual
line of sight and are also small and slow enough to adequately mitigate hazards to other
aircraft and persons on the ground. The end product of this analysis may be a new flight
authorization instrument similar to AC 91-57, but focused on operations which do not
qualify as sport and recreation, but also may not require a certificate of airworthiness.
They will, however, require compliance with applicable FAA regulations and guidance
developed for this category.
The gap that was created by these policies was an inconsistent definition of “model air-
craft,” and, as discussed in previous sections of this chapter, some individuals and agencies
took advantage of this gap to operate small (and not-so-small) UASs with cameras and
other sensing equipment on board, clearly for either a commercial or law enforcement pur-
pose, without having applied for a COA or a special airworthiness certificate.78
This era of uncertainty was brought to a close as a result of two significant developments
in governmental policy regarding unmanned aircraft. The first was the passage of the
FMRA of 2012, signed into law by President Obama on February 14, 2014.79 The second
was the release of the aforementioned Notice of Proposed Rule Making for Operation and
Certification of Small Unmanned Aircraft Systems” on February 15, 2015.80
The FMRA firmly stated Congress’ intention to create (or recognize) a new class of air-
craft that was to be regulated by the FAA, and offered three definitions of unmanned
aircraft, small-unmanned aircraft, and public UASs.81 The Act mandated a timetable for
integration of civil UASs into the national airspace,82 and specifically exempted aircraft
flown strictly for hobby or recreational use from regulation.83 The Act further mandated
establishment of six test ranges, approval of commercial operations in the Arctic, coordin-
ation of operational approvals with public agencies, the creation of regulations, standards
and requirements for civil unmanned system operations, and a number of other methods
to achieve full integration of UASs into the national airspace.84 The statute requires the
Secretary of Transportation (parent agency of the FAA) to determine if certain UASs may
operate safely in the NAS before the completion of the plan and rulemaking required in
Section 332.85
Section 333 of the Act literally opened the floodgates for civil commercial UAS operators
and entrepreneurs to petition the FAA for authority to conduct a wide variety of com-
mercial operations, including aerial photography, precision agriculture, power line and
pipeline infrastructure inspection, news gathering, building inspections, insurance
adjusting, and many more, in low-risk, controlled environments. “333 Petitions,” as they
became known, spawned a cottage industry in the legal profession whereby law firms
and practitioners holding themselves out as experts in the field inundated the FAA with
petitions. As of September 28, 2016, the last date the FAA posted these statistics, 5,551
section 333 petitions had been granted, and 1,780 had been “closed” (meaning rejected or
withdrawn). This process was intended, by the words of the Act, to be an interim path to
operational approval for civil UAS operators pending the finalization of the ssUAS rule,
which became effective on August 29, 2016.86 The criteria for approval are stringent, and
114
the proponents are expected to demonstrate that they can safely fly their UASs in a manner
that follows all applicable operational rules in the FARs and does not endanger the safety
of persons or property in the air or on the ground. Section 333 was repealed and replaced
word for word in 49 U.S.C. § 44807.87
Civil operators also have the option of obtaining a Special Airworthiness Certificate in
the experimental category for civil aircraft performing research and development, crew
training, and market surveys, or may go through the UAS type and airworthiness certifi-
cate in the restricted category process under 14 CFR § 21.25(a)(2) and § 21.185 for a special
purpose, or a type certificate for production under 14 CFR § 21.25(a)(1) or § 21.17(b).
The other significant event was the long-awaited release of the Small UAS NPRM
(Notice of Proposed Rule Making) for the Proposed Part 107, released on February 15,
2015, as previously noted. The comment period closed on April 24, 2015, and the FAA
received approximately 4,700 comments that had to be resolved and published before the
rule became effective on August 29, 2016.88 At the same event where the new rule was
announced by FAA Administrator Michael Huerta, the FAA announced three “Pathfinder”
initiatives wherein the FAA would work with industry partners on three focus areas: visual
line-of-sight operations in urban areas, with CNN; extended visual line-of-sight operations
in rural areas, with PrecisionHawk; and beyond visual line-of-sight in rural/isolated areas,
with BNSF rail system.
The key elements of the final UAS rule89 require that the aircraft must weigh less than
55 lbs, operate within visual line-of-sight of the pilot in command or visual observer, not
operate directly over people, operate in daytime only, yield right-of-way to other aircraft,
observe maximum airspeed of 100 mph (87 kts), stay below a maximum altitude of 500
feet AGL, only fly with minimum weather visibility of 3 miles, not operate in Class A air-
space, and only in other classes except Class E with ATC permission, and must only be
operated by a person holding a valid remote pilot certificate, which has some testing and
qualifications requirements., Numbering 44 subsections in all, the current rule includes
Parts 107.200 & 107.205, which create a waiver process wherein applicants can seek per-
mission from the FAA to waive the nine specified regulations that are subject to waiver.
On June 21, 2016, the FAA issued AC 107-2, which was intended to provide guidance for
conducting UAS operations in the NAS in accordance with Title 14 C.F.R. Part 107.
As of March 17, 2020, 3,960 Part 107 waiver requests have been granted, the vast majority
of which were for Part 107.29 (daylight operations), seeking waivers to fly at night.
Since the FMRA of 2012 was enacted, the U.S. Congress has passed two more compre-
hensive statutes dealing with unmanned aircraft. The FAA Extension, Safety and Security
Act of 2016,90 in “Subtitle B-UAS Safety,” amended the FMRA of 2012 and ordered the
FAA and the Department of Transportation to undertake a number of tasks intended to
enhance the safety of UAS operations in the NAS. These mandates include, among others,
developing consensus standards for remote identification of UAS; setting requirements
for UAS manufacturers to include safety literature for customers at the point of delivery
of a system; facilitating cooperation among firefighting and public utility organizations to
support restoration of services after a disaster or catastrophic event; sanctions for inter-
ference with wildfire suppression efforts; creating a pilot project for airspace hazard miti-
gation around airports; setting up an emergency exemption process for civil and public
operators responding to a disaster or emergency; developing a research plan for UAS
traffic management (UTM) development and deployment; creating an application process
for designating a fixed site facility for prohibition of flights around critical infrastructure;
development of a UAS research and development roadmap; setting up a testing and mod-
eling protocol focused on collisions between unmanned and manned aircraft; and finally
115
to conduct a probabilistic metrics research and development study assessing the risks of
integrating UAS into the national airspace.
The last major legislation was the FAA Reauthorization Act of 2018.91 This Act extends
the FAA’s funding and authorities through FY 2023, and was the first five-year reauthor-
ization since 1982. The FAA website states that:
The bill includes important legislative changes related to increasing the safety and
pace of UAS integration, expediting the financing and development of airport cap-
ital projects, directing the FAA to advance leadership in the field of international
supersonic aircraft policies, addressing aircraft noise, and ensuring safe lithium
battery transport. Furthermore, the bill directs FAA to promote U.S. aerospace-related
standards globally and allows the Agency to work with foreign partners to stream-
line certification processes for U.S. aircraft. The legislation also streamlines the FAA
certification process to ensure that U.S. aviation manufacturers can compete globally
and get their products to market on time, and fosters collaboration with industry
stakeholders to streamline certification and regulatory processes and establish clear
FAA performance objectives and metrics.92
In addition to federal legislation and the implementation of the Part 107 UAS rule, the FAA
has created a number of initiatives to promote research and development of commercial
UAS products and operations, all oriented toward integrating UAS into the NAS in a safe
manner. These initiatives include a mobile application called “B4UFLY” for recreational
flyers to show where they cannot fly their UAS; the establishment of a Drone Advisory
Committee; creation of an FAA UAS Data Exchange and Manufacturer’s Toolkit; as well as
standing up the UAS Integration Pilot Program, the UTM Pilot Program, and the UAS Test
Site Partnerships.93
Following the passage of the FAA Reauthorization Act of 2018, the FAA proposed four
rules dealing with unmanned aircraft: “Safe and Secure Operations of Small Unmanned
Aircraft Systems,” “Operation of Small Unmanned Aircraft Systems Over People,”
“External Marking Requirements for Small Unmanned Aircraft,” and “Exception for
Limited Recreational Operations of Unmanned Aircraft,” all but the last one published on
February 13, 2019, and the last on May 17, 2019. Comment periods closed on all but the last
NPRM, but no new rule has been finalized for any of these efforts except for the External
Marking Interim Final Rule, which was effective on February 25, 2019, before the closing
date for comments.
The most recent NPRM addresses Remote Identification of Unmanned Aircraft Systems,94
published December 31, 2019. The proposed rule would implement system(s) for the
remote identification of certain UASs. The FAA declared that a requirement for remote
identification of UASs in the NAS would further address security and law enforcement
concerns regarding the further integration of these aircraft into the national airspace while
also enabling greater operational capabilities by these same aircraft. Comments were to
be submitted on or before March 2, 2020. The FAA denied a request to extend the time to
comment. As of the close of the comment period, the FAA had received 53,039 comments,
far more than the agency received after publication of the first sUAS proposed rule. To state
that this proposed rule is controversial would be a gross understatement.
In summary, the prudent entrepreneur or UAS business owner is best served by working
with experts well versed in the intricate maze of FAA rules, regulations, and policies before
launching any size or configuration UAS for commercial purposes. The FAA’s website95
offers a current look at all relevant regulations and guidelines, and the Section 333 (now §
116
44807) petitions are all online, with some proprietary elements redacted or excluded from
public view. A person or entity with the time and motivation to actually have an impact
on rulemaking can, at the very least comment on proposed rules, and may also have the
opportunity to serve on one or more ARCs or join a Standards Development Organization
(SDO) and help develop the standards that support the rules, as discussed below.
Rules that have gone through this informal rulemaking process have the same force and
effect as a rule or regulation imposed by an act of Congress. Thus, the FAA is empowered
to enforce those rules as if they were laws enacted by Congress. The rules are generally
referenced to or codified in the CFRs. There are exceptions to this, however. Direct final
rules are implemented after a final rule is issued while still providing for a period of notice
and comment. The rule becomes effective after the specified period if there are no adverse
comments. The difference in this process from the notice of proposed rulemaking pro-
cedure is that there is no proposed rule published before the final rule is released. This
is used for routine rules or regulations that are not anticipated to generate comment or
controversy. Interim rules are usually effective immediately and are issued without prior
notice, often in response to an emergency. A final rule may be issued based upon the
interim rule after a period of comment. The status of an interim rule as final or amended
or withdrawn is always published in the Federal Register. Lastly, interpretive rules may
be issued to explain current regulations or its interpretation of existing statues or rules.
This tool is not commonly used by the FAA, but may be useful when a rule is repeatedly
misinterpreted, resulting in chronic compliance issues.
The point of this complex, sometimes cumbersome, and time-consuming process of
rulemaking is to advance the cause of safety and harmonization so that all users and others
affected by the aviation environment are protected from undue risk of harm. Further, it
is to ensure that all entities operate under the same set of rules and regulations and have
abundant opportunities to engage in the process so that the outcomes may be influenced
by multiple points of view. Each step of the process requires a series of reviews by other
agencies of the federal government, such as the Office of the Secretary of Transportation,
the Department of Transportation, the Office of Management and Budget, the General
Accountability Office, and the Office of the Federal Register. A flowchart of the aviation
regulatory process would demonstrate at least a 12-step process, with multiple interim
steps embedded in most of the broader categories. If a proposed rule were to be subjected
to each and every possible review step, the list would include no fewer than 35 stops along
the way. For example, due to the many and equally influential stakeholders that could be
involved in an effort by the Department of Defence to create a new restricted area for UAS
operations, testing, and training, it was generally estimated that it would take five years
to accomplish the goal, until the FAA put a stop to the debate and declared that military
restricted areas are to be used only for military activities, not civilian UAS research and
development.98 In another example, the implementation of an aviation safety device for air
transport aircraft known as traffic alert and collision avoidance system (TCAS) required
over 15 years from inception to implementation, and it took an act of Congress to mandate
the use of TCAS in commercial airliners.
In addition to formal rules and regulations, the FAA issues orders, policies, directives,
and guidance documents. The FAA routinely issues policy statements and guidance
documents to clarify or explain how the FAA interprets and enforces the regulations.
A policy statement gives guidance or acceptable practices on how to comply with a spe-
cific CFR section or paragraph. These documents are explanatory and not mandated. They
are also not project specific. Practically speaking, this means that they are not enforceable
in formal compliance proceedings, but they do provide guidance to users and the public
on how best to comply with the FARs. Guidance documents are similar in nature and are
likewise explanatory rather than mandatory.
The FAA’s website99 contains links to all historical and current policy statements,
guidance documents, orders, directives, circulars, and regulations. Binding orders and
118
regulations are published in the Federal Register and are accessible on the Electronic CFRs
(e-CFRs) government website.100
As discussed in Section 5.2.3, the overarching policy of the FAA with respect to compli-
ance with the regulations is compliance before enforcement.101
uphold certain ethical standards for professional engineers, engineering standards ensure
that organizations and companies adhere to accepted professional practices, including
construction techniques, maintenance of equipment, personnel safety, and documentation.
These codes, standards, and regulations also address issues regarding certification, per-
sonnel qualifications, and enforcement.
Manufacturing codes, standards, and regulations are generally designed to ensure the
quality and safety of manufacturing processes and equipment, and aviation regulations
are no exception. Manufacturing standards ensure that the equipment and processes used
by manufacturers and factories are safe, reliable, and efficient. These standards are often
voluntary guidelines, but can become mandatory by reference in the FARs. Manufacturing
regulations are government-defined and usually involve legislation for controlling the
practices of manufacturers that affect the environment, public health, or safety of workers.
Aircraft manufacturers in the United States and European Union are required by law to
produce aircraft that meet certain airworthiness and environmental emissions standards.
The FAA has supported and sponsored four domestic committees dedicated to developing
standards and regulations for the manufacture and operation of unmanned aircraft. RTCA’s
Special Committee 203 Unmanned Aircraft Systems (SC-203) began developing minimum
operational performance standards (MOPS) and minimum aviation system performance
standards (MASPS) for UASs in 2004: “SC-203 products will help assure the safe, efficient
and compatible operation of UAS with other vehicles operating within the NAS. SC-203
recommendations will be based on the premise that UAS and their operations will not
have a negative impact on existing NAS users.” SC-203’s efforts ended in 2013, and a new
Special Committee, SC-228, Minimum Operational Performance Standards for Unmanned
Aircraft Systems, was created shortly thereafter, also in 2013. Its task is to develop MOPS
for detect-and-avoid technology, as well as command-and-control (C2) data link MOPS
seeking L-Band and C-Band solutions. This committee’s work in part builds upon earlier
standards published by the North Atlantic Treaty Organization, STANAG 4586, “Standard
Interfaces of UAV Control System (UCS) for NATO Interoperability, 4th Ed.”
ASTM’s F- 38 Committee on Unmanned Aircraft Systems addresses issues related
to design, performance, quality acceptance tests, operations, and safety monitoring for
UASs. This committee consists of three subcommittees: F38.01 Airworthiness, F38.02 Flight
Operations, and F38.03 Personnel Training, Qualification and Certification. F38 collaborates
with other ASTM committees and, as an international SDO, ASTM participates in standards
development efforts around the world. ASTM stakeholders include manufacturers of UASs
and their components, federal agencies, design professionals, professional societies, main-
tenance professionals, trade associations, financial organizations, and academia.
SAE’s G- 10U Unmanned Aircraft Aerospace Behavioral Engineering Technology
Committee was established to generate pilot training recommendations for UAS civil
operations and propose a standard that provides an approach to the development of
training topics for pilots of UASs for use by operators, manufacturers, and regulators. The
E-39 “Unmanned Air Vehicle Propulsion Systems” committee was chartered on January
23, 2018, with responsibility to develop and maintain standards for unmanned air vehicle
propulsions systems and all their various components and subsystems.
By Order 1110.150, signed on April 10, 2008, the FAA created an sUAS ARC according to
the FAA administrator’s authority under Title 49 United States Code (49 U.S.C.) § 106(p)
(5). The committee’s term was 20 months and was made up of representatives of aviation
associations, industry operators, manufacturers, employee groups or unions, the FAA and
other government entities, and other aviation industry participants, including academia.
The committee delivered its formal recommendations to the FAA associate administrator
120
on April 1, 2009. The FAA’s Air Traffic Organization simultaneously convened a safety
risk management committee that was charged with describing the UAS systems under
review, identifying hazards, analyzing risk, assessing risk, and treating risk to arrive at
a safety management system (SMS) for UASs that would be coordinated or integrated
with the ARC’s recommendations. This process follows a number of FAA policies that
require oversight and regulation of aeronautical systems that may impact safety in the
NAS (FAA Order 8000.369B Safety Management System (SMS); FAA Order 1100.161 CHG
1 Air Traffic Safety Oversight; FAA Order 8000.365 Safety Oversight Circulars; FAA Order
JO 1000.37B Air Traffic Organization Safety Management System; Air Traffic Organization
Safety Management System Manual April 2019; Order 8040.4B Safety Risk Management
Policy; and AC 150/5200–37 Introduction to SMS for Airport Operations). The FAA web-
site also identifies three system safety guidance documents that are for the FAA only and
requires permission from the U.S. Department of Transportation to access.103
The ARC’s recommendations for regulations pertaining to ssUASs were adopted in
part and led to a published notice of proposed rulemaking for a new Part 107, Operation
and Certification of Small Unmanned Aircraft Systems, released on February 15, 2015. As
discussed above, the final rule went into effect August 29, 2016, and was the first set of
FARs dealing specifically with UASs.
One previous attempt to address a narrow category of RPA was the previously
mentioned AC 91-57, published in 1981. This AC was in reality an effort to regulate by
not regulating the recreational modelling community, outlining and encouraging vol-
untary compliance with safety standards for model aircraft operators. This controver-
sial document was later taken off the FAA’s website as the FAA attempted to manage
the surge of commercial UAS operators who were attempting to do business in reliance
on the circular, but was amended on May 31, 2019, so the current version remains as the
operative standard for model aircraft operations within certain designated areas and
under the authority of a voluntary organization, the Academy of Model Aeronautics
(AMA). The AMA created its own set of standards and restrictions for its members,
compliance with which is a prerequisite for the group insurance coverage for which its
members are eligible.
Although AC 91-57 was specifically directed toward recreational modelers, the circular
was often relied upon by commercial UAS operators and developers to claim that they
could fly their ssUASs under 400 feet AGL without communicating with the FAA and
running afoul of the FARs. Policy Statement 05-01 and Guidance Document 08-01 both
referred to AC 91-57 as the official policy with respect to recreational and hobbyist aero-
modeling, which is that those activities did not fall under the intent of FARs and were thus
excluded. However, by inference, the FAA believed that it had the statutory power to regu-
late recreational models because they fell under the definition of airplane found in 14 CFR
1.1, but chose not to do so as a matter of policy. Section 336 of the FMRA superseded that
policy.104 Subsequently, AC 91.57B was issued on May 31, 2019, that clarified FAA policy
with regard to recreational operations of unmanned aircraft.105
otherwise known as the Versailles Treaty) recognized that the air above the high seas was
not as “free” as the seas below. In that Convention, the contracting states acknowledged
exclusive jurisdiction in the airspace above the land territory and territorial waters of the
states, but agreed to allow, in times of peace, innocent passage of the civil aircraft of other
states through their sovereign airspace, so long as the other provisions of the Convention
were observed. Nation states still retained the right to create prohibited areas in the interests
of military necessity or national security. During the global hostilities of the 1940s, the
United States initiated studies and later consulted with its major allies regarding further
harmonization of the rules of international airspace, building upon the 1919 Convention.
The U.S. government eventually extended an invitation to 55 states or authorities to attend
a meeting to discuss these issues, and in November 1944, an International Civil Aviation
Conference was held in Chicago. Fifty-four States attended this conference, at the end of
which the Convention on International Civil Aviation was signed by 52 of those States. The
convention created the permanent ICAO as a means to secure international cooperation
and the highest possible degree of uniformity in regulations and standards, procedures,
and organization regarding civil aviation matters. The Chicago Conference laid the foun-
dation for a set of rules and regulations regarding air navigation as a whole, which was
intended to enhance safety in flying and construct the groundwork for the application of a
common air navigation system throughout the world.
The constitution of the ICAO is the Convention on International Civil Aviation that was
drawn up by the Chicago conference, and to which each ICAO Contracting State is a party.
According to the terms of the Convention, the organization is made up of an assembly,
a council of limited membership with various subordinate bodies, and a secretariat. The
chief officers are the President of the council and the Secretary General. ICAO works in
close cooperation with other members of the United Nations family, such as the World
Meteorological Organization, the International Telecommunication Union, the Universal
Postal Union, the World Health Organization, and the International Maritime Organization.
Nongovernmental organizations (NGOs) that also participate in ICAO’s work include
the International Air Transport Association, the Airports Council International, the
International Federation of Airline Pilots’ Associations, and the International Council of
Aircraft Owner and Pilot Associations.106
ICAO’s objectives are many and are set forth in the 96 articles of the Chicago Convention
and the 18 annexes thereto. Additional standards and guidelines are found in numerous
supplements (SARPS) and Procedures for Air Navigation Services (PANS), which are
under continual review and revision. Contracting States are free to take exceptions to any
element of the annexes, and those exceptions are also published. Contracting States are
also responsible for developing their own aeronautical information publications (AIPs),
which provide information to ICAO and other States about air traffic, airspace, airports,
navaids (navigational aids), special use airspace, weather, and other relevant data for use
by aircrews transiting into or through the State’s airspace. The AIPs also contain informa-
tion about a State’s exceptions to the annexes and any significant differences between the
rules and regulations of the State and ICAO’s set of rules.
The annexes cover rules of the air, meteorological services for international air naviga-
tion, aeronautical charts, measurement units used in air and ground operations, operation
of aircraft, aircraft nationality and registration marks, airworthiness of aircraft, facilitation
of border crossing, aeronautical communications, air traffic services, search and rescue, air-
craft accident investigation, aerodromes, aeronautical information services, environmental
protection, security- safeguarding international civil aviation against acts of unlawful
interference, and the safe transportation of dangerous goods by air. The only reference in
122
any ICAO document to unmanned aircraft is found in Article 8 of the Convention, which
states that:
No aircraft capable of being flown without a pilot shall be flown without a pilot over
the territory of a contracting State without special authorization by that State and in
accordance with the terms of such authorization. Each contracting State undertakes to
insure that the flight of such aircraft without a pilot in regions open to civil aircraft shall
be so controlled as to obviate danger to civil aircraft.
ICAO’s rules apply to international airspace, which is typically defined as the airspace
over the high seas more than 12 miles from the sovereign territory of a State (country), as
well as some domestic airspace by virtue of incorporation into a Contracting State’s own
regulatory scheme. The rules apply to all Contracting States (numbering 193 at present),
so any nation that elects not to become an ICAO member is not entitled to the protection
of ICAO’s rules. However, ICAO is a voluntary organization, and there are no provisions
for enforcement of the regulations or standards such as those found in the FARs. As a prac-
tical matter, a nation that opts out of being an ICAO Member State will find that foreign air
carriers will not be allowed to land in that nation’s airports, except in an emergency, and
that nation’s airlines, if any, will not be permitted to operate in the airspace of a Member
Nation. As a founding member of ICAO and a nation that has a substantial interest in pre-
serving harmony in international commercial aviation, the United States enforces ICAO’s
rules against U.S. operators to the extent that the ICAO rule has been incorporated into
the FARs and does not conflict with domestic regulations. In 2012, ICAO created an RPAS
Panel, designed to deliver standards for unmanned aircraft to ICAO’s governing council
in 2018. The panel’s focus was and is on the development of SARPs for adoption by the
ICAO Council regarding airworthiness, operations, and licensing of remote pilots. The
first edition of the “Manual on Remotely Piloted Aircraft Systems” was released in 2015.107
Also, in 2015, ICAO established the Unmanned Aircraft Systems Advisory Group (UAS-
AG) to support the Secretariat in developing guidance material and to expedite the devel-
opment of provisions to be used by Member States to regulate UASs. The Advisory Group
has continued to respond to ICAO’s Requests for Information (RFI) in 2017, 2018 and 2019
by holding industry symposia to showcase submissions by interested parties responding
to the RFIs. The next scheduled symposium, “Drone Enable/4,” was set for September
2020 in Rio de Janeiro, Brazil, and was postponed due to the Covid-19 pandemic. The sym-
posium, renamed “Drone Enable 2021,” will now be held from 13 to 15 April 2021, still in
Rio de Janiero, and may be conducted virtually.
Additional international aviation organizations in Europe that exercise some level
of regulatory powers include European Organization for the Safety of Air Navigation
(EUROCONTROL), EASA, and European Organization for Civil Aviation Equipment
(EUROCAE). EUROCONTROL is an intergovernmental organization that acts as the core
element of air traffic control services across Europe and is dedicated to harmonizing and
integrating air navigations services in Europe and creating a uniform air traffic manage-
ment system for civil and military users. The agency accomplishes this by coordinating
efforts of air traffic controllers and air navigation providers to improve overall perform-
ance and safety. The organization is headquartered in Brussels and has 38 member states.
The European Commission created an Single European Sky ATM Research (SESAR) ini-
tiative in 2001 and has delegated portions of the underlying regulatory responsibility to
EUROCONTROL. EASA was established as an agency of the European Union in 2003
123
and has regulatory responsibility in the realm of civilian aviation safety, assuming the
functions formerly performed by the Joint Aviation Authorities (JAA). In contrast to JAA’s
role, EASA has legal regulatory authority, which includes enforcement power. EASA has
responsibility for airworthiness and environmental certification of aeronautical products
manufactured, maintained, or used by persons under the regulatory oversight of European
Union member states. EUROCAE reports to EASA, although it was created many years
before EASA was formed, and deals exclusively with aviation standardization (with ref-
erence to airborne and ground systems and equipment). EUROCAE is not a regulatory
body, but its standards and related documents are required for use in the regulation of
aviation equipment and systems. Its membership is made up of equipment and airframe
manufacturers, regulators, European and International CAAs, air navigation service
providers, airlines, airports, and other users. EUROCAE’s Working Group 73 is devoted
to the development of products intended to help assure the safe, efficient, and compatible
operation of UASs with other vehicles operating within nonsegregated airspace. WG-73
makes recommendations to EUROCAE with the expectation that those recommendations
will be passed on to EASA.
More recently, EUROCAE WG-105, “Unmanned Aircraft Systems (UAS),” was tasked
with developing standards and guidance documents for the safe operation of UAS in all
types of airspace, at all times and for all types of operations. WG-105 originally consisted of
six Focus Teams working in specific focus areas, identified as Sub Groups (SG): UAS Traffic
Management (UAS); Command, Control, Communications (C3); Detect and Avoid (DAA);
Design and Airworthiness Standards; Specific Operations Risk Assessment (SORA); and
Enhanced RPAS Automation (ERA). Subsequently, the number of WG-105 subgroups was
expanded:
• SG-60 (SORA);
• SG-62 (GNSS for UAS);
• SG-63 (Automatic protection function for UAS
WG-105 works in coordination with RTCA SC-228 (discussed in Section 5.3) for Unmanned
Aircraft Systems.
On March 13, 2020, EASA published Opinion 01/2020 on “High-level regulatory frame-
work for the U-Space.”108 EASA stated that this document has as its purpose to create and
harmonize the necessary conditions for manned and unmanned aircraft to operate safely
in the U-space airspace, to prevent collisions between aircraft, and to mitigate the air and
ground risks. Therefore, the U-space regulatory framework, supported by clear and simple
rules, should permit safe aircraft operations in all areas and for all types of unmanned
operations.
This EASA document further declares: “Opinion 01/2020 proposes an effective and
enforceable regulatory framework to support and enable operational, technical and
business developments, and provide fair access to all airspace users, so that the market
can drive the delivery of the U-space services to cater to airspace users’ needs. This
Opinion is, therefore, a first regulatory step to allow immediate implementation of the
U-space after the entry into force of the Regulation and to let the unmanned aircraft
systems and U-space technologies evolve.” U-space is a set of new services and specific
procedures designed to support safe, efficient, and secure access to airspace for large
numbers of drones.109
In addition to ICAO and the three European organizations just discussed, any nation’s
CAA is free to promulgate its own aviation rules and regulations for operations within
their sovereign airspace, and until ICAO has created an overarching set of rules for UAS
operations among its member states, operators of UASs must be sensitive to the rules and
regulations of the contracting state that is providing air traffic services in international air-
space. Another cross-national organization, the JARUS, is made up of a group of experts
from National Aviation Authorities (NAA) of 61 countries,110 regional safety organizations,
EASA, and EUROCONTROL. This group’s task is to recommend a single set of technical,
safety, and operational requirements for the certification and safe integration of UASs into
airspace and aerodromes. Their objective is to provide guidance material to facilitate each
NAA’s efforts in writing their own requirements and to avoid duplicate efforts.111 JARUS
developed and published its “JAR doc 06 SORA” package, which is a set of guidelines
on Specific Operations Risk Assessment.112 The SORA process is intended to be the go-to,
most robust method for evaluating the hazards and risks of complex UAS operations, and
is arguably the most comprehensive document of its type with regard to operational risk
assessment for UAS.
one aircraft at a time, and follow the rules established by DECEA and ANATEL. The
Brazilian Aeronautical Code (CBA) Law No. 7565 is the overarching aviation legislation
that controls all the subcategories, including drones. Brazil recognizes the authority of
ICAO Doc 10019 Manual on RPAS (discussed in Section 5.6 above).
Canada: Canadian aviation regulations (CARs-SOR/96–433) are managed by Transport
Canada.116 The Canadian rules and rulemaking process are patterned in part on
U.S. regulations, but some were promulgated and implemented years before the FAA put
a set of rules in place in the U.S. Remotely Piloted Aircraft Regulations are found in Part
IX (sections 900.01–903.01) and Standards (sections 921–922). An SFOC (Special Flight
Operations Certificate) may be required depending upon whether the flight is recreational
or commercial, the drone’s weight, and if particular exemptions may apply. Recreational
UAS under 35 kg in weight do not require a certificate, whereas all aircraft heavier than
35 kg require a certificate regardless of use. sUAS (between 250 g and 25 kg) may be
exempted if the operator is able to follow strict safety conditions. The classification system
is based upon risk, and closely resembles U.S. drone regulations.
China: China’s national CAA is the Civil Aviation Administration of China (CAAC).117 All
permissions to operate unmanned aircraft in China are granted by the CAAC. Licensing
is required for commercial operations. Any drone weighing more than 250 g must be
registered with the CAAC.118 Drones weighing more than 116 kg require a pilot’s license
and UAV certification. Operational restrictions are similar to other nations (no BVLOS
operations, no flights above 120 m AGL, no flights in densely populated areas, no flights
around airports, military installations or other sensitive locations, all flights subject to
designated No-Fly-Zones, and no flights in controlled areas without CAAC approval). All
drone operators are required to carry third-party liability insurance.
France: The French Transport Ministry and the Ministry of the Ecological and Inclusive
Transition119 control drone policy and practice in France. Fox AlphaTango®120 is the new
name for the portal set up by the DSAC for users of piloted aircraft to register their air-
craft, obtain training certificates, and secure permission to operate commercial UAS.
France follows European Union regulatory guidance. The Ministry publishes a guide (in
French) for all users of unmanned aircraft in France (Aéronefs Circulant Sans Personne
A Bord: Activitiés Particulières). Generally, the same basic operational rules apply as found
elsewhere: No BVLOS flights stay under 150 m AGL, daytime only, no urban flights, no
flights over people, no flights in restricted areas, respect privacy of others, no commer-
cial use of images without permission, mandatory liability insurance, aircraft registration,
remote pilot certification (private pilot, or ultralight or glider license), and no flights in air-
port environments. French law describes seven different categories of aircraft, based upon
mass, and four different operational scenarios. BVLOS flights and flights over congested
areas may be permitted for aircraft weighing less than 4 kg. Commercial operations require
a licensed civil pilot and permission to operate. All UAS weighing more than 800 grams
must be registered and must carry audible warning devices and navigation lighting.
Penalties for violations of the regulations may include imprisonment for up to one year
and a $90,000 fine.
Germany: Germany’s UAS regulations went into effect April 7, 2017.121 The Federal
Aviation Office (LBA) is responsible for the issuance of certificates of proof of sufficient
knowledge and skills for the operators of unmanned aerial vehicles. Inquiries on details of
the requirements may be sent to AST@lba.de. The regulations are not currently available in
English on the official LBA website. Highlights include UAS weighing less than 5 kg may
127
be flown without a permit, but those weighing more than 2 kg require a licensed remote
pilot. UAS may only be flown above 100 m AGL with LBA permission and UAS over 5 kg
require a permit to fly at night. UAS weighing more than 250 g must be registered and
marked with a fireproof data plate. A certificate of knowledge is required to operate a UAS
heavier than 2 kg. UAS may not be flown over crowds, industrial areas, disaster areas, and
other designated sensitive locations. Liability insurance is required. It should be noted that
Germany is a federal republic with 16 states, and there is nothing in the regulations that
prevents any of those states from enacting their own drone regulations so long as they do
not conflict with LBA rules.
Ireland: The Irish Aviation Authority (IAA)122 promulgated drone regulations in “Small
Unmanned Aircraft (Drones) and Rockets Order S.I. 563 of 2015.” All drones continue to be
regulated under national legislation pending implementation of the new European Union
rules, but operators are encouraged to make themselves familiar with EU Regulation
2019/947. Ireland’s national drone regulations mirror those of most other European coun-
tries: Avoid hazardous operations, no flights over assemblies of people (12 or more), no
flights beyond 300 m from the operator, no flights above 400 feet AGL, no flights in urban
areas, no flights near airports or restricted or sensitive areas, and no flights in controlled
airspace. Specific Operating Permission (SOP) is required to deviate from any of the
limitations, and the operator must receive training from an approved training facility and a
Pilot Competency Certificate is required. All drones over 1 kg in maximum takeoff weight
(MTOW) and operated above 15 m AGL must be registered. No permission is required
to operate a drone commercially. Model aircraft are treated the same way as commercial
drones.
Italy: Italy has not produced any domestic regulations relating to drones. The Italian
Civil Aviation Authority (ENAC)123states that it is following the lead of EASA and
EUROCONTROL in working on operations in critical areas (ATZ) and operations BVLOS
in nonsegregated airspace. Procedures for drone activities are included in ATM-5 circular
of July 23, 2013, which is only available in the Italian language.124
Japan: Article 87 of Japan’s Civil Aeronautics Act is a two-paragraph treatment of pilotless
aircraft, and merely states that the Minister of Land, Infrastructure, Transport and Tourism
(MLITT) must grant permission for UAS flights, and may impose flying restrictions on the
aircraft when “he/she deems it necessary to prevent dangerous effects on other aircraft.”
An amendment to the Aeronautical Act setting new rules for unmanned aircraft went into
effect on December 10, 2015.125 The new rules define the airspace into which drone pilots
must seek permission to enter from the MLITT (around airports, airspace above 150 AGL,
and above densely inhabited districts [DIDs]). As of September 18, 2019, new rules prohibit
operating under the influence of alcohol or drugs, require a preflight “action” (presumably
checklist and system validation), operating so as to prevent collisions with airplanes and
other UAs, and not to operate in a careless and reckless manner. Nighttime operations,
BVLOS operations, operating within 30 m of persons or objects on the ground, operating
over event sites or gatherings of people, transporting hazardous materials, and dropping
objects require approval from the Regional Civil Aviation Bureau in advance. Permissions
must be sought 10 days in advance of operations from the MLITT. Violators may be liable
for a fine of up to 500,000 yen (about $4,591 USD), and up to one year of imprisonment if
operating under the influence of alcohol or drugs.
Mexico: The Ministry of Communications and Transportation (SCT), through the General
Directorate of Civil Aeronautics (DGAC), updated their drone regulations in April of 2015
128
with circular CO AV 23/10 R2.126 This circular establishes weight categories, as well as the
usual operational limitations (no night flights, no flights near airports or sensitive areas, no
flights over people and BVLOS, maintain minimum distances from people and objects on
the ground, fly below 400 feet AGL, fly when visibility is good, no dropping of objects, and
no flights in restricted areas). RPAs weighing less than 2 kg can be operated without author-
ization from the DGAC, but if operated commercially, they must have third-party liability
insurance. RPAs heavier than 25 kg have more limitations, may only be operated with per-
mission from DGAC, and the operator must have a pilot’s license. Drones weighing more
than 250 g must be registered with Mexican civil aviation authorities.
Netherlands: The Environment and Transport Inspectorate (ILT or ILENT) is the govern-
ment agency charged with regulatory compliance and oversight of RPAS activities.127 The
agency website is in Dutch and requires English translation. Any commercial RPAS oper-
ation requires an exemption from the ILT.128 The exemption rules require a certificate of
registration, an airworthiness certificate, proof of insurance and competency of the pilot,
a Safety Management System for the organization, restrictions on where the RPAS can
operate, and a two-person crew (pilot and camera operator or supervisor).
Norway: Norway’s CAA has jurisdiction over all RPAS activities.129 Relevant sections
of the Aviation Act, as amended in 2016 and 2018, apply to all aircraft without a pilot
on board. Commercial operations require permits from the CAA as well as the National
Security Authority (if aerial photography is contemplated). All rules that apply to manned
aircraft apply equally to RPAS. Recreational flying rules are similar to those contained in
U.S. regulations. Restrictions and limitations for all RPAS operations are divided into three
categories: RPAS with a maximum takeoff mass (MTOM) of 2.5 kg and maximum speed of
60 kts (RO1); RPAS with MTOM of up to 25 kg and maximum speed of 80 kts (RO2); and
RPAS with MTOM of more than 25 kg or maximum speed of 80 kts, or operated by turbine
engine, or to be used for BVLOS operations higher than 120 m, or operating in controlled
airspace of more than 120 m, or will be operated in urban airspace or over crowds of people
(RO3). Each category has organizational and SMS requirements that are more stringent as
the capabilities and mission of the RPAS increase in complexity. The Norwegian approach
to regulation is more comprehensive than most countries in nearly all respects from air-
craft certification and airworthiness to pilot qualifications, to organizational safety culture,
and to registration and marking. Beyond line of sight and extended visual line of sight
operations may be performed if the license issued by the Norwegian CAA covers those
types of operation. The common requirements found elsewhere also apply in Norway,
such as lighting, night flights, flying in controlled airspace, and operating over disaster
sites. The regulations also cover state operations (police, customs, fire, search, and rescue),
but exempt those activities from the strict liability requirements imposed on all other com-
mercial or recreational operations. Infringement fines may be imposed for violating any
regulation.
New Zealand: Part 101.201–215 (Remotely Piloted Aircraft, Control Line Model Aircraft,
and Free Flight Model Aircraft)130 and Part 102 (Unmanned Aircraft Operator Certification)
CAA Consolidation131 set forth the RPAS rules administered by the CAA of New
Zealand.132 Part 101 is focused on aircraft weighing more than 15 kg and recreational mod-
eling, although not specifically saying so, as the rules pertaining to approved persons or
organizations, operations around aerodromes, airspace restrictions, visual line of sight
restrictions, night operations, right of way rules, and aircraft mass limits generally contem-
plate aircraft operations in that category. Part 102 is specifically directed toward unmanned
129
aircraft operator certification, and again, without directly stating so, is clearly intended for
commercial RPAS operations. Generally, however, RPAs weighing less than 15 kg can fly
in uncontrolled airspace below 400 feet AGL during daylight hours and within visual line
of sight, in clear meteorological conditions, well clear of other aircraft, not within 4 km of
an aerodrome, and outside of restricted areas without obtaining permission from the CAA.
South Africa: The South African Civil Aviation Authority (SACAA) makes and enforces
the UAS regulations, which came into effect in May and June of 2017.133 Civil Aviation
Regulations Part 101 (RPAS) is divided into six subparts: General provisions; Approval
and Registration; Personnel Licensing; RPAS Operating Certificate; RPAS Operations; and
Maintenance.
The regulations do not apply to model and toy aircraft or autonomous unmanned air-
craft that cannot be managed real-time during flight. Recreational aircraft can only be flown
above one’s own property or over property whose owner has granted permission. All com-
mercial and nonprofit operations are covered. Aircraft are grouped in four classes, with
each class having subclasses, depending upon type of operations (LOS, VLO, EVLOS),
impact kinetic energy (in kJ), height (altitude), and MTOW. The Director of the SACAA
must issue an RPAS Letter of Approval (RLA) before any RPAS can be flown commercially.
All RPAS must be registered and marked. A remote pilot license is required, preceded
by training and a skills test, and a logbook must be maintained. Operating certificates
are issued by the SACAA. Operations are specifically controlled, like other nations, and
continued maintenance is required along with documentation. Many of the operational
requirements mimic manned aviation regulations (such as preflight checklists, duties of
the pilot, right of way rules, time management, power reserves, radio communications,
and the like). All in all, South Africa’s RPAS regulations are comparatively comprehensive
and leave little room for deviation from the rules.
Sweden: The Sweden Transport Agency134 has jurisdiction over all RPAS operations and
provides an English translation of their Statute Book entitled TSFS 2009:88.135 All commer-
cial UAS operations, research or tests for commercial operations, and all beyond line of
sight operations require permission from the Agency. UAS activities are divided into four
categories (1A, 1B, 2, and 3), based upon MTOW, impact kinetic energy, and whether the
flight is to be BVLOS. Organizational oversight, insurance, and registration and markings
are required in all categories. Each category has its own specific set of requirements and
limitations. The expected operational limitations for all categories are included (flights
above crowds or urban areas, established safety zones, flights beyond line of slight of the
pilot, flights above 400 feet AGL, and flights in controlled airspace). Pilot qualifications,
flight manuals, flight preparation and planning, meteorology, fuel and battery capacity,
equipment requirements, reporting, communications, airworthiness certification, main-
tenance and documentation, quality control, and organizational integrity are all covered in
detail. The Swedish UAS/RPAS regulations are as comprehensive as in any of the nations
surveyed in this chapter, if not more so.
United Kingdom: The UK CAA published the latest (seventh) edition of CAP722A & B
in 2019.136 CAP722 is split into three separate documents: CAP722 “Unmanned Aircraft
System Operations in UK Airspace – Guidance and Policy,” CAP722A “Unmanned
Aircraft System Operations in UK Airspace –Operating Safety Cases,” and CAP722B
“UAS Operations in UK Airspace –The UK Recognised Assessment Entity.” These three
documents are equal to or exceed in scope of any set of RPAS regulations enacted in any
other nation.
130
CAP722, in its seven editions, was and is intended to provide guidance to those
involved with the development, manufacture, or operation of UAS to ensure that oper-
ational authorizations may be obtained and the required standards and practices are met.
Although intended for nonrecreational users, the guidelines do overlap into the recre-
ational category of activity. The document also outlines the safety, airworthiness, and oper-
ational requirements that have to be met. These comprehensive regulations cover all of the
expected topics that are found in other nations’ UAS regulations.
CAP722A provides guidance for those involved in creating a safety case for supporting
an application to the CAA for operational approval. This would involve a hazard and risk
assessment that reduces or mitigates risk to a “Tolerable” and “As Low As Reasonably
Practicable (ALARP)” level. This document is not strictly regulatory, but provides guidance
and requirements for compliance with the regulations.
CAP722B is intended to harmonize UK regulations with European Union Regulations
that went into effect on July 1, 2020. The term “National Qualified Entity” has thus been
changed to “Recognised Assessment Entity.” The document describes the requirements,
administrative processes, instructions, and guidance related to the Recognised Assessment
Entity (RAE) scheme within the UK. The RAE is an organization approved by the CAA to
submit reports and/or issue certificates on the CAA’s behalf with regard to remote pilot
competency. In other words, organizations that train and certify remote pilots, such as
flight schools, and the list of approved RAEs is also published on the CAA’s website.
In summary, this survey of UAS/RPAS regulations from a select few nations around the
globe reveals many recurring themes. Common elements include aircraft weight and/
or impact kinetic energy categories; speed and altitude restrictions; visual line of sight
requirements; pilot qualifications and training; exclusions from restricted or sensitive areas;
prohibitions from flying over gatherings of people; daytime/nighttime restrictions; registra-
tion and markings; CAA approval for certain types of commercial operations; exemptions
for recreational model aircraft; maximum weight and altitude restrictions; maintenance
requirements; airworthiness standards; SMS and organizational criteria; licensing of pilots,
entities, or operations; operational rules of the air; lighting of aircraft; dropping of objects
and carrying hazardous materials; and third-party liability insurance requirements.
The ICAO RPAS Manual, the EASA U-Space initiative, and the JARUS SORA documents,
all works in progress, will go a long way toward globally harmonizing basic UAS safety
and operational criteria, while still allowing for ICAO Member States to promulgate their
own variations of domestic UAS regulations. Although EASA and JARUS are directly
concerned with European aviation safety, representatives from the FAA participate in their
efforts to facilitate open dialog between the U.S. and its European partners.137 As UAS
become more capable and approach manned aviation airworthiness and safety standards,
global harmonization of the essential system integrity and operational rules becomes an
essential component of the growth of the technology and its many humanitarian and
utilitarian uses.
operators, and regulators as they struggle with staying abreast of the changes and trying
to evolve or enforce existing regulations. As market forces create greater opportunities for
developers and entrepreneurs to invest capital into more sophisticated systems and bring
the industry closer to solving the sense-and-avoid, autonomy, and air traffic management
problems, there is ever-increasing pressure on the FAA and other global CAAs to put into
place regulatory structures that will allow these authorities to reclaim their “ownership”
of the airspace. This necessarily includes implementing reasonable operational, licensing,
and engineering standards through the rulemaking process that will allow the industry to
grow while not negatively affecting the overall safety of the aviation environment.
The first task is to define the scope of what the FAA and other CAAs can and should
regulate. Now that there is a definition of model aircraft that is precise enough to give notice
to the public of the exact nature of the aircraft that will remain unregulated or lightly
regulated, no longer can the clever entrepreneur claim to legally fly a commercial UAS
under the authority of the canceled AC 91.57 in the United States or a lack of specific
prohibitions elsewhere. The typical definition of “model aircraft” includes such factors as
size, weight, speed, performance capability, and kinetic energy, but is now also dictated by
operational intent. A commercially available off-the-shelf (COTS) and popular multirotor
drone that anyone can purchase off the Internet or at a local retail store and learn to fly
in a few hours can be “recreational” one day (video recording the family dog romping
through the forest) and a commercial flight the next day while taking photos of homes for
compensation from a real estate business. A “size, weight, etc.” approach describes the
physical attributes of the aircraft and its systems but now there are precise descriptions of
the locations and altitudes where model aircraft can be flown. The FMRA of 2012 did not
specifically set forth design criteria other than a weight limit of 55 pounds and otherwise
invoked “community-based safety guidelines” for operations, merely requiring coord-
ination with ATC if flown within 5 miles of an airport. If modeling enthusiasts want to
create increasingly larger and faster models that could easily overtake and possibly bring
down a small general aviation aircraft, they must know where those aircraft can be legally
operated and under what conditions.
The civilian UAS community needs to have standards by which admission to the air-
space can be assessed and authorized. Current U.S. and foreign regulations provide work-
able definitions of a “commercial” UAS operation, so that there should be no confusion
about flying a commercial UAS mission with a model aircraft.
The only reasonable alternative left for the FAA and other CAAs is to continue the
rulemaking process, subject to the inevitable lengthy comment and revision schedule, and
those efforts are ongoing as this book goes to press. The outcome of this “sausage making”
process is not clear or readily predictable, as there are many competing interests seeking
influence over the standards and rulemaking processes. Manned aviation (both general
and commercial) has legitimate concerns about UAS intrusions into airport environments
and unsegregated airspace by irresponsible operators, many feeling that it is only a matter
of time before a rogue UAS brings down a manned aircraft, with catastrophic results.
Severe penalties and prison time have not deterred some actors who are either ignorant
of the regulations or choose to flout them in the misguided belief that they would not get
caught. There are many potential gaps in the proposed rules published by the FAA, as
evidenced by the sheer number of comments to NPRMs with which the FAA is presently
dealing. Arguably, the safest approach would be to require that all UASs be fully certified
as airworthy, that their pilots and operators be properly certificated and rated, and that all
airspace regulations be fully complied with, which is essentially the state of affairs in the
United States, Europe, and the Southern Hemisphere. The global system of certification
132
is already in place under the auspices of ICAO’s authority, and all that is lacking are the
standards and guidelines that must be met in each applicable category of regulation.
A second approach in the United States would be to systematically dissect each and every
part and subpart of Title 14 of the CFRs and amend them as necessary, again through the
rulemaking process, as required, to incorporate all known characteristics of unmanned air-
craft. This was also considered and apparently abandoned in favor of chartering the sUAS
ARC in 2008. Many regulations clearly would have no application to UASs (such as those
under Part 121 pertaining to passenger seat restraints or flight attendant requirements),
while a large portion of the remainder could have application by interpretation, and thus
would be candidates for amendment. This process could conceivably take years, but if
undertaken, the most logical place to start would be 14 CFR Part 91, Air Traffic and General
Operating Rules; Part 71, Airspace; on to Part 61, Pilot and Crewman Certificates; and then
to the aircraft design standards found in Parts 21 through 49.
The third alternative is to create an entirely new part to 14 CFR devoted exclusively
to UASs, which would incorporate all the issues of “see-and-avoid” technology, airspace
access, pilot qualifications, manufacturing standards, and airworthiness certification. 14
C.F.R. Part 107 was the first step towards that solution, although as currently written it
does not deal with design and manufacturing standards or airworthiness certification.
Those standards should evolve out of the efforts of ASTM’s F-38 committee, and that was
the recommendation of the sUAS ARC. The FAA delegated the standards development
process for ssUASs to ASTM, and the F-38 Committee and its subcommittees released 23
approved standards, with another 18 in development. Part 107 makes no reference to ASTM
or community-based standards, so the status of the standards that have been developed
remains uncertain pending further clarification from the FAA or issuance of an Notice of
Availability (NOA) of a particular standard.
In the meantime, anticipating the full integration of UASs into the aviation world, the
FAA requires a mechanism to enforce its authority over the airspace and to carry out its
mandate to promote public safety and to do no harm to the current system through lack
of oversight or misguided supervision. This is best accomplished by a rule or statute that
reinforces the FAA’s authority over the airspace and provides for sufficient sanctions
against violators who do not possess certificates to be revoked or suspended, or who are
otherwise immune from civil penalty. Those tools have been provided by the series of
federal statutes enacted since 2015 that specifically address the FAA’s authority over the
national airspace and provide severe penalties for violators of those laws. It is the hope of
this author that the final outcome of the FAA’s rulemaking efforts and the activities of the
various SDOs, combined with future rules that may evolve out of the statutory mandate
of the FMRA, will be a comprehensive, yet user-friendly regulatory scheme for all UASs
in all categories and sizes that can serve as a model to the rest of the world. This vision is
necessary to promote and facilitate the extraordinary economic engine that has evolved in
the few short years since the introduction of small multirotor and fixed-wing sUASs into
the marketplace, while preserving the outstanding record of aviation safety that the United
States has enjoyed for many decades.
5.9 Conclusion
The aviation environment is complex, dynamic, and littered with pitfalls, landmines, and
blind alleys, to mix several metaphors, and the designer, developer, operator, or user of
133
a UAS seeking access to the NAS or international airspace must proceed with caution to
ensure that the rules of engagement are fully understood. The rulemaking and standards
development processes for UASs are underway and are sure to be so for the foreseeable
future. Active involvement by the industry and the user community in the process is not
only encouraged but also absolutely mandatory for the industry to grow and evolve in an
orderly fashion. The opportunities for technological advancement for unmanned systems,
many of which will have a positive impact upon the rest of the world of aviation from a
safety and efficiency perspective, are virtually unlimited. The greatest challenge for the
FAA and its counterparts around the world is to arrive at coherent, rational, and enforce-
able policies, procedures, rules, and regulations governing the operation of RPA, regard-
less of where they are deployed or for what purpose.
Discussion Questions
5.1 Discuss the FMRA of 2012. How did the Act change the regulation of UAS?
5.2 What is the FAA’s “toolbox?”
5.3 List and discuss the three tools the FAA uses to administer the FARs.
5.4 The FAA has supported and sponsored four domestic committees dedicated
to developing standards and regulations for the manufacture and operation of
unmanned aircraft. List and discuss each committee.
5.5 Discuss the relationships between the FAA, EASA, JARUS, and ICAO. Do they
work together or independently?
Notes
1 AC 91.57.
2 Dep’t. of Transp., Unmanned Aircraft Operations in the National Airspace System, Docket No.
FAA-2006–25714 (2007).
3 14 C.F.R. Part 107.
4 Pub. L. No. 112–95, 126 Stat. 11 (2012).
5 5 U.S. Code Chapter 5 §§ 500–596.
6 5 U.S.C. § 553.
7 Public Law 85–726, 85th Cong., 2nd Sess.; 72 Stat. 731; 49 U.S.C § 1301, as amended.
8 49 U.S.C. § 40103 (a)(1).
9 49 U.S.C. § 40103 (a)(2).
10 49 U.S.C. § 40103 (b)(1).
11 49 U.S.C. § 40103 (b)(2).
12 14 CFR Part 1.1 et seq.
13 14 CFR Parts 21–49.
14 14 CFR Parts 61–67.
15 14 CFR Parts 71–77.
16 14 CFR Parts 119–135.
17 14 CFR Parts 91–105.
18 14 CFR Parts 141–147.
19 14 CFR Parts 150–161.
20 14 CFR Parts 170–171.
134
21 www.faa.gov/regulations_policies/faa_regulations
22 Public Law 112–95, 112th Congress, 126 Stat. 11.
23 14 CFR 1.1.
24 14 CFR 1.1.
25 14 CFR 1.1.
26 14 CFR 1.1.
27 Advisory Circular 00-2.11 (1997).
28 Advisory Circular 00-2.11 (1997).
29 United States v. Mead Corp., 533 U.S. 218; 121 S. Ct. 2164; 150 L. Ed. 2d 292.
30 72 FR 6689, Vol. 72, No. 29, February 13, 2007 (Interim Operational Approval Guidance 08-01).
31 FAA Notice 8900.291.
32 Notice 8900.292.
33 FDC NOTAM 4/3621.
34 Notice 8900.268.
35 AC 21-12 and AC 45-2D.
36 www.faa.gov.
37 U.S. Constitution, Amendment 5 and Amendment 14.
38 FAA National Policy Order 2150.3C, FAA Compliance and Enforcement Program, effective 01/
24/20; and Order 8000.373 FAA Compliance Oversight effective 6/26/15; found on Internet
at: http://rgl.faa.gov
39 Pub. L. 115–254.
40 49 U.S.C. § 46106.
41 Anthony J. Adamski and Timothy J. Doyle, Introduction to the Aviation Regulatory Process, 5th ed.
(Plymouth, MI: Hayden-McNeil, 2005), 62.
42 Adamski and Doyle, Introduction.
43 Advisory Circular 91.57B; 49 U.S.C. § 44809 (which seems to acknowledge that recreational
unmanned aircraft are aircraft, but are exempt from regulatory oversight if they are operated
under specific guidelines).
44 14 CFR 1.1.
45 14 CFR 91.119.
46 14 CFR 91.119.
47 14 CFR Part 71.
48 Interview with Benjamin Trapnell, Assistant Professor, University of North Dakota, Lifetime
Member of the Academy of Model Aeronautics.
49 14 CFR 101.11 et seq.
50 14 CFR 101.21 et seq.
51 14 CFR 101.31 et seq.
52 FAA Order 2150.3C.
53 Coppenbarger v. FAA, 558 F. 2d 836, 839 (7th Cir. 1977).
54 49 U.S.C. § 44701(a).
55 49 U.S.C. § 44709 (b); Garvey v. NTSB and Merrell, 190 F. 3d 571 (1999).
56 49 U.S.C. §46301 (d)(5)(A).
57 49 U.S.C. §46301 et seq.
58 49 U.S.C. §46301 (d)(1)(C).
59 Docket No. 2012EA210009 “Order of Assessment.”
60 Public Law 112–95, 112th Congress, 126 Stat. 11.
61 14 C.F.R. § 1.1; 80 Fed. Reg. 78,594 (December 16, 2015)
62 AC 91-57.
63 FAA AFS-400 UAS Policy 05-01, September 16, 2005.
64 AC 91.57B, effective May 31, 2019.
65 FAA AFS-400 UAS Policy 05-01, September 16, 2005.
66 FAA AFS-400 UAS Policy 05-01, September 16, 2005.
67 14 CFR 91.113.
135
68 14 CFR 91.113(b).
69 FAA AFS-400 UAS Policy 05-01, Supra Note 43.
70 14 CFR 91.111(a).
71 FAA AFS-400 UAS Policy 05-01, Supra Note 43.
72 14 CFR 21.191.
73 FAA AFS-400 UAS Policy 05-01, Supra Note 43.
74 FAA AFS-400 UAS Policy 05-01, Supra Note 43.
75 FAA AFS-400 UAS Policy 05-01, Supra Note 43, § 6.13.
76 14 CFR 1.1.
77 72 FR 6689, Supra Note 30.
78 For example, see website for Remote Controlled Aerial Photography Association:
www.rcapa.net/.
79 Public Law 112–95 126 Stat. 11.
80 Docket No.: FAA-2015-0150; Notice No. 15-01.
81 FMRA Sec. 331 Definitions.
82 FMRA Sec. 332 Integration of Civil Unmanned Aircraft Systems Into National
Airspace System.
83 FMRA Sec. 336.
84 FMRA Sec. 332 and 334.
85 FMRA Sec. 333 Special Rules for Certain Unmanned Aircraft Systems.
86 14 C.F.R. 107
87 Pub. L.115–254, FAA Reauthorization Act of 2018
88 Comments by FAA Administrator Michael Huerta at AUVSI Press Conference,
Atlanta, Georgia, May 6, 2015.
89 14 C.F.R. Part 107
90 Pub. L. 114–190, 130 Stat. 615
91 Pub. L. 115–254,
92 https://www.faa.gov/about/reauthorization/
93 www.faa.gov/uas/programs_partnerships
94 Department of Transportation, Federal Aviation Administration, Vol. 84 Fed. Reg.
72,438, FAA Docket No: FAA-2019-1100,
95 www.faa.gov/uas/advanced_operations/section_333/how_to_file_a_petition/
96 www.faa.gov/uas/resources/public_records
97 www.federalregister.gov
98 www.uasvision.com/2014/04/03/faa-rules-out-use-of-military-airspace-for-uav-
tests/
99 https://faa.gov/uas
100 Electronic Code of Federal Regulations: http://ecfr.gpoaccess.gov/cgi/t/text/text-
idx?&c=ecfr&tpl=/ecfr-browse/Title14/14tab_02.tpl.
101 FAA Order 2150.3C, effective January 24, 2020.
102 See, for example, 83 Fed. R. 49,971 “Consensus Standards, Light-Sport Aircraft”
(October 3, 2018)
103 https://fast.faa.gov/EMP_System_Safety_Management.cfm
104 Public Law 112–95 (see note 15, and discussed below).
105 FAA Advisory Circular 91.57B Effective May 31, 2019
106 International Civil Aviation Organization: www.icao.int/
107 https://store.icao.int/products/manual-on-remotely-piloted-aircraft-systems-rpas-
doc-10019
108 www.easa.europa.eu/document-library/opinions/opinion-012020
136
137
6
Human Factors in Unmanned Aerial Systems
Warren Jensen
6.1 Introduction
While remotely piloted aircraft (RPA) are often referred to as “unmanned,” it is clear that
the humans involved and their actions are critical elements to safe operations. The goal of
human factors is to provide operators and support personnel with the necessary know-
ledge, skills, and abilities and to achieve the overall goal of safe, effective, and efficient
operations. The human has a great capacity to learn, perceive, integrate information, and
execute complex decision-making at a high-skill level. Conversely, humans can be vul-
nerable to saturation, fatigue, spatial disorientation, and communication failures, among
other issues. The challenge in the field of human factors is to address these issues through
awareness of human traits and limitations, training programs, proficiency and currency,
137
138
teamwork skill development, and effective workstation design. On the surface, it appears
that the goal of human factors training is simply to minimize or eliminate errors. The overall
goal is to optimize efficiency and effectiveness of humans managing RPA operations.
The purpose of this chapter is to provide a working discussion of some common issues
seen when transitioning to and working with unmanned systems. This chapter must
approach a wide range of operators and their experiences, operating equipment that
can vary in its capabilities, and flying very different missions and conditions. In light of
this concept, this chapter will focus on human performance challenges and strategies to
approach those challenges.
discussion, due to memory distortion or desire to only select what we see as the salient
events that contributed to the mishap.
The concern about hindsight bias stems from the fact that individuals, when transitioning
to new aircraft, systems, or procedures, may look at the case files in a way that does not
consider all the factors that can influence operations. As humans, we prefer to link singular
actions to outcomes, hoping to solve problems with a linear relationship. Even this warning
for hindsight bias is likely to be ineffective. In an article by Paul Goodwin, the author states
that the danger of hindsight is that we “can hinder our learning from … past forecasting
errors, limiting the extent to which we can improve our forecasting skills through experi-
ence” (Goodwin, 2010). Successful strategies to counteract hindsight include working to
gain knowledge about the event and understand how an individual in the situation may
think that their choice was reasonable. It is important to realize that accident reports and
operator-based insights from such events provide excellent learning experiences. The goal
is to use them effectively and keep hindsight bias in check.
Individuals scanning an “empty sky” in search of an RPA or airborne threats may focus
their vision to a point closer than the distance to the vehicle or threat. This altered focus
can impair the detection of those objects. In order to counter those effects, ground obser-
vers are advised to use short, fixed scans to areas of the sky, consciously pushing their focal
length to the threat area. This strategy is used to counter the effect of relative motion and
near-focus anomalies.
6.5 Attention
Charles Wickens’ multiple resource theory was developed to explain human cognitive
challenges of performing simultaneous and/or difficult tasks (Wickens, 2008). The theory
describes brain resources as the brain’s ability to perform tasks (e.g., visual perception,
spatial processing, and motor skills) and also identifies the challenge of sharing a single
resource for two separate tasks. For example, reading a book while driving a car would
share visual perception resources and impair performance of one or both tasks. Attention
is defined as the management of these resources. The resources can be managed several
ways referred to as attention types. An understanding of the attention types can be valu-
able to understand each type’s vulnerabilities, as well as strategies to optimize attention
performance.
Even tasks that do not share resources, but are demanding of the operator, can have
negative consequences. An example of this concept would be asking an individual to
perform an unpracticed flight maneuver while engaging in conversation. While this com-
bination of activities does not appear to share resources, it can affect performance if the
cognitive demands of these tasks are high. Effective crew management involves assigning
tasks that do not share resources.
no foul” may not apply to RPA operations, in that the same error in the future may have
significant consequences. To only identify and correct errors when negative consequences
occur is inefficient at best and would more likely delay the identification and management
of unacceptable risks.
It is evident that well-trained and current operators commit errors. The nature of human
error involves a wide range of activities, from overall strategy and planning errors, to
inadequate monitoring of information systems, to poor technical execution of a skill. Some
errors are inconsequential, which means that there is no negative outcome if they are not
identified and corrected. Many errors are identified and corrected through monitoring
actions of operators or other individuals. Anticipating, monitoring, identifying, and
correcting errors are common tasks in the aviation industry.
Why can errors be difficult to manage? What reasons could explain our resistance to
identify and effectively manage errors in ourselves and others? Part of this issue may be
in the emotional responses we have to errors, whether they are due to the actions of others
or ourselves.
When trained and qualified individuals commit errors, it is seen as an unexpected event.
The operators may be unaware of their error, especially during routine actions. The unex-
pected nature of error can impair in an individual’s recognition, acknowledgment, and
correction of the error. In reality, errors are common and should be expected. Defensive
driving strategies are based on the expectation of errors being committed by other drivers,
and through anticipation of the error and immediate application of correction strategies,
further errors or consequences of those errors can be avoided. Air traffic controllers are
trained to expect errors in communication or understanding, for the purpose of immediate
recognition and corrective action. Training professionals in RPA operations should include
active monitoring and expectation of errors. Anticipation of errors can be crucial for timely
correction as illustrated in the following interview.
Following takeoff and climb-out from an uncontrolled airport, I radioed to the area that
I was departing the airport traffic pattern to the east of the town, climbing through 3,000
feet to a cruise altitude of 5,500 feet. I received a call from another aircraft approaching
that airport, who identified their position (location) to be “west of the town at 3,500
feet, over the high school, inbound for an GPS (global positioning system) approach.”
I recalled there was only one high school in the town and it was on the east side of town,
directly under me. I immediately leveled the aircraft at 3,200 feet and saw the other air-
craft pass overhead. I was fortunate to identify the error—they were east of town, not
west—and avoid a collision.
(Interview with a pilot, 2011)
We can expect to experience distrust of other individuals who commit errors, which is
likely to impair coordination and teamwork. The key is to manage errors as an expected
event, with monitoring and correction strategies in place. Operators should be trained in
error correction strategies.
Negative transfer is a common error when transitioning to new systems with similar
layouts. Negative transfer is using a previous, well-established skill in a new setting in
which the action is incorrect. Transferring from an aircraft to an RPA that uses the same
joystick control, but has different functions for the buttons, would likely lead to an indi-
vidual to perform incorrect actions. A driver who uses manual transmissions, now con-
trolling an automatic transmission, may reach for controls in the wrong location in their
new setting.
144
Organizational influences
Supervisory influence
Preconditions
Operator actions
FIGURE 6.1
Layered error defenses. (Modified from Shappell and Wiegmann, 2000. The Human Factors Analysis and
Classification System—HFACS, DOT/FAA/AM-00/7.)
operations? Would new policies on crew duty days decrease fatigue? Would decreasing
medical certification requirements for operators result in a change of operator reliability?
The defense layers can be changed (for better or worse) by influences at other levels.
The HFACS model presented in the literature identifies further factors to more clearly
classify the issues related to each defense layer. The purpose for these evaluations is to
identify factors and trends that could be corrected and/or studied further.
are likely to be others outside the operations team that would provide input or direct
operations. The fire chief at the site of major fire may suddenly need specific information
that prompts a change in flight. Law enforcement and search and rescue personnel are
likely to have changing needs for the RPA operators as well. The ability to clearly com-
municate needs and capabilities among these users will have an impact on the safety and
effectiveness of the operation. Crew coordination training is an important component of
effective RPA operations.
The initial goals of CRM training involved increasing participative management
and assertiveness in the crews. While a clear chain of command is important in RPA
operations, participative management refers to leaders who involve other crew members
in the decision-making and actions of the team. Assertiveness was advocated to team
members who were not in charge, but needed to clearly advocate their concerns to the
group leader. Both skills are important in the development of teams and should be an
integral part of training. This is especially important for teams who have never trained
together previously.
Effective team management involves other attributes that contribute to the success of
teams. A discussion of these cultural attributes can provide insight to groups regarding
their interactions. This discussion involves the use of power distance, effective commu-
nication, ambiguity resolution, distraction management, and negative transfer. These are
a few of the topics in advanced crew coordination coursework but are considered central
issues in safe operations of unmanned systems.
Power distance is defined as the leader’s consideration of opinions or concerns of indi-
viduals who are not in a position of authority (Hofstede et al., 2010). Leaders who do not
ask for, or consider, others’ opinions would be considered to have a high-power distance.
Conversely, leaders with low-power distance allow others to provide their inputs to con-
duct of the operation. Low-power distance is considered optimal for information exchange
and effective decision-making.
Effective communication within a group supports situation awareness, decision-making
effectiveness, and error management. The use of standardized terminology is an important
component of effectively transferring ideas. Directional guidance, position reporting, and
requests for maneuvers all depend upon terminology that correctly and efficiently conveys
concerns of the operator and support teams. The process of clearly encoding messages and
providing unambiguous inquiries should go beyond classroom discussions to practice in
simulations and operations.
Ambiguity is defined as a finding that can have two interpretations or two indications
whose interpretations conflict (O’Brien and O’Hare, 2007). For example, is the image on
the screen a fugitive with a rifle or a gardener with a rake? The other form of ambiguity
would be an oil pressure alarm sounding, but the oil pressure gauge conflicts this finding,
showing normal operational pressures. The state of uncertainty created by both forms of
ambiguity is a challenge to situation awareness and safe operations.
Sometimes, ambiguity is created by limitations of the mechanical systems (lighting, reso-
lution of the optical system, etc.) or by crew interpretations or expectations of the infor-
mation (engine noise, reflection of sound). Ambiguity may be apparent or unknown to the
operators.
Ambiguity resolution involves strategies to improve situation awareness by gathering
more information from sources, focusing to identify the issues or causes of the ambiguity,
and evaluating the situation to determine the future implications of chosen actions. For
instance, gathering more information regarding the position of a small RPA may involve
asking other ground observers for information, utilizing global positioning information or
147
referring to onboard camera output. Often, ambiguity can be due to faulty assumptions
made by team members. Everyone has a responsibility to identify and resolve ambiguity.
Distraction management involves identifying information or actions not pertinent to the
operation, so as to prevent their influence on the operations. In commercial aviation, some
noncritical alarms are silenced during critical phases of flight, such as takeoff and landing.
Increasing workload with nonrelevant issues is considered a threat. The challenge is to
understand what information is noncritical and, when in high workload operations, when
distraction management strategies should be used.
For example, during launch procedures and obstacle avoidance procedures, it is wise to
limit conversation unrelated to the mission or information that is not needed for that phase of
the operation. Certain information, such as an engine performance abnormality, needs to be
communicated even in a critical phase of flight. The difference can also be skills and experi-
ence of the operator to manage independent channels of information. Be mindful that high
workload periods are not always predictable, nor is it simple to know whether incoming
information is needed or if it creates a distraction. Careful observation and discussions with
experienced operators are important training tools for distraction management.
6.13.1 Vigilance
The task of vigilance requires an individual to direct their attention to information (e.g., air-
craft position, instrument readings, airspace conflicts, structures) that has the most imme-
diate impact on safety. Vigilance is not only managing the appropriate type of attention
but also requires knowledge of the operations to identify and correctly assess the risks
involved. For example, obstructions or low-contrast backgrounds could result in the loss
of RPA visual contact during ground observation operations. Knowledge of this risk assists
the ground observer’s vigilance, allowing them to identify that potential problem prior to
movement in that area.
Vigilance is commonly degraded by distractions. When using focused attention to pro-
vide inputs to the control systems, even momentary distractions can lead to significant
148
6.13.2 Diagnosis
When working in complex systems, correctly identifying and understanding a developing
situation can be challenging. While we may be carefully observing the information systems
we have, coming to a correct diagnosis of the situation can be dependent upon our training
and familiarity with the issues, the nature of the human–machine interface, clarity of com-
munication, ambiguous findings, our problem solving skills, and our bias in interpreting
information. Spatial disorientation is a well-known accident cause in aviation and cases
exist where pilots communicate their inability to interpret the instrument indications,
even when the instruments are providing correct indications. This refers to an aspect of
achieving a correct diagnosis of a problem.
Achieving the correct diagnosis involves many skills. As described by Gary Klein, the
recognition-primed decision model depends upon the user’s prior experiences and their
ability to correlate their current situation (Klein, 1993). This process also requires the oper-
ator to ask questions or make observations to clarify the diagnosis. Klein describes the pro-
cess as creating a story to explain the findings, using experience to shape the explanation.
An individual’s story will also lead them to consider successful alternatives to the problem
and likelihood of success of each alternative.
For example, operators, flying piston-powered RPAs, are trained to recognize loss of
power and quickly identify conditions or malfunctions that are responsible. Information
is gathered and compared to patterns developed during training and experience. RPA
trainees can spend a significant amount of time learning systems (fuel, electrical, etc.) and
training with failure simulations to prepare for these contingencies. The goal is to develop
mental models that can be recalled during the event, such as the loss of power. The oper-
ator, using this prior experience, can quickly identify what information is needed and
create a story to explain the findings.
One challenge to make a correct diagnosis can lie in the clarity of the information
presented to the operator. Incomplete, inaccurate, misleading, or conflicting information
can impair this process. Klein describes an anomaly as a finding or information that does
not fit our explanation (Klein, 1993). For example, when an engine tachometer shows
decreasing performance, but there is no other confirming evidence and the vehicle is oper-
ating normally, the abnormal reading is considered an anomaly. The natural human reac-
tion is to disregard the anomaly because it cannot easily be explained. As professionals,
training emphasizes the need to consider abnormal readings that cannot be explained.
Granted, risk analysis of options we have not performed in the past can be difficult; our
past experience of success in high-risk actions may also mislead us when analyzing risk.
Vicarious learning is defined as an individual whose prior poor choices and safety risks
have not resulted in negative outcomes and, as a result, the individual does not have a real-
istic assessment of the risk they are taking. For example, drivers who use excessive speed,
but have no consequences such as accidents, speeding tickets, or negative comments from
their passengers, may underestimate risks of driving at those speeds. Through their flawed
risk analysis, they may develop a sense of invulnerability in those situations.
6.13.4 Action
Individuals who appropriately monitor their surroundings and correctly diagnose
their situation may still fail to correct the problem appropriately. Students with writing
assignments may delay beginning their work due to complacency. Individuals who commit
errors may not be willing to identify and correct the error, as this will bring attention and
possibly blame and liability. The hesitancy in both these examples would be considered a
loss of situation awareness due to a lack of action.
6.15 Compatibility
In man–machine interfacing, compatibility refers to the consistency of the information
and control systems to the operator’s expectations. There are clear advantages to working
with systems consistent with our prior experience. Laptop computers with similar layouts,
commands, and software programs will result in faster learning, fewer errors, faster reac-
tion times, less mental workload, and greater user satisfaction. Poor compatibility with
inconsistent layouts can result in negative transfer errors. When transitioning to a new
workstation, attention to compatibility can identify aspects that need modification or add-
itional training to achieve compatibility.
and their meaning may not be clear without specific training. Numbers on runways indi-
cate magnetic heading rather than some other numbering strategy. Do the operators
understand the meaning of the colors, symbols, or alarm sounds associated with their
workstations? Are the keystrokes used for commands consistent with the operator’s
expectations?
Spatial compatibility refers to the organization of the information and control systems.
Are the information systems located where the operator would expect them? Are the layers
of menus consistent with expectations? New computer operating systems often challenge
users when the organization is changed. Newer flat panel displays are easier for users to
transition to when the locations are consistent with their prior experiences and therefore
expectations.
Movement compatibility refers to the direction and sensitivity of the movement.
Information systems can have movement compatibility with the deflection of instrument
needles. A fuel gauge needle, for example, that moves in a direction opposite of the user’s
expectation can lead to an error in interpretation. The direction and sensitivity of controls
can also lead to operator error.
Controlling a small, radio-controlled RPA through direct visual observation is a good
example of movement compatibility challenges. While the aircraft flies directly away from
your vantage point, the roll command of the control system consists of roll of the aircraft
in the same direction. Control of the aircraft coming toward you may be more difficult to
translate until you have a greater compatibility with the system.
Operators can learn systems (and become highly skilled) using systems that are ini-
tially poorly compatible. Be aware that systems that are poorly compatible will increase
demands on the users.
Summary of points to be considered as follows:
1. Human error is common. Your job as a safety officer is to identify and manage error.
Be alert and inquisitive to the activities occurring and anticipate errors. Learn and
apply error management strategies in activities for the purpose of incorporating
those actions as a natural process.
2. Consider the complete situation of another individual’s error (as well as your
own). Be insightful of factors that can lead to poor performance, such as lack of
currency, poor communication, and distraction. Do not let hindsight bias interfere
with the effectiveness of incident and accident reviews.
3. Situation awareness is difficult and fragile, at times. We need to work to achieve
and maintain it. All four aspects of situation awareness discussed—vigilance,
diagnosis, risk analysis, and action—need to be actively processed to attain it.
Distraction management strategies should be discussed and implemented with
your team.
4. RPA operations can be perceptually challenging. Recognizing perceptual
limitations to identify threats or the correct orientation of your RPA are necessary
to correctly manage an operation. Spatial disorientation is a common concern in
RPA operations due to the altered perceptions operators receive.
5. Attention is the ability to manage the inputs, processing, and outputs of your brain.
The attention type will change rapidly and, at times, to the detriment of safety and
effectiveness. Key strategies for improving task performance are to understand the
challenges and employ corrective strategies of each attention type. For example,
when operators are in focused attention while the RPA is negotiating obstacles,
distraction management actions should be used.
151
6. Crew resource management development has included many useful team actions
to identify and resolve problems in real-time operations. CRM training is highly
recommended for RPA teams and groups in which they interact.
7. Human– machine interactions can be challenging. Proficiency, currency, and
developing correct mental models of the systems you are using cannot be
overemphasized.
Recommended Readings
A Summary of Unmanned Aircraft Accident/ Incident Data: Human Factors
Implications, Kevin Williams, USDOT, 2004.
Documentation of Sensory Information in the Operations of Unmanned Aircraft
Systems, Kevin Williams, FAA, USDOT, 2008.
Defensive Flying for Pilots: An Introduction to Threat and Error Management, Merritt
and Klinect, FAA, Human Factors Division, 2006.
The Human Contribution, James Reason, Ashgate Publishing, 2008.
Discussion Questions
6.1 Describe the traits that can be seen in hindsight bias situations. Provide an example
of one or more of these traits in a real life aviation mishap and discuss how that
behavior could have affected the judgment or assessment of the event by the
person or persons involved.
6.2 Traditionally, UAS/RPA operations in most countries have required the services
of a Visual Observer (VO) for Beyond Visual Line of Sight (BVLOS) flights. More
recently some civil aviation authorities are permitting BVLOS operations without
a VO. Describe the human factors that could impact the need or lack of need for
VOs in the BVLOS environment. What limitations, either operationally or tech-
nically, or both, should be imposed for BVLOS flights in non-segregated (mixed
manned and unmanned aircraft) airspace?
6.3 What is “negative transfer”? Discuss how that phenomenon could impact the ability
of a manned aircraft pilot to safely and competently serve as pilot in command of
a remotely piloted aircraft. Give eamples and possible or likely outcomes of nega-
tive transfer.
6.4 Describe the fundamentals of crew resource management. Give examples and dis-
cuss CRM challenges in the aviation environment and how failure to meet those
challenges can lead to a mishap or tragecy.
References
Eastern Airlines, Inc, L-1011, N310EA, Miami, Florida, December 29, 1972, NTSB report AAR-73/14.
152
Garland, D.J., Wise, J.A., and Hopkin, V.D. (Eds). 2010. Handbook of Aviation Human Factors, second
edition, Taylor & Francis, Boca Raton, FL.
Goodwin, P. 2010. Why hindsight can damage foresight. International Journal of Applied Forecasting, 17,
5–7. www.forecasters.org/foresight, retrieved 5/29/2015.
Hofstede, G., Hofstede, G.J., and Minkov, M. 2010. Cultures and Organizations: Software of the Mind,
third edition. McGraw-Hill, New York.
Klein, G.A. 1993. A Recognition-Primed Decision (RPD) Model of Rapid Decision Making (pp. 138–147).
Ablex Publishing Corporation.
Lauber, J. 1984. Resource management in the cockpit. Air Line Pilot, 53, 20.
O’Brien, K.S., and O’Hare, D. 2007. Situational awareness ability and cognitive skills training in com-
plex real-world task. Ergonomics, 50(7), 1064–1091.
Reason, J.T. 2008. The Human Contribution. Ashgate Publishing Limited, Burlington, VT.
Roese, N., and Vohs, K. 2012. Hindsight bias. Perspectives on Psychological Science, 7(5), 411–426.
Senders, J.W., and Moray, N.P. 1991. Human Error: Cause, Prediction and Reduction. Lawrence Erlbaum
Associates, Hillsdale, NJ, p. 25.
Shappell, S., and Wiegmann, D. 2000. The Human Factors Analysis and Classification System—HFACS.
DOT/FAA/AM-00/7, Office of Aerospace Medicine, Washington, DC.
Shappell, S., Detwiler, C., Holcomb, K., Hackworth, C., Boquet, A., and Wiegmann, D. 2006. Human
Error and Commercial Aviation Accidents: A Comprehensive Fine-Grained Analysis Using HFACS.
Springfield, Washington, DC.
Weiner, E., Kanki, B., and Helmreich, R. 1993. Cockpit Resource Management. Academic Press,
London, UK.
Wickens, C. 2008. Multiple resources and mental workload. Human Factors, 50(3), 449–455.
Williams, K.W., and Gildea, K.M. 2014. A Review of Research Related to Unmanned Aircraft System Visual
Observers. DOT/FAA/AM-14/9, Office of Aerospace Medicine, Washington, DC.
newgenprepdf
153
7
Safety Assessments
7.1 Introduction
For years, the aviation field has been rapidly advancing in technology. With all the change,
aviation organizations and manufacturers have found themselves faced with new safety
issues and ever-changing safety requirements. The unmanned aerial system/remotely
piloted aircraft (UAS/RPA) field is no different. In fact, safety in this arena is more of a
concern. With no onboard pilot, complex operating systems, ever-changing avionics, and
continuous software updates, safety appears to be one of the major hurdles for integrating
UAS/PRA into the National Airspace System.
In this chapter, several safety tools and techniques, such as the hazard analysis and its
various forms, will be explored. The risk assessment process will be examined and some
153
154
guidance will be provided to develop a risk assessment tool. And finally, safety evaluations
will be discussed, and some thoughts on UAS/RPA accident investigation considerations
will be shared.
7.2.1 Purpose
Hazard analyses are common tools found in the system safety arena. Generally, these
tools are used throughout the various stages of a product life cycle. In his book System
Safety for the 21st Century, Richard Stephens identifies the various stages of a product life
cycle. These stages or phases are concept, design, production, operations, and disposal.
Although in UAS/RPA operations, the development of a product throughout its life cycle
is not specifically targeted, the operational phase is of importance. The UAS/RPA oper-
ational phase can be subdivided into several general stages: Planning, Staging, Launch,
Flight, and Recovery. Applying the appropriate hazard analysis tool within each stage will
allow for early identification and, ultimately, early resolution of safety issues.
RL = Risk Level, RRL = Residual Risk Level Probability, Severity, and Risk Levels defined in MIL-STD- 882D/E
FIGURE 7.1
Preliminary hazard list/analysis (PHL/A).
matrix in MIL-STD-882D/E, it can be determined that the risk RL for that hazard is a 10.
Note that the higher the number, the lower the risk. While developing a custom PHL/A, be
careful. Not all risk matrices are alike, and some will be organized so that a lower number
signifies a lower risk.
lower or increase the RL. Obviously, if the RL has increased, then that particular mitigating
action should not be implemented.
The last column is labeled as Notes. This is fairly self-explanatory. If there are any spe-
cial concerns or instructions needed for the implementation of the mitigating actions, they
should be listed in this column in some detail. Keep in mind that the completed PHL/A
worksheet is an initial hazard identification tool. Once the UAS activity is underway, an
operational hazard analysis should be performed to evaluate the hazards after the miti-
gating action has been applied. The main purpose for using the hazard analysis tool is
to provide the user with a systematic approach to identifying, analyzing, and mitigating
hazards early in the UAS/RPA operational cycle.
RL = Risk Level, RRL = Residual Risk Level Probability, Severity, and Risk Levels defined in MIL-STD- 882D/E
FIGURE 7.2
Operational hazard review and analysis (OHR&A).
7.3.1 Purpose
The risk assessment tool serves two purposes. First, it provides the UAS/RPA operator with
a quick look at the operation before committing to the flight activity (a go/no-go decision).
The second is that it provides the safety and management real-time information needed to
continually monitor the overall safety of the operation. This tool should be completed by
the UAS/RPA operator before each flight and briefed to the crew. The briefing should, at
the least, consist of a review of the risks, hazards, and concerns associated with the activity.
158
Crew/Station: / /
/ /
Total
RISK LEVEL
20–30 31–40 41–50 51–64
LOW MEDIUM SERIOUS HIGH
FIGURE 7.3
Small UAS risk assessment.
159
This tool is meant to be an aid in the decision-making process and should not be the only
means used to make a go/no-go decision.
7.3.2 Development
The risk assessment tool shown in Figure 7.3 was designed for small UAS/RPA operations
and is meant to be an aid in the decision-making process. Each risk assessment tool should
be tailored for the specific operation it will assess. To get started, those involved directly
with the operation are assembled to discuss operational factors such as weather, crew
rest, and airspace, and consider the items listed on the PHL/A that would change in each
flight cycle.
Once the list is developed, the next step is to identify how each factor can change in
terms of probability and severity. At this point, a decision must be made about whether or
not to use a numerical ranking scale. If not, that is fine; but be aware that a nonnumerical
system may not provide an easy way to identify the overall total RL (low, moderate, ser-
ious, and high). Whichever method is chosen, it is recommended that some type of ranking
system be used. The one in Figure 7.3 is a numeric system with a total value scale listed at
the bottom of the sheet. Attached to each total value scale is a total RL category (low, mod-
erate, serious, and high). These categories, along with an example risk index, are listed in
MIL-STD-882D/E and in the Appendix. The numerical scale makes computer tracking and
monitoring of overall operational risk easier. The overall risk category aids in briefing team
members and gives them a meaningful RL for the operation.
Periodic review of the risk assessment tool is needed to determine the effectiveness of
the tool and to update it as necessary when some of the identified factors have changed
(Shappee 2006). This could be due to a platform change or because the operational factor
or hazard was eliminated. It is also a good idea to review the OHR&A and change analysis
to determine if any of the newly identified hazards need to be considered.
7.3.3 Use
To use the risk assessment form in Figure 7.3, start by listing the crew and their position
or station. Next, move to the matrix and start with the left-hand column where the first
operational factor, Mission Type, is located. Move right to reach the type of mission. The
choices listed are “Support,” which covers a broad range of activities like disaster response;
“Training,” which may include instruction for a new UAS/RPA operator; “Payload Check,”
which covers upgrades to a payload or new payloads; and “Experimental,” which would
involve a new vehicle or vehicle type, or a new UAS/RPA operation.
In the first row, if the mission is a training mission, the associated risk number is 2, which
should be entered in the far-right column. An experimental mission is 4, and other types of
missions have different risk numbers. Whichever mission type is chosen, the risk number
should be placed in the far-right column. Continue down the operational factors list in the
left column and move right to the associated RL that fits the planned flight, and place that
number in the far-right column. As can be seen, the farther right, the greater the associated
RL. Once the RL is determined for each operational factor, the numbers in the far-right
column are added to determine the total risk value.
Once the total risk value has been calculated, the MIL-STD-882D/E range (low, medium,
serious, and high) can be identified. For instance, a total value of 26 means that the risk is
low. Below the RLs, there are spaces for aircraft number, aircraft type, flight released by,
date, and time. All are self-explanatory except the “flight released by.” This space should
160
be reserved for someone with management authority, such as the Chief Pilot and Mission
Director. The idea behind this is to have management review each evaluated operational
factor and the total overall risk value, and sign for risk acceptance. Remember that this is
just a tool to help assess the risk and safety of the operation and should not be the only
means of determining a mission go or no-go.
In the matrix section, a few of the operational factors listed in the left column warrant
further explanation. Hardware changes are items such as wing sets and engines. Items like
operating system updates or new versions of software would fall under software changes.
Under the operational factor of airspace of operation, there is a category for special use.
A good example of special use would be for restricted areas or in an area with temporary
flight restrictions (TFRs). In the same row are Class C, D, E, and G airspaces. As the involve-
ment of air traffic control is decreased, the RL values increase. Currently, the two predom-
inant airspaces for civil UAS/RPA operations are restricted areas and E and G—providing
that the operation has some type of authorization or waiver such as a certificate of author-
ization (COA). When it comes to other range/airspace activities, there is a choice of yes
or no. The idea behind this operational factor is that if other aircraft are in the vicinity/
airspace or restricted area, they could constitute a hazard and should be considered. The
last item is UAS grouping. Detailed information on these groups can be found on the FAA
website. In general, these groupings address a variety of items, including weight limits,
speed limitations, and altitude restrictions.
is a Boolean logic tree that rolls all of the known failure modes and their rates into a single
aircraft reliability number. The known failure modes are derived from the FMECA. Clearly,
the lower the assessed aircraft reliability, the higher the risk assessment.
The component-level failure rates may be produced from actual field data, vendor data,
or commercially available failure rate tables. The best data come from similarly designed
parts operating in a similar environment. The further the usage environment deviates, the
less useful the data become. For example, the reliability data for a fielded component are
more accurate than data obtained in a laboratory environment that cannot easily simulate
all of the overlapping factors.
As stated earlier, the purpose of risk assessment is twofold. First, it provides the UAS/
RPA operator with a quick look at the operation before committing to the flight activity (a
go/no-go decision) and should be completed before every flight activity. Second, it allows
safety and management that means to review operational risks and continually monitor
the overall safety of the mission. It is this review and continuous monitoring, plus the
completed risk assessment tools that provide the needed data to show an acceptable level
of risk for the flight operation.
10
8
7
5&6
11
4 2&3 12
FIGURE 7.4
Airworthiness test card.
Standard aircraft airworthiness code is generally divided into seven major sections:
General; Flight Characteristics; Structure; Design and Construction; Powerplant Installation;
Equipment; and Operating Limitations and Information. Engines and propellers are cer-
tified separately from the aircraft. UAS/RPV differ from standard aircraft because of the
separation of the aircraft from the flight controls. Additional consideration is given to how
the aircraft responds to a lost link when the ground control station is no longer able to com-
municate with the aircraft.
The procedure for obtaining airworthiness approval is similar, regardless of the air-
worthiness authority. First, the aircraft manufacturer and the airworthiness authority agree
on the airworthiness code that will be the basis of certification and on which requirements
apply. For example, MIL-HDBK-516 covers both fixed wing and helicopter requirements
Second, the manufacturer and airworthiness authority agree on the means of compliance.
There are four basic means of compliance in rank of increasing significance: inspection,
analysis, demonstration, and test. Some airworthiness authorities break these categories
down even further. There are prescribed, acceptable means of compliance for many air-
worthiness requirements which the FAA provides in the aircraft circulars (AC). While
these are the generally accepted ways of showing compliance, the manufacturer may show
compliance with an alternate means with the airworthiness authority’s approval.
163
Third, the aircraft manufacturer develops the compliance artifacts in accordance with the
negotiated means of compliance. An internal airworthiness reviewer, familiar with gener-
ally accepted practices, reviews the artifacts prior to submission to the authority to help
ensure approval. The airworthiness authority may accept or reject the compliance artifacts
provided; but the aircraft manufacturer has the opportunity to readdress the rejected
artifacts. Finally, once the airworthiness authority is satisfied, airworthiness approval is
granted and the aircraft is certified.
Changes to the aircraft after certification require airworthiness reassessment. These
modifications may be design improvements, vendor changes, or even changes in the
manufacturing plant where a component is made. Even a simple change may introduce
unforeseen interactions that adversely affect the overall aircraft airworthiness. Only those
portions of airworthiness code affected by the change are readdressed.
Continuing airworthiness is a set of instructions used to maintain an aircraft in safe
working condition throughout its life. Before an aircraft can obtain an airworthiness certi-
fication, the aircraft must have certain Mandatory Continuing Airworthiness Information
(MCAI) that includes maintenance manuals, replacement intervals for life limited parts,
inspection procedures, requirements for modification of the aircraft, and requirements for
amending the operating limitations and procedures. The aircraft operator is required to
follow the MCAI to maintain the aircraft airworthiness.
TABLE 7.1
Excerpts from MIL-STD-882D/E
Example Mishap Probability Levels
Catastrophic I Could result in death, permanent total disability, loss exceeding $1M,
or irreversible severe environmental damage that violates law or
regulation
Critical II Could result in permanent partial disability, injuries, or occupational
illness that may result in hospitalization of at least three personnel,
loss exceeding $200 K but less than $1 M, or reversible environmental
damage causing a violation of law or regulation
Marginal III Could result in injury or occupational illness resulting in one or
more lost work days(s), loss exceeding $20 K but less than $200 K,
or mitigable environmental damage without violation of law or
regulation where restoration activities can be accomplished
Negligible IV Could result in injury or illness not resulting in a lost work day,
loss exceeding $2 K but less than $10 K, or minimal environmental
damage not violating law or regulation
Frequent 1 3 7 13
Probable 2 5 9 16
Occasional 4 6 11 18
Remote 8 10 14 19
Improbable 12 15 17 20
Designed out 21 22 23 24
1 Definitions of descriptive words may have to be modified based on the quantity of items involved.
2 The expected size of the fleet or inventory should be defined prior to accomplishing an assessment of the
system.
165
with the specific operating software and components will be needed to evaluate these
categories.
It is an advantage to have someone with these special skills in this area on the team
responsible for conducting UAS/RPA accident investigations. Another benefit to having
members who are very familiar with the software and hardware of the system is that most
of the UAS/RPA systems record flight and operational data. With the expertise of these
individuals, data can be extracted and interpolated from the flight. The type of information
that is extracted is similar to the information that is retrieved from a flight data recorder.
They can also help simulate a reconstruction of the entire flight.
7.5.3 Suggestions
If tasked with investigating a UAS/RPA accident, here are several suggestions that might
help. First, do not try to tackle the investigation alone. Experts who are familiar with the
field will be needed to help acquire and analyze the information. Second, have a plan to
get organized and know the major areas of the investigation. One tool that may help is the
investigation roster, as shown in Figure 7.5. This roster lists the major areas of focus on an
investigation, and provides space to assign team members to specific tasks.
Section chair
Operations
Pilot/maintenance
Safety assessments
Human factors
Software/Hardware
Weather/Airfield
Structures/Perf
Witnesses
Other
FIGURE 7.5
Investigation roster.
the safety of operations. Second, spend some time reviewing the references listed for this
chapter.
Discussion Questions
7.1 List and discuss each of the UAS/RPA operational phases.
7.2 Define probability and severity.
7.3 Discuss the differences between the PHL/A and the OHR&A.
7.4 What are the two purposes of the risk assessment?
7.5 What is the purpose of the safety evaluation?
7.6 Discuss some of the differences between manned and unmanned accident
investigations.
References
DOD. 2000. MIL-STD-882D Standard practice for system safety.
167
FAA. 2009. Small unmanned aircraft systems aviation rulemaking committee. Comprehensive set of
recommendations for sUAS regulatory development.
Maguire, R. 2006. Safety Cases and Safety Reports. Burlington, VT: Ashgate Pub Co.
Shappee, E. 2006, March. Grading the go. Mentor, 8(3), 12.
Stephans, R. 2004. System Safety for the 21st Century. Hoboken, NJ: Wiley-IEEE.
168
newgenprepdf
169
8
Export Control and ITAR
8.1 Introduction
This chapter focuses on U.S. export control regulations relating to unmanned aircraft
systems (UAS), components of UAS, launch systems, payloads, and related equipment.
Export controls regulate the movement of many physical goods associated with UAS from
the United States to other countries, and they also cover releases of software and “know
how” outside the United States that occur through a variety of mechanisms, including
emails, phone calls, and the use of shared databases. Surprisingly to some, the rules cover
releases of certain information to non-U.S. persons completely inside the United States.
The regulations also apply to U.S. person activities worldwide, such as when a U.S. citizen
travels to another country.
Violations of these rules undermine U.S. national security (NS). Violations can also lead
to criminal penalties, including jail time in some circumstances, to high dollar civil pen-
alties, denial of export privileges, and a prohibition on selling to the government, not to
mention reputational damage. Moreover, while U.S. export controls are enforced much
more energetically than other countries’ programs, because most of the controls discussed
in this chapter originate in international agreements, many countries have the same basic
rules in place.
169
170
U.S. export controls require specific U.S. government export licenses for many exports of
commercial and virtually all military UASs and certain vehicle control software. Specific,
case-by-case export approvals are also required for releases outside the United States and
inside the United States of a good deal of “know how” to non-U.S. persons, especially
of information related to product development. This chapter will provide you with an
understanding of the basic rules regarding export controls on military and commercial
UASs, and it will familiarize you with the two principal U.S. government agencies that
administer those rules. We will review the real-world consequences of not complying with
the rules, and describe how to develop a system to help avoid violations.
Export controls and economic sanctions have been around for thousands of years, such
as when the city of Athens refused to trade with Megara in 432 b.c.1 U.S. history is full of
examples of export controls and embargoes. For example, on October 20, 1774, during the
first meeting of Congress in Philadelphia, the adopted Articles of Association stated that
if Britain’s Intolerable Acts were not repealed, the United States would boycott British
products, and plans were also outlined for an embargo on exports to England.2 In 1917,
Congress passed the Trading With the Enemy Act, which was designed to restrict certain
types of exports and activities during World War I. Certain parts of this law are still in
effect.3 The Export Control Act of 1940 was passed to address concerns that led to World
War II, and it was amended over time.4
More recently, the Arms Export Control Act of 1976 (AECA) created additional authority
to control the import and export of defense articles and defense services, which includes
certain types of unmanned vehicles.5 Executive Order 11958 delegated the administra-
tion of the AECA to the U.S. Department of State, and its Directorate of Defense Trade
Controls (DDTC) works closely with the U.S. Department of Defense (DoD) and other
government agencies to establish policies, issue licenses, and agreements, and enforce the
regulations, as described in more detail below.6 The AECA, which is implemented in the
International Traffic in Arms Regulations (ITAR) at 22 C.F.R. § 120–130, requires overseas
parties that receive defense articles from the United States to use them for legitimate self-
defense and not transfer those articles without permission from the U.S. government. The
U.S. State Department’s export licensing decisions under the ITAR must consider whether
the proposed shipments would help trigger an arms race, contribute to the proliferation
of weapons of mass destruction, support terrorism, increase armed conflict, or under-
mine arms control and nonproliferation agreements, among other goals. These statues and
regulations are the basis for controls on military UAS and associated items.
Nonmilitary export controls on “dual-use” items (commercial items that could also be
used for a military, terrorist, or weapons proliferation purpose) are administered principally
by the U.S. Department of Commerce’s Bureau of Industry and Security (BIS), principally
under the Export Control Reform Act (ECRA) of 2018.7 BIS uses the Export Administration
Regulations8 (the EAR [properly pronounced “E” “A” “R”, not the thing you use to hear])
to administer dual-use exports, including exports of certain UASs, software, know how,
and numerous payloads, among other items. The dual-use controls emphasize protecting
NS, while also trying to ensure that legitimate commercial activity is allowed to proceed
without undue disruption. We will see that this is quite challenging because the level of
export controls on dual-use UAS is higher than you might expect, and as a result, many
exports of commercial systems require formal export licenses issued by BIS for shipments
to specific customers for approved end uses.
Please remember that this chapter is an overview regarding this complex topic that
should be treated as an introduction and not an endpoint. Export control rules are varied
and detailed, so the specifics of any “real-world” activity that has any international twist to
171
it need to be evaluated carefully under the applicable rules to be sure you and the people
you are working, researching, and studying with do not violate the law. In addition, export
control laws are dynamic and are revised regularly, so the regulations cited in this book
need to be checked for continued applicability.
“Category I items include complete rocket and unmanned aerial vehicle systems
(including ballistic missiles, space launch vehicles, sounding rockets, cruise missiles,
target drones, and reconnaissance drones), capable of delivering a payload of at
least 500 kg to a range of at least 300 km, their major complete subsystems (such as
rocket stages, engines, guidance sets, and re-entry vehicles), and related software and
172
technology, as well as specially designed production facilities for these items. Pursuant
to the MTCR Guidelines, exports of Category I items are subject to an unconditional
strong presumption of denial regardless of the purpose of the export and are licensed for
export only on rare occasions. Additionally, exports of production facilities for Category
I items are prohibited absolutely.”10
“Category II items include other less- sensitive and dual- use missile related
components, as well as other complete missile systems capable of a range of at least 300
km, regardless of payload. Their export is subject to licensing requirements taking into
consideration the non-proliferation factors specified in the MTCR Guidelines. Exports
judged by the exporting country to be intended for use in WMD delivery are to be
subjected to a strong presumption of denial.”11
Products –Think about a physical object, such as an entire UAS, or an imaging system that
will become part of the payload for a UAS. Certain cameras and imaging systems are con-
trolled under the ITAR. Others are principally designed for commercial end uses, but they
may be sophisticated and potentially useful for military or terrorist end uses. If these com-
mercial/dual-use items meet specific control criteria listed in the Commerce Department’s
EAR, they may require a license for shipment to certain countries.
Software –Software can be controlled for export on its own or while integrated with a
physical product. Software that contains encryption functionality, as so much does these
days, is subject to export control.
Re-export – Think about a U.S.-made product that is shipped from the United States
under an export license naming ABCD Company in Germany as the end user. After the
product has been used by ABCD Company for six months, the president of the company
sells the product and ships it to EFGH Company in South Africa. This U.S. product has
been re-exported from Germany to South Africa. U.S. export control laws are different
from most other country’s laws because that second shipment is generally still controlled
by U.S. licensing authorities and it may require a U.S. re-export license.
Technical Assistance Agreement (TAA) –This is an agreement between a university,
company or individual, and the U.S. government (specifically the U.S. Department of
State, DDTC) about what military know how (technical data) may be shared with non-
U.S. entities or persons as part of a project. Note that the Department of State also issues
technology export licenses that are typically more specific than the broader project-based
subject matter typically covered by a TAA.
Technology (EAR) or Technical Data (ITAR) –Think about “know how” that is required
to develop, produce or, sometimes, even use an export-controlled item. Sending one
export-controlled item outside the United States without a license can create a serious vio-
lation of the law, but what about exporting the know how required to produce thousands
of those items? Enforcement agencies are very worried about exports of controlled know
how, which can occur in so many forms these days –in computer files, email attachments,
phone conversations, and in many other forms.
Transfer –Think about that product that went from the United States to ABCD Company
in Germany. Instead of sending it to South Africa, what if the president sold it to GHIJ
Company in another town in Germany? That would be a transfer. Such transfers can also
be controlled under U.S. export control rules.
Unmanned aerial vehicle (UAV) –The Commerce Department’s regulation on commer-
cial/dual-use items (15 C.F.R. Part 772) defines a UAV as “any ‘aircraft’ capable of initi-
ating flight and sustaining controlled flight and navigation without any human presence
on board.”
173
In addition, according to section 744.3 of the EAR, unmanned air vehicles, which are
the same as “unmanned aerial vehicles,” include, but are not limited to, cruise missile
systems, target drones and reconnaissance drones.12
Sending or taking a defense article out of the United States in any manner, including
data on a device or carried, except by mere travel outside of the United States by a
person whose knowledge includes technical data; or
Transferring registration, control or ownership to a foreign person of any aircraft,
vessel, or satellite covered by the U.S. Munitions List (USML), whether in the
United States or abroad; or
Disclosing (including oral or visual disclosure) or transferring in the United States
any defense article to an embassy, any agency or subdivision of a foreign govern-
ment (e.g., diplomatic missions); or
Disclosing (including oral or visual disclosure) or transferring technical data to a for-
eign person, whether in the United States or abroad; or
174
Performing a defense service on behalf of, or for the benefit of, a foreign person,
whether in the United States or abroad.16 (As discussed, the ITAR definition is a bit
different from the EAR definition.)
Do not forget that data are exported when you carry a laptop, smartphone, and any other
electronic device that has export-controlled data stored in it. You might need an export
license to export that data or device, or you might be able to use a license exception to carry
the item with you on overseas travel.
Traditionally, there has been an unconditional strong presumption of denial (Category
I) or a presumption of denial (Category II) for license applications for most military UAS,
in line with multilateral obligations under the MTCR (see the section on MTCR in the
glossary above). That policy was loosened somewhat in February 2015, when the U.S. State
Department opened the door to allow additional exports of these items to certain allies
under specified conditions. The new policy was implemented to provide enhanced “oper-
ational capabilities and capacity of trusted partner nations, increasing U.S. interoperability
with these partners for coalition operations, ensuring responsible use of these system, and
easing the stress of U.S. force structure for these capabilities.”17 In addition, the new policy
is designed to align with developments in the UAS industry, such as wider availability
of systems and the emerging commercial UAS market. This will be discussed further in
the following sections. The U.S. government has examined further loosening of military
unmanned vehicle exports to U.S. allies to expand opportunities for overseas military
sales by the United States and to blunt development and sales by foreign competitors of
U.S. defense contractors. In support of that effort, on May 21, 2019, the State Department
released a fact sheet on the U.S. Policy on the Export of UAS, which outlines five primary
objectives to UAS transfers as follows: Increase trade opportunities for U.S. companies, bol-
ster partner security and counterterrorism capabilities, strengthen bilateral relationships,
preserve U.S. military advantage, and prevent proliferation of weapons of mass destruc-
tion delivery systems.18
If you wish to export a UAS that qualifies as a defense article, or share know how
relating to how to develop or produce that article, you must get an ITAR license or a
special agreement from DDTC. DDTC has been delegated ultimate authority to decide
what items it controls under the ITAR and which are under BIS jurisdiction. Exporters are
still permitted to self-classify their products as ITAR or EAR items so long as they do so
strictly in line with the control language in the regulations. But they can also seek written
guidance from DDTC in the form of a Commodity Jurisdiction (CJ) if they wish. This is
done through the State Department website using the DS-4076 CJ Determination form.
When filing: describe the product, why it should or should not be classified as a defense
article, and provide evidence to support your assertions as to why it is within or outside
the legal requirements of the USML. So, if someone it not sure whether to classify their
UAS as a military or dual-use item, they can ask DDTC for a written answer in a CJ appli-
cation. The determination provided can be relied on by the applicant and can be used
as a proof of the government-approved classification with potential customers, vendors,
suppliers, and others.
Because both the ITAR and the EAR are “strict liability” regimes, exporters are respon-
sible for getting their classifications right. If they misclassify their products and ship
without a required export license, they can be subject to substantial penalties, whether
they knew exactly what the rules were or not. If an item is not under ITAR jurisdiction,
that almost always means that it is a dual-use item and BIS, after consulting with other
175
FIGURE 8.1
Export control agency responsibility.
U.S. government agencies, is responsible for issuing export licenses and enforcing the rules
related to those shipments.
As shown in Figure 8.1, in addition to the state (DDTC) and commerce (BIS) controls
on exports, the United States implements certain very strict trade embargoes and eco-
nomic sanctions, which are also part of the U.S. export control regime. For example, with
very narrow exceptions for certain informational materials (e.g., a newsletter) and certain
humanitarian items such as food, medicine, and medical equipment, U.S. persons cannot
conduct financial transactions or made exports to Cuba, the Crimea region, Iran, North
Korea, or Syria without an export license from the Department of Treasury’s Office of
Foreign Assets Control (OFAC). Those licenses are very difficult, or impossible, to obtain.
Exports of military items are administered by the U.S. Department of State, which
works closely with the Department of Defense to administer export controls on mili-
tary UAS’s through the ITAR (22 C.F.R. 120 et seq.), which implements U.S. controls and
international controls like those in the MTCR. Exports of commercial/dual-use UAS’s
176
and associated items are administered by the U.S. Department of Commerce through
the EAR (15 C.F.R. 730 et seq.), which again implements U.S. and international controls
on commercial/dual-use items included in the MCTR and the international Wassenaar
Arrangement. Licensing is determined at both agencies by the characteristics of the UAS
and its function, who is receiving the item, and what they intend to do with it, among
other factors. Both agencies also have lists of countries, companies, and individuals that
are prohibited or severely restricted from obtaining products and know how from the
United States. In summary, commercial/dual-use items are regulated through EAR and
its classification system called the Commerce Control List (CCL). Defense-related articles
and services are regulated through ITAR and its classification system called the United
States Munitions List (USML).
The EAR consists of a list of controlled items that are assembled on the CCL,20 a country
chart that shows where CCL listed controlled items can be shipped,21 a set of general pro-
hibitions that indicate what exporters cannot do,22 prohibitions on certain activities by
U.S. persons,23 end use restrictions that apply to all items subject to the regulations, and a
variety of other instructions. Not all parts of the EAR can be explained, or even referenced,
in this short chapter. We will focus on some of the CCL categories that cover UAS, UAS
software, and UAS technology and some of the other EAR controls. Other issues are neces-
sarily left for the reader to research.
CCL categories are broken up into five sections that contain ECCNs with different numbers.
The “product” sections are A (systems, equipment, and components), B (test, inspection,
and production equipment), and C (material). Section D covers software and E covers tech-
nology (know how). Within each of these sections are the ECCNs.
178
As an example, here is an edited, simplified version of the principal ECCN for unmanned
aircraft on the CCL (there are many other relevant ECCNs, but this one is particularly
important to understand). Because so much of this entry has been removed to help readers
understand it more easily, it is important to review the full entry for any “real life” issues:
In order to determine if a UAS you are considering exporting needs a license, first you
need to be sure that it is not controlled by the ITAR, then you need to determine if it meets
the criteria described in one of the 9A012 subcategories (or another ECCN category). If it
does, then you need to determine the “reason for control,” listed in the ECCN. As indicated
above, in ECCN 9A012, two of the listed reasons for control are NS1 (for national security
column 1) and MT1 (a MTCR control). Once you determine the reason for control that
applies to the items qualifying for classification under 9A012, you take that reason for con-
trol to the Commerce Country Chart found in the EAR and see if a license is required for
that reason for control for the country you would like to ship the product to. See Figure 8.2.
For example, say we wanted to ship an ECCN 9A012 UAS to Algeria. You see in the
figure below, which is a part of the Commerce Country Chart that comes from Supplement
1 to Part 738 of the EAR and that there is an “X” in the NS1 box and the MT1 box after
Algeria. That means the NS1 and MT1-controlled UAS needs a Commerce Department
license before it can be shipped to Algeria (see Table 8.1).
Before you apply for a license, however, it is smart to search for a license exception in
the EAR (none are listed as available in the ECCN category itself, but you can also look
179
FIGURE 8.2
Export control flowchart.
in part 740 of the EAR for others). Almost no license exceptions are available for UASs,
however. If a license is required and no license exception is available, then you must apply
for a Commerce Department export license. There is no government fee for the applica-
tion process. Organizations may not, repeat not, ship the UAS without a required export
license. Doing so could subject the organization or individuals who are involved to crim-
inal charges and other severe penalties.
In addition to ECCN 9A012, certain UAS that come with or are designed for certain
aerosol dispensing systems are controlled in ECCN 9A120. In addition, 9B010 controls
“Equipment “specially designed” for the production of “UAVs” and associated systems,
equipment, and “components,” controlled by 9A012.”24 UAS component and payload
controls are spread throughout the CCL, such those that control guidance systems, com-
posite materials, controllers for motors and other components, cameras, lasers, sensors,
etc. One also finds cross references in the EAR-to ITAR-controlled items, such as those
in ECCN 9A115, which controls “apparatus, devices and vehicles, designed or modified
for the transport, handling, control, activation and launching of rockets, missiles, and
newgenrtpdf
180
180
TABLE 8.1
CCL Overview and Country Chart
Commerce Country Chart Reason for Control
Chemical and Nuclear Regional Firearms
biological weapons nonproliferation National security Missile tech stability convention Crime control Antiterrorism
Countries CB 1 CB 2 CB 3 NP 1 NP 2 NS 1 NS 2 MT 1 RS 1 RS 2 FC 1 CC 1 CC 2 CC 3 AT 1 AT 2
unmanned aerial vehicles capable of achieving a ‘range’ equal to or greater than 300 km.
(These items are ‘subject to the ITAR.’ See 22 CFR parts 120 through 130.)” In short, you
need to review the ITAR’s USML and the EAR’s CCL before exporting items to determine
if you need a license or not.
Also, as part of the export reform process introduced by state and commerce over the
last few years, several parts and components of UAS have been moved from the ITAR
to the EAR, including, but not limited to the following items that fall under the newly
created 9A610:
In addition, a variety of complex control provisions exist in ECCNs 9D and 9E for soft-
ware associated with MTCR-controlled UAS and for 9A012-controlled UAS. For example,
9D004.e controls “software” “specially designed” or modified for the operation of “UAVs”
and associated systems, equipment, and “components,” controlled by 9A012.26 It is there-
fore vitally important that software and know how related to UAS also be classified care-
fully under either the ITAR or the EAR and that a full licensing analysis be conducted
before any exports occur across U.S. borders or before software or know how are released
to non-U.S. persons in the United States.
The point here is not to memorize the specifics of these control categories. Nobody
really does that unless they work with a few of these categories on a day-to-day basis.
What we want you to understand is that more UASs and UAS components, software,
and know-how than you might expect are controlled for export from the United States.
Moreover, when you are dealing with these issues in the real world, whether that is in an
internship or job with a UAS manufacturer, at a university lab, or in your own UAS start-
up, you need to know that it is necessary to get out the rules and figure out these details
to keep yourself in compliance with federal law (and out of jail, or well clear of a money
penalty).
Remember, many UAS items that are subject to control under the EAR are subject to NS1
(National Security 1) or MT1 (Missile Technology 1) controls. Other than the controls on
sanctioned countries, these are the most severe export controls that exist under the EAR. It
means there is a license requirement for virtually every country in the world.
Perhaps counterintuitively, under export reform, certain items that transferred from the
ITAR to CCL category 9A610 are eligible for a new, but complex license exception Strategic
Trade Authorization (shortened in the regulations to STA) found in 15 C.F.R. § 740.20. Items
in 9A610 may in some cases be exported without a license to countries that are eligible to
182
receive products under this license exception, so long as all of the requirements of the
license exception and the EAR are satisfied in full.
If your item is a commercial/dual-use item (not ITAR), but it is not called out in a spe-
cific ECCN category on the CCL, it is still under the jurisdiction of EAR, but it may be
classified as an EAR99 item. A validated EAR99 classification that is definitely not in a
controlled ECCN category means that the commercial item generally does not require
a license to be exported or re-exported. Except that EAR99 items may not be exported
from the United States to sanctioned countries (including, but not limited to Cuba, the
Crimea region, Iran, North Korea, and Syria), and they may not be exported for prohibited
end uses (e.g., certain missile, nuclear, chemical/biological weapons, or nuclear propul-
sion end uses),27 and they may not be sent to “denied persons,” such as U.S. government-
listed terrorists, narcotics traffickers, and others. Few commercial UAS items currently fall
under EAR99, unless those items are for hobby purposes or they fall outside of the con-
trol category.28 Given recent NS tensions with Russia and China, there are many export
controls on products and technology proposed for export to those countries. Employment
of nationals of those countries in jobs that require access to export controlled information
related to unmanned vehicles has also proven challenging in recent years.
Key export control policies on UAS are described in part 742 of the EAR, which addresses
“Unmanned Aerial Vehicles (UAVs) of any type, including sensors for guidance and con-
trol of these systems, except model airplanes.” The end use controls referenced above are
not based on the CCL and ECCN categories. Virtually, any item proposed for export from
the United States that fits into one of the prohibited end uses described in part 744 for
UAS (there are several) requires an export license issued prior to shipment. For example, a
pencil that is proposed for export from the United States for the listed prohibited end uses
in certain countries would require a Department of Commerce export license based solely
on the proposed end use. Individuals who are overly focused on ITAR and EAR CCL-level
item controls often overlook the end use controls. If you are ever involved with exporting,
researching, or studying UAS and/or working with non-U.S. persons on UAS issues, please
read parts 742 and 744 of the EAR in addition to knowing the CCL controls described above.
TABLE 8.2
MCTR Countries as of March 2019
• Argentina (1993) • Greece (1992) • Portugal (1992)
• Australia (1990) • Hungary (1993) • Republic of Korea (2001)
• Austria (1991) • Iceland (1993) • Russian Federation (1995)
• Belgium (1990) • India (2016) • South Africa (1995)
• Bulgaria (2004) • Ireland (1992) • Spain (1990)
• Brazil (1995) • Italy (1987) • Sweden (1991)
• Canada (1987) • Japan (1987) • Switzerland (1992)
• Czech Republic (1998) • Luxembourg (1990) • Turkey (1997)
• Denmark (1990) • Netherlands(1990) • Ukraine (1998)
• Finland (1991) • New Zealand (1991) • United Kingdom (1987)
• France (1987) • Norway (1990) • United States of America (1987)
• Germany (1987) • Poland (1998)
“(a)(5) Unarmed military unmanned aerial vehicles (UAVs) (MT if the UAV has a range
equal to or greater than 300km);
(a)(6) Armed unmanned aerial vehicles (UAVs) (MT if the UAV has a range equal to or
greater than 300km);
(a)(13) Controls Optionally Piloted Vehicles (OPV) (i.e., aircraft specially designed to
operate with and without a pilot physically located in the aircraft) (MT if the OPV has a
range equal to or greater than 300km);
(d) Controls “Ship-based launching and recovery equipment specially designed for
defense articles described in paragraph (a) of this category and land-based variants
thereof (MT if the ship-based launching and recovery equipment is for an unmanned
aerial vehicle, drone, or missile that has a range equal to or greater than 300 km).”
(h)(12) Controls “Unmanned aerial vehicle (UAV) flight control systems and vehicle
management systems with swarming capability (i.e., UAVs interact with each other to
avoid collisions and stay together, or, if weaponized, coordinate targeting).”
Associated technical data and software are included in this category as well, as
indicated in the sections above.
Not Otherwise Enumerated), XVII (Directed Energy Weapons), XIX (Gas Turbine Engines
and Associated Equipment (certain UAS use gas turbine engines, turbine components and
equipment to make or repair components that are controlled under the ITAR (or in some cases the
EAR)), XX (Submersible Vessels and Related Articles), and XXI (Articles, Technical Data,
and Defense Services Not Otherwise Enumerated).36
A number of other USML categories are also relevant to UAS and payloads, but those
categories must be determined on a case-by-case basis.
ITAR is administered by the DDTC through licenses or special agreements.
1. Check to see if the item to export is on the USML that is found in 22 CFR 121
in ITAR.
2. Unsure if the item is covered, then file a Commodity Jurisdiction request.
3. If it is on the USML, then you must be registered with the DDTC.
4. After registration then apply for an export license. This can be done through
D-Trade. D-Trade is an electronic export licensing system in DDTC.
5. For basic questions, call the DDTC Response Team.38
FIGURE 8.3
Department of Commerce license review process.
other way. The following are a few helpful example tips that can be incorporated into your
compliance program:
“BIS’s Export Enforcement team, along with the Department of Homeland Security’s
Bureau of Immigration and Customs Enforcement, and the Federal Bureau of
Investigation, enforce controls on dual- use exports. These agencies, through
investigations of suspected violations of law and regulations, and the interdiction of
suspected illicit shipments, have provided the necessary evidence to successfully pros-
ecute both criminal and civil cases on export violations. Our multilateral controls also
provide a strong framework for cooperative enforcement efforts overseas when such
efforts call for an international approach.”40
ARC International
On February 3, 2010, Harold Hanson (Hanson) and Nina Yaming Qi Hanson (Qi) were
sentenced in U.S. District Court in the District of Columbia. Qi was sentenced to 105 days
in jail with credit for time served, placed on one year of supervised release, ordered to pay
a fine of $250 and a $100 special assessment fee and ordered to attend a U.S. Department
of Commerce sponsored export education training program. Hanson was sentenced to
24 months’ probation, required to pay a fine of $250 and a $100 special assessment fee,
ordered to perform 120 hours of community service, and also ordered to attend a U.S.
Department of Commerce sponsored export training program. On November 13, 2009,
Hanson and Qi pleaded guilty to making false statements. On March 12, 2009, a federal
grand jury in the District of Columbia returned an indictment charging Qi, her husband
Hanson (an employee at Walter Reed Army Medical Center), and a Maryland company,
ARC International, LLC, with illegally exporting miniature Unmanned Aerial Vehicle
(UAV) Autopilots controlled for national security reasons to a company in the People’s
Republic of China.
to Iran. They were charged with conspiracy, violations of the International Emergency
Economic Powers Act and the United States Iran Embargo, and making false statements
to federal agencies in connection with the export of thousands of U.S. goods to Iran.
Charges against defendant Majid Seif, also known as Mark Ong, and Vast Solutions
alleged that Seif and Vast exported radio control devices and accessories used in
Unmanned Aerial Vehicles from a Singapore firm to Malaysia. The radio control devices
were then shipped to Iran.
Landstar/Yi-Lan Chen
On February 3, 2010, Yi-Lan Chen, also known as Kevin Chen, was arrested on charges
of illegally exporting commodities for Iran’s missile program. According to the affidavit
filed in support of the criminal complaint, Chen caused dual use goods to be exported
from the U.S., including P200 Turbine Engines, which the investigation revealed were
for end users in Iran. “The P200 Turbine Engines are designed for use as model airplane
engines but can also be used to operate Unmanned Aerial Vehicles and military target
drones.”41
Do not be lulled into a sense of complacency by these serious criminal cases. There are
any number of other serious civil penalty cases involving releases of a wide variety of
commercial/dual-use know how or product exports that caused companies, univer-
sities, and individuals many headaches and a lot of money. Even though the rules are
very complex, the U.S. government puts the obligation on all U.S. persons to know and
apply them properly. If you play any part in the UAS industry, you need to be familiar
with export control rules to protect yourself and your organization from a violation.
Moreover, as noted before, export controls are a strict liability regime. You can be punished
severely even if you do not know the rules. So, it is no defense to bury your head in the sand
and say that the subject is too complex or hope that someone else will deal with it. This is
critically important to understand, because when dealing with UAS, as you have seen from
above, even the simplest commercial system, payload item, or data file can be controlled
by the EAR, not to mention the ITAR. As an example, the civil penalty for a violation of the
EAR can be approximately $300,000 per shipment or per data release to the wrong non-
U.S. person, or twice the value of the item subject to the violation, whichever is higher!
about domestic data releases to non-U.S. persons. Do not make the mistake, however, of
restricting hiring in your program just to U.S. persons without taking further compliance
steps. That could lead you into a claim of discrimination on the basis of national origin.
You must carefully ensure that you are complying with labor and employment rules, and
with U.S. export control rules.
All is not lost in pursuit of international business and international academic cooper-
ation. In fact, many companies in the industry are looking outside the United States
for sales because of the many restrictions on flying even small commercial UASs in the
U.S. national airspace, notwithstanding the FAA’s recently started rulemaking process in
that area. Many companies, universities, and others effectively deal with export control
regulations that affect their day-to-day activities. In addition to getting products, software
and technology classified properly, in almost any situation where you are dealing with
UASs, you need to put a written export control policy and compliance program in place.
DDTC has a short guide to what is needed in a compliance system that can be found at this
link: www.pmddtc.state.gov/compliance/documents/compliance_programs.pdf.
While you need to adapt these basics to your organization’s specific circumstances and
products, this basic approach is a good starting spot for organizations dealing with both
military and commercial items. As indicated in the guidance, the best approach is to create
a written policy and guidelines, identify responsible individuals, and conduct regular
training, audits, proper recordkeeping, and a standard approach to dealing with poten-
tial violations. These are all effective steps described in the DDTC guidance. Another best
practice is to create and require the use of systematic procedures (e.g., checklists) that help
people identify and react properly to export control issues in relevant situations. That way
people do not have to rely on their memory of these complex rules. This is critical as ignor-
ance is not an accepted excuse when it comes to export control. Building export control
steps into existing business or academic practices is a smart way to attack compliance.
For example, including a line in the checklist used for all international shipments that
determines whether a license has been obtained would be an effective step to help prevent
violations.
It is also vitally important to have the right message from leadership –“these are
important rules and we are going to comply.” And it is critical to have a point person
who is responsible for the program that people can contact with questions. If that person
needs some help, which is common because of the complexity of this area, they should
have access to the regulations and be able to seek expert guidance from time to time.
Violations need to be handled intelligently. In our experience, the best approach is to be
honest and bring violations you spot to your export control officer or superior. Of course,
the best option is to avoid violations in the first place and seek help and guidance when-
ever you have a question, and certainly before the item in question is exported. When in
doubt, ask!
Discussion Questions
8.1 What is the purpose of export controls? What is the underlying purpose or jus-
tification for enacting export control regulations? What is the purpose of the
export control license? Who must obtain an export control license? Which fed-
eral agency issues such licenses? Describe in a very general way, AECA and ITAR
191
Notes
1 www.ancient.eu/Peloponnesian_War/
2 https://history.state.gov/milestones/1776–1783/continental-congress.
3 www.gpo.gov/fdsys/granule/USCODE-2011-title50/USCODE-2011-title50-app-tradingwi.
4 www.gpo.gov/fdsys/granule/USCODE-2011-title50/USCODE-2011-title50-app-exportati-
other.
5 www.gpo.gov/fdsys/pkg/USCODE-2010-title22/html/USCODE-2010-title22-chap39.htm.
6 www.archives.gov/federal-register/codification/executive-order/11958.html.
7 www.congress.gov/bill/115th-congress/house-bill/5040/text?format=txt (last visited
September 23, 2019).
8 15 C.F.R. § 730 et seq., www.bis.doc.gov/index.php/regulations/export-administration-
regulations-ear.
9 The ITAR definitions are found in 22 C.F.R. § 120.1 and the EAR definitions are found in 15 C.F.R.
Part 772.
10 www.mtcr.info/english/FAQ-E.html.
192
11 www.mtcr.info/english/FAQ-E.html.
12 www.bis.doc.gov/index.php/forms-documents/doc_view/838-772 page 42
13 United Nations, www.un.org/en/sc/1540/.
14 United Nations, www.un.org/disarmament/WMD/1540/.
15 www.wassenaar.org/.
16 22 C.F.R. § 120.
17 State Department, www.state.gov, Diplomacy in Action, U.S. Export Policy for Military
Unmanned Aerial Systems
18 www.state.gov/u-s-policy-on-the-export-of-unmanned-aerial-systems/
19 50 USC Chapter 58
20 15 C.F.R. § 774, Supplement 1.
21 Id. at § 738, Supplement 1.
22 Id. at § 736.
23 Id. at § 744.
24 C.F.R § 744, Supplement 1.
25 C.F.R. § 774, Supplement 1., ECCN 9A610
26 15 C.F.R. § 774, Supplement 1.
27 15 C.F.R. § 774.
28 The consolidated denied persons list can be found on the Department of Commerce, Bureau of
Industry and Security websiteL www.bis.doc.gov/indes.php/policy-guidance.lists -of-parties-
of-concern.
29 www.metr.info/english
30 www.metr.info/english
31 Department of Commerce, www.bis.doc.gov. Commerce Control List (CCL)
32 Department of Commerce, www.bis.doc.gov. Commerce Control List (CCL)
33 The History Channel –This Day in History WWII US Passes Exprot Control Act
34 Gerald R. Ford Executive Order No. 11958, 3 C.F.R. 66 (January 18, 1977)
35 Gerald R. Ford Executive Order No. 11958, 3 C.F.R. 66 (January 18, 1977)
36 22 C.F.R. § 121.1 The United States Munitions List
37 Department of State, www.pmddtc.state.gov, Compliance Programs
38 Department of State, www.pmddtc.state.gov, Getting Started with DDTC
39 National Contract Management Association
40 Department of Commerce, www.bis.doc.gov/index.php/forms-documents/doc_view/
730-testimony-by-assistant-secretary-wolf-before-the-national-security-and-foreign-affairs-
subcommittee\
41 Department of Commerce, www.bis.doc.gov/index.php/forms-documents/doc_view/
730-testimony-by-assistant-secretary-wolf-before-the-national-security-and-foreign-affairs-
subcommittee\
42 www.pmddtc.state.gov/sys_attachment.do?sysparm_referring_url=tear_off&view=true&sys_
id=745d7205db15df00d0a370131f9619a3
newgenprepdf
193
9
Unmanned Aircraft System Design
193
194
and control systems have enabled increased autonomy of operations, thus enabling more
specific mission-driven UAS designs. The purpose is not to physically remove a human
pilot from the aircraft, but to directly design the aircraft as a platform or tool for specific
applications. This explains the growth in UAS designs where habitation of the aircraft is
impossible. The absence of humans aboard the aircraft opens the design space, compared
to that of manned aircraft. This affects all the design choices, from the airframe materials
and construction techniques, to the quality of servos, to system redundancies, and to
recovery systems (e.g., no landing gear).
In addition to risk reduction, it is anticipated that uninhabited aircraft will signifi-
cantly reduce system cost compared to manned aircraft that perform the same or similar
mission(s). At a scale where replacing a pilot with an autopilot can reduce weight or oper-
ational cost, UASs do provide opportunity for cost savings against competing manned air-
craft. However, the view that UASs are competing against manned systems often ignores
the broader complementary or supplementary role that the UAS might provide in mission
design.
Military customers continue to drive UAS development, but the emergence of civilian
demand for small UAS (sUAS) over the past decade has created a market pent-up by a
worldwide regulatory environment that was unprepared to integrate any UAS, particu-
larly sUAS, into the airspace system. The FAA and NASA are working to clarify airspace
regulations for UAS with each passing day. However, registration efforts and on-demand
notifications available through the UAS Data Exchange and Low Altitude Authorization
and Notification Capability (LAANC) are helping. On-demand payload delivery and
sensing to inform decision-making will continue to motivate the proliferation of commer-
cial sUAS. The ability to provide urban and suburban advanced air mobility (e.g., UBER
ELEVATE) may harness the systems developed for UAS over the past decade to transform
society when there is a supportive regulatory environment and community acceptance.
Several fixed-wing UASs shown in Figure 9.1 represent performance characteristics
across the spectrum of size, speed, endurance, and range of systems in operation today.
Bard College’s Drone Databook [BARD1], Armada’s Drone Compendium [AMRADA1],
and Janes’ All The World’s Aircraft: Unmanned [JANE1] provide broader surveys of the
UAS industry. Multicopters have had such a major impact on the public perception of sUAS
that when someone speaks about a “drone” today, they are referring to a small multicopter
rather than the large military UASs that were originally referred to as drones.
In the following sections, the discussion will focus on how these UASs are designed
and the typical UAS subsystems. Considering the incredible range of size, performance,
and applications of UASs, it might be surprising to consider that most UASs are made up
of the same subsystems. However, these subsystems obviously vary tremendously in the
number, size, weight, power requirements, and complexity of the components.
FIGURE 9.1
UAS airframes.
(a) NASA Global Hawk [www.nasa.gov/centers/armstrong/aircraft/GlobalHawk/],
(b) NASA Ikhana [www.nasa.gov/centers/armstrong/multimedia/imagegallery/Ikhana/ED14-0341-09.html],
(c) RECUV Tempest UAS (University of Colorado/NOAA), and (d) DJI Phantom 2 Vision Quadcopter
(Amazon) [http://ecx.images-amazon.com/images/I/61x8yJcesfL_SX425_jpg].
FIGURE 9.2
A typical conceptual UAS design process can iterate at any step.
196
Key performance parameters that guide UAS requirements are derived from a descrip-
tion of the mission. Subsystem requirements are then derived from the UAS requirements.
Aircraft configurations are evaluated by their match to the capability and mission. Roskam
notes that 65% of the product life-cycle cost is decided in the concept design phase and 95%
prior to acquisition, emphasizing the importance of wise decision-making during this time
of maximum uncertainty [ROSKAM1]. Businesses commonly assess what parts or tech-
nologies they can reuse (e.g., avionics, tools, wings) to minimize the development cost and
accelerate development. Key technologies needed for the UAS to effectively and efficiently
perform the mission are identified, a risk assessment is completed, and the development
schedule and budget are estimated to be sure that the UAS can be developed with available
resources and constraints.
Many UAS designs have a starting point in previous manned aircraft designs used for
similar purposes. Some actually convert manned aircraft into UAS (e.g., Boeing/Aurora
Autonomous Aerial Cargo Utility System & Centaur). As a result, current UAS designs
range from those for which the airframe might appear externally similar to a comparably
sized manned aircraft, to the multicopter designs that have no conventional counterpart.
Even in the case of UASs that are the size of a conventional manned aircraft, there are
usually features that make them obviously uninhabitable, such as no obvious cockpit or
windows. The few exceptions are when the UAS airframe is actually a repurposed manned
airframe, or are “optionally piloted” aircraft (where there is an option to have a human
pilot on board, e.g., Northrop Grumman Firebird).
UASs built for the military follow the acquisition path described by the Defense
Acquisition Guidebook [DAG1]. Commercial UAS may follow a similar development
path, but the design is tuned to efficiently meet a commercial market need and its
associated mission, and guided by Federal Aviation Administration (FAA) regulations.
The International Council on Systems Engineering (INCOSE)’s systems engineering
handbook [INCOSE1] and the systems engineering diagram shown in Figure 9.3 provide
guidance important for UAS product development to be successful. They help guide the
design process to ensure that the UAS meets increasingly complex requirements. MIL-
SPEC-881D [MIL1] provides a work breakdown structure (WBS) useful to organize pro-
ject scheduling, budgeting, and execution.
FIGURE 9.3
The systems engineering “V” diagram guides UAS development. (https://ops.fhwa.dot.gov/publications/
seitsguide/section3.htm.)
model [RAND1], SEER [SEER1], or Price True Planning [PTP1] is vital to ensure that a UAS
program establishes reasonable cost estimates early in its development.
Although the methods for aircraft design layout and design analysis used in the industry
tend to be proprietary and highly computerized [RAY12], software proliferation enabled
by internet-based configuration control is democratizing many aspects of UAS tool devel-
opment. Many open-source or freely available tools for aircraft design have enabled
smaller companies to thrive in the UAS market. NASA Open Source Software [NASAOSS1]
including OpenVSP, NDARC, and FLOPS; Public Domain Aerospace Software [PDAS1];
and software in online configuration-controlled repositories like GitHub provide many of
the tools needed to move beyond the empirical methods that had been used in the concep-
tual and preliminary design phases. These tools are powerful when used to inform multi-
disciplinary quantitative trades, but remain heavily dependent on user experience. They
may also require additional validation to ensure that the in-house manufacturing capabil-
ities are represented correctly. Distributed and cloud computing are enabling multidiscip-
linary tools to be combined into design architectures as shown by the Design Structure
Matrix [XDSM1] in Figure 9.4, and higher fidelity analysis to be performed at an earlier
stage in the design process.
Empirical methods and tools developed for conventional, large aircraft design are not
directly applicable to the design of UAS aircraft. This is particularly true for tools based
on the databases of manned aircraft, since UAS generally operate at flight speeds and
Reynolds numbers much lower than for manned aircraft, and are often constructed from
composites instead of metallics. In addition, many UASs use electric propulsion systems
powered by batteries, fuel cells, or solar cells, which rely on energy storage or conversion
systems not typically modeled in conventional aircraft design tools.
Aerodynamic databases, such as the University of Illinois Urbana-Champaign’s (UIUC)
Airfoil Data Site [UIUC15], have expanded wind-tunnel airfoil data to include Reynolds
198
number values that are of interest to model airplane hobbyists and sUAS airframe designers.
The emergence of high-fidelity computational fluid dynamics (CFD) tools, such as those
included in commercial multiphysics modeling packages, enables “virtual wind-tunnel”
testing of airframe components as well as entire airframes. These packages include ANSYS
Fluent [ANS15], Star-CCM+ [CCM15], and COMSOL [COM15]; and open-source tools
like OpenFOAM [OFOAM] or SU2 [SU2]. Simpler panel method-based tools such as AVL
[AVL15] can compute stability derivatives as well as aerodynamic forces and moments
on simplified geometries. They are particularly useful for preliminary airframe design.
These stability derivatives can be used to drive a 6-degree simulation like RealFlight
[REALFLIGHT1], or help tune gains for autopilots like the Piccolo [PICAUTO1], or
Pixhawk [PIXHAWK1]. They can also be used for more sophisticated certified autopilots,
for subscale model development, or to fly full-scale UAS.
High-fidelity analysis tools remain mostly proprietary, but their accuracy and com-
putational efficiency is improving rapidly as cloud computing has expanded access
to high-performance computing resources. The Department of Defense provides validated
high-fidelity tools for fixed and rotary-wing design, and analysis to contractors with the
high-performance computing CREATE program [CREATE1] software suite.
5
Major Iteration: 51 0
Twist
−5
−10
−1 0 1
7.5 Elliptical
Lift 5.0
2.5
0.0
−1 0 1
0.2
Thickness 0.1
0.0
−1 0 1
1e7
Failure limit
2
Von mises
Fuelburn: 68685.73 1
0
−1 0 1
FIGURE 9.4
The N2 Diagram generated with pyXDSM [XDSM1] (top) shows the input and output flow through various
solvers within the Python-based OpenAeroStruct [OAS1] code. The output results (bottom) demonstrate the
ability to simultaneously optimize aerodynamics and wing structural geometry.
how those properties vary in the material undergoing structural loading and deform-
ation, are required to maintain aerodynamically optimized shapes for maximum design
efficiency; or simply to anticipate shape changes so that reliable control laws for aircraft
stability can be designed. The materials for UAS airframe construction are typically those
used for a range of aircraft from manned aviation to hobby aircraft. They range from
aerospace-grade metals and composites, supported by a vast database of material proper-
ties and construction standards for certified manned aircraft like those provided by NIAR
and MIL-Handbooks 5 and 17, to balsa and Monokote (a thin plastic film used for the outer
skin of many hobby aircraft). The databases for hobby construction materials that might
be used for sUAS airframes are sometimes only supported by the shared knowledge and
goodwill of the user community, and the material properties that manufacturers choose to
200
make public. As a result, drone cargo delivery provided by Amazon or Google Wing are
just gaining access to the certified airspace.
Figure 9.5a shows the payload weight capability for a range of large-to-small UASs
compared to the overall per-airframe cost (airframe cost includes the communication and
control systems) for a representative selection of legacy U.S. military systems. The trend
line that fits these data shows that the airframe cost is a bit over U.S.$ 1M per hundred
pounds of payload. While it is no surprise that larger payloads require larger, more expen-
sive airframes, it shows that sUAS airframes continue to be sized according to the payload,
and do not reach the threshold of airframe size necessary to safely carry a human pilot.
Figure 9.3b shows the fractional cost of subsystems for three high-performance legacy
UASs, categorized by airframe empty weight (the data are from the year 2003). Figure 9.5b
shows that the cost of the high-performance sUAS is dominated by the specialized propul-
sion system, and for the large UAS, the largest fraction of the cost is for the sensor package.
The purpose of Figure 9.5 is to illustrate trends that are only notional compared to the
civilian systems in development today.
(a) 3000
RQ-4A Global Hawk blk 20
2500
2000
Payload weight (lb)
1500
106 lb payload/$M
RQ-5A Hunter
1000
MQ-9A Predator B
MQ-1B Predator
500
RQ-7A Shadow 200
RQ-2B Pioneer Aerosonde mark-4.4
0
0 5 10 15 20 25 30
Airframe cost ($M)
(b) 1.0
0.9
0.8
0.7
0.6
Cost fraction
0.5
0.4
0.3
0.2
0.1
0.0
30 lb 1130 lb 9200 lb
Airframe empty weight
FIGURE 9.5
(a) Trend for airframe cost relative to payload capacity for representative legacy systems. (b) Fraction of system
cost versus airframe empty weight for three representative legacy systems.
202
100,000
RQ-4B Global Hawk
MQ-9A Predator B
10,000
MQ-1B Predator Turbines RQ-4A
RQ-5B Hunter Global Hawk
Empty weight (lb)
1000
RQ-2B Pioneer
RQ-7B Shadow200
100 IC engines
ScanEagle
Aerosonde mark 4.4
Tempest
10 Pointer
Desert hawk
Dragon eye
1
Electric motors
Black widow
0.1
0 100 200 300 400
Cruise speed (kt)
100,000
RQ-4B Global Hawk
RQ-4A Global Hawk
RQ-5 Hunter
10,000
RQ-9A Predator B Turbines
RQ-2B
Pioneer MQ-1B Predator
Empty weight (lb)
1000
IC engines
100
RQ-7A
Tempest Shadow 200
10 Desert hawk Aerosonde mark 4.4
Pointer
Dragon eye ScanEagle
1
Electric motors
Black widow
0.1
0 10 20 30 40
Endurance (hr)
FIGURE 9.6
Illustration of the performance of representative UASs over a range of sizes.
203
Today, most sUASs operating within close visual range are still typically flown through
full wireless remote control (RC) although beyond-line-of-sight-operations are on the
increase. Additionally, many small rotorcraft employ some type of stability augmentation,
such as gyros, to assist with the RC pilot’s control of the aircraft. Other UASs are generally
flown with some level of automation or autonomy, particularly if they are flown beyond
visual range. This includes large UASs such as the General Atomics Predator family of
UASs, and the Northrop Grumman Global Hawk, as shown in Figure 9.1. In the case of the
Predator, the pilot controls the aircraft with a joystick. There is a variable amount of direct
joystick control, depending on the mission segment (e.g., takeoff, cruise, and landing).
The Global Hawk is operated at an increased level of autonomy, with automated takeoff
and landing. The autopilot system uses flight plans to control the trajectory of the aircraft
between waypoints. In this case, the role of the remote pilot is primarily to monitor the air-
craft and to potentially update the flight plan or to handle contingencies.
For the UAS that is not flown in RC mode or stability-augmented RC mode, a flight con-
trol system (often referred to as an autopilot, which is the term that will be used here) is
employed to control the aircraft. The autopilot system is typically composed of a micropro-
cessor or computer that runs algorithms designed to control the aircraft over a preplanned
flight path. It is also used to augment control of the aircraft that is receiving steering
commands (commands not associated with maintaining stability, such as heading changes)
from a remotely located pilot. Typically, an inner control loop receives high-frequency
sensor data to manage the aircraft attitude, while an outer-loop controller manages the
aircraft position while following a flight plan.
In some UASs, a separate flight computer might run independently from the autopilot
computer, with algorithms that issue high-level commands to the autopilot outer control
loop. The degree to which such commands are based on “decisions” made by the flight
computer algorithms without direct human interaction is often a measure of the system’s
level of autonomy.
FIGURE 9.7
(a) GA-ASI Certifiable Block 50 Ground Control Station for MQ-9B SkyGuardian UAS (www.ga.com/
ga-asi-certifiable-ground-control-station-makes-its-first-flight) and (b) GA-ASI XC2 laptop used
for MQ-1C Gray Eagle UAS pre-flight, automatic takeoff, navigation, and landing (www.ga.com/
ga-asi-demonstrates-satcom-launch-recovery-for-mq-9b-using-expeditionary-command-control-xc2).
205
remotely operating a UAS. It is important for CS interface design to consider the “human
factors” that produce a different experience than that encountered in an onboard cockpit.
GCS maturation has reduced pilot and sensor operator tasking. Laptop-based CS form
factors have been used for auto-takeoff and landing operations of the MQ-1C Gray Eagle,
demonstrating that attention to human factors can consolidate many of these functions into
even an expeditionary product. Increasing levels of manned-unmanned teaming (MUM-T)
operations demonstrated that CS functions, like sensor control or weapons release for a
Gray Eagle, can be given as commands from a manned AH-64 helicopter. The CS may be
airborne; multiaircraft control from a single airborne CS is under active development for
implementation with the F-35 joint strike fighter.
9.3.5 Payloads
Figure 9.5b shows the fractional cost breakdown of three representative high-performance
UASs. In the case of the two larger UASs, the payload (sensor subsystem) is a more sig-
nificant part of the total cost than on the sUAS. This reflects the trend that sUASs are more
likely to be used to lower costs, but commercial-off-the-shelf (COTS) payloads (cameras,
meteorological sensors, etc.) are not necessarily less capable. The larger airframes are gen-
erally designed for higher reliability and used to carry the more expensive, more power-
demanding sensors for military and specialized civilian applications. Some of these sensors
include electro-optical/infrared (EO/IR), light detection and ranging (LIDAR), synthetic
aperture radar (SAR), and multifunction active electronically scanned array (AESA) radar
sensors.
Miniaturization of sensor packages and increasing reliability of small airframes and
subsystems has enabled some mission capabilities, originally only achievable by relatively
large and expensive UASs, to be scaled to smaller UASs. Again, the flexibility of not having
to design the airframe to include human occupation enables more specific mission-derived
design, so that the aircraft size and performance can be optimized to meet the mission
requirements. The DJI Phantom Quadrotor with an integrated video camera, as shown in
Figure 9.1d, is an example of how sensor miniaturization combined with small airframes
and advanced battery technologies has led to the proliferation of sUAS designs available
to the general public and professionals alike.
FIGURE 9.8
Schematic of the RECUV Networked UAS Communications, Command, and Control (NetUASC3). (From
Elston, J. et al. 2011. Journal of Field Robotics, Vol. 28, No. 4, pp. 461–483.)
communication that link the aircraft and CS and also simultaneously enable communica-
tion with various data servers and other clients sending and receiving data. This diagram
clearly illustrates how, in this case, the aircraft is only one of many components that can
make up an UAS.
Several engineering standards organizations are working develop standards for UAS
design and operations. The ASTM International Committee F38 on UASs is developing
one of the most comprehensive sets of UAS design and operations standards and guidance
materials. Their scope, as stated by the Committee, is to develop technical publications that
include [ASTM15]:
The Radio Technical Commission for Aeronautics (RTCA) is chartered by FAA as a Federal
Advisory Committee. The RTCA Special Committee 203 (SC-203), UASs, was established
in 2004 (terminated in 2013) to develop standards and certification criteria; procedures for
sense-and-avoid systems; and protocols to be used for the certification of command, con-
trol, and communications systems [RTCA203]. The RTCA SC-228, Minimum Operational
Performance Standards (MOPS) for UASs, was established in 2013 and is developing MOPS
for detect-and-avoid equipment, and command and control (C2) data link MOPS estab-
lishment of L-Band and C-Band solutions [RTCA228]. One of the earlier UAS standards
that was published is “Standard Interfaces of UAV Control System (UCS) for NATO
UAV Interoperability, 3rd Ed” [NSA07]. Other organizations that are developing UAS
standards include the Society of Automotive Engineers (SAE) and the American Institute
of Aeronautics and Astronautics (AIAA).
as they would move to control the aircraft in a real flight. Therefore, this type of testing puts
the autopilot and flight computer software through their paces, and may also verify the
function of the servos and control surfaces prior to an actual flight. In some cases, the con-
trol software of the autopilot might run separately on the simulation computer or another
computer, and not on the actual autopilot hardware. In this case, any latency that might be
associated with running the algorithms on the autopilot hardware must also be simulated
for a realistic replication of the autopilot function. For an sUAS, a flight simulator for HIL
testing is included with most COTS autopilot systems. In some cases, they are designed to
integrate with high-fidelity graphical interfaces originally developed for video games.
After systems verification, the simulated environment might be used to prepare for
mission validation, or for pilot/operator training, where the tasks of an actual mission
might be simulated. Depending on where the remote pilot/operator is located, it might
be impossible for that person to distinguish between a simulated mission and an actual
mission.
Discussion Questions
9.1 In the introductory paragraphs, the author makes several statements. Answer the
following questions based on that passage. What factors have caused the “pent-
up” global demand for UASs? Why have UAV per-unit costs remained high? What
209
entities have carried out the most civilian sUAS operations and why? What design
opportunities are attributable to the lack of a pilot on board the UAS?
9.2 Generalize the design process. Describe tools currently available to designers of
UAS and tell how these tools influence the design process.
9.3 What are the functions of the autopilot? What is the difference between the auto-
pilot inner and outer control loops? Who does the author identify as the developer
of the first successful flight of a powered, unmanned aircraft?
9.4 Describe the purpose of the GCS or CS. How does the CS of the General Atomics
Predator differ from the pilot interface (i.e., cockpit controls) typically found on
complex, high-performance manned aircraft?
9.5 What is meant by C3? Describe the difference between operator “in the loop” and
operator “on the loop.”
9.6 What is meant by aircraft certification standards? List organizations involved in
developing UAS standards and the corresponding areas that each organization is
addressing.
9.7 Describe hardware-in-the-loop operation. What is the difference between UAS
design verification and mission validation? In which instance would HIL be most
useful? Why?
9.8 Propose your own architecture for UAS design by selecting a combination of open-
source tools. What disciplines must be included? What analytical tools offer the
most value?
References
[AND99] Anderson, J.D. 1999. Aircraft Performance, McGraw-Hill, New York, Chap 5.
[ANS15] www.ansys.com/, accessed 4/1/15.
[ASTM15] ASTM International Committee F38 on Unmanned Aircraft Systems, www.astm.org/
COMMIT/SCOPES/F38.htm, accessed 4/1/15.
[AVL15] http://web.mit.edu/drela/Public/web/avl/, accessed 4/1/15.
[REALFILGHT1] www.realflight.com/index.php, accessed 3/27/20.
[PICAUTO1] www.cloudcaptech.com/products/auto-pilots, accessed 3/27/20.
[PIXHAWK1] https://pixhawk.org/, accessed 3/27/20
[CCM15] www.cd-adapco.com/, accessed 4/1/15.
[COM15] www.comsol.com/, accessed 4/1/15.
[OFOAM] https://openfoam.org/, accessed 3/27/20.
[SU2] https://su2code.github.io/, accessed 3/27/20.
[ELS11] Elston, J., Roadman, J., Stachura, M., Argrow, B., Houston, A., and Frew, E. 2011. The tempest
unmanned aircraft system for in situ observations of Tornadic Supercells: Design and VORTEX2
flight results, Journal of Field Robotics, Vol. 28, No. 4, pp. 461–483.
[MCC95] McCormick, B.W. 1995. Aerodynamics, Aeronautics and Flight Mechanics, Wiley, New York,
pp. 378–385.
[MOTO15] MotoCalc, www.motocalc.com/, accessed 4/1/15.
[NEW04] Newcome, L. 2004. Unmanned Aviation: A Brief History of Unmanned Aerial Vehicles, AIAA,
Washington, DC, Chap. 3.
[NGC15] Northrup Grumman Corp., RQ- 4 Global Hawk High Altitude, Long– Endurance
Unmanned Aerial Reconnaissance System, www.northropgrumman.com/capabilities/
rq4block10globalhawk/documents/hale_factsheet.pdf, accessed 4/1/15.
210
[NSA07] NATO Standardization Agency. 2007. Standard Interfaces of UAV Control System (UCS) for
NATO UAV Interoperability, STANAG 4586, Ed. 2.5.
[OSD05] 2005. Unmanned Aircraft Systems Roadmap: 2005–2030, Office of the Secretary of Defense
Memorandum for Secretaries of the Military Departments.
[RAY12] Raymer, D.P. 2012. Aircraft Design: A Conceptual Approach, 5th ed., AIAA, Washington, DC,
Chapters 1 and 17.
[NICOLAI1] Nicolai, L.M., and Carichner, G.E. 2010 & 2013. Fundamentals of Aircraft and Airship
Design Volume 1 & 2. AIAA, Washington, DC.
[TORENBEEK1] Torenbeek, E. 2013. Advanced Aircraft Design: Conceptual Design, Analysis and
Optimization of Subsonic Civil Airplanes, Wiley, New York.
[GUNDLACH1] Gundlach, J. 2012. Designing Unmanned Aircraft Systems A Comprehensive Approach,
AIAA, Washington, DC.
[PDAS1] Carmichael, R., Public Domain Aeronautical Software, www.pdas.com/, accessed 1/23/20.
[RAND1] www.rand.org/pubs/research_memoranda/RM5221.html, accessed 3/27/20.
[SEER1] https://galorath.com/, accessed 3/27/20.
[PTP1] www.pricesystems.com/price-cost-analytics/true-planning/, accessed 3/27/20.
[RTCA203] SC-203 Unmanned Aircraft Systems (UAS), www.rtca.org/, accessed 4/1/15.
[RTCA228] SC-228 Minimum Operational Performance Standards for Unmanned Aircraft Systems,
www.rtca.org/, accessed 4/1/15.
[SAB03] Unmanned Aerial Vehicles in Perspective: Effects, Capabilities, and Technologies. 2003. Vol
1: Summary, SAB-TR-03-01, USAF Scientific Advisory Board, AF/SB, Washington, DC, Sep.
[TRA09] Traub, L.W. 2009. Range and endurance estimates for battery-powered aircraft, Journal of
Aircraft, Vol. 48, No. 2, pp. 703–707.
[UIUC15] UIUC Airfoil Data Site, http://m-selig.ae.illinois.edu/ads.html, accessed 4/1/2015.
[VBL09] van Blyenburgh, P. 2009. Unmanned Aircraft Systems: The Global Perspective 2009/ 2010,
Blyenburgh & Co., Paris, France, May.
[WAL09] Wallace, L. 2009. Remote control: Flying a predator, Flying, www.flyingmag.com/pilot-
reports/turboprops/remote-control-flying-predator, accessed 4/1/2015.
[BARD1] Gettinger, D. 2019. The Drone Databook, Bard College, New York, https://dronecenter.bard.
edu/projects/drone-proliferation/databook/, accessed 1/17/20.
[ARMADA1] ARMADA. 2019. https://armadainternational.com/2019/06/compendium-uav-june-
july-2019/, accessed 1/17/20.
[JANE1] IHS Jane’s All the World’s Aircraft: Unmanned. 2020. https://ihsmarkit.com/products/
janes-all-the-worlds-unmanned-aircraft.html, accessed 1/23/20.
[ROSKAM1] Roskam, J. 2018. Airplane Design Part VIII: Airplane Cost Estimation: Design,
Development, Manufacturing and Operating Fig. 2.3.
[DAG1] Defense Acquisition Guidebook, www.dau.edu/tools/dag, accessed 1/17/20.
[INCOSE1] International Council on Systems Engineering Systems Engineering Handbook. www.
incose.org/products-and-publications/se-handbook, accessed 1/23/20.
[MIL1] MIL- SPEC- 881D Work Breakdown Structures for Defense Material Items, https://
quicksearch.dla.mil/qsDocDetails.aspx?ident_number=36026, accessed 1/23/20.
[DARAAA1] Advanced Aircraft Analysis, DAR Corp., www.darcorp.com/advanced-aircraft-
analysis-software/, accessed 1/23/20.
[PLAB1] www.txtgroup.com/markets/solutions/pacelab-sysarc/, accessed 3/27/20.
[NASAOSS1] NASA Open Source Software Catalogue, software.nasa.gov/, accessed 1/23/20.
[CREATE1] Computational Research and Engineering Acquisition Tools and Environments
(CREATE), www.hpc.mil/program-areas/computational-research-and-engineering-
acquisition-tools-and-environments, accessed 1/23/20.
[MCOPT1] www.phoenix-int.com/product/modelcenter-integrate/, accessed 3/27/20.
[MFOPT1] www.esteco.com/modefrontier, accessed 3/27/20.
[ISIGHT] www.3ds.com/products-services/simulia/products/isight-simulia-execution-engine/,
accessed 3/27/20.
211
[HEEDSOPT1] www.plm.automation.siemens.com/global/en/products/simcenter/simcenter-
heeds.html, accessed 3/27/20.
[OPENMDAO1] Open Multi- Disciplinary Analysis and Optimization, https://openmdao.org/,
accessed 1/23/20.
[OPENMDAO2] Gray, J.S., Hwang, J.T., Martins, J.R.R.A. et al. 2019. OpenMDAO: an open-source frame-
work for multidisciplinary design, analysis, and optimization. Structural and Multidisciplinary
Optimization Vol. 59, pp. 1075–1104. https://doi.org/10.1007/s00158-019-02211-z
[XDSM1] Lambe, A.B., and Martins, J.R.R.A. 2012. Extensions to the design structure matrix for the
description of multidisciplinary design, analysis, and optimization processes. Structural and
Multidisciplinary Optimization Vol. 46, pp. 273–284. https://doi.org/10.1007/s00158-012-0763-y,
https://github.com/mdolab/pyXDSM, accessed 1/15/20.
[OAS1] OpenAeroStruct, https://github.com/mdolab/OpenAeroStruct, https://github.com/
mdolab/OpenAeroStruct/blob/master/OAS_xdsm.pdf, accessed 1/15/20.
[TCREQ1] www.plm.automation.siemens.com/global/en/products/teamcenter/, accessed 3/27/
20.
[DREQ] www.ibm.com/us-en/marketplace/requirements-management, accessed 3/27/20.
[JREQ1] www.jamasoftware.com/solutions/requirements-management/, accessed 3/27/20.
[FINGER1] Finger, D.F., de Vries, R., Vos, R., Braun, C., and Bil, C. 2020. A Comparison of Hybrid-
Electric Aircraft Sizing Methods. Conference on Aircraft Design with Hybrid-Electric Propulsion
Technology (Focus: VTOL). AIAA Scitech 2020 Forum, Orlando FL. DOI: 10.2514/6.2020-1006
[SURV01] Ball, R. 2003. The Fundamentals of Aircraft Combat Survivability: Analysis and Design, 2nd ed.,
AIAA, Washington, DC.
[XPR1] www.afrl.hpc.mil/software/description.html?app=xpatch, accessed 3/27/20.
[AFSIM1] Clive, P.D., Johnson, J.A., Moss, M.J., Zeh, J.M., Birkmire, B.M., and Hodson, D.D. 2015.
Advanced Framework for Simulation, Integration and Modeling, International Conference of
Scientific Computing, 2015.
212
newgenprepdf
213
10
UAS Airframe Design
10.1 Introduction
Of necessity, the design of any given unmanned aircraft system (UAS) will correspond
directly to the intended mission of the platform—in the case of unmanned aircraft (UA),
form truly follows function. Any UA that does not conform to this basic principle will
fail to optimize mission goals. For example, infrastructure inspections (e.g., bridges,
monuments, flue gas stacks, wind turbine blades, and towers) may demand stable, low-
vibration platforms to obtain the high-resolution images necessary to ensure the integ-
rity of the structure under examination. In these applications, a high degree of endurance
and range may not be a major requirement, and a multirotor (quad-, hexa-, or octocopter)
UA, powered by an electric motor, may be best suited to the mission. On the other hand,
213
214
while covering larger areas searching for pipeline failures, abandoned mine shafts, or a lost
hiker may not require high-definition imagery, the mission will dictate greater range and
endurance. In this latter example, a conventionally configured fixed-wing aircraft, having
a high fineness ratio fuselage and wings of high aspect ratio powered by a gasoline, recip-
rocating engine may be best suited to the mission. In the civilian world, for the foreseeable
future, obtaining remotely sensed data as one step in delivering a finished data product is
often the very reason for the development of a particular UA platform and its associated
systems. Thus, the mission is currently a significant factor in determining the selection or
configuration and design of a UAS.
Due to the multifaceted functionality of UASs and the diversity of operations suited
to the application of this technology (as documented throughout this book), UA run
the design gamut between small UAs that fit in the palm of one’s hand (e.g., IAI Malat
Mosquito and the Prox Dynamic Black Hornet Nano, which weighs approximately 16 g,
or just over one-half ounce) to large fixed-wing aircraft, such as the Boeing SolarEagle,
designed by the Phantom Works to incorporate a wing spanning more than 120 m, and the
General Atomics Avenger with internal weapons bay and a GTOW over 7,700 Kg (17,000
pounds), and beyond. Between these design extremes are small UASs (sUAS), such as the
vectored thrust, ducted fan vertical takeoff and landing (VTOL) craft, the Honeywell RQ-16
T-Hawk (named for the Tarantula Hawk, a waspish insect found in the Southwest desert),
helicopters, multirotors, and fixed-wing aircraft comparable in size to corporate jets (at
about 16.8 m, the wingspan of a General Atomics Gray Eagle approaches that of many
Learjets, Citations, etc.), or even larger aircraft (the wingspan of a Northrop Grumman
Global Hawk/Euro Hawk7 surpasses that of a Boeing 727 or Airbus A320). The choice of
UAS powerplants is similarly diverse, ranging from pure turbine, turbofan, turboprop,
two and four stroke gasoline and heavy fuel engines (HFEs), Wankel, hybrid electric and
typical of smaller UASs, and pure electric utilizing lithium chemistry battery technology
(see Table 10.1).
Given such diversity, providing an in-depth, detailed discussion of all design consid-
erations is far beyond the scope of this chapter, or even of a book of this size. Rather, the
author’s intention is to outline design considerations as influenced by mission goals and
performance and payload constraints, while providing a general overview of common
designs and the reasons behind the decisions resulting in the selection of these over others
in a diverse field of alternate platforms.
TABLE 10.1
Generally Accepted UAV “Groups”
Maximum Gross Normal
Takeoff Weight Operating
Category Size (MGTW) (lbs) Altitude (ft) Airspeed (knots) Representative UAS
last two characteristics are closely related, but the terms are not strictly interchangeable.
For example, if an aircraft flies very, very slowly while consuming small amounts of power,
it may exhibit limited range, but high endurance. Conversely, an aircraft that flies very fast
while consuming large amounts of power may have great range, but limited endurance.)
The answer to the question posed at the outset of this paragraph is that the consideration
of each of these design attributes is certainly important, but none, by itself, is substantially
overriding. Trading various combinations of these requirements with customer involve-
ment can help focus the design on the intended mission thereby helping the customer
understand the cost of each requirement in terms of its effect on other requirements, par-
ticularly cost and endurance. For example, carrying an anti-/de-icing system on every
flight for the entire life of a UA will add 2%–7% of the weight and add 5%–10% to the air-
frame cost, when perhaps most missions will rarely if ever occur during icing conditions.
In this case, perhaps, only a portion of the aircraft, such as the engine inlet/s, need to be
protected from ice accumulation.
However, two preeminent factors do exist. As previously mentioned, the nature of the
intended mission should take precedence above all other factors in a ground-up design
or in the decision to select an existing platform for a particular application. The second
factor of paramount importance is cognitive and it lies at the heart of the design process.
It is the realization that any UAS platform should be chosen or designed according to the
rule of interdependent synergism, a phrase which means that the interrelationship of all
subsystems and components function together in a way that maximizes system perform-
ance. Only when the entire design is considered as a synergistic construction of individual
components with sometimes competing system demands and often diametric operational
constraints, can it be realized that the design of any given UA system is a trade-off; similar
to a linear programming problem wherein the optimization of the entire system may
only result from the sometimes-suboptimal performance of individual components and
subsystems that are integrated to form the UA system.
216
For example, perhaps the endurance of an electric aircraft is insufficient to complete its
intended mission of surveying an area of specified dimensions. Increasing the size of the
battery (in terms of ampere-hour capacity) will allow the aircraft to stay aloft longer, but
doing so will also diminish useful load, and therefore, decrease the choice of payloads
available to gather data for the mission. This situation could then necessitate the installa-
tion of a smaller, lighter, but disproportionately more expensive sensor package. Installing
a larger, heavier battery may also alter the center of gravity (CG) and negatively affect
other performance and aerodynamic characteristics. Or, perhaps, a hand-launched electric
airplane is difficult to get airborne on a windless day. Choosing a more powerful motor
and installing a larger propeller having less blade angle may improve launches, but will
also reduce endurance unless a higher capacity (larger and heavier) battery is installed,
which will, again, reduce flexibility in payload selection, and alter other performance
characteristics as the domino effect associated with a simple alteration manifests itself.
This effect applies to all aircraft regardless of method of propulsion. The point is, and it is
an important one, that the aircraft platform and all subsystems and components should
function as a complete system to achieve optimal overall operational capability of the
UAS in achieving mission goal. Maximizing mission effectiveness, however, is often only
achieved at the expense of suboptimal performance at the component level. Maximizing
overall design capability can be an extremely complex process, often, at once, both art and
science. Humorously, the conceptual engineer might have a sense that they are close to an
optimal design when they have achieved equal displeasure from each subsystem subject
matter expert (SME).
10.2.1 Form Follows Function: The Best Place to Begin the Design Process
Because “form follows function,” the most likely “best place” to begin the design pro-
cess is to consider the intended mission of the UA. Keep in mind that the UAS is exactly
that—a systemic entity composed of components and subsystems, and any design
change to any element of the system has the potential to affect the entire system. At the
most basic level, the UA exists only as a platform to carry the payload necessary to suc-
cessfully accomplish the intended mission. The mission, in turn, will determine factors
such as the type of payload (number, weight, and configuration of sensors), endur-
ance, and possibly aircraft structure/configuration. Payload will, in turn, influence
the vehicle weight, powerplant selection, and structural design among other factors.
Endurance requirements will affect design choices such as fuselage/wing design (i.e., to
minimize aerodynamic drag), fuel load (and consequently gross weight), powerplant,
etc. The amount, type, and cost of UA ground support equipment (GSE) as well as the
choice and design of launch and recovery subsystems will also be affected by the overall
UA design as determined by the mission. Consequently, because the mission affects
every aspect of airframe, powerplant, and system architecture and integration, the most
fundamental design consideration is how to best configure the UA for its intended pur-
pose. The entire engineering team must, at the outset of the design process, monitor and
police weight estimates, and additionally hold back a certain percentage of available
takeoff weight with an understanding that the manifestation of “Mystery Mass” invari-
ably materializes. In other words, an aircraft when first built, often gains weight from
its intended design. Going into an aircraft design with the understanding that every air-
craft over time is tasked with carrying heavier loads can help influence design choices.
A weight increase of 20% or more is not uncommon over the production life of a UA, so
217
accommodating for that early in the design process, will add value to the UA and help
extend the life cycle.
be incorporated into the UA platform are referred to as exogenous design factors, that is,
attributes dictated by other than economic, intended mission, aerodynamic, airframe, or
propulsions system considerations, but rather by requirements outside the immediate
design process. Examples of exogenous design influences include industry standards that
frequently inform, or even drive, FAA regulations. Sources of such standards, which pro-
vide guidance for all aspects of UAS operation, construction, maintenance, and design,
are manifold and include private entities (ARINC, ASTM, RTCA), trade organizations
(AUVSI), professional organizations (SAE), and ad hoc committees of industry leaders.
As part of the regulatory process, the FAA solicits input and recommendations from
representatives of these organizations who constitute either full (ARAC) or partial (ARC)
membership of the respective rulemaking committees; thus, the influence of these groups
can be very significant. Just as occurred in manned aviation, increasing regulation of UAS
flight is inevitable and without foreseeable end. Additional examples might include aes-
thetic details such as wing tips, winglets (even though performance does not warrant
inclusion), or a particular tail configuration as that might be regarded as a “Brand” of the
company, etc.
Although industry influence of the design (and operation) of UASs is closely bound
to the regulatory process, the influence of industry standards may be strong without the
undergirding force of the federal government. An example from manned aircraft is the
adoption of the Air Transport Association (ATA) system of organizing technical and main-
tenance data for complex and turbine-powered aircraft. Although the ATA-100 coding
system was never enacted as a regulation, the adoption by airlines, manufacturers, cor-
porate flight departments, and maintenance operations has been complete. Because the
major airframe and powerplant manufacturers providing parts, spares, components, and
aircraft to the operators of corporate and transport category aircraft began using the ATA
system, all entities in any way affiliated with the industry were forced to adopt and inte-
grate these into all relevant aspects of their operations. In this way, the industry-developed
standard of ATA coding came to carry the weight of regulation without regulatory action.
It is not unlikely that a similar form of pervasive adoption of certain industry standards, as
exogenous design influences, will also occur in the UA industry as it evolves and matures.
FIGURE 10.1
Skunk Works® 3 + Mach D-21 under development. (Image courtesy of Lockheed Martin Skunk Works®.)
Drag is the sum of all forces opposing movement of an aircraft through the viscous
medium of the atmosphere. Total aircraft drag develops from multiple sources. As stated,
creating lift produces induced drag, the result of tip vortices. High-pressure air spills from
under lower wing surface, curling around the wingtips into the low-pressure area above
to create a swirl of air, or vortex, trailing off the tip and behind and below the aircraft. The
dissipation of energy in these vortices is the source of drag attributable to a wing gener-
ating lift. The horizontal tail can also contribute induced drag. The remainder of total drag
is referred to as parasite drag. Components of parasite drag include skin friction, form
drag, base drag, interference drag, cooling drag, leakage drag, and the strong influence
of compressibility effects, sometimes referred to as compressibility drag or wave drag.
Because airflows may pass through the speed of sound (Mach) as it accelerates over the
cambered surfaces of airfoils and other curved surfaces of the airframe (e.g., the canopy)
when the airspeed of the aircraft is around 75% of Mach (or, 0.75M), compressibility drag
is a factor in the design of a very few UA (e.g., the Lockheed Martin QF-16, the 3+ Mach
D-21 developed at Lockheed’s Skunk Works® and Boeing’s scramjet-powered, hypersonic
X-51 Waverider) (Figures 10.1 and 10.2).
The remaining sources of parasite drag, to some extent, all affect the performance
(e.g., range, endurance, useful load, and required thrust) of a UAS. Skin friction drag
develops from the shearing stresses that dissipate energy in the thin boundary layer
above the surfaces of the aircraft. Trim drag resulting from typically forward CG
conditions requiring tail lift downward, resulting in added induced drag from the hori-
zontal tail and increased induced drag from the main wing having to compensate for
this down force with additional lift (possible reduced elevator pitch control authority
as a consequence).
Leakage drag, which is generally associated with fixed-wing aircraft and accounts for
1%–2% of total drag (Sadraey 2009), results from the change in momentum of the air
flowing through the gaps between fixed and moveable surfaces (e.g., ailerons, flying wing
flaperons, elevators, rudders, flaps, ruddervators). Based on the frontal area presented to
the airstream, form drag (aka, pressure drag or flat plate drag) results from the unbalanced
pressure distributions across the area of the projected shape presented to the viscous flow
220
FIGURE 10.2
Artist’s illustration of the X-51 Waverider. (Image courtesy of NASA.)
and the turbulence it creates. Thrust must overcome this pressure differential in order to
move the aircraft forward. Interference drag results from the energy losses resulting from
the interaction of airflows at the juncture of various components. When stabilizers join
empennage and wings mate to the fuselage, the flows converge and interact to produce
turbulence, shearing, and separation of the boundary layers—all of which are wasteful of
energy—creating interference drag. The presence of a fuselage, in fact, disrupts the other-
wise elliptical lift distribution a wing typically creates adding to drag and for the same
loads can increase bending moments. The existence of interference drag explains why total
drag is actually greater than the sum of all the drag acting on all components of the air-
craft (see Figure 10.3). Finally, cooling drag results from the loss of momentum and total
pressure in the air flowing over the powerplant and/or heat exchangers to carry away heat
(Sadraey 2009).
Increased drag translates into reduced payload, range, and endurance—all important
design considerations. Features intended to reduce drag are apparent in the design of all
UASs, but these are generally a more important consideration in fixed-wing aircraft where
mission goals require the ability to stay aloft for extended periods. For example, consider
the following: Elliptical wingtips and high aspect ratio (AR) wings reduce induced drag.
(In its simplest form, for a symmetrical, Hershey-bar wing, the aspect ratio is simply a
comparison of the length of the wing to its chord. For tapered wings, where the chord
varies from root to tip, AR is expressed as the square of the wingspan compared to the sur-
face area of the wing. B^2/S)
The drivers of L/D (lift divided by drag) are fundamentally the wing span and wetted
area (the surface area that is in contact with the external airflow). This is called the “wetted
aspect ratio” and defined as the span^2/total wetted area. This parameter, like aspect
ratio, is to be maximized for increased L/D until other physical constraints dominate the
design (Raymer 1992). High aspect ratio wings are long and narrow. Think about it this
way: An infinitely long wing would have no tips, produce no vortices, and induce no drag.
As the span of the wing goes to infinity so, too, does the aspect ratio. Just as high aspect
ratio wings decrease induced drag, so, too, does a high fineness ratio fuselage reduce form
221
FIGURE 10.3
Elliptical Lift Distribution interrupted by fuselage. (Image courtesy of GA-ASI.)
drag. The fineness ratio is a comparison of the length of the fuselage to its width. A short
wide fuselage has a low fineness ratio; a long narrow one exhibits a high fineness ratio.
When one carefully examines the design of the fixed-wing UAS, high aspect and fineness
ratios are frequently very apparent (examples include the Aeromapper EV2, the Hi Aero
Gabbiano, General Atomics MQ-9 series, and the IDETEC Stardust). A high-wing aircraft
suffers less interference drag than a mid-wing design as the adverse pressure gradient over
the aft top region of the wing has no interfering fuselage boundary layer. However, the
presence of the fuselage, as mentioned above, impairs upwash, downwash, and thus lift.
See Figure 10.3 (High-wing UASs include several Israeli Aerospace Industry [IAI], designs,
e.g., Heron, Searcher, Mastiff, and Hunter, and the designs they influenced, e.g., the RQ-2
Pioneer and the RQ-7 Shadow.) Control surface hinges of sUAS are sometimes nothing
more than an extension of the airframe material (e.g., carbon fiber cloth) or covering; these
surfaces are attached by a thin skin of plastic film or composite and run the length of the
surface, thus completely eliminating leakage drag. Larger UASs tend to employ hinge and
actuation schemes similar to manned aircraft. Additional characteristics will subsequently
be discussed, but the necessity to minimize drag will always be among the factors to be
given careful consideration in the design of any UAS, but most particularly those of fixed-
wing configuration.
Heavier-than-air craft, whether manned or unmanned, whether fixed-or rotary-wing,
must develop lift to fly. Lift is the force opposing the gravitational pull of the earth on
the aircraft, weight. All heavier-than-air craft, whether manned or unmanned, develop lift
according to the same laws of physics. External aerodynamic forces acting on the surfaces
of an airfoil (i.e., a wing) are attributable to two forces: air pressure (or pressure differen-
tial) and air friction. Of these two forces, friction, which occurs in a very thin fluid layer
existing at the wing surface, is much the lesser, and, for most considerations, can be ignored
to produce an idealized condition for study (Hurt 1965). Thus, in this generalized, or ideal
state, lift acting on an airfoil, whether it be a wing, propeller, or rotor blade, can be said
to develop as a function of pressure differentials acting across opposing airfoil surfaces in
conjunction with Newton’s 3rd law of motion (action/reaction) as the air is acted upon by
the shape of the airfoil.
A distinguishing characteristic of subsonic flow is that changes in velocity and pressure
occur with relatively minor changes in density—for most purposes, these can be considered
222
negligible. This is another simplifying assumption, and is the reason subsonic airflow is
said to be “incompressible”—if the density of the flow is held constant, then changes in
pressure and velocity become the significant factors in producing lift. In its most simplified
form, Bernoulli’s equation states that total pressure equals the sum of dynamic pressure
plus static pressure. According to the Bernoulli equation, or Bernoulli’s principle (and
Newtonian physics), because the mass flow remains unchanged, variations in velocity
result in corresponding, but inverse changes in pressure, and vice versa. Thus, as the vel-
ocity (dynamic pressure) of the airflow over the cambered surface of an airfoil increases,
static pressure above that surface decreases, while total pressure remains unchanged.
The force of lift develops as a result of the pressure differential acting across airfoil surfaces.
If we are describing a wing during flight with a more cambered upper surface, then lift is
the result of the decreased static pressure (attributable to increased air velocity) acting
above the wing’s surface, and greater pressure (due to lesser airflow acceleration) on the
lower surface (and possibly some amount of impact pressure resulting from wing angle
of incidence). In the same way, the rotating blades of a helicopter main rotor produce lift
that is controlled to produce thrust, the force opposing drag, for propulsion and, also, for
maneuvering. Similarly, a propeller converts the shaft horsepower (shp) output from the
UAS powerplant to a propulsive force by rotating in an air mass to produce a pressure dif-
ferential across the propeller back (cambered surface) and the flat face (surface having the
higher pressure). An alternative explanation is that the thrust resulting from the acceler-
ation of a mass of air through the propeller (or rotor) disk develops according to Newtonian
mechanics, that is, according to the laws of the conservation of momentum, energy, and
mass (Seddon 1990). Thrust produced by any propeller or propulsor is represented by the
letter “F,” for force, and equals the product of the mass of air and the amount of acceler-
ation imparted to that air mass (i.e., F = m × a).
Unfortunately, a propeller is not terribly efficient at converting shaft horsepower to
thrust. Propeller efficiencies may fall between 50% and 87%, though some newer NASA
airfoils and advanced planform designs, as incorporated in the unducted fan (or propfan)
powerplants developed for manned aircraft during the 1980s, were able to achieve around
90% conversion of input power to thrust. Geometric pitch is the theoretical distance a given
point on the propeller (usually measured at the 75% radius or spanwise blade station)
should advance in one revolution if no inefficiencies were present. Effective pitch is the
actual distance a propeller moves through the air under specified conditions. The difference
between geometric and effective pitch is referred to as slip. (More will be said about these
terms in the section on UAS powerplants.) Propeller slip results from inefficiencies and
represents losses in the conversion of input power to thrust. Factors that reduce the ability
of the propeller to effectively propel (i.e., “pull” or “push”) the aircraft through the air
include, for example, aerodynamic drag, suboptimal angles of attack that produce stalled
regions on the blade, and energy lost to vibration, noise, and tip flutter. These conditions
result in energy conversions (or, losses) that diminish performance and account for the
difference between the expected distance of travel (geometric pitch) and the actual dis-
tance covered (effective pitch) in a single revolution. Successively outboard blade stations
travel increasingly greater distances, and consequently, at correspondingly higher speeds.
The blade shank, the thick, noncambered section located just outboard of the hub, is trav-
eling at a much slower rate than the propeller tip. Because the amount of lift produced
by an airfoil section at a given blade station is a function of both airspeed (of the relative
wind) and angle of attack, the propeller manufacturer designs the propeller so that its
blade angle decreases from hub to tip. This is referred to as propeller twist. Twisting the
blades in this way produces more uniform pressure distributions (lift) across the propeller
223
disk, maintaining a relatively acceptable angle of attack while preventing blade sections
from either stalling or “turbining” (being driven like a pinwheel). Twisting the blades
improves propeller efficiency. Because accelerating a larger mass of air to a lower velocity
for a given amount of thrust (recall that force, in this case, thrust, is the product of mass
times acceleration) requires exponentially less energy (energy consumption increases as
the square of the increase in acceleration), larger propeller diameters have the potential to
produce thrust more efficiently, but the design trade-off is that increased tip speeds intro-
duce higher energy (and power) losses. Similarly, adding blades using three or four instead
of two holds the potential to accelerate a greater amount of air through the propeller disk,
but the increased losses due to drag and the additional weight and complexity (especially
in a constant speed design) may offset any potential efficiency gains. Martin Hepperle has
a great section on his website explaining in more detail the factors influencing propeller
design. www.mh-aerotools.de/airfoils/propuls4.htm
The preceding highlights several of the ways sUAS designs are similar to those of
manned aircraft. However, due to scale effects among other factors, certain differences
also exist. On average, the size (mass) of both unmanned fixed-and rotary-wing air-
craft are orders of magnitude less than their manned counterparts (Austin 2010). As we
“scale down” aircraft to smaller sizes, all attributes are not affected in the same way. For
example, wing surface area, being two dimensional, will vary inversely as the square of
the scaling factor, whereas volume, a cubic, will vary inversely as the cube of the scaling
factor. Thus, all other factors held constant, wing loading—that is, weight (mass in the
gravitational field of the earth) divided by wing area—tends to increase with a decrease in
UA size. Higher wing loading affects aircraft performance, decreasing the rate of climb and
increasing stall speed. Decreasing the rate of climb may negatively affect endurance, and
consequently, range. Increased stall speed increases stress on all recovery structures (main
and nose landing gear system primarily). Higher wing loading may compel the designer
to use a catapult launch system in lieu of the less equipment intensive hand launch. Higher
wing loading also reduces maneuverability. Conversely, any reduction in mass affects the
ability of the UAS to resist the disturbing or upset force of wind gusts, an important con-
sideration in many data gathering missions. Neither are rotorcraft immune to the effects
of reduced scale. Narrower blade chords and smaller rotor disks produce low Reynolds
numbers, which reduce the efficiency and lift of the rotor system (Seddon 1990) that, in
turn, decreases range, endurance, and payload. Thus, in UAS design, size is important,
affecting several operational characteristics that may, in turn, affect the ability of the plat-
form to meet mission requirements.
So, to bring the conversation full circle, vehicle size will frequently be dictated by the
mission. A large platform may be necessary for stability, to carry enough fuel for the
desired range and endurance and to mount the necessary sensor package or payload.
Additionally, electrical power consumption of the various payloads can push engine sizes
larger to meet this demand. Or, the agility of a smaller UAS package may be desirable
for close-up work and for negotiating the tight spaces encountered during infrastructure
inspections. On the other hand, an inappropriately sized UA may reduce system perform-
ance. Selection of appropriate design attributes and platform size and configuration or
of an existing unmanned platform design that will optimize performance and effectively
and efficiently fulfill the mission is best accomplished through the judicious selection
of components and the careful consideration of the performance of the overall system.
During the selection or design process, keep in mind that the overall UA system should
be a synergistic assembly of individual components with sometimes competing system
demands and often opposed operational constraints. The selection or design process is one
224
FIGURE 10.4
General Dynamics F-16 was the first aircraft designed with relaxed static stability (rss). (Image courtesy
of NASA.)
226
and 27% (Hurt 1965). Think about the AC as the lateral axis (y-axis) about which pitch
changes occur and the fulcrum about which the aircraft is balanced. With the CG of the
aircraft located forward of the AC, the tail-down force acts as a counterbalance. If airspeed
decays, less down force is produced, the nose drops, airspeed increases, and the equilib-
rium is restored. In this way, the horizontal stabilizer contributes to longitudinal (static)
stability. This relationship between the AC and the tail-down force produced by the tail-
plane is also why adverse loading of the aircraft to move the CG aft of the AC is too often
disastrous: Both CG and tail-down force are acting in concert to cause the aircraft nose to
pitch up and reduce, possibly catastrophically, control while simultaneously increasing the
likelihood of a stall. Moreover, to provide pitch stability, especially at lower airspeeds, an
aft tail must not stall before the wing—doing so would cause a loss of tail-down force and
a severe pitch break while the aircraft wing continues to produce lift. This design require-
ment is generally accomplished using a tailplane with a lower aspect ratio than the wing,
which increases the range of angle of attack before a stall occurs (Gundlach 2012).
In a conventionally designed aircraft, the vertical stabilizer is the primary source of dir-
ectional control and stability. (Although a wing, especially one that is swept, will con-
tribute to static directional stability, any effect is relatively slight.) Should the aircraft yaw,
or sideslip, the change in angle of attack of the vertical stabilizer causes a side force (change
in pressure differential acting on the major surfaces of the vertical stabilizer) to yaw the
aircraft about the CG in a restoring moment that will turn the nose of the aircraft into the
relative wind. The size of the vertical stabilizer and the arm (distance between the stabil-
izer and the CG, or x-axis) will determine the effectiveness of the stabilizer in creating a
restoring force following any displacement of the nose in yaw.
The trade-off in any tail design is effectiveness in producing the desired stability and con-
trol moments versus weight and parasite drag. Consequently, as a general rule of thumb,
the tail should be no larger than that which produces the desired level of stability and con-
trol. A number of other factors affect the decision regarding the selection of configuration
(whether T-tail, Y-tail, V-tail, etc.), and these will be subsequently discussed.
In closing this section, it might be worth noting that the design of all aspects of manned
aircraft, from nose to tail and wingtip to wingtip, is guided and constrained by the Code of
Federal Regulations (CFR) Title 14, entitled Aeronautics and Space (e.g., CFR 14, Parts 23,
25, 27, 33, and 35). In the emerging field of UA, group 3–5 design engineers use relevant
sections of accepted industry and regulatory design guidance to guide UA airframe design
as UA are increasingly integrated into the National Airspace.
FIGURE 10.5
Upon completion of its 80th combat mission, the B-17 Flying Fortress, The Careful Virgin, was transferred to
Operation Aphrodite and deployed, as an RPA, against V-1 emplacements in France. (Army Air Corps image.)
inverted-T empennage, having a vertical stabilizer/rudder, forming the leg of the “T” and
a horizontal tailplane/elevator located at the bottom of the vertical member to create the
characteristic inverted-T shape. All surfaces attached to a tapered empennage. Examples
include the low-wing Interstate TDR-1, the high-wing Denny Radioplane OQ-1/2/TDD-1
(and its descendent, the Northrup MQM-57 Falconer), and the high-wing Naval Aircraft
Factory TDN-1. UAS designs that resemble conventionally designed manned aircraft
have become increasingly rare with the passage of time. Currently produced examples of
UASs constructed with forward wings and inverted T-tails are much less common than
similarly configured manned aircraft, and examples are generally confined to the least
sized sUAS (e.g., the AeroVironment RQ-11 Raven, the PrecisionHawk Lancaster, and the
Aeromapper EV2).
A primary advantage of the conventional design is that it is a proven configuration in
which lifting surfaces can be conveniently attached to the empennage by conventional
means. Sadraey (2009) claims that familiarity with this well-tested construction is the
reason that 60% of manned aircraft are manufactured with forward wings and a conven-
tional inverted-T tail. Another advantage inheres to the fact that this design is the simplest
and easiest upon which to perform predictive computations and performance analyses.
According to Sadraey (2009, 299), “The analysis and evaluation of the performance of a con-
ventional tail is straight forward … If the designer has low experience, it is recommended
to initially select the conventional tail configuration.” Finally, a conventional tail configur-
ation is lighter and less complex than some other designs (e.g., an H-tail design).
flow away harmlessly behind the aircraft. Also note that certain data links can be disrupted
by the intermittent blockage of a propeller. This configuration can be seen in the Northrup
Grumman Global Hawk and the General Atomics Aeronautical Systems Predator, Reaper
and Gray Eagle series of UAs. It is also noteworthy that the added synergy of the inverted
V protects the propeller from ground strike in the event of a bounced landing. The obvious
challenge is achieving proper CG with a long, often destabilizing nose requiring large tails
(www.ga-asi.com/gray-eagle).
FIGURE 10.6
UAV Factory Penguin B. (Image courtesy of UAV Factory.)
of twin-boom construction also affords flexibility in meeting design goals. During design,
the arm of the tail may be increased or decreased with relative ease to counterbalance
anticipated payload weights and provide the necessary stabilizing and control moments.
For example, control surface arm and stabilizer moment may be increased by moving
the entire tail aft, to improve stability and controllability (at the expense of reduced
maneuverability).
Twin-boom construction is analogous to a box, which surrounds a pusher propeller
to enhance structural stiffness as well as often protecting a propeller. On V-tails, this
decreases surface side-loading to reduce torsion (twisting). On the negative side, the
tail surface located in the discharge of a pusher prop will tend to increase interference
drag and minimally reduce propulsive force, while exposing the tail assembly to greater
buffeting and vibration. Finally, with the engine mounted in the rear of a pusher design,
greater fuselage volume is available for the payload, while sensor packages will be
provided a clear view without the distorting influences of engine exhaust, heat, and oil.
An additional consideration with a twin boom configuration is overall aircraft stiffness
and flutter. The entire weight of the booms and tails are cantilevered off the aft portion
of the wing. The engineer must pay careful attention to structural stiffness and weight to
produce a flutter free design.
Another option available to design UASs with an FOV undistorted by exhaust gasses is
that of a twin-boom, twin-engine aircraft, such as the InView Unmanned Aircraft System,
having wing-mounted powerplants (Figure 10.7). Despite this advantage, multiengine,
fixed-wing UASs are not common. Centerline thrust (pusher/tractor design) twin-engine
configurations represent an attempt to overcome the undesirable yaw characteristics that
occur when operating on a single wing-mounted engine (e.g., during an engine-out inci-
dent), but this option suffers from the combined disadvantages of both pusher and tractor
designs plus the complexity of a twin-engine installation (Gundlach 2012). Nonetheless, one
prominent example of a twin-boom, centerline thrust UAS is the RQ-5 Hunter developed
jointly by IAI and TRW, Inc. (TRW was acquired by Northrop Grumman in 2002).
230
FIGURE 10.7
Twin-boom, twin-engine InView UAS. (Image courtesy of Barnard Microsystems.)
FIGURE 10.8
Northrop YB-49 flying wing (circa 1947–1948). Note the vertical stabilizers necessitated by the lack of a flight
dynamics computer. (U.S. Air Force image.)
The flying wing is attractive to designers because it offers the theoretical potential for high
aerodynamic efficiency (low drag for the amount of lift produced), which leads to lower
energy consumption and increased range. These characteristics can result in improved L/
D ratios. Flying wings are robust, and sUASs are often constructed without landing gear,
saving weight and reducing parasite drag. This design affords considerable flexibility
in payload positioning, although aircraft CG is critical and the load must be judiciously
distributed. Also, because UAS flying wings are most frequently of pusher design, the
lack of a forward-mounted powerplant affords the same advantages as a twin boom—that
is, greater fuselage volume for sensor packages and a clear view without the distorting
influences of engine exhaust and heat. For military UASs, an added advantage of the
flying wing is a low radar cross section (RCS), which is a measure of the detectability
of the aircraft. The characteristic of minimal RCS is a significant reason why unmanned
combat aerial vehicles, such as the Northrop UCAV X-47B, among other entries in the
Navy’s Unmanned Carrier-Launched Airborne Surveillance and Strike (UCLASS) compe-
tition, and stealthy reconnaissance UASs, such as the Lockheed Martin RQ-3 DarkStar and
the RQ-170 Sentinel, are of flying-wing design. Again, in these instances of military UAS
applications, it can be seen that mission goals dictate design characteristics.
Of course, as with most things in life, there is no such thing as a “free lunch,” and
certain negative aspects inhere to the flying-wing design. Due to the lack of stabilizing
surfaces, flying wings exhibit the inherent characteristic of directional instability, although
the autopilot or stabilization augmentation systems are able to mitigate this instability to
varying degrees. Trade-offs exist between wing loading and speed, maneuverability, and
stability. A flying wing is sensitive to displacement by wind gusts and air turbulence.
Designing a flying wing requires the use of “nonstandard,” blended airfoils—the aero-
nautical engineer cannot just consult a catalog of wing designs (e.g., NACA Report No.
824) to select the airfoil for an appropriately shaped wing. Finally, flying wings have a
narrow CG range and balancing the payload, autopilot, receiver, avionics, antennae, etc.,
can be challenging.
232
Those readers interested in a more detailed description will have no difficulty locating
additional resources.
must react inversely for angular momentum to be conserved. The commonly used analogy
is that of figure skaters withdrawing arms inward to increase their rate of spin—this is
another example of the effects of the law. Because flapping causes the blades to accelerate
(lead) or decelerate (lag), provision for this movement must also be accommodated and
is accomplished through hub flexing and blade bending or installation of a lead-lag (or
drag) hinge incorporated in the rotor hub. (Tail rotor blades also encounter dissymmetry
of lift and may also be provided with hinges to accommodate blade flapping.) Although
sUAS helicopters have been fitted with hinges to allow blade flapping (e.g., Zeal produced
aluminum teetering hinges for high-performance applications), the moments and forces
acting on smaller rotor systems are generally low enough that flexing and bending can
accommodate most blade movement.
Large unmanned helicopters (e.g., the Northrop Grumman Fire Scout and the Boeing
A160 Hummingbird) accomplish variations in lift and thrust in the same way that manned
helicopters do, that is, by maintaining a desired rpm while effecting blade pitch changes
about a feathering hinge installed in the hub. To increase lift (and altitude), a collective pitch
change causes all blades to simultaneously increase angle of attack by the same amount.
Thus, lift across the disk is increased. The rotor heads of smaller unmanned helicopters
(e.g., the AutoCopter and the Yamaha RMAX) often incorporate feathering hinges as well.
Moreover, rather than directing inputs straight from the servos through the swash plate
(a device that transforms the rotating motion of a shaft into reciprocal motion) to the pitch
change mechanism, still smaller helicopters (e.g., the ZALA 421-02 and the T-Rex) may
also use a flybar (aka paddles or stabilizer bar) system, similar to that found on two-bladed
Bell and Hiller manned rotary-wing aircraft. The flybar system consists of a bar, fitted with
paddles or weights at the end, installed at 90° to the main rotor blades and perpendicular
to the main rotor mast. The purpose of the flybar assembly is to provide additional cyclic
inputs in response to wind and turbulence, which, in turn, results in greater stability and
control. The smallest, electric unmanned helicopters (e.g., the Proxdynamics Black Hornet
Nano), which are sometimes classed as microaerial vehicles (MAVs), generally have fixed-
pitch main rotor blades and increase or decrease lift by varying rotor rpm.
All helicopters, manned and unmanned, large and small, develop directional flight in a
similar way. To produce directional thrust, the pitch of the blades must change differentially
to tilt the rotor disk in the direction of desired travel. Tilting the rotor disk is accomplished
through differentially changing the pitch of the blades, through cyclic inputs, as they orbit
around the main shaft axis. Due to gyroscopic precession, these inputs must occur 90°
ahead of maximum tilt. To illustrate the effects of gyroscopic precession, assume that the
direction of blade rotation is counterclockwise as viewed from above the disk (common
for manned helicopters produced in the United States). If the longitudinal axis of the heli-
copter is the 0°/360° reference line extended forward of the helicopter, then, to fly forward,
the input to increase pitch must occur at the point 90° in the direction of rotation, while
that to reduce pitch must occur at the point 270° in the direction of blade rotation. Due to
gyroscopic precession, maximum blade deflection will occur 90° later and the rotor disk
will tilt forward, directing thrust and moving the helicopter forward.
Another design feature of rotor blades is that, like propellers, they often incorporate
twist, increasing blade angle from tip to hub. (Because the velocity of the inboard blade
region is lower, without an increase in blade angle, less lift would be produced nearer
the hub.) As with propellers, this is done to reduce stress and increase efficiency by more
evenly distributing lift across the entire rotor disk. This twist is less apparent in helicopter
rotors, largely because it is distributed across a much greater span.
235
Torque effect is present in both fixed-wing and rotary-wing designs, but much more
dominant in the latter. Torque effect develops as the result of Newton’s 3rd law, “for every
action there is an equal and opposite reaction.” Power delivered to the rotor causes the
fuselage to display the propensity to rotate in the direction opposite the rotor. This ten-
dency varies linearly,—increase power, increase torque effect. Torque effect is countered
on single-rotor helicopters, both manned and unmanned, by the tail rotor (aka, antitorque
rotor). If the thrust produced by the tail rotor is less than torque effect, the fuselage
will yaw in the direction opposite main rotor blade rotation; if thrust produced by the
antitorque rotor is greater than the torque effect force, the fuselage will yaw in the direc-
tion of main rotor rotation. Using two rotors affords the advantage of torque cancellation,
whereby the two rotor systems rotate in opposite directions and thus the torque of one
cancels that of the other and no other antitorque system (e.g., a tail rotor) is necessary.
Examples of UASs with two main rotor systems include both coaxial, contra-rotating,
and tandem, counterrotating designs. The difference is that in the former example, the
blades rotate around a common axis, while in the latter, rotation occurs about two inde-
pendent axes. The first rotary-wing UAS, the QH-50 DASH, developed by Gyrodyne for
the Navy in the late 1950s and early 1960s, was a coaxial, contrarotating design powered
by a Boeing turboshaft producing 300 shaft horsepower. During the late 1980s and early
1990s, Sikorsky experimented with a coaxial unmanned design known as the Cipher and
Cipher II, which subsequently evolved into the USMC’s Dragon Warrior UAS. Currently
produced examples of a tandem, counterrotating UAS rotor system may be found on the
unmanned version of the Kaman K-MAX, a helicopter capable of lifting an external load
equal to its own weight, and the IAI Ghost, which resembles a Chinook manned heli-
copter in configuration. The K-MAX rotor system, wherein the blades mesh, much like
those of an old-fashioned, mechanical egg beater, is also referred to as a synchropter or
intermeshing rotor design.
10.3.2.2 Multirotors
Multirotors exist mainly in quad-, hexa-, and octocopter configurations. Note that all have
an even number of rotors for torque cancelation. (Though much less common, three rotor,
“Y-frame” multirotor designs also exist, but these must use a tail rotor or rotor tilting,
which greatly complicates flight dynamics and aircraft control, to counteract the torque
effect induced by an odd number of rotors.) Manufacturers of sUAS multirotors include
DJI, Airobot, Aeryon, now owned by FLIR, and Skydio. Multirotors are almost exclusively
small UASs, powered by electric motors. They afford the advantages of VTOL flight, the
ability to hover and loiter on station, agility, and a relative freedom from vibration, but at
the expense of limited range, altitude, and endurance. Multirotors modulate the various
prop rpm’s for control and this is done in a prescribed manner to keep the net torque of
the system nulled.
Recall that the earlier discussion of drag principally focused on fixed-wing aircraft.
The reason that the points made in that section were more relevant to those aircraft is
attributable, in part, to the fact that drag increases with airspeed. The missions for which
VTOL aircraft (e.g., helicopters and multirotors) are designed generally do not dictate high
airspeeds. Moreover, where endurance and range may be sacrificed to obtain other desir-
able attributes, such as maneuverability, a rotary-wing platform may be selected over a
fixed-wing configuration. The ability to fly in any direction, rather than in only a straight
line, negates the advantages of streamlining, and multirotor designs consequently do not
236
incorporate fairings or fillets or any other strategy to reduce form or interference drag.
Aerodynamically, multirotors are very dirty—antennae, wires, controllers, and motors
protrude into the airstream. In comparison to the design of fixed-wing UASs, the low-
speed operational envelope and directional agility of rotary-wing aircraft render the con-
sideration of drag less important in the design process. However, as the pressure to achieve
faster and longer flight envelopes grows, so will the refinement of the multirotor shaping
to reduce drag and rotor blockage.
FIGURE 10.9
Honeywell Tarantula Hawk landing. (Image courtesy of Honeywell Aerospace.)
237
441). Examples of hand-launched sUAS include the Aerovironment RQ-11 Raven, the
Wasp and the Puma, and the Lockheed Martin Stalker.
Catapult launchers (including what are sometimes referred to as rail launchers) and
“tensioned line” systems (aka High Start or Hi Start systems) use one of several methods
to store the initial energy subsequently imparted to the UA to provide the dynamic energy
necessary to produce lift. The application of this energy cannot be too abruptly applied.
(Langley’s Great Aerodrome experienced structural failures when the spring-powered
catapult accelerated the ungainly aircraft to 27 m/s (60 mph) in a mere 21 m (70 feet).
The Wright Brothers also employed rail launch systems, and catapult/rail launch systems
thus predate the use of landing gear.) Small, relatively light UASs may be launched by a
catapult that stores energy in a bungee. Bungee cord has improved over the years, and
currently produced bungee has much greater elasticity, and consequently greater capacity
to store energy than older materials could provide. The British company, Universal Target
Systems, currently produces a bungee catapult capable of launching a 105 kg (approxi-
mately 231 lb) UAV to a launching speed of 24 m/s (about 54 mph) (Novakovic and Medar
2013). Larger fixed-wing UA may be launched from a pneumatic catapult. For example,
both UAV Factory and Arcturus UAV manufacture catapult systems capable of storing
compressed air to launch their aircraft. In comparison to pneumatic launch systems,
advantages generally afforded by bungee launchers include compactness, lighter weight,
less complexity, and a smaller footprint once assembled in the field. Although bungee
launchers afford several advantages, pneumatic launchers are more common (Gundlach
2012). Carrier deployed UA, such as the Northrop Grumman X-47B UCAV, are launched
from the same steam-powered catapult as their manned counterparts.
Other commonly used launch techniques include rocket-assisted takeoff (RATO or,
sometimes, JATO for jet-assisted takeoff) as used to launch the German V1, the Ryan
FireFly and FireBee, and the Northrop BQM-74 Chukar, air-drop launches (Lockheed
Skunkworks D-21 and the Boeing X-51 Waverider) and even car-top launch systems
(UAV Factory Penguin and the Sperry Flying Bomb) where the UA is carried to take off
speeds by an automobile and then released to lift from the carrier cradle. Larger UASs,
generally weighing more than approximately 455 kg or 1,000 lb (e.g., the Global Hawk
and aircraft in the Predator/Reaper class), operate exclusively from paved (or, at least,
improved) runways and often rely on retractable landing gear for launches. Of course, a
variety of configurations exist, and, for example, the UAV Factory Penguin II incorporates
fixed tricycle landing gear to operate from grass fields and pavement, but, as previously
mentioned, may alternatively be launched from a car-top cradle or pneumatic catapult.
RATO/JATO launch systems are simple in construction and afford high specific thrust
(thrust to weight ratio) and modularity. RATOs are particularly beneficial when the lack
of a runway and the complexity, logistics, and footprint of a catapult launcher precludes
its use. An early example of an RPA incorporating two RATO bottles integrated into its
fuselage is the Northrop MQM-57 Falconer, a UA whose lineage is traceable through the
15,000 OQ-2/TDD-1 drones and their variants produced during WWII back to Reginald
Denny’s original Dennyplane, powered by the Dennymite engine. The MQM-57, which
carried a high-resolution camera, is an early example of a successful tactical reconnais-
sance UA. The RATO bottles could abruptly loft the Falconer, which was powered by 72
hp McCulloch O-100, from a zero-length launch ramp. (The aircraft relied on a parachute
recovery system.) Heavier UAs, requiring a relatively high rate of acceleration to lift off,
may also benefit from an RATO/JATO launch system. The German V-1, with its short,
stubby wings and relatively high wing loading, required an RATO, steam catapult, or air-
drop launch. More recently, RATO systems have been used to launch the AAI RQ-2 Pioneer
239
and the TRW/IAI-developed RQ/MQ 5A/B/C Hunter in areas where space available for
takeoff was limited. In designing RATO/JATO systems, alignment with the aircraft’s CG is
critical to maintaining control during launch.
An airdrop launch affords several advantages. When combined with a parachute
recovery system, which also eliminates the drag associated with a landing gear carriage,
an airdrop launch allows designers to optimize the wing for high-speed flight. (This is
also true for an RATO/JATO launch system where a parachute recovery is employed.)
Since the UA is usually at a relatively higher altitude than other launch systems provide,
aircraft takeoff weight is reduced while range and endurance are increased. Most UA are
airdropped from under the aircraft, an approach generally considered safer than carrying
the aircraft above the mothership. The Lockheed M-21/D-21 air launch, in which the D-21
UA was to lift from a modified SR-71 mothership, failed to provide sufficient separation
resulting in a fatal accident (described in the next paragraph), after which the D-21 was
dropped from beneath a B-52.
Regardless of the type of launch mechanism, certain desirable characteristics gener-
ally inhere to devices used to impart the dynamic energy necessary to loft the UAS. The
requisite length of the launch varies directly with the square of change in UAS velocity and
inversely with acceleration, whereas, “[t]he launch energy imparted to the UA is propor-
tional to the takeoff gross weight [and the imparted] … kinetic energy … is proportional
to the relative launch velocity squared. This implies that launch speed can be a more sig-
nificant launch energy driver than UA weight” (Gundlach 2012, 424). Although transfer-
ring a certain level of energy to the vehicle is necessary, it is, at the same time, desirable to
minimize forces during launch (and recovery) to prevent the overstressing of structures,
to reduce wear and tear on the launch mechanism, and to minimize the field footprint
of any associated apparatus and supporting devices (e.g., a compressor and accumulator
for pneumatic launchers). Thus, the rate of UA acceleration and the amount of generated
energy converted to force to be absorbed by the launching device is significant. Also,
launch mechanisms must provide sufficient clearances during the entire operation. This
seems obvious, but failure to provide adequate clearance between Lockheed’s D-21 super-
sonic UA and the M-21, a modified SR-71 Blackbird, during an air launch resulted in a fatal
accident in which the Launch Control Officer, Ray Torick, drowned after ditching over the
ocean. (The pilot, Bill Park, who had previously ejected from a Blackbird at 500 feet and 200
knots, survived, but both the D-21 UA and the M-21 mothership were destroyed.)
Gundlach (2012, 425) defines the recovery (or capture) operation as the successful
activity of “… transitioning the UA from a flying state to a nonflying state.” Recovery
systems include the use of capture nets, parachute deployment, arresting devices, pro-
prietary apparatus such as the Insitu SkyHook® (Figure 10.10), and conventional landing
gear systems. The recovery phase can provide greater challenges than the launch oper-
ation. The approach requires adherence to an airspeed controlled within narrow limits,
near stall, where the aircraft is susceptible to wind gusts, and a precise ground track to
intersect the location where the aircraft is to be captured or recovered. Moreover, upon
capture, the dynamic energy carried by the UA must be dissipated in a controlled way to
minimize stresses induced in the platform and recovery device. Even a belly landing can
produce very large forces on the fuselage as it compresses to absorb energy, particularly
where descent rates are high.
The necessity of using a launch and recovery system may be dictated by the design
and mission of the aircraft, but the choice of recovery may also afford certain inherent
advantages. A belly skid recovery, which relies on the friction between the ground and
the UA airframe to arrest forward motion, eliminates the drag associated with landing
240
FIGURE 10.10
A Boeing Insitu RQ-21A Blackjack captured by the company’s proprietary SkyHook® recovery system.
(U.S. Navy image.)
gear to enhance range and endurance and obviates the need for a runway. Larger, often
tactical, UASs that may not well withstand the forces and abrasion experienced during a
belly landing often rely on a net recovery. Nets can also be used as an arresting barrier in
conjunction with conventional landing to more rapidly slow an UA while reducing the
aircraft’s rollout. Similarly, arresting cables may be employed in much the same way. The
SkyHook® proprietary recovery system employs a unique configuration wherein a vertical
arresting cable is clutched by a grasping claw located at either wing-tip of certain Insitu
UASs (e.g., ScanEagle and Integrator). This configuration provides an extremely small
footprint and is consequently often found installed on a ship deck or trailer. Parachute
recovery systems, used on a wide range of aircraft (e.g., sUAS, tactical and air-launched
UA), provide low descent rates and relatively soft landings. However, a means of cutting
the parachute free after touchdown can prevent the extensive damage caused by a strong
surface wind dragging the aircraft through the desert before recovery personnel can get
to the aircraft. Parachutes can also be employed as emergency flight termination and drag
inducing (drogue chute) devices. UA suspended under a parachute canopy may also be
snagged for recovery during descent, a common means of retrieving the Ryan Firebee
during the Vietnam War.
The largest UASs (e.g., the Global Hawk) commonly employ the most complex command
and control system for launch and recovery. The Global Hawk’s LRE (aka, the satellite con-
trol station) is intended to be rapidly deployable and capable of controlling the aircraft in
the field to a distance of approximately 370 km (200 nautical miles) (Austin 2010). Once the
241
UAS is aloft, control of the aircraft is “handed off” to the mission control element (MCE) for
BLOS operation during the majority of the mission. Upon completion of the operation, the
Global Hawk is flown to within range of the LRE and control relinquished so that the air-
craft may be landed at its base of origin. The most advanced launch and recovery systems
are fully integrated with the navigation avionics, autopilot, and aircraft subsystems to pro-
vide the capability of fully automated takeoffs and landings. One example is the Advanced
Launch and Recovery System (ALRS) available on the IAI Heron II. The ALRS cannot only
perform preprogrammed autonomous takeoffs and landings, but also “handoff” aircraft
control to the ground station of a forward base of operations. According to Israel Aerospace
(2002 under Advanced Ground Control Stations), the ALRS “… minimizes human error
during [critical] … phases of flight and reduces the cost of operator training.”
General Atomics UAS’s implement a Launch and Recovery Team that uses a GCS at a
forward location to take off, land, and service the UA. Once in the air, control is handed
off to a mission team hundreds to thousands of miles away controlling the UA via a satel-
lite network. Additionally, automatic takeoff and landing systems are being implemented
extensively as this book is being written within the General Atomics Predator/Reaper/
Gray Eagle family of UASs (Figure 10.11).
For DOD or military UAs, it is typically desirable for group 3–5 UA to adopt a launch
and recovery scheme that blends in seamlessly with the existing infrastructure utilized for
manned aircraft.
10.5 Conclusion
As can be seen from the great diversity in airframe construction, design options for UASs
are numerous affording the designer and engineer tremendous flexibility and control over
FIGURE 10.11
Gray Eagle UA on gear. (GA-ASI Image.)
242
the final aircraft configuration. Many factors ultimately affect the decisions that culminate
in the final design, but the most significant among these is the mission goal. After all,
the UAS exists solely to efficiently and successfully achieve some objective, most often
in the civilian world, the acquisition of remotely sensed data, and in the DOD world,
deliver ordnance in addition to remotely sensed data often venturing into hostile airspace.
(Survivability can be another aspect of UA design the scope of which is beyond this text).
The selection of airframe configuration should be accomplished with full consideration of
how the UAS is to be used and of the ultimate goal of the mission for which the system is
to be flown.
Discussion Questions
10.1 Why does the author state that, in designing any UAS, form follows function?
10.2 List factors in the design of UASs. Why are these important? Of these, which two
are likely the most significant? Why?
10.2.1–10.2.3 Describe economic and exogenous design factors and tell how
these may influence UAS design.
10.2.4 What are the four main forces acting on any heavier-than-aircraft during
flight? Describe how lift and thrust develop. What are the sources that
sum to produce total airframe drag? Describe each. Explain why total
airframe drag is greater than the sum of the drag acting on each indi-
vidual component. Explain how an increase or reduction in drag affects
other UAS design parameters.
10.2.5 Define aspect ratio, fineness ratio, and wetted aspect ratio and tell how
these influence UAS performance and design.
10.2.6 Describe how a propeller develops thrust. Define propeller blade face,
blade back, geometric pitch, effective pitch, and slip. What are sources
of propeller inefficiencies? Describe these. Why are propeller and rotor
blades “twisted” so that the blade angle changes from blade station to
station?
10.2.7 What is meant by “scale effect?” How does scale effect affect UAS, par-
ticularly sUAS, design?
10.3 When classified according to the method of lift production, what are the two
broad categories of UAS?
10.3.1 Gundlach (2012) states that the great diversity in tail designs is analo-
gous to an artist’s pallet. List and describe the various tail configurations
available to the designer of UASs.
10.3.1.1 Describe the X, Y, and Z axes as these relate to aircraft stability
and control. What is meant by “tail-down” or “nose-up” force?
Why is this important? How is it designed into UA?
10.3.1.2 Compare and contrast the various configurations of control/
lifting surfaces employed in UAS design to impart stability
and control about the X, Y, and Z axes, providing advantages
and disadvantages of each. Identify aspects or characteristics
unique to each (e.g., the use of ruddervators or elevons).
243
10.3.1.3
Briefly discuss the origins and history of twin-boom, pusher
UA designs that are so common today.
10.3.1.4 Briefly discuss the advantages and disadvantages of the single
fuselage, aft tail, aft engine, and nose payload configuration.
10.3.2 Discuss the benefits and drawbacks of selecting a rotary-wing design
over that of a fixed-wing.
10.3.2.1 Explain the flight dynamics and their control in a helicopter
UAS. How may torque cancelation be achieved? What is
the difference between counterrotating and contrarotating
propellers and helicopter rotor systems?
10.3.2.2 Why are the majority of multirotors configured with an even
number of rotors? What is a Y-frame multicopter? How is
torque cancelation achieved on Y-frame sUAS?
10.3.2.3 The Honeywell Aerospace Tarantula Hawk is a novel approach
to sUAS rotary-wing design. Describe the construction of the
T-Hawk and its rotor system. How does Honeywell achieve
torque cancelation on this sUAS?
10.4 Describe the various launch and recovery systems that are a part of any UAS,
providing characteristics, advantages, and disadvantages of each. Provide
examples of UASs using each. Provide the phrases represented by the acronyms
LRE, MCE, and ALRS and tell how each are used in the command and control
of UASs.
References
Austin, R. 2010. Unmanned Aircraft Systems: UAVS Design, Development and Deployment. Chichester,
UK: John Wiley and Sons.
Melbourne: Department of Defense, Aeronautical Research Laboratory.
Gessow, A. and G.C. Myers, Jr. 1985. Aerodynamics of the Helicopter. New York: Frederick Unger
Publishing.
Gundlach, J. 2012. Designing Unmanned Aircraft Systems: A Comprehensive Approach. Reston: American
Institute of Aeronautics and Astronautics.
Hurt, H.H., Jr. 1965. Aerodynamics for Naval Aviators. Washington, DC: Naval Air Systems
Command.
Israel Aerospace Industries. 2002. Advanced Ground Control Stations. www.iai.co.il/2013/34404-
37386-en/IAI.aspx (accessed April 12, 2015).
Jarnot, C. 2012. History. In Introduction to Unmanned Aircraft Systems, eds. R. K. Barnhart, Hottman,
S.B., Marshall, D.M., and Shappee, E., pp. 1–16. Boca Raton, FL: CRC Press/Taylor & Francis
Group.
Louge, M., A. Halterman, A. Billington, E. Franjul, J. Gong, Y. Lee, J. Nersasian, C. Ozkaynak, J. Pei,
and M. Ujihara. 2004. Mars unmanned aircraft 2003–2004. Working paper, Odysseus Team,
Cornell University. www.southampton.ac.uk (accessed June 6, 2014).
Novakovic, Z. and N. Medar. 2013. Analysis of a UAV bungee cord launching device. Scientific
Technical Review 63(3):41–47.
Raymer, D. 1992. Aircraft Design: A Conceptual Approach, 5th ed. Washington, D.C. : American Institute
of Aeronautics and Astronautics; pp. 37–40.
Sadraey, M. 2009. Aircraft Performance Analysis. Saarbrücken, Germany: VDM Verlag Dr. Müller.
244
Schafroth, D.M. 1980. Aerodynamics, Modeling and Control of an Autonomous Micro Helicopter. PhD dis-
sertation, Eidgenössische Technische Hochschule Zürich, Schweiz (Swiss Federal Institute of
Technology in Zurich).
Seddon, J. 1990. Basic Helicopter Aerodynamics: An Account of First Principles in Fluid Mechanics and
Flight Dynamics of the Single Rotor Helicopter. Oxford, UK: BSP Professional Books.
newgenprepdf
245
11
UAS Propulsion System Design
11.1 Introduction
The propulsion system design must satisfy the requirements derived from the unmanned
aircraft system (UAS) requirements. UAS design requirements include aircraft speed, pay-
load weight, runway length, climb rate, endurance, maneuverability, maximum altitude,
environment, aircraft reliability, etc. These requirements are balanced against each other in
an iterative process to determine the propulsion system requirements. Propulsion system
requirements include thrust (and lift for rotorcraft), efficiency, propulsion system environ-
ment, propulsion system reliability, etc. These requirements are further specified in greater
detail for the engine, propeller, and ancillary systems.
245
246
In this chapter, we examine engine designs, propellers, and the systems that bring these
components together resulting in the overall propulsion system design. Unmanned aerial
vehicle (UAV) propulsion systems are not unique—they are essentially the same as any
other application. The principles detailed here describe large UAS; however, they are
equally applicable to smaller UAS.
FIGURE 11.1
General Atomics Aeronautical Systems, Predator XP & Rotax 914 Turbocharged Four-Stroke Engine. (Image
courtesy of General Atomics Aeronautical System, Inc.)
is transmitted to the crankshaft through the connecting rod. The engine generates power
for the production of thrust only during the power event. The next 180° of rotation of the
crankshaft pushes the piston upward in the cylinder to expel the exhaust gases through the
exhaust valve, and overboard through the exhaust system. Thus, four strokes and 720° of
crankshaft rotation are necessary to complete the five events of the Otto cycle.
Four-stroke engines afford certain design benefits: less vibration (in comparison to a
two-stroke engine), quieter operation, relatively high torque, and a broader power band.
When range and endurance are important factors in the anticipated mission of the UAS,
four-stroke engines offer the major advantage of providing the higher fuel efficiency than
two-stroke internal combustion engines. On the other hand, they are also generally heavier,
more complex, and expensive than two-cycle engines. Four-stroke aviation engines have
relatively high compression ratios that require higher octane fuel to prevent preignition of
the fuel. Aviation engines use aviation gasoline (AVGas) that uses tetraethyl lead (TEL) to
boost octane number.
One example of a UAS four-stroke powerplant would be the 120 horsepower (hp)
Teledyne Continental IO-240-B7B installed on the Eagle ARV UAS. Another is the Austrian-
produced (opposed) four-cylinder, 115 hp, turbocharged Rotax 914F engine that powers
the RQ/MQ-1 Predator A and Predator XP (see Figure 11.1). The IAI RQ-5 Hunter was
also powered by a Moto Guzzi two-cylinder, four-stroke powerplant. Small four-stroke
engines, available in sizes of 7.5 cc and above, may be installed on small UAS (sUAS)
platforms. An example would be the Barnard Microsystems InView UAS powered by a
pair of 29.1 cc (1.8 cubic inch) displacement powerplants that burn 100 low lead aviation
fuel to which is added synthetic oil in a 20:1 ratio to provide lubrication.
area is created below the piston. Occupied by the piston connecting rod and the crankshaft,
this area is enclosed and termed the crankcase. Air, mixed with fuel in the proper mixture
ratio and a small amount of oil for lubrication, is drawn into the crankcase and stored. At
the same time, above the piston is a charge of air and fuel, previously stored in the crank-
case during the preceding compression stroke, which is being compressed by the upward
motion of the piston. The ignition event is timed at the proper point around the maximum
upward travel of the piston (TDC) to provide maximum expansion of the gases and the
greatest downward force on the piston through the connecting rod to the crankshaft. This
is the power stroke. With the downward travel of the piston, an exhaust port is uncovered
to begin the scavenging of the cylinder. As the piston continues downward, an intake port
is uncovered and the decreasing crankcase volume forces the fuel/air mixture stored there
through the intake port and into the cylinder. The fresh charge pushes the remaining spent
gases out of the cylinder through the exhaust port. The intake port and then the exhaust
port are covered by the piston as the fresh charge is compressed and the process is repeated
so long as the engine continues to operate. Thus, the two-stroke engine is capable of com-
pleting all five events in one complete crankshaft rotation.
Some fairly obvious advantages of the two-stroke design are simplicity, with few
moving parts, compactness, and low weight. This last attribute contributes to a high
specific power (power-to-weight ratio), at least within a narrow power band. Compared
to other powerplants, two-stroke designs are relatively inexpensive. Two-stroke engines
are also able to operate on lower grade fuels owing to their lower compression ratios.
One disadvantage is a lack of smoothness in operation that creates airframe vibration.
While a vibration-free UAS platform is necessary for susceptible payload sensors, the
shaking induced by a two-stroke powerplant can prove difficult and costly to isolate
and dampen. Two strokes are also notoriously noisy with a relatively high rate of fuel
consumption. This inefficiency has a negative impact on range and endurance. Another
serious disadvantage associated with two strokes is the poor performance that occurs
during off-load power (Fahlstrom and Gleason 2012). At low revolutions per minute
(rpms), the exhaust gases do not scavenge well in a two-cycle engine, and consequently,
dilute the fuel/air charge drawn into the combustion chamber. The resulting lean mix-
ture produces intermittent firing, popping, and rough operation, and may even “kill”
the engine. This characteristic can be fatal to the UAS if it occurs during an attempted
recovery at low engine rpm.
In the earliest days of UAS design, most aircraft were manned aircraft modified to
respond to exogenously originated or preprogrammed commands, and purpose-built
UAS powerplants did not exist. As late as the 1960s, the selection of a UAS two-stroke
engine was limited to those that were commercially available and included generator,
lawn mower, and chain saw engines, but these quickly proved to be “… unsatisfactory in
terms of life at high output, level of vibration, fuel economy and reliability” (Catchpole
and Parmington 1990, 1). Research, driven largely by military requirements and funding,
developed new designs and evolved these to the point where, today, two-stroke engines
power a multitude of diverse unmanned platforms. Manufacturers, including Cosworth,
Sachs, Desert Air, Graupner, Husqvarna, Hirth, 3W Modellmotoren, and Ricardo, among
others, currently produce two-stroke engines, explicitly for UASs, capable of operating
on gasoline, kerosene fractions, and glow fuel (a mixture of methanol, nitromethane, and
synthetic or castor oil to provide lubrication). Examples of UASs on which these are (or
have been) installed include the RQ-2 Pioneer, UAV Factory Penguin, the IAI Searcher, the
General Atomics Gnat 750, and the SVU-200 unmanned helicopter designed by American,
Dennis Fetters, for export to China.
249
FIGURE 11.2
General Atomics Aeronautical Systems, MQ-1C, Gray Eagle & a Thielert Centurion. (Image courtesy of General
Atomics Aeronautical System, Inc.)
the five necessary internal combustion engine events—that is, the equivalent of three
complete Otto cycles. Thus, because three power pulses occur in one revolution of the
rotor, the specific power of the engine is high. This rotating assembly is the only moving
part in the engine. Because Wankels convert the force of the pressure created in the com-
bustion chamber into rotation without reciprocating motion, these are extremely smooth-
running engines—a significant consideration where a steady, stable, vibration-free UAS
sensor platform is desired. Falstrom and Gleason (2012, 81) emphasize the importance
of this characteristic saying, “Vibration is the deadly enemy of electronics and sensitive
electro-optic payload systems and is much of the reason for the lack of system reliability of
UAV systems.” Wankels are also very compact with a high specific power. Rotary engines
can be made to operate quietly when fitted with an effective muffler system. Although
Wankels are reasonably fuel-efficient and capable of high rpms, torque output is some-
what low, a problem that can be solved using a gear reduction system. Rotary engines are
installed on a number of UASs, including the RQ-7 Shadow and the RQ-2C Pioneer both
powered by UEL AR-741 rotary engines producing 28.3 kW (38 hp) and the Schiebel S-100
Camcopter, powered by an Austro AE50R Wankel producing 41 kW (55 hp).
installed on older fixed-wing designs that relied strictly on the reaction thrust generated
by the engine; turbofans are more efficient propulsors, consisting of a core engine and fan
module, found on newer fixed-wing airplanes and UASs; turboprops, consisting of a gas
generator, gearbox, and propeller, are installed on fixed-wing aircraft, both manned and
unmanned; and turboshaft powerplants are installed on helicopters and tiltrotors. An air-
craft gas turbine is mechanically simple, but the physics and thermodynamic principles
associated with its operation are complex. Gas turbines are considered to be the most reli-
able and smoothest operating of all powerplants available for installation on unmanned
aircraft (Fahlstrom and Gleason 2012). They generally burn HFs (e.g., kerosene hydro-
carbon fractions) and are, by far, the most expensive of UAS powerplants. Gas turbines are
generally installed on larger, high-performance UASs.
The turbojet, turboprop, turboshaft, and turbofan all consist of the same basic compo-
nent assemblies in which the five events characteristic of an internal combustion engine
occur. Air enters the inlet and is ducted or routed to the compressor where the air under-
goes an increase in static pressure and total pressure. Compressor design may be axial
flow, centrifugal, or a combination of the two. A stage of axial compression consists of
a set of rotating blades, or rotors, installed around the circumference of the compressor
drum, and a set of downstream stationary blades, or stators, installed in the compressor
housing. The compressor drum, and consequently, the rotors are driven by the turbine(s)
to accelerate air into the stators. The stators slow the airflow and increase working fluid
static pressure, before directing it into the next stage of compression. An axial-flow com-
pressor is extremely efficient, but exhibits a very low per-stage compression ratio, approxi-
mately 1.1:1 to 1.25:1. This high efficiency is the reason that the majority of large aircraft
gas turbines are constructed with axial-flow compressors, which may achieve an overall
compressor pressure ratio of 40:1, or more. Axial-flow compressors are found in the
gas turbines powering large UASs (e.g., the Global Hawk) and Unmanned Combat Air
Vehicle (UCAV) (e.g., the X-47B). Centrifugal compressors achieve a much greater per-
stage pressure increase, but at a much lower compression efficiency. The use of centrifugal
compressors can create a compact powerplant, and these are integral to the TPE331-10
installed on the General Atomics Reaper. Due to losses that increase substantially with each
boost in pressure, no more than two stages of centrifugal compression will be incorporated
into an aircraft gas turbine. The compound compressors, integral to some turboprop and
turboshaft gas turbines (e.g., the Pratt & Whitney Canada, or P&WC, PT6, and the Rolls
Royce 250, and M250), are configured with multiple stages of axial compression dischar-
ging into a single stage of centrifugal compression. Passing out of the final compressor
stage, the air enters a divergent duct, known as the diffuser, where the working fluid slows
and static pressure increases. Taken together, these components, the inlet, compressor, and
diffuser, are sometimes collectively referred to as the cold section of the engine.
The hot section consists of the combustor, turbine section, and exhaust duct. Often, the
diffuser duct will be constructed with vanes that reduce airflow turbulence and direct
the working fluid into the combustion section (aka, combustor) where fuel, continuously
sprayed from the fuel nozzles, mixes with the air just before being ignited to rapidly oxi-
dize in the combustion process. Working fluid temperature and energy reach maximum
values in the combustor. Upon exiting the combustion section, the working fluid enters the
turbine section to pass through multiple stages of turbine. Unlike a stage of compression,
a stage of turbine consists of a set of upstream stators (aka, the diaphragm or nozzle) and
a downstream set of the turbine blades installed in a rotating disk. This rotating assembly,
or rotor, is also known as the turbine wheel or T-wheel. The nozzle assembly directs the
working fluid, at the proper angle and velocity, into the cupped turbine blades causing the
252
rotor to spin like a pinwheel. Because energy is incrementally extracted by each successive
T-wheel, less is available to each downstream stage, and the diameter of each rotor is suc-
cessively larger to uniformly capture the appropriate amount of power in each subse-
quent downstream stage. The rotor disks are fastened to the turbine shaft and the power
extracted by the rotors is used to drive the compressor and any propulsor airfoils (i.e., the
fan, propeller, or rotor blades of a helicopter). From the turbine section, the working fluid
enters the exhaust duct to be directed overboard.
Aircraft gas turbines often incorporate two (or, less commonly, three) sets of turbines,
the compressor, or gas generator turbines and the power, or free turbines. This distinc-
tion is a key feature differentiating various classes of gas turbine designs. Although other
configurations exist (e.g., the PT6), most often the power or free turbine shaft rotates within
the compressor turbine shaft. Because the two assemblies are independently supported
by separate bearing systems, they can rotate at different rpms, with the more upstream
turbine assembly, the compressor turbine, rotating faster. The gas generator turbine con-
stantly drives the compressor to process air in the continuously ongoing process of the
Brayton cycle. No turbine system driving the compressor will extract all of the energy
available in the working fluid. In a turboprop, turbofan, or turboshaft powerplant, some
power must remain in the working fluid to drive the propeller, fan, or rotor blades. Only a
turbojet does not have a power turbine assembly. Nonetheless, some energy must remain
in the working fluid to provide thrust during acceleration of the working fluid through the
propelling nozzle of the exhaust duct. The output shaft of a turboprop or turboshaft will
drive a gear reduction system. If the propeller or rotor blades reach transonic speeds, aero-
dynamic performance dramatically deteriorates and the output rpm of the power turbine
is too high to drive the propulsor airfoils at an rpm acceptably low to operate efficiently.
Consequently, the gear reduction system (the gearbox, gear reduction unit, or the transmis-
sion of a helicopter) converts high rpm, low torque to low rpm, high torque to drive the
prop or rotor blades. Due to the heavy loads encountered by gearboxes integral to turbofan
installations, an aircraft fan is rarely driven through gear reduction.
FIGURE 11.3
General Atomics Aeronautical Systems, MQ-9 Predator B Reaper & Honeywell TPE331 Turboprop. (Image
courtesy of General Atomics Aeronautical System, Inc.)
to increase powerplant and transmission life. Another example of a UAS turboshaft instal-
lation is that of the Pratt & Whitney Canada PW207D turboshaft, which develops 478 kW
(641 shp) and powers the Bell Eagle Eye tiltrotor.
11.2.3.3 Turbojets
Turbojets, developed during World War II (WWII) are very noisy, and in terms of fuel
consumption, extremely inefficient, particularly at lower airspeeds. On the other hand,
254
FIGURE 11.4
General Atomics Aeronautical Systems, Predator C Avenger & a Pratt & Whitney PW545 turbofan. (Image
courtesy of General Atomics Aeronautical System, Inc.)
FIGURE 11.5
Polecat developed “in-house” at Lockheed Martin’s Skunk Works®. (Image courtesy of Lockheed Martin Skunk
Works®.)
they are without the additional complexity and weight of an integral gearbox, prop or fan,
and therefore, exhibit a high specific thrust. Turbojets have not recently been installed on
UASs but have provided the propulsive force for the Ryan Firefly (General Electric YJ97-
GE-3 turbojet producing 17 kN, or 4,000 lb of thrust), the Ryan Firebee (Continental J69-T-
29A turbojet generating 7.6 kN, or 1,700 lb of thrust), and Firebee II (Teledyne CAE J69-T-6
turbojet producing 8.18 kN or 1,840 lb of thrust), a UAS frequently flown on reconnais-
sance missions in Vietnam and as recently as 2003 in Iraq.
FIGURE 11.6
Two Williams F44 turbofans (above) powered the Lockheed Martin Polecat. Williams International produces
a family of small, lightweight civil-certified FJ33/FJ44 turbofan engines (roughly in the 1,000–4,000 lbf range).
(Image courtesy of Williams International.)
brushless motors (compared to brushed electric motors) include greater torque and spe-
cific power, more torque per amp (higher electrical efficiency), lower maintenance, and
a longer life (no brushes, slip rings, or commutator to pit, burn, or wear) and less elec-
tromagnetic interference (EMI), which is often an extremely important consideration for
UA systems. (EMI can induce spurious signals in autopilot, avionics, and communications
systems to the extent that the vehicle may be uncontrollable and subsequently lost.) BLDC
motors may be of inrunner or outrunner design.
An inrunner BLDC motor is constructed by mounting permanent magnets on the rotor
(connected to the output shaft), which are simultaneously attracted and repelled by
the magnetic fields produced by the stationary windings (or stators) positioned around
the magnets. In an outrunner design, the outer shell, in which the permanent magnets are
installed, rotates around the central stator. Again, the permanent magnets are attracted/
repelled by the magnetic fields established in the stator windings. The output shaft, to
which the propeller or vertical takeoff and landing (VTOL) rotor drive system connects,
is integral to this outer shell. Brushless motors often use neodymium permanent magnets
(also known as NdFeB, NIB, or Neo magnets), which are made up of the rare earth metal,
neodymium, alloyed with iron and boron. These are the strongest permanent magnets yet
developed. Neodymium magnets are available in several grades (strengths)—the stronger
the magnet, the more it costs. The use of strong magnets makes a BLDC motor very efficient.
Due to inherent advantages, sUAS electric powerplants are most commonly, though
not exclusively, of outrunner design. An outrunner will rotate much more slowly than
an inrunner and, yet, produce more torque. Because the outrunner stator is interior to the
motor, the windings and internals can be sealed to protect them from the environment.
Outrunner windings are not subjected to centrifugal loading that may extend motor life.
Air cooling of the windings is not necessary, since heat can be dissipated by conduction.
This is significant because one factor limiting the maximum sustained power output by a
brushless motor is the amount of heat produced by the BLDC—too much heat may per-
manently damage stator winding insulation and weaken rotor magnets.
Electric motors are installed on a large proportion of sUAS fixed-wing aircraft and
helicopters and nearly exclusively on multirotor VTOLs. Examples include the UAV
Factory Penguin BE, the UTC Aerospace Vireo, and the Aeryon Labs Scout and SkyRanger
256
FIGURE 11.7
Aeryon Labs Scout quadcopter with outrunner BLDC motors. (Image courtesy of Aeryon Labs, Inc.)
(Figure 11.7). Although electric motors are very quiet and provide extremely smooth,
vibration-
free operation, the primary design trade- off is that of reduced endurance
and range. Endurance for the Scout quadcopter is approximately 25 minutes, while the
published flight time of the fixed-wing Vireo is one hour, though this depends much
on winds. Published endurance for the Penguin BE is 110 minutes. Compare this to the
published endurance of 20+ hours for the Penguin B powered by a two-stroke 3W 28i two-
stroke engine. Battery-powered sUAS, however, are continuing to make significant gains
in endurance with each design.
discussion under UAS Flight Dynamics and Physics). The pitch of a fixed-pitch propeller
should be chosen to align with the mission and flight characteristics of the UAS: Selecting
a propeller of lesser pitch will reduce drag, and all other factors constant result in higher
rpms, a characteristic favoring lower speed operation and the takeoff/landing segments of
the flight. Choosing a higher blade angle (or greater pitch) would be warranted for higher
airspeed applications such as efficient operation at cruising speeds.
Large UASs, such as the turboprop Reaper, will use constant speed propellers in an
attempt to maintain an efficient angle of attack (around two to four degrees) where the lift
to drag ratio is maximized. Such a system is much like those found on manned aircraft: a
single-acting propeller governor will port high-pressure oil, diverted from the powerplant
lubrication system, to a piston in the propeller hub to effect pitch change or release oil
to allow some combination of spring force, aerodynamic forces, and the force exerted by
counterweights (if installed) to effect a pitch change in the opposite direction. The term,
single-acting, refers to the fact that the governor will direct high-pressure oil to cause the
blade angle to change in only one direction. A single-acting governor will direct oil to
the propeller to either increase pitch or decrease pitch—depending upon manufacturer
design; it can do either—but not both. A double-acting governor will route high-pressure
oil to either side of the propeller piston (a component of the pitch change mechanism)
to both increase and decrease blade angle. The Reaper uses a four-bladed McCauley pro-
peller, which is very similar to those found on manned aircraft. Aerovate and NWUAV
both produce constant speed propellers for UASs smaller than the Reaper; propellers
manufactured by the former use aerodynamic forces counteracted by spring force to
accomplish changes in pitch, whereas the designs of the latter may be either electrically or
hydraulically actuated.
in the intake valve. As the aircraft climbs in altitude, air density drops. Because there is less
airmass in the cylinder, the engine burns less fuel and produces less power.
The induction inlet draws air from outside the engine nacelle. Extending the engine air
inlet into the freestream produces increased static pressure. When a fluid slows down, the
dynamic pressure is converted to static pressure. Along the surface of the aircraft, friction
slows down the air, so the scoop is moved away from this boundary layer. Consideration
is given to protecting the induction system from icing. Reciprocating and rotary engines
require a particle filter to prevent contaminants from clogging tight clearances. These filters
are a periodic maintenance item requiring access.
Medium-altitude long endurance (MALE) UAVs with reciprocating engines are often
equipped with a turbocharger to maintain a constant intake manifold air pressure (MAP)
with increasing altitude. A turbocharger uses the engine exhaust gas energy captured
through a turbine to drive an inlet air compressor mounted on the same shaft. The
turbocharger speed and compressor pressure ratio are regulated by a waste gate valve
that throttles the flow of exhaust gas to the turbine. The maximum compressor pressure
ratio dictates the altitude at which MAP starts to decline and engine power is limited.
This pressure ratio is dictated by the aerodynamics of the compressor wheel and com-
pressor housing. In general, high compression ratio compressors have a narrower air
mass flowrate in which they operate. At low air mass flow, the compressor surges and the
pressure and mass flow fluctuate wildly. At high air mass flow, the compressor reaches
the Stonewall curve where it cannot pump any more air. The shaft of the turbocharger is
usually lubricated with oil. The oil feed must have a very fine filter due to the very close
tolerances. The high speed of the turbocharger shaft (in excess of 125,000 rpm) generates a
large amount of heat. If the oil flowrate is insufficient, the oil will coke, a process where oil
undergoes oxidation and thermal breakdown producing solid black residue.
As the air is compressed, thermodynamic inefficiencies heat the air to the point that the
air density may be lower than the ambient air. An intercooler uses ambient air to lower
the temperature of the compressed air, thereby increasing the density. Care is taken in the
design to minimize the pressure loss through the intercooler. Typically, aluminium brazed
fin intercoolers are used for their light weight and thermal efficiency.
The hot engine exhaust must be directed away from the engine nacelle, keeping it away
from combustible materials and preventing it from impinging on flammable drain or vent
lines. The exhaust itself must be constructed of fireproof materials and have the flexibility
to withstand vibration and the relative movement of connected parts. Minimizing the
pressure drop in the exhaust ducting reduces backpressure on the engine that will nega-
tively affect power and efficiency. Consideration is also given to ensure that the exhaust
will not harm personnel handling the aircraft.
Most engines require a separate oil system to lubricate moving parts. Two stroke engines
and small electric motors do not require oil systems. In its simplest form, the oil system
consists of a tank, filter, pump, heat exchanger, and deaerator. The engine and gearbox may
either use a single oil system or each have their own dedicated oil system. Oil is consumed
by the engine necessitating the use of an oil tank. The size of the tank must be sufficient
to account to the maximum rate of consumption of oil for the aircraft endurance and have
sufficient room to account for the expansion of hot oil. The oil pump forces the oil through
the engine passages and allows heat to be carried away. If the oil was allowed to remain
stagnant, engine heat would cause the oil to coke and stop lubricating the moving parts.
The oil pump may be electrically driven; however, it is commonly mechanically driven
off the gearbox. There may be several filters in the oil system. A larger mesh size may be
located between the tank and pump to protect the pump from larger debris. A finer oil
259
filter is placed after the pump to protect the engine. The filter unit may include a magnetic
chip detector that can collect ferrous particles. When sufficient material is collected, the
particles bridge two electrical contacts and trigger a warning, caution, or alarm (WCA)
that may indicate that the engine is wearing prematurely. This filter must be accessible for
easy maintenance. Finer filters may be required to protect components with even tighter
tolerances. A heat exchanger is incorporated into the oil system to remove heat gained
from the friction of moving parts and the heat of the engine. The choice of heat exchanger
depends upon the system architecture and how the heat can be used. Some choices include
an air-cooled radiator, an oil-to-coolant heat exchanger, or an oil-to-fuel heat exchanger.
The system architecture may use multiple heat exchangers. The moving parts in the engine
and gearbox entrain air and some combustion gases into the oil, resulting in foam that
makes the oil less effective in heat transfer and lubrication. This necessitates the use of
a deaerator to separate these gasses from the oil while minimizing the loss of oil from
the system. The gasses are vented overboard of the aircraft in a location that does not
constitute a hazard. While these components constitute the basic components of an oil
system, there may be other propulsion system components that require oil, adding com-
plexity to the system.
A coolant system removes heat from the engine to prevent damage to the engine due to
the immense heat generated; however, not all engines require a coolant system. Gas tur-
bine engines are cooled by the high volume of air they ingest. Small reciprocating engines
transfer sufficient heat directly to the air with the aid of cooling fins on the engine cylinder.
Larger reciprocating and rotary engines require a coolant system to help remove some
of the heat. Coolant is forced through channels in the combustion chamber and out to an
air-cooled radiator. The coolant is usually a mixture of water and either ethylene glycol or
propylene glycol and additives. This mixture depresses the freezing point (antifreeze) and
raises the boiling point when compared with pure water. Through the block, the coolant
must have sufficient flow and pressure to prevent nucleate boiling that causes erosion of
the engine block. The radiator cap maintains an elevated system pressure by incorporating
a spring-loaded seal. A coolant tank ensures that the system remains filled and provides
expansion space for the hot coolant. As with the oil system, the coolant pump is either
electrically driven or mechanically powered off the engine. A temperature control valve
proportions the flow of coolant to the radiator to maintain the required temperature into
the engine.
The fuel system controls the flow of conditioned fuel into the engine to support the
requested power level. Fuel is conditioned to meet the temperature, pressure, and contam-
inant requirements of the engine. Because cold fuel requires more heat (and therefore more
time) to ignite, higher altitude UAVs must warm the fuel prior to injection into the engine.
UAVs that operate at lower altitudes may not need this preconditioning step. While some
reciprocating engine might still use carburetor systems that mix the fuel and air prior to
engine combustion chamber, most modern engines inject the fuel directly into the combus-
tion chamber when the air is nearly fully compressed. To ensure a fine mist of fuel droplets,
the fuel must be injected at a pressure much greater (at least twice) that of the compressed
air. This is achieved with a high-pressure pump mechanically driven off the engine. Since
combustion only occurs in the vapor phase, the droplets must evaporate before they ignite.
Larger droplets evaporate more slowly than small droplets that can delay ignition and
result in a less even burn. Sufficient excess flow is provided to keep the fuel pressure con-
stant during injection that will affect the mass flow of the time-based fuel injection. The
aircraft fuel system will contain a particulate filter with provisions to separate out water
that can collect in the fuel tanks.
260
There are certain minimum control system powerplant instruments required for large
UAVs. All aircraft require measurements of fuel quantity, oil pressure, oil temperature, oil
quantity, and fire warning. Reciprocating engines require an engine tachometer, cylinder
head temperature, fuel pressure or fuel flow, MAP, and coolant temperature. Gas turbine
engines require gas temperature, fuel flowmeter, fuel pressure, tachometer, an air induc-
tion system ice protection indicator, fuel filter capacity indicator, an oil strainer warning,
and a means to indicate that any fuel filter heater is functioning. Turbojets and turbofan
systems require thrust indication and reverse thrust position. Turbopropeller UAVs require
a torque indicator and propeller blade angle.
The control system makes adjustments to the propulsion system actuators to achieve the
requested power command at the highest system efficiency within the operating limits of
the propulsion system. The control system consists of a full authority digital engine con-
trol (FADEC), sensors, and actuators. The FADEC is the digital computer that operates
the control system. Since the FADEC has full authority, there is no manual backup. To
increase reliability, the FADEC contains two or more completely redundant computers.
If one computer fails, another computer takes control. In its simplest form, the engine
controller is trying to achieve the commanded power; however, more complex propul-
sion system controllers use set points of airspeed or altitude. They may have different
modes for ground operations (taxi) and flight operations. The FADEC uses propulsion
system sensors to determine the current operating condition of the engines, such as fuel
inlet temperature and pressure; engine speed; air temperature and pressure; and exhaust
gas temperature. The FADEC also uses aircraft sensors such as outside air temperature
(OAT), atmospheric pressure, and air speed. Servo actuators adjust the manual controls on
propulsion systems originally designed for human control. The control system automates
many complex interactions with the propulsion system that would otherwise overburden
the pilot.
The engine nacelle is designated a fire zone due to the presence of flammable fluids
and ignition sources. Hot surfaces on the engine and sparking from the alternator bushes
are sufficient to ignite any leaking fuel or oil. If left unchecked, an engine fire may result
in structural failure of the aircraft and complete loss of aircraft control. This is a safety
risk to people and property on the ground. Elements are incorporated into the design to
mitigate against engine fire. The fire zone is isolated from the rest of the aircraft by a fire-
wall that prevents the spread of fire. All penetrations through the firewall are sealed. Fuel
and other flammable fluid tanks are located a safe distance from the firewall to prevent
the heat of a fire from igniting them. A shutoff means on the cold side of the firewall is
incorporated into the line supplying fuel to the engine to cut off the supply when a fire is
detected. Flammable fluid components and lines are constructed of fire proof materials to
prevent them from contributing to a fire. Similarly, any component required to shut down
the engine in the event of a fire is constructed of fireproof materials or protected with
shields or fire blankets. Drain holes prevent any leaking flammable fluid from collecting.
The engine nacelle is ventilated with fresh air to keep the concentration of any flammable
vapor below the lower flammability limit.
of the propulsion system. The engineers developing the propulsion system walk through
the components within each subsystem and ask the question, “What happens to the system
when this component fails that way?” They use engineering judgment to assess that par-
ticular failure mode on the rest of the system. A fault tree analysis (FTA) is a quantitative
assessment of critical failure rate. Critical failure rate (λ) is the inverse of the reliability
number, mean time between critical failures (MTBCFs). The FTA is a Boolean logic tree
that rolls up all of the known failure modes and their rates into a single aircraft reliability
number. The known failure modes are derived from the FMECA. The lower the assessed
aircraft reliability, the higher the risk assessment.
The top-level propulsion system failure is loss of thrust. There may be secondary failures
to evaluate, such as loss of electrical power from the alternator. Loss of thrust might further
be broken down into loss of engine power or loss of propeller functionality. Engine power
is further broken down into loss of fuel, loss of air supply, loss of ignition, loss of oil, loss of
coolant, controller failure, mechanical failure, and others, depending on the system. Each
of these systems are broken down further to their constitute components.
The component- level failure rates may be either produced from actual field data,
vendor data, or commercially available failure rate tables. The best data come from simi-
larly designed parts operating in a similar environment. The further the usage envir-
onment deviates, the less useful the data become. For example, the reliability data for a
fielded component are more accurate than data obtained in a laboratory environment that
cannot easily simulate all of the overlapping factors. Similarly, the reliability data from a
component used on an aircraft are more accurate than a similar component used on a sta-
tionary powerplant.
Overall system reliability is improved by incorporating redundant backups for critical
components. For instance, a backup fuel pump ensures that if the primary pump fails,
fuel still flows to the engine. To be fully redundant, the backup unit must be completely
separated from the primary unit. In the example, the backup fuel pump must have its own
fuel supply, inlet screen, and power circuit. This minimizes the number for single-point
failure in the redundant system. Another example is a multiengine aircraft that may be
flown with one or more engines inoperable.
11.5.2 Certification
The airworthiness authority grants an airworthiness-type certificate for the aircraft system
if substantiated by the data provided by the manufacturer. For propulsion systems, there
are three-type certificates required: engine, propeller, and propulsion system integration.
For the Federal Aviation Authority (FAA), engines are covered by 14 CFR 33; propellers are
covered by 14 CFR 35; and propulsion system integration is covered by either 14 CFR 23 for
smaller UAVs or 14 CFR 25 for larger UAVs. Normal category rotorcraft are addressed in 14
CFR 27. Transport category rotorcraft are addressed in 14 CFR 29. The aircraft requirements
are written for manned aircraft. With the advent of UAS/RPV, airworthiness authorities
are creating new standards that address the unique attributes of these aircraft.
The procedure for obtaining airworthiness approval is similar regardless of the air-
worthiness authority. First, the aircraft manufacturer and the airworthiness authority
agree on the airworthiness code that will be the basis of certification. Second, the manufac-
turer and airworthiness authority agree on the means of compliance. There are four basic
means of compliance in rank of increasing significance: inspection, analysis, demonstra-
tion, and test. Some airworthiness authorities break these categories down further. For
many airworthiness requirements, there are prescribed acceptable means of compliance.
263
The FAA provides these in the Aircraft Advisory Circulars (AC). While these are the gen-
erally accepted ways of showing compliance, the manufacture may show compliance with
an alternate means with the airworthiness authority approval.
Third, the aircraft manufacture develops the compliance artifacts in accordance with the
negotiated means of compliance. An internal airworthiness reviewer, familiar with gen-
erally accepted practices, reviews the artifacts prior to submittal to the authority to help
ensure approval. The airworthiness authority may accept or reject the compliance artifacts
provided. The aircraft manufacturer has the opportunity to readdress the rejected artifacts.
Finally, once the airworthiness authority is satisfied, airworthiness approval is granted and
the aircraft is certified.
Changes to the aircraft after certification require airworthiness reassessment. These
modifications may be design improvements, vendor changes, or even changes in the
manufacturing plant where a component was made. Even a simple change may introduce
unforeseen interactions that adversely affect the overall aircraft airworthiness. Only those
portions of airworthiness code affected by the change are readdressed.
14 CFR 33 are the airworthiness standards for aircraft engines. This code addresses both
reciprocating and turbine engines. For both types of engines, the code details both design
and construction requirements, and an engine block test. The engine block test involves
a 150-hour endurance test where the engine is subjected to a series of rigorous cycles of
various power levels. A teardown inspection is conducted at the end of the test to prove
that the engine is still functioning within its acceptable limits. In addition, Part 33 requires
that the engines have instructions for continued airworthiness, an installation manual,
engine ratings and limitations, and established power or thrust rating. Any UAV manufac-
ture must conform to that documentation.
14 CFR 35 are the airworthiness standards for propellers. As with the engine code, the
propeller code has both design and construction requirements and test and inspection
requirements. Example of propeller tests includes bird impact, fatigue, lightning strike,
and endurance. As with the engine requirements, the propeller manufacturer must pro-
vide propeller configuration; instructions for continued airworthiness; an installation
instructions, propeller ratings, and operating limits; and features and characteristics. The
aircraft manufacturer must conform to this documentation.
The airframe manufacture is responsible for showing compliance with the powerplant
requirements. These requirements include the following categories: General, Fuel System,
Oil System, Cooling, Air Induction System, Exhaust System, Powerplant controls, and
Powerplant Fire Protection. A few examples of these requirements were briefly presented
in the sections above. As with the engine and propeller, the airframe manufacturer must
provide documentation such as operating limits, flight manual, instructions for continued
airworthiness, and a maintenance manual. The operator is required to follow this
documentation.
11.6 Maintainability
Continuing airworthiness is a set of instructions to maintain an aircraft in safe working
condition throughout its life. Before an aircraft can obtain an airworthiness certification,
the aircraft must have certain Mandatory Continuing Airworthiness Information (MCAI)
that includes maintenance manuals, replacement intervals for life limited parts, inspection
264
procedures, requirements for modification of the aircraft, and requirements for amending
the operating limitations and procedures. The aircraft operator is required to follow the
MCAI to maintain the aircraft airworthiness.
The propulsion design should give consideration to the maintenance requirements.
Frequently maintained components, such as filters and fluid tanks, should be easily access-
ible. Some of the more common items were identified in the sections above. Larger UAVs
will require Ground Support Equipment to provide support and access to the propul-
sion system. Procedures for the maintenance of peculiar support equipment, which are
often custom designed, may also need to be developed. Access should be provided for
inspections such as for corrosion wear and fatigue. Failure to take maintenance into con-
sideration early in the design will result in a propulsion system that take a long time to
service that increases costs and result in increased downtime.
11.7 Conclusion
In this chapter, we learned about some of the factors that go into UAS propulsion design.
UAS performance requirements are iteratively decomposed to the propulsion system
components. Safety requirements are provided by the airworthiness authority. The pro-
pulsion system consists of an engine, thrust-generating device (propeller, fan, or rotor),
and ancillary systems. There are a wide variety of engines to select from each with their
own advantages and disadvantages relative to the application. The ultimate choice of
system components are the ones that best satisfy the functional, environmental, and safety
requirements. Packaging the propulsion system into the UAV poses its own challenges for
mounting, interfacing, and safety. The completed system is evaluated for safety to ensure
that it is airworthy and capable of completing its intending mission.
Discussion Questions
11.1 Which of the four main aircraft forces do propulsion system provide?
11.2 Give an example of the iterative decomposition of requirements from the UAS to
the propulsion system.
11.3 List and describe the various powerplant configurations available to the designer
of UAS, identifying aspects or characteristics unique to each and the advantages
and disadvantages of each design when installed on UASs. Explain the operating
cycle of each. Give examples of UASs on which each is installed.
11.3.1 Describe the construction of inrunner and outrunner BLDC motors, giving
the advantages and disadvantages of each. Why are neodymium magnets
commonly used in the rotors of these motors? What will be the effect of heat
on these magnets?
11.3.2 Explain the differences between turbojet, turboprop, turboshaft, and
turbofan gas turbines? Give examples of UASs on which each type of gas
turbine has been installed?
265
11.4 Identify those UASs most likely to use a fixed-pitch propeller and those where a
constant-speed propeller would be used. A constant-speed system is heavier and
much more complex. Explain why, in the face of the preceding statement, these
would be used. Identify those flight regimes where higher or lower blade angles
would be desirable and justify your answer. When compared to a “cruise” fixed-
pitch prop, would a “climb” prop have a greater or lesser blade angle?
11.4.1 Describe the function of the typical propulsion subsystems. For each engine
type, identify which subsystems are required to operate that system. Why
are the other subsystems not required?
11.4.2 Describe the challenges involved with integrating the propulsion system
into the UAV. Which subsystem components might be integrated into
the engine and which are airframe components? Describe why some
components might not be integrated into the engine?
11.4.3 Describe how a hybrid powerplant system works. What are the advantages
and disadvantages of a hybrid powerplant? Are hybrid powerplants good
for all applications?
11.5 Why is a safety evaluation necessary for an unmanned air-vehicle system? Who is
the object of the safety evaluation?
11.5.1 What is an FMECA used for? What is an FTA used for? How do the FMECA
and FTA help the UAS propulsion system design? When should the FMECA
and FTA be conducted?
11.5.2 What is the process to prove the airworthiness of a UAS propulsion system?
What does airworthiness mean? Who grants an airworthiness-type certifi-
cate and who is it granted to?
11.6 What is continuing airworthiness? Why is it important?
11.7 Describe some common propulsion system maintenance items? Identify some
other propulsion system maintenance items not listed in this chapter.
References
Catchpole, B.G. and B. Parmington. 1990. Design and Preliminary Development of an Engine for Small
Unmanned Air Vehicles. Propulsion report 184. Melbourne: Department of Defense, Aeronautical
Research Laboratory.
Fahlstrom, P.G. and T.J. Gleason. 2012. Introduction to UAV Systems. Chichester, UK: John Wiley
and Sons.
266
newgenprepdf
267
12
UAS Subsystem Nexus: The Electrical System
12.1 Introduction
The unmanned aircraft (UA) electrical system provides the nexus of the UA subsystems
to perform the intended mission. The electrical system powers the navigation and flight
sensors; powers the flight, engine, and mission control computers; powers communication
and detect-and-avoid systems; powers electromechanical servos and motors; commands
valves for hydraulics if applicable; and in the case of small unmanned aircraft systems
(sUASs) provides the source of propulsion. The lack of a pilot aboard UA precludes the
use of manual mechanical flight control, in which pilot applied force is transmitted via the
control stick, levers, and pedals to the flight control surfaces using a combination of rods,
cables, gears, pulleys, and/or hydraulics. As such, UA necessarily use fly-by-wire flight
control, in which electrically powered flight computers combine flight sensor data with
remote pilot input or preprogrammed mission input to generate the flight control surface
commands. With no people on board, the purpose of UA is not the transport of personnel
but the utilization or delivery of the carried payload. The size and design of the payloads
are as varied as the size and design of the UA themselves:
267
268
Even in the case of UA drone racing, cameras and sensors are required for remote pilot
situational awareness. In some perspectives, the UA can be viewed as a flying electrical
power bus, allowing the UA to perform all aspects of its flight and mission.
For example, among the most diminutive of the commercially available sUAS is the
electrically powered Proxdynamics PD-100 (aka, Black Hornet Nano) microaerial vehicle
(MAV) that measures approximately 10 × 2.5 cm (4 × 1 inch) and weighs just 16 g (2.1
ounces) including the battery that provides 20 min, or more, of flight time. The PD-100 is
capable of remote operation as a remotely piloted aircraft (RPA) or of autonomous flight
enabled by an onboard autopilot with integrated avionics (i.e., GPS receiver, inertial meas-
urement unit, and three-axis gyro system). Because the MAV’s payload consists of an elec-
trically positioned, electro-optical sensor capable of streaming (downlinking) either a live
video feed or still images, the PD-100 is well suited to various 3D (dirty, dull, and dan-
gerous) missions including close-quarters search and rescue following a natural disaster,
inspection of nuclear and chemical manufacturing facilities, and hostage rescue and mili-
tary applications.
By comparison, as UA increase in size, platforms generally become more capable of
carrying larger, heavier payloads, which, in turn, provide greater mission capabilities.
Larger payloads typically require greater amounts of electrical power, affecting power
generation and distribution. The physical increase in size of UA necessitates that power
be distributed over longer distances, increasing the effects of cable resistance and induct-
ance. Larger UA have requirements for greater system redundancy to ensure safety.
Consequently, as a generalized observation, it could be stated that the complexity of the
associated onboard systems becomes greater as UA platforms become larger. The intri-
cacy and sophistication of the onboard systems of large UA (e.g., the Northrop Grumman
Global Hawk, the Lockheed Martin Sentinel, and the NASA-modified General Atomics
Reapers of the Ikhana and Altair programs) become comparable to those of large, turbine-
powered manned aircraft.
On nearly all UA, the primary or backup source of electrical power is chemical energy
stored in batteries. For sUAS, the batteries provide one or more voltage levels to power
the electrical system, such as 6V direct current (DC) and 12V DC. In larger UA, which inte-
grate technical standard order (TSO –A Federal Aviation Administration [FAA] standard)
avionics, commercial off the shelf (COTS) units, and government furnished equipment
(GFE) payloads, voltage levels are driven to aircraft standards such as 28V DC, 270V DC,
and 115V alternating current (AC) detailed in MIL-STD-704. Also, as the size of the UA
increases, battery power alone is typically insufficient to cover all electrical system power
demands, except for emergency and engine-out conditions, so electrical power is converted
from higher energy density chemical energy stored in fuel that is converted to mechanical
energy via combustion engine turboprop, turbofan, or auxiliary generators. In other cases,
supplemental UA power is converted mechanically via ram air turbines, converted chem-
ically from fuel cells, or collected electromagnetically via solar panels.
With the exception of superconductors, all electrical conductors have resistance. That
includes generator and servomotor windings, power distribution network wiring and
bus bars, and circuit card traces. Even batteries have internal resistance, which becomes
of particular concern during discharge, as batteries age, and as batteries operate in low-
temperature environments, both on the ground and at altitude. (This characteristic and the
responsible chemical processes are subsequently discussed.) The resistance of a conductor
is a function of the material of which it is made, given by a constant of material resistivity
and represented by a lower-case Greek rho, ρ. Given a particular conductive metal (e.g.,
copper or aluminum), resistance then varies directly with length and inversely with cross-
sectional area—the longer the conductor and smaller the cross-sectional area, the greater
the resistance. Expressed mathematically, the resistance of a conductor can be calculated
using the formula, R = (ρL)/A. Resistance generates heat as it converts electrical energy
into thermal energy. If the circuit is a heater, then no problem: it is doing its job. If the cir-
cuit is not a heater, then unnecessary resistance generates unnecessary heat that wastes
energy and can stress components, leading to an increase in component failure rates. While
a concern even for the smallest circuit cards, conductor resistance is particularly an issue
for the wiring of electrical power distribution networks as the lengths of power distribu-
tion cables are typically orders of magnitude larger than the lengths of circuit card traces.
Aviation quality wire (i.e., manufactured according to FAA and military standards and
specifications) is sized according to the American Wire Gauge (AWG) system in which
larger numbers indicate a smaller diameter wire. For example, 0.1 in diameter AWG 10
wire is an order of magnitude larger than 0.01 in diameter AWG 30 wire. Although a manu-
facturer could order wire in odd AWG sizes, aircraft wire manufactured according to FAA
and military specifications is generally available only in even-numbered AWG diameters.
Aviation quality wire is stranded for flexibility and manufactured only in copper or alu-
minum (although aluminum is less commonly used due to lower conductivity, higher
resistance, and susceptibility to corrosion). To decide which size wire to use, the designer
is left with the typical engineering trade off. Smaller wire is less expensive, weighs less,
and takes up less space. However, smaller wire has higher resistance, which, depending
on the current through the wire, results in larger voltage drops (V = IR drop of Ohm’s law).
Wire that is too small for the current applied will overheat (P = I2R as discovered by James
Prescott Joule while running experiments for his brewery). Overheating wire degrades the
wire insulation, increasing the risk of short-circuit failures, causes the wiring to become
stiff and brittle, and can be an ignition source for fires. Large wires can handle higher
currents, but are expensive, heavy, and take-up space. Every ounce of unnecessary cable
270
weight corresponds to less flight time due to the increase weight of the UA, requiring more
propulsion to keep the UA aloft. In addition, every cubic inch of space taken by unneces-
sarily large wiring displaces space that could have otherwise been used for batteries, fuel,
or payloads. Use of large wiring does not only affect the size of the wiring itself, but also
increases the size of conduits to route the cabling, the space for cable turns due to min-
imum bend radius requirements, and the space at the avionics box interfaces due to the
size of the connectors. The size of the connectors, in turn, can drive the size and weight of
the avionics boxes, compounding the issues of space, weight, and power. Consequently,
when designing any UAS electrical system or installing a new component, selecting a
wire of suitable diameter is critical to satisfactory system operation and longevity. For a
given UAS circuit, anticipated peak current flow, the maximum voltage drop acceptable
in the circuit, and the conductor length, from power source to component ground, are the
most important factors in selecting the correct AWG wire size. This problem is common
to all aircraft design, manned and unmanned alike, so guidance on wire gauge sizing is
readily available from government and commercial standards, such as Advisory Circular
AC43.13-1B published by the FAA, which, in turn, references Society of Automotive
Engineers (SAE) AS50881 that superseded the military document MIL-W-5088L. The wire
gauge sizing is dependent on the maximum current load, as well as the thermal effects
of altitude and the thermal effects of bundling multiple wires together. The guidance on
acceptable voltage drop for 28V DC, 270V DC, and 115V AC electrical power systems can
be found in the military standard MIL-STD-704F, which is also referenced in AC43.13-1B.
Of interest to some: superconductors are not a viable option for current UA as even current
“high-temperature superconductor” materials require cooling near –200°C using liquid
nitrogen, and are not practical due to the expense as well as the harsh environments of air-
craft avionics per aircraft environmental standards such as Radio Technical Commission
for Aeronautics (RTCA) DO-160 and MIL-STD-810.
Maxwell’s equations, along with the Lorentz Force Law, form the foundation of the math-
ematical modeling of electromagnetism. In particular, the equations show that changing
electric fields induce magnetic fields, and that changing magnetic fields “induce” electric
fields. As such, the transmission of electrical power generates electric and magnetic fields
that can be beneficial, as in the case of stored energy and noise reduction provided by prop-
erly damped capacitor and inductor filters, or detrimental, as in the case of radiated elec-
tromagnetic interference (EMI), capacitive signal cross talk, and inductive voltage drops
and spikes due to step loads. Like resistance, inductance is present in all conductors, not
just in coils and loops. Similar to resistance, the inductance of a straight wire is proportional
to the length of the conductor and inversely proportional to the cross-sectional width of
the conductor—the longer the wire and smaller the cross-sectional width, the greater the
inductance. The inductance of a conductor causes a portion of the electrical current to be
converted to a magnetic field. That portion of the power is not dissipated as was the case
for resistance, but is absorbed and stored as a magnetic field. The absorption of the power
can result in significant voltage drops when a load turns on or draws additional current
while operating. Inversely, the inductance can result in significant voltage spikes when
load currents are switched off as the collapsing magnetic fields return the stored power
back into the conductor. If left unchecked, those voltage spikes can cause damage to the
circuitry of the avionics or payloads. As such, electrical system design is just that a system
design. Design of the cables includes using proper gauge wire in twisted pairs with inter-
leaving to reduced magnetic effects, and using shielding with circular (360°) terminations
to reduce EMI radiation and susceptibility. The impedance (a measure of the opposition
of electric current to the energy flow when a voltage is applied) of twisted pair wiring is
271
2.2–2.4 times less than a single wire 2–4 in above a ground plane. As cited in MIL-STD-461F
appendix A (page 205, preceding Figure A-6), “where power distribution wiring has short
lengths, or where dedicated returns run with the high sides (versus structure return),”
use of 5 µH line impedance stabilization network (LISN) may be appropriate as opposed to
the typical 50 µH LISN used for single wire systems. The reduction in impedance allows the
use of smaller sized components for EMI filtering, saving space and weight within avionics
utilization equipment. Design of power distribution boxes includes using fuses, traditional
circuit breakers, and/or solid-state circuit breakers and current limited switches to limit
fault currents for circuit protection. Design of the electrical power system also includes
safety grounding, especially for 115V AC, 270V DC, or other high-voltage systems, for
circuits near fuel or other combustible vapors, and for materials that are subject to static
electricity build-up (e.g., propeller blades, flight surfaces, and even hydraulic lines and
fuel lines). Government and commercial standards provide guidance for those aspects
of the electrical system design, such as Advisory Circular AC43.13-1B, MIL-HDBK-274,
MIL-HDBK-454, and MIL-STD-464.
Another important characteristic of wire is the quality of its insulation. The purpose of
the insulation surrounding the conductor is to keep circuit current within the conductor.
A measure of the ability of the insulation to perform this paramount function has been his-
torically referred to as its dielectric strength, although preferred terms, depending upon the
context, might be relative permittivity or dielectric permittivity. If the wire abrades or is cut
or damaged by solvents or fuel, its dielectric characteristics are diminished, weakening the
insulation at a point where, if voltage is sufficient to overcome the remaining resistance at
that location, current will escape from the circuit (short circuit). Short circuits can generate
heat and impair or interrupt system operation. Short circuits can also lead to safety issues
for maintainers on the ground if AC or high-voltage DC is allowed to conduct to exposed
conductive surfaces. If the system does not incorporate circuit protection, the short circuit
may produce enough heat to cause an in-flight fire and result in loss of the aircraft. When
installed, such circuit protection devices should be installed as near the electrical power
source as possible to protect the maximum length of circuit wiring.
All electrical systems require a closed-loop circuit through which to conduct the current,
i.e., a power source path and a return path. In the case of larger UA of traditional semi-
monocoque construction (aluminum fuselage skin supported by load bearing internal
frame), not only does the low-impedance aluminum fuselage provide a path to conduct
high currents resulting from lightning strikes, but the aluminum fuselage/empennage can
also be used as the electrical power return path. An example of such UA is the Northrop
Grumman Global Hawk/Euro Hawk, which is designed around a fuselage constructed
of aluminum. For a historical snapshot, the Lockheed/ Boeing RQ- 3A DarkStar UA
(Figure 12.1) also utilized an aluminum fuselage, but that program was terminated in 1999
due to budget cuts. In such a configuration, the positive leads of DC power sources, such
as batteries and generators, are connected to a distribution bus to which the positive sides
of the component circuits also connect. When the return leads of the power source(s) and
the return leads of the component(s) are connected (grounded) to the airframe, a complete
circuit is provided. Current flow to circuits is then controlled by solid-state semiconductor
switching devices and/or electromechanical relays and contactors. Because only one
conductor carries current from the bus to the component with the airframe acting as the
conductive return path to complete the circuit to the source, this arrangement of wiring
is referred to as a single-wire system—and, it is something that is not possible where the
UAS structure is constructed completely of composite materials, such as nonconductive or
partially conductive glass fiber, carbon fiber, and Kevlar. In general, composite structures
272
FIGURE 12.1
Lockheed Martin/Boeing Tier III-(minus) RQ-3 DarkStar on the ramp following delivery to Dryden Flight
Research Center, Edwards, CA. (Image courtesy of NASA.)
have a higher strength to weight ratio than aluminum, making for lighter airframes.
There are also physical limitations of aluminum structures, where the thickness of alu-
minum panels are constrained to a minimum thickness required to support aircraft struc-
tural rivets. The combination of weight savings and panel thickness forces most sUAS to
utilize composite structures. Add to that the benefits for reduced corrosion, the ability to
use fewer parts of custom shapes instead of multiple part assemblies, and the increased
performance in extreme temperature and weather conditions, and it is no surprise that
even large commercial manned aircraft are transitioning to use composite structures, such
as the Boeing 787 Dreamliner. The cost (aside from the literal increased cost of composite
materials and fabrication) is that composite UAS manufacturers do not have the luxury
of a nearly equipotential ground plane of the aluminum fuselage for power returns, so
must either embed conductive strips or bus bars within the composite structure to be
used as a common distribution bus or shared ground, or must double the amount of
wire used, including both the power and dedicated return within the cables. The weight
savings of the composite fuselage typically exceed the increase in weight from the second
wires, for a net weight reduction, and including both power and return wires within
shielded, twisted pair cabling keeps cable routing clean and limits EMI. However, com-
posite structures, even those that include one or more layers of wire mesh within the com-
posite, require internal avionics to have higher levels of transient protection as induced
voltages from lightning strike currents are higher. Like all engineering problems, to goal
is to navigate all of the often-conflicting constraints to design a workable system (not the
optimal system as that is too expensive, takes too long to design/manufacture, and is
always subject to interpretation).
Another aforementioned design consideration associated with circuit wiring is the cre-
ation of EMI (aka, radio-magnetic interference [RMI]). EMI results in a voltage being
impressed upon a conductor creating a spurious signal, which can corrupt or confuse
the information carrying signal in sensitive autopilot, communication, and navigation
circuits to produce a system malfunction. EMI can even cause a critical UAS system to
fail completely (FAA 2012). More than one UAS has been destroyed as the result of EMI
produced by an unshielded magneto ignition circuit interfering with the autopilot and
avionics systems. Potential sources of such spurious signals are many and include igni-
tion systems, switch-mode power supplies, electronic speed controllers (ESCs), electric
273
motors, servos, and even conductors themselves. Any change in the intensity of current
flowing in a conductor results in an expansion or contraction of the associated electro-
magnetic field that surrounds the wire. Should the resulting relative motion cause this
varying field to cut across an adjacent conductor, a secondary voltage will be impressed
in the wire that is otherwise electrically insulated from the one carrying the initially
varying current flow. If this secondary circuit is carrying data to a critical component,
the impressed (spurious) signal can corrupt the original data signal, with potentially
undesirable or catastrophic results (e.g., a crash and loss of the aircraft). Because the
strength of the EMI-producing magnetic field decreases as the inverse of the square of
its distance from the receiving conductor, maximizing separation between conductors is
sometimes an effective strategy for reducing or eliminating electronic noise or interfer-
ence. Twisting wires is also a simple way to cause the interacting fields to cancel, and
thus, reduce EMI. A more positive EMI-suppression strategy is the use of shielded wire
or cable (FAA 2012). (An electrical cable consists of multiple insulated conductors, some-
times twisted, and routed together in a common sheath.) Another commonly employed
method used to reduce or eliminate EMI in UAS electrical systems, particularly those
found in sUAS, is the use of chokes made up of sintered soft iron or ferrite (ceramic
materials compounded with iron (III) oxide), which are available in a variety of sizes,
dimensions, and shapes, such as beads or tubes. Where used in sUAS installations,
the wires associated with EMI-producing circuits are often passed through the centers
of toroid-or donut-shaped soft iron chokes and coiled in turns around their surfaces.
The chokes are passive and are not connected to the circuit. Absorbing and dissipating
energy while being frequency-sensitive and tunable (by varying characteristics such as
size, shape, and material of construction), these chokes are somewhat analogous to the
inductors used in electrical circuits as EMI filters.
EMI filters are created from reactors, that is, inductors and capacitors. Although they
produce an opposition to current flow in an AC circuit, reactors differ from resistors in
several important ways: (1) the amount of opposition, termed reactance where attribut-
able to reactors, varies with frequency, and where both inductance and capacitance are
present in a circuit, it completely disappears at the resonant frequency; (2) reactors create a
phase shift between voltage and current, whereas resistors do not; and (3) because reactors
alternately absorb and return energy to the circuit, they do not convert voltage to heat in
the same way as a resistor. A final EMI-suppression strategy relies on the use of a cap-
acitor (or capacitors) in parallel with the load and/or an inductor (or inductors) in series
to create a low-pass (LP) electronic filter. An LP filter permits the passage of low-frequency
voltages (and associated currents), while higher frequencies are filtered or blocked. DC has
zero frequency and is freely passed. A high-pass filter, which will block lower frequencies
(longer wavelengths) while passing those of higher frequencies (shorter wavelengths), can
be constructed from some combination of inductors in parallel and capacitors in series
with the load. Because both LP and high-pass filters are frequency-sensitive, both types can
be tuned to pass or block frequencies or bands by varying the value of the reactors used in
the construction of the filter. Properly designed electronic filters include dampers to pre-
vent a high signal gain (amplification) at the resonant frequency. Consider the following
as an example of the use of an electronic filter to suppress the noise. DC aircraft fuel pump
motors are constructed of an armature, made up of many turns of insulated wire windings,
repulsed by the magnetic field produced by the stators. The relative motion created by
the rotation of the armature windings in the magnetic field of the stators induces a high-
frequency AC that, were it not filtered out by the capacitive noise filter integrated into the
motor, would generate a high-frequency EMI. Consequently, one potential application of
274
an electronic LP filter would be incorporation into the design of fuel pumps installed in the
tanks of UASs powered by gasoline or heavy fuel engines.
A point to be made, in closing this section, is that UAS electrical systems share common-
alities though the components and overall system design will vary with platform size and
mission. Nearly all UASs, from the smallest RPA to the largest, most sophisticated UA,
carry a battery. All UA electrical systems are powered from a primary source, most often
a generator or battery, and provide the available power to the electrical loads through a
distribution system. Most have some form of voltage regulation to provide proper voltages
to the various components. These similarities, as well as the differences, will be discussed
in the remainder of this chapter.
FIGURE 12.2
View of all-electric Penguin BE payload bay. Visible in the bay, just forward of the wing, is the lithium–polymer
(Li–Po) battery cartridge and just aft of the wing, atop the powerplant cowling, is the air scoop to direct cooling
air around the BLDC inrunner electric motor. (Image courtesy of UAV Factory.)
by electric propulsion include the AeroVironment RQ-11 Raven, the UTC Aerospace
Systems Vireo, the UAV Factory Penguin BE (Figure 12.2), and the PrecisionHawk
Lancaster. Almost all multirotor sUAS are all-electric, and even some large unmanned
rotorcraft, such as the IAI Panther tiltrotor, which, at 65 kg (~143.3 lbs), approaches three
times the FAA maximum weight for sUAS (<55 lbs), rely exclusively on electrical energy
to operate the propulsion and all onboard systems. The use of an electric powerplant
dictates much in the design and construction of the sUAS electrical system, including
the requirement to not only control motor rpm, regulate voltage, and provide usable
DC power for the propulsion, but also to power the receiver, servos, avionics, onboard
computers, and payload. What generally will not be found on an all-electric sUAS are air-
borne charging systems and backup power sources (i.e., a dedicated emergency battery)
to provide power for starting and to energize the electrical system in the event of a loss of
the electrical generator.
FIGURE 12.3
NASA Helios flying at a speed of approximately 25 mph and 10,000 feet off the coast of Kauai, Hawaii. (Image
courtesy of NASA.)
The basic unit of a battery is an electrochemical cell in which energy conversions occur.
Without an external circuit connected to the cell terminals, chemical reactions cause ioniza-
tion within the cell electrolyte and the active material on the positive plates or electrodes
(the cathode) and the negative plates or electrodes (the anode) (Gundlach 2012). During
this process, the active plate material is converted to the inactive material as cations form
at the positive plates of the cell. Simultaneously, anions, with extra electrons available to
become electricity, migrate to those plates, which are negative. Once the active material
is inactivated through the ionizing reactions, it is unavailable to produce additional free
electrons. The ongoing conversion of active material (to that which is inactive) explains
why all cells and batteries eventually self-discharge over time. Aside from taking part in
the chemical reactions occurring within the cell, another function of the liquid or paste
electrolyte existing between the positive and negative plates is to allow migration of the
ions within the cell, and thereby, conduct current internally through the cell. During dis-
charge (aka, galvanic action), when an external load is connected across the terminals of
the cell (or battery), the rate of ionization increases as electrons are drawn from the nega-
tive electrode under the attraction of the cations on the positive terminal. In this way, the
rate of chemical reactions occurring within the cell increases in response to the demand for
the power necessary to operate circuit loads. If active material is converted and consumed
during the chemical reactions of the galvanic discharge, the cell cannot be restored to its
predischarge condition. Nonrechargeable cells and batteries are said to be the primary
sources of power in, for example, a conventional carbon-zinc Leclanché dry cell that is
often referred to as a primary cell. In a rechargeable cell or battery, the active material is
not consumed and lost, but is only converted, and the chemical reactions that produced
the electrical current to power the external circuitry can be reversed through the applica-
tion of electricity from an external source (e.g., a generator or solid-state battery charger)
to restore the electrolyte and active plate material to their original states. The process of
producing chemical reactions through the application of electrical energy (DC) is known
as electrolysis or electrolytic action. Rechargeable power sources in which the battery
constituents can be electrolytically restored are referred to as secondary cells or batteries.
Nominal cell voltages are a function of electrolyte and active material chemistries,
which determine the rate at which ionization can occur to drive free electrons through the
277
external circuit. (A more technically stated description would be that the available output
voltage is a function of the net reduction potentials of the positive and negative plates
or electrodes.) The term “battery chemistry” refers to the materials from which the cell
components (positive and negative plates and the electrolyte) are produced. For example,
lithium polymer and lithium-ion polymer batteries are constructed of similar materials
and develop voltage using comparable chemistries: graphite for the anode, lithium cobalt
or, rarely, lithium magnesium for the cathode, and a lithium salt electrolyte. In nickel–
cadmium batteries, the electrolyte is potassium hydroxide (KOH), while the negative plate
is cadmium and the positive plate is nickelous material (e.g., nickel (III) oxide-hydroxide).
Examples of nominal voltages associated with cells used in UAS applications, as either
main or supplementary power sources, include hydride cells (nickel–cadmium [Ni–Cd]
and nickel metal-hydride [NiMH]) producing 1.2 V per cell, lithium cells (lithium-ion
[Li-ion] and lithium–polymer [Li–Po]) generating 4.2 V, and lithium–sulfide cells (Li–S)
producing 2.1 V per cell.
Unlike voltage, the capacity of a cell is not a function of chemistry, but rather of the
amount of active plate or electrode material exposed to the electrolyte. Capacity may be
defined as the ability of a cell (or battery) to deliver a specified constant current flow over a
given period of time, often standardized at an hour, to a given voltage level. The specified
or expected rate of discharge is often referred to as the C-rate, for capacity rate. The C-
rate is also sometimes said to be shorthand for charging/discharging rate (Fahlstrom and
Gleason 2012). For example, a fully charged lead-acid (LA) cell will have a nominal voltage
of approximately 2.0 V (or possibly a tenth or two higher). The same LA cell is considered
discharged at 1.75 V. If the cell has a published ampere-hour rating (AH rating) of 1 amp,
the C-rate discharge would be 1 amp for 1 hour. At the end of that 60 min, if the cell voltage
is 1.75 V or higher, the cell is capable of delivering 100% of its rated capacity. If a “topped-
off” or fully charged LA cell is discharged at the C-rate to reach 1.75 V in one-half hour,
then the cell is at 50% of its capacity. A battery can discharge at much higher rates than
the specified C-rate, but for correspondingly shorter periods. At some point, the rate of
discharge will become too great, and the battery will be irreversibly damaged by the heat.
Another commonly used term, related to capacity, is energy density, which refers to the cell
(or battery) capacity per weight. Similarly, power density refers to maximum deliverable
power, expressed in watts per unit weight (Fahlstrom and Gleason 2012).
Cells of similar chemistry can be connected either in series or parallel (or both) to create
a battery. Connecting cells in series additively increases the output voltage of the battery,
while placing cells in parallel similarly increases capacity. As an example, connecting two
Li–Po cells in series produces a battery, commonly referred to as a 2S, having a nominal
voltage of 8.4 V, whereas placing the cells in parallel would create a battery having double
the capacity but the same voltage (4.2 V) as the individual cells. Thus, battery voltage is a
function of both cell chemistry and the number of cells connected in series, and capacity
of the battery is, keeping all other factors constant, the result of battery size (determined
by plate size) and, possibly, the number of cells connected in parallel. Sufficient voltage is
necessary to overcome circuit resistance and provide adequate power to operate the power
plant, servos, and other circuit loads. Where necessary, the voltage will be regulated to a
lower level appropriate to components requiring less energy to operate. Capacity affects
endurance and range. However, because capacity is also directly related to battery size, the
ability of a battery to deliver current may be a limiting factor in sUAS attributes related
to weight, such as the ability to hand launch the aircraft or in the size of the payload that
may be carried. In a “from-scratch” build, battery packs can be created with cells in both
series and parallel configurations to meet the design needs and mission goals of the UAS
278
FIGURE 12.4
Penguin BE 48-cell, 640-Whr lithium–polymer battery pack constructed as a quick-change cartridge capable of
delivering regulated onboard voltages of 6 and 12 V. (Image courtesy of UAV Factory.)
platform (Gundlach 2012). For example, the UAV Factory designed the Penguin BE with a
48-cell, 640-Whr Li–Po battery pack that is constructed as a quick-change cartridge capable
of delivering regulated onboard voltages of 6 and 12 V (Figure 12.4).
Note, however, that batteries are far from ideal components. The parasitic impedances
of the battery, particularly internal equivalent series resistance (ESR), have a large effect
on the available output voltage at a given current. Battery ESR can vary widely from
one battery to the next even of the same design, especially due to the effects of aging
(both the passage of time and number of charge and discharge cycles), the duration
of storage, the state of charge and temperature during storage, and the temperature
during operation. Batteries are negatively affected by both high and low temperatures,
limiting safe charge and discharge environments. In general, sealed lead acid batteries
are heavy and have steeply sloped voltage curves during discharge. In general, Ni-Cd
batteries are among the most chemically stable batteries with relatively flat discharge
curves, but suffer from “memory effect” where repeated partial charge and discharge
cycles reduce cell capacity, requiring the cells be reconditioned by complete charge
and discharge cycles on regular intervals, increasing required maintenance. In general,
NiMH batteries have relatively high energy density, but are sensitive to high and low
temperatures, and are particularly sensitive during charging (cells can vent and release
hydrogen gas if overcharged). Li-Ion batteries do not suffer the “memory-effect” and
have very high energy densities, but typically have a life of about 1,000 charge and
discharge cycles, and are sensitive to high temperatures, particularly as many Li-Ion
chemistries are have exothermic reactions that can easily lead to thermal runaway with
disastrous results. Thermal runaway is particularly a risk when large cells are packed
together, as was the case of the Boeing 787 Dreamliner. Use of smaller cells, more stable
chemistries, internal and external safety mechanisms (cell pressure vents, fuses, and
external phase change material to absorb thermal energy), and destructive safety testing
prior to fielding ensures Li-Ion battery safety at the expense of cost, complexity, weight,
and energy density.
279
FIGURE 12.5
Carbon fiber forward-facing air scoop and carbon fiber cooling shroud installed around Penguin BE inrunner
BLDC motor and gear reduction. (Image courtesy of UAV Factory.)
very slightly improved range and endurance. Because the ESC generates heat, potentially
considerable amounts of it, providing adequate cooling is important, especially where the
controller incorporates the additional functionality of an integral BEC (described in the
following section). Consequently, additional ducting may be necessary to provide cooling
air to the motor controller, and possibly the motor itself (Figure 12.5). The use of heat
sinks may also be effective in reducing ESC temperatures. Cooling the ESC translates into
more efficient operation, less resistance (which increases with temperature), and lower
voltage drop at the controller (the voltage drop increases with resistance), which, in turn,
provides greater power to the motor. Moreover, the ESC itself can be destroyed by exces-
sive amounts of heat.
Often, an all-electric sUAS will carry a BEC (battery eliminator circuit or battery elimin-
ation circuit), which, because a battery is still required, is a bit of a misnomer. The BEC may
be a discrete component or incorporated into the electronic speed controller, especially
likely in those ESCs having lower power ratings. Obviously, the BEC cannot eliminate the
need for a battery in an all-electric UAS. However, by providing generally lower voltage
(usually around 5 V) to the receiver, servos, avionics, and payload gimbal/sensor(s) inde-
pendent of the electric energy provided to power the motor, the use of a BEC eliminates
the need for an additional battery (or batteries) dedicated to nonpowerplant components.
Lower capacity BECs, for example, those rated at approximately 5 amp, or less, generally
use a less expensive, linear voltage regulator, whereas those having higher current ratings
use a more efficient switch-mode regulator. (Linear-and switch-mode regulators are sub-
sequently discussed in detail.) Regardless of whether the BEC is a discrete component or
integral to the ESC, the two components are electrically connected in parallel, drawing
power for the entire electrical system from a single-source battery.
Because the permanent magnets of an inrunner BLDC are located on the output shaft
of the motor, the rotating mass is located close to the axis of rotation and the rotor, in
comparison to that of an outrunner design, and tends to spin considerably faster. (For
an explanation, the reader can review the discussion in the section “The law of conser-
vation of angular momentum in the helicopter aerodynamics” provided in Chapter 10.)
Consequently, these may be suitable to directly drive a small rotor in a ducted fan propul-
sion motor, or will require gear reduction to reduce rpm and increase torque to rotate a
larger propeller. Inrunners may be slightly more efficient than outrunners, which can con-
tribute to improved endurance and range. Another advantage of the inrunner design is the
282
FIGURE 12.6
Aveox 27/26/7-AV inrunner BLDC motor with integral gear reduction and ESC as installed on the RQ-11
Raven. (Image courtesy of Aveox, Inc.)
compactness associated with a housing of smaller diameter, which can result in reduced
fuselage diameter and less drag. On the other hand, outrunners also afford advantages
to the UAS designer. Because the permanent magnets of outrunner motors are located in
the housing, the propeller or rotor is mounted directly to the rotating motor case. In com-
parison to an inrunner, this characteristic creates a much greater rotating mass located
further from the center of rotation, which means that outrunners spin more slowly while
producing greater torque. No gear reduction is generally necessary. Because the outrunner
stator is interior to the motor, the windings and internals can be sealed to protect them from
the environment. Moreover, outrunner windings are not subjected to centrifugal loading
that may extend motor life, and air cooling of the windings is often not necessary, since
heat can be dissipated by conduction. Both inrunners and outrunners provide the pro-
pulsive force for sUAS. For example, both the AeroVironment RQ-11 Raven (Figure 12.6)
and UAV Factory Penguin BE use integral planetary gear reduction systems incorporated
into inrunner propulsion motors, whereas the Aeryon Labs Scout quadcopter uses four
outrunners to produce both lift and thrust.
insufficient, the field must be “flashed” from a suitable DC source such as an automotive or
aircraft battery for output to be achieved.) In fact, the construction of a DC motor and gen-
erator is so similar that a motor can be used as a generator simply by energizing only the
field windings and taking electrical power from the brushes. The familiar AC generator,
commonly known as an alternator, creates a magnetic field in the windings of the rotor.
(Electrical energy is transferred to the rotating armature via brushes and slip rings, so the
direction of current flow through the windings is consistent in polarity and intensity.) This
field (typically) sweeps across three discrete stator windings that produce a three-phase
AC output that is rectified (electronically commutated) by a diode bridge circuit coupled
to an LP filter to produce a very clean DC output. Though more complex, alternators are
generally lighter and more efficient than the older DC generator design.
Regardless of the power source, whether battery or generator, voltage regulation is neces-
sary. As previously mentioned, where current demands are not great (~5 amp or less), the
smallest of the UASs may use linear voltage regulators. Although generally an integrated
circuit, linear voltage regulators function in a way analogous to a voltage divider net-
work wherein the desired voltage is taken from the appropriate divider reference point
and any excess is dissipated as heat. This is very inefficient, and the electrical efficiency of
linear regulators is typically only around 40% and may fall to as little as 14% (Dimension
Engineering 2014). Linear regulators generate a lot of heat, particularly where current
flows are elevated, and may require a large heat sink, which will increase the overall size
of the installation. On the other hand, linear regulators are simple, inexpensive, and, where
current flows are low, acceptably inefficient. For higher current flows, switch-mode regula-
tion is a better option. Switch-mode regulation maintains the desired voltage by switching
on and off, alternately storing and returning magnetic fields in one or more inductors
and electric fields in one or more capacitors via diodes and transistors. Power is mainly
consumed during the switching operation, but since the regulating section (e.g., pass tran-
sistor) is mostly energized or de-energized, very little power is wasted. In comparison to a
linear regulator, a switch mode regulator may be 85% efficient, delivering more than twice
as much useful power for given voltage (Dimension Engineering 2014). Depending on
the topology, switch-mode power regulators can divide down the output voltage (buck),
increase the output voltage (boost), or do both (buck-boost), allowing the switch-mode
regulator to operate over a wide range of input voltages. Switch-mode regulators are con-
stant power devices, so act in the system as if they have a negative input resistance (i.e.,
draws more current at low input voltages, and draws less current at higher input voltages),
requiring careful input filtering to prevent oscillation, and requiring undervoltage lockout
to prevent unacceptably high-input currents at turn on. Technology has advanced such
that many switch-mode regulator ICs include undervoltage lockout, overvoltage lockout,
current limiting, and thermal shutdown protections all within the integrated circuit or
power supply module, requiring few to no external components (often requiring an
inductor, a voltage divider to set the point of voltage regulation, and input and output
bypass capacitors for filtering). The generator output of larger sUAS is controlled by a
solid-state device known variously as a generator control unit (GCU) or generator power
unit (GPU), among other terms. Because the acronym GPU could be confused with that
representing ground power unit, I prefer GCU and will use GCU in the text of this chapter.
The GCU regulates voltage and generally performs other functions, which may include
reverse current protection and a means to prevent excessive current flows. While some of
the generator output is used to charge an onboard battery, the GCU output must either
be routed through a buck-boost converter, or must be set greater than battery voltage
to overcome the battery’s internal resistance and provide the energy for the electrolytic
284
FIGURE 12.7
The Northrop Grumman RQ-4/MQ-4 fuselage is of semimonocoque aluminum construction. (U.S. Air Force
image.)
chemical reactions that will cause the battery’s active material (and possibly electrolyte) to
be restored (i.e., charge the battery). (This was discussed earlier in the chapter.) The GCU
also provides power to a distribution bus or individual components (e.g., avionics and
payload), depending on how the electrical system is designed, at the proper voltage. The
point of regulation can be remote sensed to the point of the most sensitive payloads to com-
pensate for V = IR voltage drop in the power distribution system, so long as the upstream
avionics can handle the additional voltage. The reverse current function of the GCU is to
protect the generator when battery voltage may be higher than generator output. This can
happen, for example, at low engine rpms. Because the battery is connected to the generator
through the control unit, a high battery voltage will pass through the generator rotor and
stator windings and tend to drive the armature like that of a motor. This condition, known
as “motoring” or “generator motoring,” may cause the generator that is, at the same time,
being driven by the power plant to become damaged.
As the sUAS electrical system becomes more complex, the use of an electrical bus, or
common connection point for wires and multiple circuits, becomes more desirable. All
circuits must convey electrical energy to power the component and provide a return path
to the source. As discussed previously, the smallest of sUAS use wire for the entire cir-
cuit, from the power source to component and back to the source, referred to as dual-wire
system. Very large UASs, such as the Global Hawk (Figure 12.7), with a semimonocoque
design being either partially or entirely made of metal can utilize the metal aircraft as the
electrical power system return, referred to as a single-wire system. As UASs grow in size,
the criticality of failure increases, necessitating additional safety features. Circuit protec-
tion devices (e.g., fuses, traditional or solid-state circuit breakers, fusible links, and current
limited solid-state switches) on the power distribution bus limit current flow in the event
of a short or ground fault—a condition that will generate heat and possibly melt wire insu-
lation to cause a fire. To protect the maximum length of the conductor, this circuit protec-
tion should be connected as nearly as possible to the connection to the bus. The purpose of
285
including circuit protective devices in the electrical system is to prevent damage to the elec-
trical devices that are installed in the UAS, and to prevent component failures from propa-
gating to other units. While circuit components must be protected from excessive current
flow, an internal fuse, traditional circuit breaker, or solid-state circuit breaker is used to
protect the component (e.g., the UAV factory installs an internally accessed slow-blow fuse
in series with the power lead to the heater controller of the Penguin’s heated pitot/static
probe). Fuses are small, light-weight, and inexpensive, and can be readily purchased in
a variety of current thresholds and response times, ranging from 1 hour to fractions of a
millisecond. However, once blown, the fuse’s output cannot be reconnected until the UA is
recovered and the part in question is removed for repair. Traditional circuit breakers (e.g.,
mechanical, thermal, or magnetic field activated, with or without a protective relay pilot)
are readily available, but have relatively slow response times, typically ranging from sev-
eral minutes to 20 milliseconds. Solid-state circuit breakers and solid-state switches with
active current limiting, which output a fixed maximum current with or without voltage
foldback, or shutdown current limiting, which shuts off the output when the threshold
is exceeded, have significantly faster response times (on the order of 100 µs), and can be
configured to reenergize the output in the event the fault had cleared. Solid-state circuit
breakers and switches, however, are significantly more complex than fuses and traditional
circuit breakers. A small distribution bus may be connected across one side of multiple cir-
cuit breakers to act as a common connection and reduce the amount of wire necessary in
the circuitry; however, flight critical loads must be physically separated from noncritical
circuits in such configurations. A well-designed electrical system, particularly appropriate
to the larger UAS, isolates flight-critical and noncritical circuits from each other. This is
accomplished by powering two or more subsystem buses, often termed essential and
nonessential buses, from the main distribution bus. A large, slow-blow fuse, known as a
current limiter, or solid-state circuit breakers may be used to connect nonessential buses
to the main bus. In this way, a fault in the noncritical-to-flight circuitry causing excessive
current flow will “blow” (i.e., melt) the fuse or trip the solid-state circuit breaker to open
the circuit. Current flow in the damaged circuit will cease, preventing an electrical fire,
while allowing the critical circuits required for flight to remain energized.
rectified through a commutator and brushes to provide a DC electrical output to the main
power bus. If the operation of payload, communications, or avionics devices requires AC,
solid-state inverters will convert the DC and deliver AC at the desired voltage and fre-
quency to one or more AC buses. The use of a starter/generator saves considerable weight
(and space on the accessory gearbox), while reducing the overall complexity of the acces-
sory drive system. Further, because only one component is constantly driven (instead of
both starter and generator) by the power plant, greater power is available to drive other
accessories or for propulsion. Recently, several companies have developed brushless per-
manent magnet generators and starter/generators specifically for UAS applications, for
example, Northwest UAV for sUAS applications and innovative solutions for large UA.
Under an Air Force SBIR/STTR (Small Business Innovation Research/Small Business
Technology Transfer) contract, Innovative Power Solutions developed a brushless starter/
generator (BS/G) for the Northrop Grumman RQ-4 Global Hawk/EuroHawk, powered
by the Rolls-Royce AE3007 (aka F137). These newly developed BS/G designs require less
maintenance and are even lighter than the conventional starter/generators still found on
the majority of smaller gas turbine power plants. General Atomics MQ-9B SkyGuardian
instead interfaces the Honeywell TPE-331 turbo prop engine to an AC generator and direct
drive brushless alternator.
In comparison to sUAS, a greater number of factors influence the determination of wire
size for larger UA. As with sUAS, the selection of the proper wire diameter is guided by
the length of the wire run, anticipated peak current flow, and acceptable voltage drop
from bus to ground. However, other factors, including aircraft service ceiling, number
of wires installed in a bundle or conduit, and intermittent operation may also affect the
choice of wire selected for use in the electrical systems found on large UASs. The selec-
tion of wire with sufficient diameter is essential to ensuring proper circuit operation, pro-
viding adequate component service life and precluding the creation of excessive heat,
which can lead to in-flight fires. On the other hand, using the smallest possible wire with
these desirable attributes would save weight and space, while increasing range, endur-
ance, and payload carrying capacity. Thus, determination of the correct wire size is best
achieved through following the guidance of the aforementioned commercial and mili-
tary standards. Although many such publications are intended for use in designing and
maintaining manned aircraft, the contents are also appropriate for a UAS. The electrical
systems and components of a UAS may even be installed in a pressure vessel, similar to
that designed into commercial transport aircraft, pressurized by bleed air from the gas tur-
bine power plant. This design not only provides a more benign operational environment,
but also reduces the risk of arcing that can damage electrical components, and possibly
under certain conditions, create an electrical fire resulting in the loss of the ship.
As UASs become larger, more capable, and more powerful and the complexity of UA
increases, their onboard electrical systems will become increasingly similar to those of
manned aircraft. The integration of a variety of payloads requires the electrical power
system support of a variety of standard bus voltages, such as 28V DC, 270V DC, and
115V AC. FAA regulations for emergency power (e.g., engine out and generator failure
conditions) require a minimum of 30 minutes of operation on battery power for aircraft
with an altitude ceiling of ≤25 kft, and 60 minutes for aircraft with an operational altitude
ceiling >25 kft. The utilization of high-voltage systems saves cable weight by the reduc-
tion of currents, especially in the case of hybrid electric power systems, but increases the
complexity of voltage conversions and adds safety risks to maintenance personnel who
require addressing. As larger UA have max endurance of over 40 hours per flight and have
a service life of 40,000 flight hours, such as the General Atomics MQ-9B SkyGuardian,
287
12.5 Conclusion
The electrical system is the essential nexus of the UA, interconnecting avionics, payload,
command and control, onboard computers, and receivers, among other components, into
a synergistically holistic, integrated system. It forms the backbone of the UAS, providing
the means of autonomous and remotely piloted flight, data acquisition, telemetry, and, in
some cases, propulsion. The electrical systems of sUAS are sophisticated, but relatively
straightforward in design. As the UA platform becomes larger and more complex, so,
too, does the electrical system that becomes increasingly similar to those found on large,
turbine-powered manned aircraft.
Discussion Questions
12.1 Why can it be said that the electrical system is the ubiquitous nexus of unmanned
aircraft systems?
12.2 List and define/describe the basic units of electrical measurement. Use these
to write the formulae for Ohm’s law and electrical power. Why is aircraft wire,
used in both manned and unmanned aircraft, stranded? List other important
characteristics associated with aviation wire and tell why each is significant.
Describe the AWG system. Give the formula for determining wire resistance and
elaborate the definitions of the unit and explain their meaning and position (i.e.,
whether a direct or inverse relationship) in the formula. What is meant by the
term voltage drop? How does a voltage drop in the external circuit affect compo-
nent operation and service life? State the purpose of fly-back diodes on inductive
loads. State the purpose of a soft-start on switched outputs to capacitive loads.
Give examples of circuit protection devices. What is the purpose of these? With
respect to location, where are circuit protection devices best installed. What is
the difference between single-wire and dual-(or double-) wire circuits? Why are
composite airframes considered to be dielectric (i.e., define dielectric and relate
this to UAS airframe construction), and how does this type of construction affect
UAS electrical system design? Define EMI/RMI and tell why this is significant
to dependable and safe UAS operation. Give strategies for mitigating or elimin-
ating EMI, and tell why these are effective. How are high-pass and low-pass filters
constructed? Which would most likely find application in UAS airframe circuit
construction and tell why you believe your response is correct.
12.3 What has allowed sUAS to proliferate in the current technological environment?
Identify some of the enabling technologies. Discuss the interaction of design
decisions, based on mission goals, which affect UAS power plant and, correspond-
ingly, electrical systems.
12.3.1 Identify and describe the all-electric unmanned aircraft that flew in 1957.
What is the significance of this flight?
12.3.1.1 List the types of batteries commonly providing electrical energy
for UAS ground and flight operations and describe cell chem-
istry and construction. Give nominal cell voltages for each type
of battery. Define battery capacity and tell how this relates to the
289
References
Austin, R. 2010. Unmanned Aircraft Systems: UAVS Design, Development and Deployment. Chichester,
UK: John Wiley & Sons.
Büchi, R. 2012. Brushless Motors and Controllers. Norderstedt, Germany: Herstellung und Verlag.
Dimension Engineering. 2014. A Beginner’s Guide to Switching Regulators. Under “What’s wrong
with a linear regulator?” Accessed July 27, 2014, www.dimensionengineering.com/info/
switching-regulators.
Fahlstrom, P.G. and T.J. Gleason. 2012. Introduction to UAV Systems. Chichester, UK: John Wiley
& Sons.
Federal Aviation Administration (FAA). 2012. FAA Aviation Maintenance Technician Handbook—
Airframe. Newcastle, WA: Aviation Supplies and Academics.
Gundlach, J. 2012. Designing Unmanned Aircraft Systems: A Comprehensive Approach. Reston: American
Institute of Aeronautics and Astronautics.
Livingston, R. 2013. Intelligent Aerospace. Important considerations in designing electrical power
systems for unmanned aircraft. Last modified January 13, 2014. www.intelligent-aerospace.
com/articles/2014/01/uav-electrical-power.html.
Logan, M.J., J. Chu, M.A. Motter, D.L. Carter, M. Ol, and C. Zeune. 2007. Small UAV research and evo-
lution in long endurance electric powered vehicles. In Proceedings of AIAA Infotech @ Aerospace
2007 Conference and Exhibit, Rohnert Park, California, AIAA Paper 2007–2730, 7–10 May, 2007.
Noth, A. 2008. History of Solar Flight. Autonomous Systems Lab. Zurich: Swiss Federal Institute of
Technology. Accessed July 15, 2014. www.asl.ethz.ch/research/asl/skysailor/History_of_
Solar_Flight.pdf.
290
newgenprepdf
291
13
Unmanned Aircraft Systems (UAS) Communications
Saeed M. Khan
291
292
13.1 Introduction
A commonly used classification for unmanned aircraft data links is line-of-sight (LOS)
and beyond-visual-line-of-sight (BVLOS). In either case, a simple and practical way to
introduce UAS communications to the newcomer is through the concept of data links.
A data link is formed when a source and receiver communicate electronically. It has a
transmitter, a receiver, and a medium through which it communicates. In many wireless
applications, the medium is free space or air. The quality of the link depends on fre-
quency used, the medium, and the length of the link among other things. While there
may be a single or multiple data links between the aircraft and controller, the quality of
the link is key to conveying vital information to and from the unmanned aerial vehicle
(UAV) and the ground control station (GCS) wirelessly in most cases. This informa-
tion or data can be used for controlling the UAV manually or through automation by
manipulating control surfaces and throttle. Figure 13.1 illustrates UAV-GCS commu-
nication links for a small commercial remotely piloted vehicle. The link is also used
for downloading captured images and telemetry data among other things. Enhanced
commercial systems may employ the use of satellite links such as the Inmarsat Network
that allow UAV and GCS to take advantage of a global IP network (Wagenen 2015, 1).
For military UAS systems, additional complexity and functionality is required in the
design of the data link systems stemming from the need to access the World Wide Web;
resist unintentional interference; lower the probability of interception; boost security;
resist deception; and employ antijam capabilities (Fahlstrom and Gleason 2012, 191–
204). In other words, the functionality of these links makes them the lifeblood of any
UAS system.
In LOS systems, the UAV is always in LOS with the GCS. BVLOS systems may involve
other links, such as a satellite that is in LOS to one of the parties (UAV/GCS) but not
both. Communication links can also be characterized as being point-to-point or point-
to-multipoint (Figure 13.2). Another interesting link is one that forms between a swarm
of unmanned vehicles where they can communicate with each other while maintaining
connection to a ground station. While the link architecture can take many more complex
forms, they are usually derivatives of the ones that have been discussed.
UAV
Two-way
Telemetry
Data Link
at 915 MHz
UHF Band Video Data
RC control (ISM) Link at 5.8 GHz
Data Link
C Band (ISM)
for Surfaces and
Throttle at
2.45 GHz S
Band (ISM)
RC Controller
FIGURE 13.1
A UAS Data LInk System for commercial applications.
and as such we begin our treatment of EM wave propagation with a brief overview of
the EM spectrum.
UAV
POINT TO POINT
LINK
GCS
POINT TO
MULTIPOINT
GCS
FIGURE 13.2
Point-to-point and point-to-multipoint links.
Below High Frequency 3–30 MHz 10–100 m ANTENNAS AND ANTENNAS AND Short wave radio, amateur radio, etc.
Microwave (HF) TRANSMITTER RECEIVER
(IEEE Very High 30–300 MHz 1–10 m ELECTRONIS ELECTRONICS Digital audio broadcasting (DAB)
Designation) Frequency (VHF) FM radio broadcasting, television
broadcasting, two-way land mobile
radio systems, etc.
Ultrahigh 0.3–1 GHz 0.1–1 m Mobile communications, broadcasting
Frequency
(UHF)
L and partial S Band 1–3 GHz 30–100 cm Wi-Fi, GNSS, ISM, Bluetooth, weather/
ship Radar,
Mobile Communications, satellite
communications, etc.
Microwaves S, C, X, Ku, K, 3–30 GHz (Typical) 1–30 cm Wi-Fi, Radar, air traffic control,
and partial KA bands (IEEE weather radar, surface ship radar,
designation) communications satellites, defense
tracking, vehicle speed detection, etc.
Millimeter Waves 30–300 GHz 1–10 mm 5 G Wireless, Radar Systems
(Typical)
INFRARED Terahertz (THz) 300 z to 3+ THz 0.1–1 mm Photoconductive Photoconductive Sensing and Imaging: Cameras,
Antennas, Antennas, Ultrafast Scanners, Body scanners, Ultrafast
Ultrafast LASER detectors, Imagers, etc.
LASER
Other Infrared 3 THz–490 THz 700 nm -0.1 mm IR IR Photodiode Fiber Optics, Gas Sensing, Optical
LED. LASER amplifiers, LiDAR Technology
Diodes
Visible Light Waves 490 THz–790 THz 400–700 nm LASER Diodes Photodiode Free space communication, fiber-optical
communication, satellite–satellite
communication, etc.
Ultraviolet Waves 790 THz–30 PHz 10–700 nm UV LASERs Avalanche Photodiode Flame detection, Imaging,
(APD) communication
X-rays 30 PHz–30 EHz 10–0.01 nm X-ray tube Si-PIN diodes Imaging
Gamma Rays more than 30 EHz Less than Natural Sources, Gamma-Ray Nuclear Radiation detection; Material
295
0.01 nm e.g., the Sun Spectrometer (GRS) Content Detection.
296
FIGURE 13.3
The Electromagnetic Spectrum. (myNASAdata; https://mynasadata.larc.nasa.gov/basic-page/electromagnetic-
spectrum-diagram retrieved December 18, .)
Half Wavelength
Coaxial feed
Conducting Wire
Probe Feed Location Probe Feed Location
Conducting Patch
Dielectric
Layer
Ground Plane
same time as the direct signal are more harmful and can cause more errors in the informa-
tion received.
For appreciable radiation to take place, effective lengths of the devices/circuits/antennas
should be comparable to a wavelength. Remembering that relationship between wave-
length (λ) and the frequency (f) in free space is simply (λ = c/f, where c is the speed of light
in free space or 3 × 108 m/s) where lower frequencies for both the wavelength and the
radiator get to be very large making it unsuitable for wireless communication (e.g., at a fre-
quency of 1 KHz, the free space wavelength is 300,000 m and at that size, it is very difficult
to construct an efficient radiator of appropriate size [~λ /4 and greater]).
298
Diffracted
Ray
Refracted
Path Direct Path
GCS
FIGURE 13.5
Obstructed direct path, refracted path, and edge diffraction of electromagnetic wave.
TRANSMITTER
TRANSMITTING
MIXER/
INFORMATION MODULATOR RF POWER ANTENNA
FREQUENCY
SOURCE AMPLIFIER
SYNTHESIZER
CHANNEL
FIGURE 13.6
A simplified block diagram of a communication system.
13.3.1 Modulation
Modulation combines information with a carrier signal. The first section on the transmit-
ting side holds the information source that can be analog or digital. Analog is converted to
digital data if digital data are required by the modulator. Commonly, transceivers use the
term modem to identify a system block that can serve both a modulator and demodulator
in such systems.
For the special case of frequency shift keying (FSK) modulation that is widely used in
UAV-GCS communication, all data need to be in digital form. Figure 13.7 shows how this
modulation can be accomplished. First, the digital data are converted to two different
voltage levels. In this case, a low-voltage level indicates a digital “1” and a high-voltage
level indicates a digital “0” (although the opposite is also possible). The FSK modulation
uses two different frequencies to modulate the input digital data stream with the higher
frequency being used to modulate 1s and a lower frequency to modulate 0s.
13.3.2 Transmitter
The transmitter takes in the modulated signal and outputs an amplified radio frequency
(RF) signal transmission (e.g., transmitter takes the FSK-modulated signal and outputs an
RF waveform). An RF power amplifier in the transmitter section delivers the signal to the
antenna for transmission. In the special case of UAV-GCS using FSK modulation, an added
complexity is thrown in (i.e., the output center frequency is not kept constant but hops
around as discussed in the following section).
300
11 0 0 10
1
Digital Information
Voltage Levels
assigned for
1’s and 0’s
FSK Modulated
output using different
frequencis for 1’s and 0’s
FIGURE 13.7
Frequency shift keying (FSK) modulation of digital data.
13.3.3 Channel
The connection between the receiving and transmitting antennas is made through the
channel for the wireless link. Assuming good atmospheric conditions, the amount of power
transferred to the receiver using an LOS link in air depends on the gain of the two antennas,
the polarization of these antennas, and the distance between them. The important topics of
directivity, gain, and polarization of antennas are discussed next.
POINT SOURCE
SIDE LOBES
point source antenna that is impossible to build. Figure 13.8 is graphical representation of
the radiation properties (aka radiation pattern) for a directive antenna and the hypothetical
isotropic radiator.
One also needs to understand the concept of radiation intensity of antennas to define
directivity. From the IEEE standard definition of terms for Antennas (IEEE 1983), in a given
direction, the power radiated from an antenna in per unit solid angle is its radiation intensity or,
in simpler terms, how much power is radiated by the antenna in a certain direction far
enough away from the antenna so as not to impact the antennas EM characteristics (far
field). The radiation intensity remains independent of distance in the so-called far field of
the antenna (MTI, 1).
All antennas have some directional properties and they radiate better in some directions
than others. If it is assumed that both the antenna and the isotropic radiator radiate the same
amount of total power, then the directivity of the antenna is the ratio of the maximum radi-
ation intensity to the radiation intensity of a reference antenna such as an isotropic radiator.
Moving forward, D0 (dimensionless) will be used to refer to the directivity of an antenna.
gain and maximum directivity unless stated otherwise. Moving forward, G0 (dimensionless) will
be used to refer to the maximum gain of an antenna. The terms conduction efficiency (ec) and
dielectric efficiency (ed) can be difficult to grasp but they can be experimentally determined.
Based on our definition, the following relationship exists between directivity and gain.
G 0 = e c ed D 0 [13.1]
When the reference antenna is an isotropic one, dBi is sometimes used in the place of dB.
Thus, equation 13.2 may be written as:
13.3.4 Receiver
After passing through the channel, the EM signal arrives at the receiver where it is converted
by the antenna to electrical energy. While passing through space between antennas, the
signal becomes very weak and needs to be amplified in a low noise amplifier (LNA) very
close to the antenna. For the signal to be picked up and demodulated by the receiver, a cer-
tain signal-to-noise ratio called the receiver sensitivity is required. Both of these items are
discussed below along with the despreading of the frequency-hopped signal.
303
E-vector
Y
Y
FIGURE 13.9.
Radiation pattern of isotropic and directional radiator.
N=kTB [13.4]
where k is the Boltzmann constant having a value of 1.38 × 10–23 joules per kelvin. Note
that joules are a unit for energy and are equal to the product of power in watts and time
in seconds. Other items impacting noise are the mixing of two different signals causing
unwanted energy production at sum and difference frequencies (or their multiples) called
intermodulation noise.
304
FREQUENCY HOPPING
TRANSMISSION
AMPLITUDE
AMPLITUDE
FREQUENCY FREQUENCY
NOISE INTRODUCED
IN CHANNEL
INFORMATION BAND
AFTER DESPREADING
WITH CHANNEL NOISE EXTERNAL
REDUCED NOISE
AT RECEIVER
FROM CHANNEL
AMPLITUDE
AMPLITUDE
FREQUENCY FREQUENCY
FIGURE 13.10
Linear, elliptical, and circular polarization.
Crosstalk, another form of noise, can impact a wireless communication system when
antennas pick up unwanted signals from space, although highly directional antennas can
avoid this for the most part. Impulse noise can occur from both natural and man-made
sources and is experienced as irregular pulses and spikes. Lightning and pulses from
EM pulse (EMP) weapons are examples of natural and artificial sources of impulse noise
(Stallings 2007, 89–91). An advantage of frequency hopping systems is that they can spread
impulse noise across a broader bandwidth upon reception. The (S N ) is simply the ratio
of the signal power to the noise power; more commonly this is given in a decibel form
as below:
S S
=10 log10 [13.5]
N dB N
S
N dB
S
= 10 log10 [13.6]
kTB
= 10 log10 S − 10 log10 k − 10 log10 T − 10 log10 B
The receiver sensitivity also depends on its clearance from the noise level. As an example,
in Wi-Fi LAN networks, the noise level needs to be cleared by about 20 dB. So, if the noise
level in a room is –95 dBm, then the signal level should be higher than –75 dBm. If one
knows the signal and the noise levels in dBm, then they can also compute the signal to
noise ratio in dB by the following:
S
= (S )dBm − ( N )dBm
N dB [13.9]
13.3.5 Demodulation
After the frequency hopping FSK signal has been through the despreading process,
demodulation is done by mixing the signal in two different paths by the two different fre-
quencies and integrating the outputs over the bit interval times. Demodulation results in a
binary stream of data. If analog data had been transmitted, then the digital output would
need to go through another step where a digital to analog (DAC) conversion takes place.
306
DR = 2Blog 2 M [13.10]
EXAMPLE 13.1
An analog source of 4000 Hz bandwidth is sampled using 256 level sampling. What
is the equivalent data rate? If the transceiver data rate is given as 10,000 bps, will this
data rate be enough for the source bandwidth?
Using equation 13.10,
DR = 2 ⋅ ( 4000 ) ⋅ log 2 ( 256 ) = 64 , 000 bps or 64 kbps
The data rate far exceeds the limits of the transceiver and as such will not be able
to carry this source.
For our next example, we calculate the bandwidth given the data rate.
EXAMPLE 13.2
An input data rate for a transceiver system is capped at 10,000 bps for a two-level
digital signal. What is the equivalent bandwidth for this baseband signal in Hz?
In a real-world system, achievable data rates through a channel need to be calculated only
after taking into consideration the signal to noise (S N ) ratio. This is found by calculating
the Shannon-Hartley limit using the relationship below:
S
DR = Blog 2 1+
N [13.11]
In the next example, we calculate the DR given a (S N ) ratio for a channel. This example
will also help us specify the bandwidth requirements for antennas on our link.
EXAMPLE 13.3
While selecting an antenna for system, you are required to specify a bandwidth
assuming that you are using a modulation scheme that requires the modulated signal
to only have the same bandwidth as the baseband signal if the data rate is 100,000
bps. The given (S N )dBis 20 dB.
At this bandwidth, how many levels are needed for the digital data?
S
20 = 10 log10
N
20
S 10
∴ = 10 = 100
N
S
Hence, the ratio is 100.
N
The minimum bandwidth required is therefore 15.02 kHz. Using Hartley relationship,
In order to achieve the 100,000-bps data rate using a 15.02 kHz bandwidth, an eleven-
level digital signaling would be required.
For the case of FSK, the bandwidth of each channel is given by 2” f+2B and not simply
B as in Example 13.3, where ” f is the frequency difference between the high frequency
and the low frequency used in modulating 1s or 0s; B is the baseband bandwidth. For the
frequency hopping FSK modulation, this is the bandwidth of each channel, and the total
channel bandwidth depends on the number of channels available.
EXAMPLE 13.4
A frequency hopping FSK modulation is operating using a system bandwidth
demarked by 902–928 MHz. If the difference (” f) between the high and low frequen-
cies of modulation is 4 kHz, what is the maximum number of channels that can exist
when the baseband signal has a bandwidth of 15 kHz?
From Example 13.3, B = 15 kHz
Channel = 2∆f + 2B = 2 × 4000 + 2 × 15,000 = 38,000 Hz
928,000,000 − 902,000,000
# of channels = = 684 channels
38,000
ZANT − Z0
Γ= [13.12]
ZANT + Z0
Now if one carefully matches the antenna impedance to the cable, characteristic imped-
ance Γ tends to be very small. If reflection was considered, assuming that the transmitter
cable carries the transmitted power (PT) to the antenna, it would be partly reflected as
given by the relationship below:
309
DIS
TA
N CE
OF
PR
OP
AG
AT
ION For the receiving antenna
(d) it is assumed that the antenna is
pointing towards the maximum gain of
the antenna. And that there are no
polarization losses.
RE
CE
IV
ER
FIGURE 13.11
Impact of despreading on channel noise.
(
= PT 1 − Γ
2
)
≈ PT when Γ ≈ 0
In our treatment of link design, we will move on assuming we have a good match and all
the transmitter power (PT) is coupled to the transmitting antenna. However, one should
remember that there can be a serious coupling problem if the matching is not optimal.
Assuming that the receiving antenna is aligned in the transmitting antenna’s direction
of maximum gain (GT), then the power density (PD) at the receiving antenna located at a
distance d from the transmitting antenna can be calculated from the following relationship
(Blake 2002, 520–527):
PT GT
PD = watts/m 2 [13.13]
4πd 2
One way to look at Equation 13.13 is to note that product PTGT is the power that an isotropic
antenna would require to create the same power density PD at the receiver (as created by
the directive antenna). Otherwise stated, an isotropic source radiating PTGT power into free
space can have the power density calculated by simply dividing the radiated power by
the surface area of a sphere of radius d. The product PTGT is also sometimes known as the
effective isotropic radiated power (EIRP).
EXAMPLE 13.5
A directional antenna has a gain of 7 dBi (decibel isotropic) at 900 MHz. If the trans-
mitted power is 0.5 watts, what is the power density 6 miles from the antenna in its
direction of maximum gain?
First, we need to convert the gain from decibels to a dimensionless number (GT).
7 = 10 × log10 (GT )
7
∴ GT = 10 10 = 5.012
Now using Equation 13.13, we can compute the power density 6 miles away (9656 m).
0.5 × 5.012
PD = = 2.139 × 10 −9 watts per meter2 or 2.139 nanowatts per meter2
4 × À × (9656)2
λ 2 GR
Ae = [13.14]
4À
PR = A e PD [13.15]
A e PT GT
PR = [13.16]
4πd 2
311
EXAMPLE 13.6
If a receiving antenna is receiving power from the transmitting antenna in
Example 13.5, what is the power received (PR) by the receiving antenna?
The wavelength (λ) at 900 MHz,
c 3 × 108
λ= = = 0.333 meters
f 900 × 106
λ 2 GR 0.333 2 × 5.012
Ae = = = 0.044 meter 2
4π 4 × π
PR = A e PD = 0.044 × 2.139 × 10 −9 = 9.412 × 10 −11 watts or 94 picowatts
λ 2 GR PT GT λ 2 PT GT GR
PR = =
16π 2 d 2 16π 2 d 2 [13.17]
Equation 13.17 can also be rearranged to a form that derives the ratio of the power
received by the power transmitted:
PR λ 2 GT GR
=
PT 16π 2 d 2 [13.18]
c
Equation 13.18 can be rewritten by substituting where λ = ,
f
PR c2 G G
= 2 T 2 R2
PT f 16π d [13.19]
Now if we are interested in using km and MHz for distance and frequency, we need to
make the following substitutions in Equation 13.19:
d = 10 3 × dkm
f = 106 × fMHz
c = 3 × 108
( )
2
PR 3 × 108 GT GR
=
( ) ( )
2 2
PT 106 × fMHz 16π 2 10 3 ⋅ dkm
[13.20]
( )
2
PR 3 × 108 GT GR
or, =
( ) 16π (f
2
PT 109 2
MHz )2 (dkm )2
312
PR
10 × log10 = 10 × log10
× (
3 108 2
) +10 × log ( G ) +10 × log ( G )
( )
10 T 10 R
PT 9 2 2
10 16À
− 20 × log10 ( fMHz ) − 20 × log10 (dkm )
= − 32.442+ ( GT )dBi + ( GR )dBi − 20 × log10 ( fMHz ) − 20 × log10 (dkm ) [13.21]
( )
2
PR 3 × 108 GT GR
or, 10 × log10 = 10 × log10 [13.22]
PT 9 2
( ) 2
10 16π ( fMHz ) (dkm )
2 2
the path (Lpath) loss in decibels can be computed by using Equation [13.21] or [13.22],
P
L path =10 × log10 T = 32.442 − ( GT )dBi − ( GR )dBi
PR [13.23]
+ 20 × log10 ( fMHz ) + 20 × log10 (dkm )
Once path loss is computed from Equation 13.21 and the power output of the transmitter
is known, the received power can also be known. Note that in this treatment, dielectric and
material losses at the transmitting antenna, atmospheric losses, and polarization losses
have been neglected. However, polarization losses at the receiver can be minimized by
manipulating the antenna structure’s positioning and alignment. Generally, the losses may
add 5–10 dB extra to the path loss and can be accounted for by adding on that extra amount
to the minimum clearance from the receiver sensitivity.
EXAMPLE 13.7
The receiving and the transmitting antennas have the same gain at 3.5 dBi. The dis-
tance between them is 5 km. The power at the transmitter is 0.5 watt @ 500 MHz.
How much power is received at the receiver?
First, we find path loss,
( Power in milliwatts)
(Power )dBm = 10 ⋅ log10
1 milliwatt
EXAMPLE 13.8
What is the input power from Example 13.7 in dBm?
(0.5 ⋅ 1000 )
(Power )dBm = 10 ⋅ log10 = 26.99 dBm
1
S
N i
NF = [13.24]
S
N o
in decibel form,
If the input power at the receiver is known, and thermal noise (N = KTB) can be identified,
then one can calculate the signal-to-noise ratio at the receiver with the help of the noise.
This implies known bandwidth and the temperature.
S Pr
N i
NF = = kTB [13.26]
S S
N o NR
Pr
S kTB
rearranging, = [13.27]
N R NF
S
= 10 × log10 ( Pr ) − 10 × log10 (kTB ) − NFdB [13.28]
N RdB
314
If the received power is given in dBm then equation 12.28 is rewritten in the form below,
S
= ( Pr )dBm − 10 × log10 (1000 kTB ) − NFdB [13.29]
N RdB
EXAMPLE 13.9
If the power received at the input of the receiver is taken from Example 13.6, what
is the signal-to-noise ratio at the receiver at 300K for a bandwidth of 1 MHz (using
NFdB = 10)? (Boltzman const, k = 1.38 × 10–23 Joules/K]
Using Equation 13.8,
S
= 10 × log10 ( Pr ) − 10 × log10 (kTB ) − NFdB
N RdB
( )
= 10 × log10 (2.285 × 10 −10 ) − 10 × log10 300 × 1.38 × 10 −23 × 106 − 10
= 37.419 dB
EXAMPLE 13.10
If the receiver sensitivity is -85 dBm, what is the signal-to-noise margin from problem
in Example 13.8?
what data rates are manageable. Section 13.4.1 has general rules for establishing data rate
requirements for a given application when FSK modulation is used where there were only
two levels (M = 2). In other digital modulation schemes, different values of M may need to
be used such as M = 2 for binary phase shift keying (BPSK) and M = 4 for quadrature phase
shift keying (QPSK). Very briefly, BPSK uses the same frequency and opposite phases to
modulate, while QPSK uses the same frequency with four different phases.
Currently, frequency hopping FSK is most widely used in UAV commercial applications,
but many applications may employ BPSK and/or QPSK. Loss calculations are not affected
by modulation techniques (FSK, PSK, or QPSK).
The worst-case link lengths need to be estimated and link losses calculated for those
worst-case scenarios. Section 13.4.2 covers much of this discussion. A look at Equation
13.23 tells us how to compute the path loss, but it also gives us the variable with which
to manipulate in order to decrease path loss. Since we really do not have as much control
over the ISM band frequencies that we use or the worst-case distances between receiver
and transmitter, selecting higher gain antennas always reduces the path loss. It must be
remembered that the EIRP must not exceed FCC guidelines. The key thing to remember is
that the path loss should include all the power received and clear the receiver sensitivity
by a safe margin.
13.6.2 Jamming
Jamming problems are similar in some respects to the EMI problem we just discussed.
A jamming signal is disruptive whether this is in contested airspace or not. The jamming
signal carries a power level that overwhelms the receiver, making it difficult or impos-
sible to navigate or complete an intended application. Whether it is the GNSS signal being
jammed or the UAV-GCS link, this poses a threat to UAV operation. In the future, as newer
316
UAV
Two RC controllers
interfereing with the
same UAV-GCS link
UAV
RC Controller 1
RC Controller 2
FIGURE 13.12
Considerations for calculating received power at receiving antenna.
applications demand more and more UAV platforms, the problem of illegal jamming for
commercial advantage is also going to create problems that are normally associated with
contested battlefield scenarios. Currently, there are some positive developments related
to the design of spatial processing antennas that would cut off jamming sources (Heng
et al. 2015).
13.6.3 Multipath
We have discussed the concept of multipath before and talked about different pathways
a signal can take to a receiver, and how some of these signals arrive at the receiver after
bouncing around (Figure 13.4). The problems from multipath stem from the fact that two
or more copies of the signal arrive at the receiver sometimes interfere destructively by
opposing the phase of the direct signal, and sometimes it can increase signal amplitude by
being in phase. GNSS receivers, that also have this problem, are able to address it through
signal processing techniques to where signal arriving later at some interval can be ignored
317
by the processor (Kaplan and Hegarty 2006, 703). However, when the multipath signals
arrive closer to the direct signal, it still creates errors. The answer to this UAV-GCS problem
may lie in a similar solution to the one being proposed by Heng et al. (2015) in which the
antenna is designed to cut off the multipath signal through special processing.
Discussion Questions
13.1 An analog source is 4000 Hz bandwidth is sampled using 16-level sampling. What
is the equivalent data rate? If the transceiver data rate is given as 1000 bps, will this
data rate be enough for the source bandwidth?
13.2 While selecting an antenna for a system you are required to specify a bandwidth.
Assuming that you are using a modulation scheme that requires the modulated
signal to only have the same bandwidth as the baseband signal if the data rate is
10,000 bps. The given (S N )dB is 20 dB. At this bandwidth, how many levels are
needed for the digital data?
13.3 A frequency hopping FSK modulation is operating using a system bandwidth
demarked by 902–928 MHz. If the difference (” f) between the high and low fre-
quencies of modulation is 4 kHz, what is the maximum number of channels that
can exist when the baseband signal has a bandwidth of 60 kHz?
13.4 A directional antenna has a gain of 5 dBi (decibel isotropic) at 900 MHz. If the trans-
mitted power is 100 watts, what is the power density 6 miles from the antenna in
its direction of maximum gain?
13.5 If a receiving antenna is receiving power from the transmitting antenna in review
problem 4, what is the power received (PR) by the receiving antenna?
13.6 The receiving and the transmitting antennas have the same gain at 5 dBi (decibels-
isotropic). The distance between them is 15 km. The power at the transmitter is 100
watt @ 500 MHz. How much power is received at the receiver?
13.7 If the power received at the input of the receiver is from review problem 7, what
is the signal to noise ratio at the receiver at 300K for a bandwidth of 1 MHz (Using
NFdB = 10)? (Boltzman const, k = 1.38 × 10–23 Joules/K)
13.8 If the receiver sensitivity is –85 dBm, what is the signal-to-noise margin from
review problem 7?
References
Balanis, Constantine. 2005. Radiation mechanism. In Antenna theory analysis and design. 3rd ed., 7–16.
Hoboken, NJ: Wiley.
Blake, Roy. 2002. Free-space propagation. In Electronic communication systems. 2nd ed., 520–527.
Albany: DELMAR.
Fahlstrom, P., and J. Gleason. 2012. Data-link functions and attributes. In Introduction to UAV systems.
4th ed., 191–204. Hoboken, NJ: Wiley.
319
Gerke, D., and B. Kimmel. 2005. EMI, noise, and interference—a different game. In EDN designers
guide to electromagnetic compatibility. 1st ed., 3–8. Newton, MA : EDN Custom Publishing
Services.
Heng, L., T. Walter, and G. Gao. 2015. GNSS multipath and jamming mitigation using high-mask-
angle antennas. IEEE Transactions on Intelligent Transportation Systems 16 (2): 741–750.
IEEE, Standards. 1983. IEEE standard definitions of terms for antennas. (accessed March 29, 2015).
Kaplan, Elliott, and Christopher Hegarty, eds. 2006. Understanding GPS principles and applications. 2nd
ed. Boston; London: Artech House.
MTI, Group. in MTI [database online]. [cited March 29, 2015 2015]. Available from www.mtiwe.com/
?CategoryID=353&ArticleID=163.
Sevgi, Levant. 2007. The antenna as a transducer: Simple circuit and electromagnetic models. IEEE
Antennas and Propagation Magazine 49 (6): 211--218.
Stallings, William. 2007. Transmission impairments. In Data and computer communications. 8th ed.,
89–91. New Jersey: Pearson.
Wagenen, Juliet. Inmarsat parrot bebop drone takes flight for journalists. in Sattelite TODAY News
feed, ST Briefs, Telecom [database online]. 2015 [cited March 19, 2015]. Available from www.
satellitetoday.com/ t elecom/ 2 015/ 0 3/ 11/ i nmarsat- p arrot- b ebop- d rone- t akes- f light- f or-
journalists/(accessed March 19, 2015).
320
newgenprepdf
321
14
Command and Control
Nathan Maresch
14.1 Introduction
The definition of command and control may differ depending on context. From a human
perspective, especially in the context of the military, command and control has a lot to do
with the structure of ranks and the hierarchy within which a mission is accomplished. In
the context of unmanned aircraft system (UAS), the primary concern is with technology
implementation. It may be abbreviated “C3” or “C4,” etc., to be concise, adding communi-
cation and computers, respectively. While very useful to know, in the context of UAS, the
differences in abbreviation and terminology are essentially meaningless since they are all
321
322
referring to the same concept. It is impossible to have command and control without com-
munication or computing elements. In the simplest of terms for UAS, command and control
refers to the issuing of commands through a communication medium, to a resource such as
an air vehicle, and verifying positive control over the situation. It is what allows operators
to send initial instructions and updates to flight plans and other aircraft systems, as well as
receive information about what is happening on board the aircraft while flying (Gundlach
2012). Depending on the mission at hand, some unmanned aircraft are flown completely
autonomously without transmitting or receiving communications from the ground station
throughout the entire flight (no C2 implementation). For almost all applications, however,
two-way communication with the aircraft is desired. This chapter will focus on radio fre-
quency (RF) datalinks, because they are the most common form of communication for
unmanned systems. Other mediums such as tethered cables and beams of light are some-
times used for information transfer (Austin 2010). This is true for both the uplink –the
commands from the operator to the aircraft, and the downlink –the status information
sent from the aircraft.
FIGURE 14.1
Voltage Status Indicator Variations: (a) Black Text (b) Red Low Voltage Text (c) Color-coded Red, Yellow,
Green Indicator.
trigger the procedure. If at any time the link is reestablished, the operator may cancel the
lost-link flight procedure and resume the mission.
14.3 Datalinks
Datalinks communicate information between the ground station and unmanned aerial
vehicle (UAV), and occasionally may be used to communicate with other system elements
such as antenna trackers. Wireless modems on the UAV transmit telemetry and receive
commands from the operator who has similar wireless hardware connected to the ground
station. These modems are typically transceivers connected to one or more antennas.
These could be Wi-Fi based with fast throughput, or relatively slow-speed serial modems;
modems that have throughput from tens to a few hundred kilobits per second (Kbps) are
sufficient for command and control. Figure 14.2 shows three different command and con-
trol transceivers. In some cases, there may be separate receivers and transmitters operating
on different frequencies (Gundlach 2012).
FIGURE 14.2
Various sUAS Command and Control Transceivers.
325
regulatory authority for this spectrum is the Federal Communications Commission (FCC).
Part of the job of the FCC is to manage the radio spectrum in an efficient way, assigning spe-
cific frequencies (channels) to users and regulating their power output. This management
is to prevent interference from other users transmitting on the same frequency in the same
locality; everyone gets their own radio channel –not a particularly easy job to manage. If
someone simply decides to transmit on a particular frequency without authorization, they
may face significant fines or penalties, especially if they interfere with someone who has
a license for that frequency. Typically, the FCC allocates parts of the spectrum for certain
uses, such as the bands used for AM/FM music radio. To date, there are no bands set aside
for use exclusively by unmanned aircraft. Licenses are issued on a case-by-case basis by
availability, though several bands are being considered for unmanned aircraft specific use
(Transportation 2013).
There are also certain bands that do not require a license to use as long as the equipment
is certified to comply with a number of rules set forth in Part 15 of the FCC rules (The
FCC rules may be found in Title 47 of the US Code of Federal Regulations [CFR]). These
unlicensed bands are very popular for use with unmanned aircraft. Using these bands, the
radio equipment must hop between one frequency to another very rapidly over a large
range of frequencies (spread spectrum). The transmitter and receiver must be synchronized;
the receiver must hop using the same pattern as the transmitter for proper reception. Many
times, a specific pattern in use may appear completely random to an outside observer, but
the communicating devices remain synchronized to each frequency change; the pattern
is pseudorandom. The benefit of using this method is that multiple users may operate in
the same band without causing crippling interference to others; different users employ
different hopping patterns. This communication method is relatively immune to other
sources of interference as well, because noise occurring at one frequency results the loss
of only a small portion of a spread spectrum transmission; however, a potential pitfall is
that there is no license of exclusivity, so interference must generally be accepted. In fact,
the unlicensed frequencies are within part of the spectrum that previously was specified
only for RF noisy industrial, scientific, and medical (ISM) uses; microwave ovens operate
in one of these bands. Advanced spread-spectrum transceivers can detect existing sources
of interference (such as a microwave oven running nearby) and avoid those channels com-
pletely (Blake 2002). Wi-Fi is an example of spread-spectrum technology in action. A visual
representation of frequency hopping is shown in Figure 14.3. This shows a spectrum meas-
urement of an unlicensed command and control link over about 60 seconds time. A section
of the RF spectrum is plotted along the horizontal axis. Elapsed time is plotted along the
vertical axis. Each horizontal segment indicates an average amount of RF energy sampled
during an interval of a few seconds. Most of the RF energy is concentrated at differing
FIGURE 14.3
Spectrum waterfall view indicating frequency hopping over time.
326
Users of wireless datalinks should also periodically check the radio hardware they are
operating. One procedure that is beneficial to perform before flight is a reduced power
check. Reducing the power helps one find out if there are problems with the modems and
associated connections, cabling, and antennas. Some radios can be configured to reduce
the transmitting power on both ends enough for the check, and other times an attenu-
ator may be added between one of the antennas and the transceiver. An attenuator is a
matched resistor that dissipates a portion of the RF of power. Some attenuators are fixed,
and some may be adjusted to dissipate more or less power; in the case of a transceiver,
the attenuator reduces the transmitting power before reaching the antenna, as well as the
received power before it reaches the receiver. This simulates adding distance between the
ground station and the air vehicle. Note that it is important that an attenuator should be
installed and removed with the equipment off, as unplugging the antenna of an operating
transceiver may burn it out due to the signal being reflected back inside. If the system is
still able to operate with reduced power when separated by several meters, then it follows
that it should function at greater distances with full power. If the Received Signal Strength
Indicator (RSSI) is abnormally weak on both ends during the check, then the problem is
likely within the antenna, cabling, or connections on one or both sides. If the power is weak
on only one side, then the transceiver hardware is usually faulty, either a weak transmitter
on one end or an insensitive receiver on the other end.
A unique ID (sometimes paired with an encryption key), serial number, or network
address is what is used to establish a connection between the ground station and the UAV.
Sometimes, an ID must match between the aircraft and ground station transceivers, and
other times, it is easily specified or selected from a list of aircraft on the operator screen in
order to control one or more vehicles simultaneously.
must know how to decode signed packets, otherwise it is incompatible and cannot decode
the packet). The signature is 13 bytes in length and has a structure of its own. The first byte
of the signature is the link ID, unique for each connection. The next six bytes represent
a timestamp updated every 0.00001 seconds. Finally, the last six bytes represent the sig-
nature itself, 48 bits of an SHA-256 hash calculated from the message, timestamp, and a
secret key that the transmitter and receiver both know. This helps ensure that the message
is secure, including the originator and message content (MAVLink n.d.).
After going through the header structure, it is interesting to note that headers contain
only sender information, nothing about the destination. If there is information destined for
a single system or component, it is specified by specific payload structure. As a result, all
packet headers are processed in some way by all receivers in the MAVLink network.
(IDs 42 and 46, respectively). In both cases, the payload is simply the mission (waypoint)
item sequence number. Another routine message, the (INS filtered) GPS message, ID#33,
encodes 28 bytes in its payload (MAVLink n.d.).
Because the status messages being sent back from the UAV are transmitted regularly, and
at a relatively fast rate, they do not require ground station acknowledgment of reception.
In fact, most packets are not acknowledged, only commands from the ground station, such
as “command_long,” have corresponding acknowledgment responses. This is achieved
by including confirmation and target system/component sections in the payload. On the
first transmission, the confirmation byte starts at zero, and if the UAV has not responded
with an acknowledgment after a timeout period, the command is resent. On each retry,
the confirmation value increases. An acknowledgment message returns the command ID
that it is acknowledging, as well as a detailed result, such as “accepted,” “denied,” “not
supported,” “in progress,” etc. A separate progress field can even indicate the progress by
percent completed. Fields for the system/component that originated the command are also
included as specific targets for acknowledgment. For messages that a receiver finds with a
system or component target other than itself, it is expected to retransmit the message via
any channel that it has seen target traffic from. Broadcast messages are handled similarly,
being sent to any channel that has not seen them (MAVLink n.d.).
14.3.6 Encryption
Encryption is very important to the security of digital connections, and without it,
unauthorized third parties could eavesdrop on the link communication, or even worse
detect the type of communication occurring and transmit their own commands to the UAS,
possibly taking it over or terminating it. Citing these security concerns, many RF datalinks
are beginning to implement encryption. It is important to note that encryption, especially
public key encryption, involves computational power to implement, and thus introduces
delays in message transmission (Blake 2002).
332
Two types of encryption are popular, public key, and private key (or symmetric key).
Private key is much simpler, combining a long number with the message information using a
built-in algorithm before being transmitted. The long number is the secret key (usually input
by the user as a password during setup) that both ends of the link know. At the receiving
end, the same algorithm decodes the message with the secret key (Blake 2002). It is important
that the secret key be secured during initial setup, however; usually, for UAS modems, the
setup process involves physically plugging into the datalink modem that carries some level
of security. If it were wirelessly initialized, however, this could be problematic.
Keeping the secret key safe is not much of an issue with public key encryption. The
message receiver sends out a public key that the transmitter uses to encode the data. The
public key alone cannot be used to decrypt the data, only encrypt it; a private key (which
may be kept safe) is still used for message decryption (Blake 2002).
FIGURE 14.4
Ground Control System Interface with Waypoints.
333
FIGURE 14.5
Main Autopilot Interfaces.
here. The autopilot methods behind waypoint navigation vary between different types of
autopilot. Once the operator commands reach the autopilot, they must be processed by a
microcontroller to change various internal set points (such as a new waypoint). They must
process the new commands along with large amounts of sensor and location data, all while
navigating and intercepting an intended flight track and sending back status information.
Many autopilots use Kalman filters (or extended Kalman filters) to process the naviga-
tion information, fusing all the various sensor information together and rejecting outlying
information.
FIGURE 14.6
Autopilot Components.
clock pulse signaling to go on to the next item on the list. This clock is merely a very fast
timed pulse, signaling at rates from many millions of times per second, to over a billion
times per second for higher end systems. The purpose of the clock is to keep everything
synchronized. This clock signal is derived from the regular vibrations of a quartz crystal
in the presence of a voltage applied to it. To handle high-priority tasks (and tasks that
require attention at specific intervals), the processor uses interrupts. This is a mechanism
that “interrupts” the current list of things to process to perform others, before resuming
once again. An interrupt may be triggered by an internal timer, performing important
tasks at certain intervals, or by an external signal. For example, an interrupt may be used
to trigger the reading of the current location of the aircraft from a GPS receiver when new
data are available.
Depending on the design of the autopilot system, the various sensors that interface
with the main processor may be mounted on board the autopilot itself or exist as separate
systems that plug in. Figure 14.6 shows the layout of the major components found on the
circuit board of an open-source autopilot system.
Besides transmitting telemetry through the data link, some autopilots may have a
flight-data recorder built-in. This consists of an onboard memory –in some cases even
an SD card that may be removed for easy download. A copy of the flight data is saved
in this memory, as well as transmitted through the datalink. If there is a lost-link situ-
ation or the aircraft is lost, the flight data may be downloaded later to aid in analysis or
troubleshooting. In some cases, this memory is useful for diagnostic functions and precise
measurements because the user may select the type of data to be collected, as well as the
rate at which it is collected. More information may be saved in this memory than the data
link is able to transmit back. For example, much faster accelerometer data may be saved
for vibration analysis purposes. Depending on various factors, the recording of additional
335
data may affect autopilot flight performance due to the extra processing required to save
the data.
FIGURE 14.7
Pitot/Static Tube With Sensor.
compressed air. Simply pressing and holding one’s finger firmly to a pitot tube is sufficient
for a quick air leak check. The trapped air is compressed enough to be detected by your
finger. The airspeed indication should increase and hold constant for a number of seconds
while holding the tip of the tube. Figure 14.7 shows the end of a combined pitot/static tube
with the differential pressure sensor.
Autopilots rely on the GPS for primary navigation; GPS is essential to the navigation
of almost all unmanned aircraft systems. Most systems have one or more GPS receivers,
which update the aircraft position multiple times per second. Figure 14.8 shows various
GPS receivers. A front and backside view of one is shown at the top of the figure. Note
that some have the ceramic GPS antenna integrated into the receiver itself, while others
are designed to have a remote antenna attached via a cable. The receiver must have a
lock on at least four satellites to obtain a three-dimensional position. The signals from
the satellites are extremely weak. In fact, the signals are weaker than the ambient noise
(noise floor); they have a negative SNR. A GPS receiver uses algorithms that look for
patterns in the noise consistent with what it expects from the GPS signals, and then
isolates the signals from the noise. The GPS antenna should always have a clear view
of the sky. If the receiver is in motion, the velocity and direction of movement can be
determined based on previous GPS readings. This is why the GPS aircraft heading is
incorrect or not available when the aircraft is sitting on the ground. The GPS receiver
itself does this processing.
Because GPS signal distortions are caused by various effects such passing through
different layers of the earth’s atmosphere, correction signals are generated by stations at
a known location to augment the original information and increase positional accuracy;
the distortions may then be subtracted out. You may hear this augmentation called DGPS,
SBAS, WAAS, and others. Sometimes, the stations themselves transmit the correction
signal on a local level, and other times, satellites retransmit them, as in the case of WAAS
(Cork 2014). There are subscription-based services that provide proprietary corrections
337
FIGURE 14.8
Various GPS Receivers.
to improve the positional accuracy of GPS as well. Systems like this may improve GPS
accuracy by many times. Some unmanned aircraft employ Real Time Kinematic (RTK)
GPS for precision maneuvers such as automated landings. This uses a station at a known
location similar to augmentation systems, establishing a lock on a specific portion of the
carrier wave of the GPS signal. Because the carrier is a much higher frequency, greater
precision positioning is possible with the faster timing. These systems again require
data to be transmitted from the base to the receiver aboard the aircraft. Without regular
transmissions from the base, the remote receiver will quickly lose its lock on the carrier
and revert to using standard GPS. With RTK corrections, the positional accuracy can be
about one inch.
To determine the basic movement and attitude of the aircraft, the autopilot makes
use of accelerometers and gyros. These are usually found on board the autopilot itself.
Accelerometers detect acceleration along an axis, where gyros detect angular velocity
about an axis (Woodman 2007). These sensors require calibration or initialization. It is
important to note that because accelerometers by definition measure acceleration, they
will indicate the acceleration due to gravity. Accelerometers and gyros found on most
338
autopilots are not used alone for primary long-term navigation. The reason for this is that
the small accelerometers and gyros suitable for these systems do not have enough pre-
cision to be useful over time; errors are additive without some correction. These sensors
are relatively low-cost micro-electromechanical systems (MEMS) devices fabricated using
the same methods and materials as the integrated circuit industry (Cork 2014). Many
times, an MEMS device looks exactly the same on the outside as any other solid-state chip
mounted on a circuit board, and is just as small, even with all the elements needed for
three accelerometers and three gyroscopes (sometimes even three magnetometers as well)
in the same four millimeter square package. It is important to remember that MEMS are
mechanical devices, and subject to damage and failure. Though damage is extremely rare,
care should be taken to avoid sharp drops and falls. They should be checked regularly for
proper operation.
Some autopilots offload certain processes to a second processor. In some cases, this
secondary controller can handle the reading of the external pilot inputs, and encoding
of the outputs to the control-surface servos, among other tasks. If the main processor
fails, the secondary processor can route the inputs from the external pilot directly to the
servos, acting as a multiplexer. A multiplexer is basically a switch that allows a choice
of selection between multiple sets of input; one set is routed to the output. In this way,
the external pilot may fly the aircraft manually and safely land. For autopilot systems
without this functionality built-in, an external multiplexer may be added so that the
external pilot can switch control from the autopilot to their controller in the rare event
that an autopilot system failure occurs. In conjunction with the RC receiver, it can be
configured so that control is automatically routed to the autopilot if external pilot signals
are not received.
The external pilot controllers for sUAS are generally the same as those used for hobbyist
radio-controlled aircraft. The flight control servos on board the aircraft (and throttle servo
or electronic speed controller [ESC] on an electric aircraft) expect a pulse of a certain
duration. A pulse of 1.0 ms corresponds to full deflection in one direction, 1.5 ms center
deflection, and 2.0 ms full deflection in the other direction (with any pulse/deflection in
between). The rate that these pulses are sent to the servos varies between 50 and 400 Hz
depending on the system and type of servos. The technology used for transmitting the
pulses between the external pilot transmitter and the receiver on the aircraft also varies;
pulse code modulation (PCM) and proportional pulse modulation (PPM) are common
methods, and modern transmitters also use spread spectrum technology. Autopilots com-
monly have a provision for an external pilot to control the aircraft through the command
and control data link itself. This usually consists of a controller or joystick plugged into
the GCS or operator station. There is usually more delay with this method, due to the add-
itional processing associated with encoding and decoding the data packets, and autopilot
translation of the data into servo pulses.
14.4.3 Tuning
Autopilots generally require tuning to properly control and stabilize a specific airframe
type. The flight control systems commonly consist of a proportional, integral, and differ-
ential (PID) closed feedback controller for each set of flight surfaces. Each of these three
components have numeric settings, called gains. The gains are established during ini-
tial test flights, and usually do not require further tuning once they are set. The propor-
tional gain applies a correction that is proportional to the magnitude of the error in the
system. As the amount of error decreases due to the correction, so does the correction
339
itself. Performance may become an issue with smaller errors; the decreasing corrections
take longer to complete. Part “a” of Figure 14.9 shows a simulation of proportional gain
response. The horizontal line is the set point that is the goal, and the curved line is the
location in time relative to the set point (the controller response starting at the lower left
corner). If not concerned with the performance, proportional control alone may be accept-
able, though small corrections also present another problem besides speed. Because of
factors like friction and others, proportional feedback may not be enough to make full
corrections. There may be a dead band near the desired set point called steady-state error.
Oscillations will result if proportional gain is excessive (Kilian 2006).
The integral component is added to decrease or eliminate steady-state error. This adds
correction based on accumulating previous error. This can, however, introduce instability
in the system. The system can now easily overcorrect and create oscillations because no
braking is applied until after overshooting. Part ‘b” of Figure 14.9 shows the dangerous,
unstable response of having too much integral gain. If this response were to happen while
tuning in flight, the aircraft would most likely shake apart.
To reduce overshoot, the derivative portion is added for some extra braking effect
just before reaching the intended target. It also gives extra force at the beginning of the
movement, trying to predict the future error based on the rate of change of the current
error. Part “c” of Figure 14.9 shows derivative gain added, but the integral portion is still
too high. There is still too much overshoot. Too much derivative gain can slow down per-
formance due to the damping effect.
FIGURE 14.9
(a) Slow Response plus Steady-State Error (b) Dangerous Unstable Oscillations (c) Excessive Overshoot
(d) Properly Tuned.
340
There are various techniques for tuning PID controllers; however, tuning in general can
be a challenge because changing one term also affects the other two. The desired response
is fast and precise, without too much overshoot, instability or oscillation. Part “d” of
Figure 14.9 illustrates a desired response. Some autopilot systems have built-in methods
to automatically tune the system with an ongoing process of gain tweaking. Because it
corrects for a changing dynamic, this is called adaptive control (Kilian 2006). Adaptive
methods vary from simple algorithms to highly complex forms of artificial intelligence.
In some cases, the automatic tuning (or even marginal manual tuning settings) may cause
system instability when a dynamic such as wind velocity changes. Because of this, it is
important not to save manual gain settings close to a point where the system becomes
unstable.
all that is required; however, many times a magnetometer is added to detect the magnetic
compass heading and help reduce the rotational error of the gyro system. In some cases,
GPS is also added to correct errors that accumulate (Cork 2014). The fusion of data from
these sensors is processed with a computing device to determine relevant navigation infor-
mation such as current position, velocity, and heading. Stereo-optical sensor data (optical
odometry) may be incorporated with the INS data as well by using an extended Kalman
filter. This provides accuracy close to that of GPS (Kelly et al.)
Dedicated inertial navigation devices contain more precise sensors for measurement than
GPS-navigated sUAS autopilots generally do. For example, the drift rating on a fiber-optic
gyro (FOG) in an INS system may be a fraction of a degree per hour or less. It is typical for
the MEMS accelerometers and gyros on board sUAS autopilot systems to have position
errors of many meters or to drift 30 degrees per hour or more if uncorrected. Generally,
the more precise accelerometers and gyros within dedicated inertial navigation systems
are much larger, consume more power, and are costlier than their sUAS counterparts. As
a result, dedicated IMU/INS systems are rarely found on sUAS; they are typically found
aboard manned aircraft and large unmanned aircraft.
to those who pay for specific features. Most open-source autopilot ground control software
and the firmware code that runs on the aircraft, fall into this category.
Open-source hardware is similar to open-source software. Developers of open-source
autopilots and related hardware make the design files and schematics for this hardware
available to the public. Users may use the schematics for troubleshooting purposes or to
build their own if they wish. Companies can also use the design to begin building and
selling the hardware, even if the original developer is already doing so. Sometimes, one
group creates an improvement that is eventually incorporated into hardware assemblies
from others. While this means that there may be various versions of hardware available
from different manufacturers, the diversity of design expertise means that there is great
potential for improvements.
14.7 Conclusion
As we have seen, the command and control element is a very pivotal part of the operation
of an unmanned aircraft system. Without command and control, all there would be is a set
and forget system, without monitoring capability. It works as the human communicates
through a standardized protocol using the RF spectrum as a medium, as was explained
previously. There was also an introduction to the workings of the autopilot and other
components needed to accomplish the intended commands and transmit back status infor-
mation. Because of open-source software and hardware, there are opportunities not only
to explore and learn more about how command and control works, but to potentially con-
tribute new ideas and improve existing technologies.
Discussion Questions
14.1 In the context of UAS, “command and control” refers to what? Define what is
meant by the terms “uplink” and “downlink.”
14.2 What is a “lost link” and what can trigger that event? What are some actions
an sUAS might be programmed to execute in the event of a lost link? Discuss
operator interface systems. Discuss those qualities, attributes, and characteristics
considered to be desirable and undesirable in a ground station display/human
interface. What might be considered the most important aspect of operating an
unmanned aircraft?
14.3 What is the purpose of a transceiver? What are sufficient throughput speeds for
command and control?
14.3.1 What is a simple definition for RF spectrum? Give the extremes, in terms of
frequency and wavelength, of the RF portion of the electromagnetic spec-
trum. How are frequency and wavelength related? What is spread-spectrum
transmission and how does pseudorandom frequency generation enhance
this technique? Give examples of applications of spread-spectrum tech-
nology. What are ISM frequencies? What is the civil regulatory authority in
344
References
Austin, Reg. 2010. Unmanned Aircraft Systems: UAVs design, development and deployment. West
Sussex: John Wiley & Sons Ltd.
Blake, Roy. 2002. Electronic Communication Systems, 2E. Albany: Delmar.
Cork, Lennon. 2014. Aircraft Dynamic Navigation for Unmanned Aerial Vehicles. PhD dissertation,
Queensland University of Technology. http://eprints.qut.edu.au/71396/1/Lennon_Cork_
Thesis.pdf
Gundlach, Jay. 2012. Designing Unmanned Aircraft Systems: A Comprehensive Approach. Reston: American
Institute of Aeronautics and Astronautics, Inc.
Kelly, J., Saripalli, S., and G.S. Sukhatme. Combined Visual and Inertial Navigation for an Unmanned
Aerial Vehicle. www.robotics.usc.edu/publications/media/uploads/pubs/ 540.pdf.
Kilian, C. 2006. Modern Control Technology, 3E. Clifton Park: Delmar Learning.
MAVLink. n.d. “MAVLink Developer Guide.” Accessed July 30, 2019. https://mavlink.io/en/
guide/
346
United States Department of Transportation. 2013. Unmanned Aircraft System (UAS) Service
Demand 2015–2035: Literature Review & Projections of Future Usage. Technical Report, Ver.
0.1. www.ntl.bts.gov/lib/48000/48200/48226/UAS_Service_Demand.pdf.
Wang, Chao-Lei, T.M. Wang, J.H. Liang, Y.C. Zhang, and Y. Zhou. 2013. Bearing-only visual SLAM
for small unmanned vehicles in GPS-denied environments. International Journal of Automation
and Computing 10(5) 387–396.
Woodman, Oliver. 2007. An Introduction to Inertial Navigation. Technical Report, No. 696. University
of Cambridge Computer Laboratory. www.cl.cam.ac.uk/techreports/UCAM-CL-TR-696.pdf
newgenprepdf
347
15
Unmanned Aircraft Subsystem Integration
William H. Semke
The integration of subsystems into unmanned aircraft is an essential piece of the utiliza-
tion of unmanned aircraft system (UAS), as this what allows the aircraft to carry out their
intended mission. In most cases, the aircraft is a platform from which to collect data, make
observations, or to make deliveries to a desired location or target. Unmanned aircraft pro-
vide an ideal platform in situations where rapid deployment may be useful, environments
that may be hazardous, or extended durations missions. Examples of missions include
search and rescue operations, long-duration surveillance, military operations, precision
agriculture, sense and avoid technologies, and many other applications that utilize the
unique abilities of UAS.
The discussion of subsystems, and in particular UAS payloads, integration comes from
experience and processes developed and utilized at the Unmanned Aircraft Systems
Engineering (UASE) Laboratory at the University of North Dakota (Lendway et al., 2007;
Semke et al., 2007). The intent is to provide the reader an overview of the process along with
practical information regarding UAS-specific integration challenges and requirements.
The steps described have been successfully implemented in numerous projects and have
served as an excellent guide for successfully integrating subsystems onto UAS.
Payload subsystems come in a variety of sizes and configurations, from extremely com-
plex with heavy computational capabilities to relatively simple designs. Each system
tries to meet the objectives of the operator. Figure 15.1 shows the MQ-1B Predator Multi-
Spectral Targeting System, or MTS-A sensor ball. This payload integrates an infrared
sensor, optical cameras, a laser designator, and a laser illuminator into a single package
that provides multiple assets for military operations. On the other end of the sophistica-
tion scale is an example of a UAS payload system, a flying insect capture system using
deployable nets attached to its wings, as shown in Figure 15.2. This system was developed
347
348
FIGURE 15.1
Multi-Spectral Targeting System, or MTS-A sensor ball, integrated onto a MQ-1B Predator UAS for military
surveillance operations. (Photo credit: http://duncandavidson.com.)
FIGURE 15.2
Flying insect capture payload installed on the wings of an airborne UAS.
to support a study on the distribution and spread of disease by mosquitos. These two
examples, of which there are many thousands of others, illustrate the wide range of poten-
tial applications of UAS payload systems (Wehner et al., 2013; Lemler and Semke, 2012;
Dvorak et al., 2012).
The myriad of applications of UAS with their respective payloads provides great oppor-
tunity for researchers in many fields to implement and exploit the capabilities of UAS. The
349
capabilities are unique to the airframes and many technical issues arise in the integration
of the payloads into the aircraft. This chapter provides guidelines for payload developers
for safe and effective payload design and subsystem integration.
Each of these steps and UAS-specific highlights will be discussed. The design process is
a complex and iterative process and multiple texts address valuable design methodologies
that can be implemented (Larson and Wertz 1999; Ullman 2010; Dieter 2000). This chapter
provides an overview of processes that have been proven to be successful in UAS payload
development within the UASE Laboratory with emphasis on several issues that are unique
to UAS subsystem development.
UAS-specific actions at this phase include determining the type of aircraft necessary. The
aircraft type is based primarily on range, maneuverability, lifting capacity, and costs. With
hundreds to thousands of airframes to choose from, many times there are several viable
options and the best fit typically comes down to a cost versus benefit comparison. General
guidelines are that fixed-wing aircraft give longer duration flights that travel greater
distances, but lack the maneuverability of rotorcraft. Rotorcraft allow for fixed location
hovering and station keeping, but lack the flight efficiency of fixed-wing aircraft. In the
past, most UAS were fixed-wing aircraft, but more recent advances in electronics miniatur-
ization and battery developments have made multirotor aircraft the most common UAS
in use today.
In all aviation, the Size, Weight, and Power (SWAP) requirements of the subsystem must
be reduced as much as possible. The SWAP requirements dictate the airframe and its sub-
sequent performance during missions. On the large end of the spectrum is the Northrop
Grumman Global Hawk with the ability to carry over 3000 pounds of payload, as shown
in Figure 15.3. On the other end is a micro-UAS that is only capable of carrying specialized
payloads only a few grams in mass, as shown in Figure 15.4.
Once several concepts are generated and the performance versus cost benefits explored,
this is the best time to have additional discussions with the end users. Often, the desires
of the end users may not coincide with the technical abilities and/or budget of the pro-
ject. Now is the time to discuss what modifications may be appropriate. An example is the
desire to have a long-range radar system, but the only systems currently available that
are capable of the range requested require immense size and weight using today’s tech-
nology. So, either a compromise must be made between requirements and capabilities or
the project is at stand still and cannot move forward until technological advances improve
the capabilities or an innovative solution is found. It is important that all parties involved
must remain amenable to change and adaptable to continued technological advancements
while striving to meet the requirements. Unfortunately, sometimes, the technical barriers
are insurmountable with airborne capable technologies, and alternate systems are deemed
351
FIGURE 15.3
The Northrup Grumman Global Hawk UAS. This large UAS aircraft is capable of heavy lifting and long, high-
altitude missions. (Photo Credit: Wiki “Global Hawk 1” by U.S. Air Force photo by Bobbi Zapka - www.af.mil/shared/
media/photodb/
photos/070301-F- 9126Z- 229.jpg.
Licensed
under Public domain via Wikimedia Commons -
http://commons.wikimedia.org/wiki/File:Global_Hawk_1.jpg#mediaviewer/File:Global_Hawk_1.jpg.)
more appropriate, so the process of an airborne system ends at this point. However, with
slight modifications and/or additional technical development, the capabilities of airborne
systems are immense and can most times meet the true needs of the end user.
FIGURE 15.4
A Black Hornet nanohelicopter illustrating a UAS that is capable of carrying a few grams in an extremely
small, lightweight system. (Photo credit: “Black Hornet Nano Helicopter UAV” by Richard Watt - Photo www.
defenceimagery.mod.uk/fotoweb/fwbin/download.dll/45153802.jpgMetadata source: www.defenceimagery.
mod.uk/fotoweb/fwbin/fotoweb_isapi.dll/ArchiveAgent/5042/Search?FileInfo=1&MetaData=1&Sea
rch=45155077.jpg. Via Wikimedia Commons - http://commons.wikimedia.org/wiki/File:Black_Hornet_Nano_
Helicopter_UAV.jpg#mediaviewer/File:Black_Hornet_Nano_Helicopter_UAV.jpg.)
Throughout this stage of the design, aircraft Interface Control Documents (ICDs) are
extremely useful. Some commercial grade UAS have excellent documentation that is
readily available, while other aircraft only provide very limited resources. The documenta-
tion level may significantly influence the decision on what airframe to implement and/or
type of integration chosen. Useful information may include wiring schematics along with
capacities, mounting locations and types, physical dimensions, weight and balance infor-
mation, and many other useful design parameters. In addition, the quality and respon-
siveness of the customer and technical support the vendor provides is a critical factor in
determining the most appropriate hardware and software to implement.
UAS-specific actions at this phase include power and weight budgets, data storage, and
airframe flight worthiness. Typically, both power and weight resources are scarce in UAS,
so accurate accounting of each is critical. Therefore, care should be taken to find the most
efficient and lightweight components available.
Power estimates of each component with the respective efficiencies are tabulated. This
budget will help define whether the system can be self-powered or needs to use aircraft
resources. In general, a self-powered system with its own battery simplifies integration
and aids in the test and evaluation phase. However, using aircraft resources may reduce
the weight of the payload and therefore add mission life. The drawback to using aircraft
353
FIGURE 15.5
An externally mounted missile system attached to the wing of a UAS. (Photo credit: TSGT Scott Reed, U.S. Air
Force - www.dodmedia.osd.mil/;
VIRIN: DF-SD-06-14785.)
components for the fabrication phase. The design is finalized and all the stakeholders have
a final review prior to fabrication. A complete description of the design specifications and
capabilities is presented for final comment. A time line for completion is also provided
that will guide the schedule along with allowing end users proper time to prepare for the
product. Many times this is the phase that must be completed before the distribution of
funds to support the fabrication of the system. A detailed list of items included in the CDR
include:
The UAS-specific actions at this phase include the finalized power requirements and
weight and balance calculations. It is also the time where the parts and vendors intended
for use are found that provide the quality and traceability needed for UAS applications.
While the FAA does not currently dictate the exact standards of parts and materials, many
355
FIGURE 15.6
An external wing pod designed to carry radar equipment providing a clear field of view without interference
from the airframe and engine.
of the best practices developed in manned aviation are good guideline for application on
UAS. Some of the more relevant requirements are locking connectors, aircraft or equiva-
lently rated hardware, traceable materials, fastener back-off protection, and proper circuit
protection.
Electrical connections are essential for operation and some sort of locking mechanism
is needed to ensure that the connectors stay connected during flight. There is substantial
vibration during flight operations and any connection that becomes loose can lead to cata-
strophic results. Therefore, several types of LEMO-style push–pull connectors, as well as
Powerpole-style connectors have been implemented in our designs over the years. These
styles of connectors have proven themselves reliable and effective in flight operations.
Other types of connectors will also work well, but the user should verify that they are not
susceptible to loosening or disconnection during flight.
The hardware and materials used in the payload fabrication should be of the highest
quality for defect-free construction and problem-free operations. All hardware should be
aircraft (AN) grade or equivalent. AN-grade hardware meets high levels of performance
and can be traced to place and date of origin. These fasteners are free from defects that
can occur in lesser grade fasteners and have extremely high reliability. This makes them
an ideal choice in fasteners, especially in flight critical components. They also often come
with a back-off prevention method. The use of traceable materials is also recommended to
356
ensure high-quality, defect-free stock from which to manufacture components. This results
in dependable parts that meet the design specifications and perform well over the entire
lifetime of the payload.
The electronic components used should all be evaluated for temperature ratings. It has
been observed that elevated temperatures are a common occurrence in small UAS pay-
load systems without any active or passive cooling designed into the system. The small
aircraft typically have an enclosed area that houses the payload and over time elevated
temperatures often are encountered. These result in electronic failures, unusual operations,
or shutdowns. Conversely, cold temperatures encountered in winter operations and poten-
tially high elevations also produce failures and shutdowns. In both cases, care needs to be
taken in the selection of components and proper testing procedures conducted prior to
operations. Proper testing protocols will be outlined in the Systems Testing section of this
chapter.
Electromagnetic interference (EMI) is another significant factor to be concerned with in
UAS payload development. Improper wiring or unanticipated EMI can lead to interfer-
ence with command and control telecommunication links and also interfere with global
positioning system (GPS) signals. Proper shielding of sensitive electronics in payload
systems can help reduce the risk of interference with aircraft systems, or the possibility
of aircraft EMI interfering with the payload operations. In practice, the use of conductive
enclosures, EMI gaskets, and copper tape can help control EMI effectively. Coax and other
types of shielded cables with grounding also reduce unwanted antennae broadcasting or
receiving of stray electromagnetic radiation.
Proper circuit protection is required to reduce the risk of electrical overheating and poten-
tial fire. By installing a fused connection to the battery, short circuits and other electrical
malfunctions are isolated from the rest of the UAS. In addition, external access allowing
the payload power to be turned on and off is very beneficial. Traditional aircraft “remove
before flight” switches work well for this feature. The ability to turn on the payload with
an external switch is important, since the preflight testing and other aircraft preparations
may take significant time during which the power available to the payload is decreasing.
Therefore, the ability to easily turn on the payload near the time of takeoff increases the
operation time of the payload system.
15.6 Fabrication
Throughout the fabrication of the payload system, high-quality fabrication and workman-
ship must be maintained. The fabrication should follow the design specifications stated
and parts manufactured to the part drawings created. All wiring should be secured appro-
priately; this can be done with tie-downs or tacking down the wires so that they are not
free to move. This prevents oscillations that may lead to loose or intermittent connections
resulting in failure of the payload to operate effectively. Back-off prevention should also
be used on all threaded fasteners to prevent loosening and possible separation. This can
be accomplished by several methods including, wire tie downs, locking washers, deform-
able threads, nylon thread inserts, or liquid thread locker. The environment in which
UAS operate is often very dynamic and these vibrations can cause components to loosen,
leading to payload failures and loss of data collection opportunities.
357
The final product is only as good as the fabrication process; therefore, attention to detail
and utilizing proper manufacturing procedures and equipment is required. After pro-
ducing a quality design using solid engineering principles, the fabrication should result
in a high-quality system that will operate as expected. Poor fabrication methods may
result in ill-performing systems with many integration issues. The workmanship is also
a reflection on the overall perception of the system, and a poor-quality appearance may
give the impression that it is not a high-quality system. Therefore, it is recommended that
experienced technicians perform or oversee the fabrication of the payload system.
FIGURE 15.7
An electromagnetic field test being conducted to measure the radiated emissions from the payload to check for
potential interference with command and control links.
engines, conventional landing gear or belly-land configurations, and many other factors
(Semke et al., 2009; Semke and Dunlevy 2018). Therefore, information regarding the vibra-
tion environment in the ICD for the aircraft should always be used when available.
A baseline vibration excitation test that may be used is the Proto-Flight Minimum
Acceptance Vibration Test Levels (MAVTL) specified by the NASA Payload Flight
Equipment Requirements and Guidelines for Safety- Critical Structures (NASA 2005).
The MAVTL vibration test levels are shown in Figure 15.8. This testing level exercises the
equipment to a level of excitation that exposes dynamic faults in the system. The random
profile is preferred to a swept sine approach because it more evenly excites the structure
over a relatively broad frequency range and does not overly excite a single, potentially res-
onant, frequency of the structure. This broad excitation frequency encompasses most of the
excitation frequencies experienced in many types of UAS.
Frequency Level/Slope
20–80 Hz +3.0 dB/Oct
80–350 Hz 0.04 g2/Hz
350–2000 Hz –3.0 dB/Oct
The payload system is placed in the flight configuration on the mechanical shaker and
excited for 1 minute at the random excitation levels indicted in the MAVTL test procedure.
A vibration testing system is shown in Figure 15.9, illustrating the shaker, amplifier, and
controller necessary for environmental vibration testing.
359
0.1
g2/Hz
0.01
0.001
10 100 1000 10,000
Freq (Hz)
FIGURE 15.8
Minimum Acceptance Vibration Test Levels (MAVTL) specified by the NASA payload flight equipment
requirements and guidelines for safety-critical structures
FIGURE 15.9
Vibration testing equipment, including the electrodynamic shaker, amplifier, and computer controller.
360
After the system has undergone vibration excitation, it is powered up and thoroughly
tested for performance. Any issues that arise should be documented and investigated until
a reasonable fix is produced. In some cases, it may be appropriate to operate the system
during the test to evaluate the systems performance while the excitation is active. Other
payloads only require that the system be able to withstand the vibration and continue
operations when activated. The appropriate test depends on the needs of the payload and
the environment in which it is operating.
Thermal testing in the environmental conditions likely to be encountered during
flight operations is also recommended. Many electronic components have safe storage
temperatures that are greater than the reliable operational temperatures. For example, both
hot and warm environments may cause interrupted operation of payload systems when
in flight. In past experiences, problems most often have been due to elevated temperatures
inside the enclosed payload bay of an aircraft on warm sunny days. With the electronics
operating, internal temperatures over 40° C may be encountered, resulting in limited
mission performance. Cold temperatures can be encountered in wintertime operations or
in high-altitude missions experienced by some payloads. To assess the ability of the pay-
load to operate in the anticipated environment, a thermal chamber (Figure 15.10) is an
ideal way to subject the system to adverse conditions in a controlled manner. The payload
is placed into the chamber and commanded to the appropriate temperature while it is
running. Continued exercise of the payload should be done throughout the test to assess
the performance. Once the desired temperature is achieved and the equipment come to
a thermal equilibrium without issue, the test can be terminated. In addition to thermal
testing, many of the chambers also allow for altitude simulation. Most often, small UAS
payloads are operated at relatively low altitudes, but some may be utilized in high-altitude
missions. In these cases, the appropriate altitude testing should also be performed.
The final test procedure that is unique to UAS testing is the mobile truck test. This test
exercises the equipment by providing a moving platform with a true GPS data stream
along with a vibration environment in self-powered mode. This procedure is an excel-
lent tool to utilize before the expense of flight operations. Typically, flight testing is very
limited due to associated costs, logistics, and availability, so truck testing helps to identify
FIGURE 15.10
A thermal altitude testing chamber used to simulate operating conditions that may be encountered by UAS
payloads.
361
FIGURE 15.11
A payload system being installed for a mobile truck test. This testing platform closely simulates the flight
environment in a relatively easy and inexpensive manner.
any problems in the full operational mode prior to flight. Shown in Figure 15.11 is a test
rack built to hold payloads in the back of a pickup truck. The payload system should be
powered in the same fashion as in flight, with battery packs or simulated power from the
vehicle. In this case, the rack system allowed the payload to operate in a rotated position
so that image collection of scenes could be captured. This test often exposes payload issues
that would not have been discovered by other laboratory bench testing. The combination
of a moving vehicle to exercise the GPS equipment and operating the entire system in
a mobile, dynamic environment is as close to actual flight testing that can be achieved
relatively easily without restrictions that come with flight. It is highly encouraged that
the mobile truck test be performed on every payload system prior to flight testing. Flight
opportunities are not readily available, and therefore, the payload should be thoroughly
tested to take advantage of the flights that arise.
FIGURE 15.12
The field integration of a UAS payload into the airframe for flight testing.
A detailed test plan is required to properly assess the performance of the payload. With
the limited flight opportunities and limited flight time, an effective and efficient test plan
is critical. Things to include in the test plan are the settings to be made on the equipment
and proper battery and data storage capabilities. In addition, the required altitude and
flight lines should be calculated for proper data collection. Any specialized support
equipment should also be prepared for flight testing. If any interfaces with the aircraft
are required, it is important to describe the interface completely and confirm that it is
compatible with the airframe. With the detailed test plan and the proper prior testing, all
integration in the field should be easily accomplished. Field integration of a payload into
a UAS for flight testing is shown in Figure 15.12.
Proper flight planning with the aircraft operator will mean that the desired data will
be obtained. The operator will help establish safe flight operations within the regulations
that most closely match the desired values. At times the payload developer’s wants may
not be achievable under regulatory restrictions or aircraft performance. For example,
a maximum altitude restriction may be applicable in the flight area being used or the
desired airspeed is less than the stall speed of the aircraft. Therefore, it is important to
work with the aircraft operator to establish acceptable parameters that most closely meet
363
FIGURE 15.13
The start of safe flight of a UAS after utilizing “best practices” in the payload development outlined in this
chapter.
the wants of the payload developer with the rules and capabilities of the aircraft. This
planning allows for more effective flight testing as the appropriate flight planning can be
done prior to operations.
The final preparation for flight testing is to develop a complete equipment list of all
the necessary gear and supplies required for the flight operations. This should include all
flight hardware, spare parts, test and evaluation tools, and any other supplies necessary
for operations and repairs. It may also include personal items that can help make the flight
operations more enjoyable. This includes items such as sunglasses, proper clothing, sun-
screen, insect repellant, a camp chair, snacks, and water. A detailed list will help guarantee
you have all the necessary supplies in the field and flight operations will meet the mission
objectives in a safe manner, as shown in Figure 15.13.
Discussion Questions
1) Name the seven steps in the design process for successful UAS payload
development.
364
2) Use the web to find two different fixed wing UAS with the same wingspan, one
using an internal combustion engine and one using an electric motor, and compare
the flight times and payload capacity.
3) Use the web to find two multirotor aircraft with a different number of rotors and
comment on the capabilities of each system.
4) Name six types of missions that data collection using a UAS is preferred over a
manned platform.
5) Name a mission where a real-time data stream is required.
6) What type of hardware (screws, nuts, and bolts) should be used in UAS
payloads?
7) Name two types of fastener back-off prevention methods that may be used in UAS
payloads.
8) Name two frequency bands many UAS use for command and control.
9) What is the highest vibration excitation frequency used in NASA MAVTL
testing?
10) Name the three deliverable for UAS payload flight testing.
References
Dieter, G., Engineering Design, Third Ed., McGraw Hill, New York, NY, 2000.
Dvorak, D., Alme, J., Hajicek, D., and Semke, W., “Technical and Commercial Considerations of Using
Small Unmanned Aircraft Systems in Agriculture Remote Sensing Applications,” AUVSI’s
Unmanned Systems North America 2012, Las Vegas, NV, August 5–9, 2012.
Larson, W., and Wertz, J., Space Mission Analysis and Design, Third Ed., Microcosm Press, El Segundo,
CA, 1999.
Lemler, K. and Semke, W., “Delivery and Communication Payloads for UAS Search and Rescue
Operations,” AUVSI’s Unmanned Systems North America 2012, Las Vegas, NV, August
5–9, 2012.
Lendway, M., Berseth, B., Trandem, S., Schultz, R., and Semke, W., “Integration and Flight of a
University-Designed UAV Payload in an Industry-Designed Airframe,” Proceeding of the
Association Unmanned Vehicle Systems International (AUVSI), 2007.
NASA, Payload Flight Equipment Requirements and Guidelines for Safety- Critical Structures
(March 29, 2002). NASA Doc. SSP 5 2005, sect. 7, p. 7.
Semke, W., and Dunlevy, M., “A Review of the Vibration Environment Onboard Small Unmanned
Aircraft,” Proceedings of the International Modal Analysis Conference (IMAC) XXXVI: A
Conference and Exposition on Structural Dynamics, 2018.
Semke, W., Lemler, K., and Thapa, M., “An Experimental Modal Channel Reduction Procedure Using
a Pareto Chart,” Proceedings of the International Modal Analysis Conference (IMAC) XXXII: A
Conference and Exposition on Structural Dynamics, 2014.
Semke, W., Schultz, R., Dvorak, D., Trandem, S., Berseth, B., and Lendway, M., “Utilizing UAV
Payload Design by Undergraduate Researchers for Educational and Research Development,”
Proceedings of the 2007 ASME International Mechanical Engineering Congress and Exposition,
IMECE2007-43620, November 2007.
Wehner, P., Schwartz, J., Hashemi, D., Stock, T., Howell, C., Verstynen, H., Buttrill, C., Askelson, M.,
and Semke, W., “Evaluating Prototype Sense and Avoid Alternatives in Simulation and Flight,”
AUVSI’s Unmanned Systems North America 2013, Washington D.C., August 12–15, 2013.
365
Semke, W., Stuckel, K., Anderson, K., Spitsberg, R., Kubat, B., Mkrtchyan, A., and Schultz, R.,
“Dynamic Flight Characteristic Data Capture for Small Unmanned Aircraft,” Proceedings of
the International Modal Analysis Conference (IMAC) XXVII: A Conference and Exposition on
Structural Dynamics, 2009.
Ullman, D., The Mechanical Design Process, Fourth Ed., McGraw Hill, New York, NY, 2010.
U.S. Department of Transportation, Aircraft Weight and Balance Handbook FAA-H-8083-1A, Federal
Aviation Administration, Flight Standards Service, Oklahoma City, OK, 2007.
366
newgenprepdf
367
16
Detect and Avoid
16.1 Introduction
One of the foundational tenets of flight is the responsibility of the pilot to see and safely
avoid other aircraft. From the dawn of manned flight, pilots have been expected to main-
tain vigilance to remain “well clear” from other aircraft.
By the middle of the 1900s, advances in aircraft detection technology (such as air traffic
control (ATC) radar and aircraft transponders) had allowed the ATC system to provide
more efficient and safe separation between aircraft through ever improving technologies;
most of which provide more information and more accurate information than a human
pilot. Despite these technological advances, however, the ultimate responsibility for
avoiding collisions has remained with the pilot. He or she must maintain vigilance, pri-
marily by using his or her eyes to scan outside the aircraft for traffic. This concept of the
pilot’s ultimate responsibility for safety has been a core principle of the nation’s aviation
regulatory system for decades. Also enshrined in aviation regulations are the limitations of
natural human vision that will lead to a loss of the pilot’s ability to “see and avoid.” From
the early days of aviation, it has been understood that being limited to using human vision
alone to navigate and keep separate from other aircraft leads to significantly diminished
operational flexibility. This led to the creation of instrument flight rules (IFRs) and a greater
reliance on Air Traffic Services (ATS).
Beyond regulation, this responsibility has been installed and upheld in our judicial
system as well. Dozens of court cases have been adjudicated to assess whether pilots have
performed the essential function of “see and avoid” in order to remain “well clear” of, and
avoid collisions with other aircraft. But for all the emphasis placed upon the linked respon-
sibilities of “see and avoid” and “well clear,” neither concept has been defined precisely.
Instead, both concepts are left as subjective judgments and are not tied to a specific metric
or level of safety. They are left open for interpretation by pilots, regulators, and the courts.
This tenet has remained stable for over a century, despite continual advancements in avi-
ation safety technologies that provide order-of-magnitude increases in aircraft detection,
conflict identification, and collision avoidance (CA) capabilities.
durations, without putting an onboard pilot at risk. However, the impacts of the funda-
mental differences in UASs are not confined to local flight operations; they are felt across
the entire aviation system. Removing the pilot from the cockpit means that he or she is no
longer able to provide eyes-on, subjective judgment to “see and avoid” other aircraft, to
remain “well clear”, and to avoid collisions. This factor, more than any other, has delayed
the integration of UASs with manned aircraft in all classes of airspace.
This same factor has a significant benefit as a forcing function, for the tremendous cap-
abilities of UASs to save lives and otherwise benefit society cannot be fully exploited until
UASs are safely, efficiently, and securely integrated into our airspace system. Today, tech-
nologies exist that can detect other aircraft and determine potential flight path conflicts
long before a human pilot could do so using only the naked eye. These technologies have
the potential to markedly increase the safety of aircraft operations due to the greater range,
accuracy, and reliability of the information they can provide to pilots. An added benefit is
their immunity to the stress and fatigue that can negatively affect the pilot’s performance.
This is particularly true in dense, complex airspace environments such as around busy
airports.
RTCA DO-365 contains an excellent explanation of the derivation and use of the concept of
“DWC.” [Ref. Consigilio and Chamerblin NASA Paper on DAA].
The second change is semantic. A modification of the term “see and avoid” must be
made to change or remove the word “see,” which restricts the process to the human eye-
ball. Using the more accurate term “detect and avoid” for UASs, or adding a proviso to 14
CFR 91.113 that allows for electronic methods in lieu of seeing would satisfy the regulatory
need and open the door to an electronic means of compliance for UASs.
The ability to detect, analyze and maneuver to avoid potential conflicting traffic
by applying adjustments to the current flight path in order to prevent the con-
flict from developing into a collision hazard. […] Remain Well Clear consists of two
components: maintain DWC and regain DWC.
RWC maneuvers occur at longer times and greater distances from other aircraft than CA
maneuvers. They are intended to be normal, nonobtrusive maneuvers that will not conflict
371
with accepted air traffic separation standards. The time and distance minima used to
measure the success of the RWC function is known as “DAA well clear”. It is distinguished
from the “well clear” written in aviation regulations so that it does not suggest that it
would apply to manned aircraft.
If a loss of well clear (LoWC) occurs, then the RWC function may attempt to Regain Well
Clear using different logic and metrics. Since RWC is independent from ATC Separation
Services and Collision Avoidance, RWC may alert the pilot before or after ATC initiates a
maneuver for separation, which may or may not lead to a CA alert. These overlaps between
functions should be minimized but may not be avoidable.
FIGURE 16.1
Relative airspace volumes for the “well clear” and collision avoidance subfunctions. Note: “Collision Avoidance
System” has a specific regulatory meaning under 14 CFR 125.224 and refers to TCAS. In this chapter, collision
avoidance refers broadly to any action that the DAA system takes to avoid a collision, which may occur before
or after a loss of well clear (LoWC).
372
TABLE 16.1
Subfunctions of the Detect and Avoid Process
FAA SAA Workshops DoD SAA SARP
Source: Adapted from Federal Aviation Administration, Sense and Avoid (SAA) for Unmanned
Aircraft Systems (UAS), October 9, 2009 and January 18, 2013; and Office of the
Secretary of Defense, Sense and Avoid Blueprint, October 26, 2010.
Note: I n both of the approaches listed in Table 16.1, all of the subfunctions apply to both
RWC and CA. In the specific case of the “Return-to-Course” subfunction, an air-
craft that executes a CA maneuver must wait until “well clear” is regained before
returning to course.
System (TCAS), in use since the 1990s, uses vertical maneuvers between appropriately
equipped aircraft to avoid collisions when other means of separation assurance have not
been successful.
Threat
aircraft
FIGURE 16.2
DAA encounter timeline and task breakdown.
Entrance criterion: An airborne object enters the surveillance volume of the sensors used
for DAA of a UAS.
Exit criterion: One or more sensors detect the airborne object.
the airborne object based on multiple detections from that sensor. Different surveillance
sources will build tracks differently and may provide different information to the DAA
system. There are several algorithms that sensor systems use to attempt to distinguish
between targets of interest (such as other aircraft) and extraneous targets (such as birds).
Entrance criterion: Assessment of the potential risk for one or more threat aircraft.
Exit criterion: Prioritizing which aircraft poses the greatest risk for a “well clear” viola-
tion or a collision.
may be left to the pilot. For others, an algorithm may recommend, or in some cases exe-
cute a specific maneuver or range of maneuvers designed to minimize risk. In some cases,
coordination with ATC may be necessary prior to maneuvering the UAS. See Section 16.6
for further discussion on the role of ATC.
The Return to Course action may be accomplished by the pilot, the DAA system, or some
other flight management function on the UA. The criterion for determining completion of
377
this subfunction is similar to the “clear of conflict” guidance used in the FAA-developed
Traffic Collision Avoidance System (TCAS). In some cases, the pilot may need to con-
tact ATC to obtain a new approved route or receive permission to return to the existing
clearance.
1. Pilot in-the-loop
2. Pilot on-the-loop
3. Pilot off-the-loop (automatic)
Each of these architectures allocates the DAA subfunctions to the pilot differently, and
while grouping levels of automation in this way is not useful for the development of
requirements, it does help create common understanding across the community of interest.
Table 16.2 provides a summary of how the various subfunctions are allocated under each
category.
TABLE 16.2
Allocation of DAA Subfunctions
Allocation of Detect and Avoid Subfunctions (P = Pilot, U = UAS or DAA)
Detect target Ua Ua U
Track target U U U
Fuse target tracks U U U
Identify object U U U
Evaluate threat U U U
Prioritize threat U/P U U
Declare alert U/P U U
Determine maneuver U/Pa U/Pa U
Command maneuver P U/P U
Execute maneuver P U/P U
Return to course Pa U/Pa U
a ATC may be involved, depending on class of airspace, applicable flight rules, decision time, and other factors.
1. If the pilot intervenes, the DAA system shifts to a secondary role; notifying the pilot
via alerts and recommending action. The DAA system will continue to monitor
the situation through the Track, Evaluate, Prioritize, Declare, and Evaluation
sub-functions.
2. If the pilot does not intervene (e.g., fails to maneuver), the system is capable of exe-
cuting a self-separation or collision avoidance maneuver. This system provides a
useful “last resort” after an attempt to notify the pilot that “action is needed” has
not received a response.
Pilot-on-the-loop DAA systems have the advantage of keeping human judgment in the
equation but taking some of the burden off of the pilot. Another advantage is that they are
capable of executing an avoidance maneuver even when the command and control link to
the UAS is degraded or lost.
allocated to the electronic DAA system. The systems perform the entire DAA cycle without
the need for pilot notification or intervention.
As with pilot-on-the-loop operations, the system is capable of executing an avoidance
maneuver even when the command and control link to the UAS is degraded or lost.
A drawback of this control architecture is that it may not be able to respond correctly to
rapidly changing and/or unanticipated scenarios where human judgment is invaluable.
Without the pilot’s ability to intervene, the level of criticality of the DAA system may rise
so much that certification is difficult or unachievable. These systems will also be subject to
greater levels of scrutiny in terms of cyber security and resilience due to the pilot’s lack of
ability to intervene.
When an ATC clearance has been obtained, no pilot in command may deviate from that clearance
unless an amended clearance is obtained, an emergency exists, or the deviation is in response to a
traffic alert and collision avoidance system resolution advisory.
Each pilot in command who, in an emergency, or in response to a traffic alert and collision
avoidance system resolution advisory, deviates from an ATC clearance or instruction shall notify
ATC of that deviation as soon as possible.
While no regulatory language yet exists that covers DAA maneuvers, the precedent cited
for TCAS is clear: deviation from an ATC clearance (or instruction) is authorized in order
to prevent a collision based on alerts and guidance from an onboard system. The pilot of
a UAS is similarly responsible to notify ATC as soon as possible if a DAA maneuver is
executed either by the pilot or by the system.
For RWC maneuvers (a collision is not imminent, but a maneuver is necessary in order
to maintain “well clear”), the most relevant language is contained in 14 CFR § 91.181.
This section requires all aircraft under IFR to maintain their assigned course, but provides
an exception (“does not prohibit”) maneuvering the aircraft to pass “well clear” of other
aircraft. There are not similar provisions in ICAO or European regulations, so there is an
ongoing debate among the international community as to whether or not RWC maneuvers
require explicit approval from ATC.
As DAA systems become adopted and certified, clarification in these and potentially other
aviation regulations will be needed to ensure a clear understanding of the expectations and
procedures for compliance. Appendix A of RTCA DO-365 contains a flow diagram for this
interaction between pilots and ATC.
380
TABLE 16.3
Attributes of Selected Sensors
Sensor Modality
Source: Adapted from Lacher, Andrew, Maroney, David and Zeitlin, Andrew (The
MITRE Corporation). Unmanned Aircraft Collision Avoidance—Technology
Assessment and Evaluation Methods, 2007.
Note: Sensor(s) may be located on board the aircraft, or as part of an external system
(such as air traffic control radar).
potential LoWC or collision. However, just as the goal of DAA surveillance is not to replace
the human eye, the goal of an alerting and guidance algorithm is not to replace the human
brain. The system calculates the relative position and velocity, along with the uncertainties,
for the potential threat aircraft, and mathematically determines a maneuver or maneuver
space to resolve the conflict safely. This information may be provided to a human pilot as
guidance, executed automatically by the DAA system, or both.
Ensuring the safety and reliability of alerting and guidance algorithms requires exten-
sive testing with potentially millions of simulated encounter scenarios before they can be
recommended as safe for use. Avoidance algorithms should, whenever possible, recom-
mend a maneuver that is compliant with the appropriate aviation regulations regarding
course changes and aircraft right-of-way rules. According to existing regulations, when a
collision is considered imminent, a pilot may maneuver as necessary, including with the
assistance of onboard systems.
16.7.3 Displays
In general, DAA displays fall into three categories: informative, suggestive, or directive.
Informative displays (see Figure 16.3 for a notional example) are the simplest type of DAA
display. Informative displays provide current information to the pilot about the position
(horizontal and vertical) and velocity of surrounding air traffic. They do not provide infor-
mation about potential avoidance maneuvers. Informative displays are used to aid an “in-
the-loop” human pilot and are not considered sufficient for CA systems.
Suggestive displays provide the same position information as informative displays, but
also provide maneuver options or recommendations to assist the pilot in maintaining “well
clear” or avoiding a collision. Suggestive displays may use a variety of graphical decision
aids to assist with the pilot’s comprehension and decision-making processes. Examples
of decision aids include the depiction of “safe zones” or “keep away zones” for the UAS
to maintain an acceptable distance away from an intruder. A notional suggestive display
is shown in Figure 16.4, with the green-shaded regions showing an appropriate range of
horizontal maneuvers for the pilot to RWC from the depicted aircraft. Suggestive displays
are considered sufficient for an RWC function because the pilot can still consider other
objectives (e.g., minimize course deviation) to determine an appropriate RWC maneuver.
382
FIGURE 16.3
Typical TCAS display on flight deck of a modern aircraft (left) and Notional example of an informative display
for UAS (right).
FIGURE 16.4
Notional example of a suggestive display for UAS.
Directive displays provide clear and specific maneuver guidance to the pilot or UA con-
trol system. In the notional example in Figure 16.5, a specific horizontal flight path is
drawn on the display, with accompanying text instructions that indicate the recommended
maneuver(s) to the pilot (i.e., Turn Right). This display type requires the use of a tested
383
FIGURE 16.5
Notional example of a directive display for UAS.
and validated avoidance algorithm to calculate the optimal path for the UAS to maintain a
safe distance from other aircraft. Figure 16.6 shows a representative directive display of a
current example of UAS command and control software.
FIGURE 16.6
Representative Directive Display from UAS Flight Software. (From, Directive Display Concept with options for
MIDCAS [A. Lenz, “HMI Questions and Discussions.” p. 17, 2014].)
16.9 Conclusion
For decades, UASs have held the promise to improve, and in many cases save human lives
by providing air-based capability quickly and cheaply without putting an onboard pilot
at risk. But in order to fully realize this promise, a UAS must be able to operate safely and
seamlessly with other air traffic.
DAA technologies represent the next great leap forward for the integration of the UAS
into the global airspace system. The use of robust DAA systems enables operation of UASs
in virtually all classes of airspace with a comparable, or even enhanced, level of safety
when compared to many types of manned aircraft.
Defining the components of DAA has been proved to be the critical step in focusing the
research, development, and test activities that will lead to accepted standards for UAS
design, manufacture, and operation. The resulting new generations of UASs will continue
to realize the tremendous benefits of unmanned technology; and benefits that help ensure
a safer, more capable future for everyone.
Acknowledgments
The authors would like to thank:
385
Stephen George of the FAA’s UAS Integration Office. George created and led the FAA’s
UAS SAA Workshops, and without his leadership, a great deal of the current progress in
“detect and avoid” would not have been made.
Stephan Cook and Dallas Brooks, the authors of this chapter in the second edition, from
whom most of the material in the current Chapter came.
The participant organizations and individuals of the FAA UAS SAA Workshops from the
FAA, DoD, academia, Federally Funded Research & Development Centers, and industry.
The past and present members of the UAS SARP, originated under the DoD and now
cosponsored by the DoD, the FAA, NASA, and DHS.
Discussion Questions
16.1 What are the two functions of a DAA system?
16.2 How can these functions be decomposed into subfunctions?
16.3 What are the advantages and disadvantages of pilot-in-the-loop DAA systems?
16.4 What are the three components of the DAA system?
16.5 Why do DAA systems need a quantitative means to comply with “well clear?”
Note
1 Approved for Public Release; Distribution Unlimited. Case Number 15– 1403. The author’s
affiliation with The MITRE Corporation is provided for identification purposes only, and is not
intended to convey or imply MITRE’s concurrence with, or support for, the positions, opinions,
or viewpoints expressed by the author.
References
Annex 2 to the Convention on International Civil Aviation: Rules of the Air. International Civil
Aviation Organization, 10th Edition, July 2005 (Amendment 44: November 13, 2014), pp. 1–5.
DO-185A with Attachment A—Minimum Operational Performance Standards for Traffic Alert and
Collision Avoidance System II (TCAS II) Airborne Equipment. RTCA Special Committee 147,
December 1997.
Cook, S., Brooks, D., Cole, R., Hackenburg, D., and Raska, V. Defining well clear for unmanned
aircraft systems. Paper presented to the American Institute of Aeronautics and Astronautics,
November 14, 2014.
RTCA (Radio Technical Commission for Aeronautics) Document- 365, Minimum Operational
Performance Standards (MOPS) for Detect and Avoid (DAA) Systems
RTCA (Radio Technical Commission for Aeronautics) Document- 366, Minimum Operational
Performance Standards (MOPS) for Air-to-Air Radar for Traffic Surveillance
386
newgenprepdf
387
17
UAS in Public Safety
priorities, you make the rules, and you have the ultimate power to enforce them. That may
be the UAS policy picture in a theater of war, but when the same technology is brought
into spaces with a large, diverse set of users and other concerned parties, policy questions
become complex.
The earliest regulatory requirements for UAS came from the technical fact that most
UASs are remotely controlled via radio signals, and therefore subject to regulation by the
Federal Communications Commission (FCC). 47 CFR 97 § 215 sets the basic guidelines for
radio control signals for model aircraft.
More substantial efforts to absorb UAS into the existing regulatory scheme began with
the Federal Aviation Administration (FAA). FAA’s September 16, 2005 memorandum “AFS-
400 UAS POLICY 05-01” was the first agency-level effort to bring order to the growing
presence of UAS in the National Airspace System (NAS). The memorandum established
some early concepts and set the tone for further regulation. Importantly, the memorandum
defined all unmanned aircraft as “aircraft” within the meaning of 14 CFR 1.1, declared
UAS a matter of national security, and established some early airspace and aircraft safety
rules. It is important to point out that the memorandum is not a regulation. The memo-
randum was a form of internal guidance for FAA personnel for how to determine if an
unmanned aircraft operation could be allowed within the NAS.
A useful early review of the state of UAS policy at the national level can be found in
the FAA’s September 2009 report DOT/ FAA/ AR-09/
7 “Unmanned Aircraft System
Regulation Review.” In addition to summarizing the state of the UAS policy world at the
time, the report set out a number of issues for future UAS regulations to address. Among
the goals were defining whether there were categories of UAS that did not need regulation,
and defining a set of operational capabilities for UAS.
The FAA Modernization and Reform Act of 2012 set a timeline for the FAA to put in
place regulations for the commercial use of UAS. In the meantime, public safety agencies
sought to use drones under a set of exceptions to the existing aviation regulations. Those
regulations evolved over time to govern manned aviation in the skies above the United
States, but many rules were a poor fit for the disruptive concept of operations that came
with modern UAS.
In a scramble to accommodate the demand from users, both commercial and public,
the FAA issued Certificates of Waiver or Authorization (COAs), carving out custom sets
of exceptions, authorizing particular UAS operations on a case-by-case basis. The process
was cumbersome, slow, and not easily scalable to accommodate the demand. Initial COAs
were limited to public operators, although public operators could sponsor a commercial
operator for the purposes of a COA, allowing commercial operators to fulfill the public
needs that could not be met by most public agencies at the time.
The mandate from Congress to enact regulations for the commercial use of drones
resulted in the FAA ultimately codifying the rules for small (55 pounds or lighter) drones
in 14 CFR 107. The rule became effective in June 2016, and finally gave UAS users a clear
set of rules to work with. Part 107 was intended for commercial UAS operators, but many
public agency operators noticed that the rules also made their UAS efforts simpler. A public
agency did not have to create a UAS program from scratch anymore, provided that its
drone pilots complied with the set of rules in part 107. Over the few short years of its exist-
ence, part 107 has evolved to accommodate a growing set of missions, and adapting to
the needs of the public safety community. The FAA has sought to make it easier for civil
operators under part 107 to apply for, and obtain waivers of certain rules, including oper-
ating in controlled airspace, flying over people, and flying at night. These waivers enable
public safety drone pilots to accomplish many missions within the confines of part 107. The
389
FAA also established a process for public safety agencies to contact the Systems Operations
Support Center in emergency situations, allowing for expedited approval of otherwise
nonconforming flights.
COAs remain an important option for organizations whose missions do not fit well into
the part 107 scheme. Part 107 is flexible, but not a solution for every mission. One hard rule
that is not waivable under 14 CFR 107 is that it only applies to aircraft weighing 55 pounds
or less. As a practical matter, operations beyond line of sight of the remote pilot will also
typically require a COA –such operations may be possible under part 107, but technology
dictates that aircraft that can carry the required fuel or battery, as well as over-the-horizon
communications equipment to support beyond line-of-sight operations is more likely to be
over 55 pounds at takeoff. Moreover, while airspace waivers are available under part 107,
and obtaining them has become easier, operators who frequently perform missions in con-
trolled airspace can benefit from the COA process.
The FAA Extension Safety and Security Act of 2016 is notable for requiring the FAA to
develop standards for remote identification of drones. At the time this chapter was written,
the rulemaking process was underway, with the Notice of Proposed Rulemaking having
been published on December 31, 2019. The remote ID requirement for drones is seen by
many as the underlying framework to enable future concepts, including more effective
counter-UAS laws and regulations, UAS Traffic Management (UTM), and to improve the
capability of drones to operate more autonomously in increasingly complex airspace.
The Act also called on the Secretary of Transportation to enter into agreements with
the Secretaries of Interior and Agriculture to facilitate the use of drones in wildland fire-
fighting. Unfortunately, the principal firefighting agencies within those departments, the
Bureau of Land Management and the US Forest Service, have created increasingly high
barriers to their own use of drones—barriers the Secretary of Transportation and the FAA
are powerless to do anything about. In spite of clear congressional intent, the USDOI
and USDA have moved to require extensive (and mostly unavailable) training for UAS
operators who would fly under the agencies’ auspices. They have also prohibited the use
of drones manufactured in China, and even attempted to curtail others’ use of drones in
the airspace above the land managed by these agencies, in spite of a clear statutory delega-
tion of airspace management to the Department of Transportation.
In other provisions, the Act created a framework for requesting from the FAA a prohib-
ition on drone flights over certain sensitive facilities, mandated priority handling of COAs
when drones are needed for disaster response, and set up more ambitious goals, like the
continued study of a UTM system.
The FAA Reauthorization Act of 2018 required further studies, reports, and develop-
ment of regulations in the UAS realm. Of particular note is the requirement that the FAA
develops rules for the “carriage of property,” enabling commercial delivery of goods by
drone. An important caveat is that establishing drones that deliver cargo as “air carriers”
will entrench any regulations of such activity in the federal realm, limiting the states’
authority to affect any aspect of such deliveries, or enforce the federal regulations.
their operations, and if so, how to do it in a way that supports the agency’s mission most
effectively. UAS capabilities have evolved in important ways that make them an excellent
tool for many public safety missions. Lofting a camera over a tactical law enforcement
operation or a large structure fire, creating maps of a crime scene, monitoring crowd safety
at large public events, getting a look inside a vehicle with a gunman inside, delivering
communication or first aid supplies to a victim not otherwise reachable by authorities,
detecting and mapping a wildfire –these are just a few examples of what drones can do
for public safety practitioners. UASs often perform aviation missions that would be impos-
sible, impractical, unsafe, or too expensive to accomplish with manned aviation resources.
Yet, drones are not the answer to every public safety aviation need. Many missions remain
best served by manned aviation assets. UAS and manned aviation will coexist in the public
safety space, and will evolve together to accomplish more missions, with a better margin
of safety, at less cost to the public.
The public safety aviation community in the United States encompasses a large, diverse
set of aviation programs, each adapted to unique specialties, mission profiles, and agency
responsibilities. Until just a decade ago or so, public safety aviation meant manned avi-
ation, whether in the form of fixed-wing aircraft for firefighting, surveillance, critical
personnel transport, etc., or helicopters for firefighting, disaster contingencies, technical
rescue, law enforcement support, etc. The very high costs of manned aviation programs
meant that only larger and better funded agencies across the country could even consider
such programs.
UAS democratized public safety aviation. Drones are not yet capable of large-scale water
or retardant delivery on wildfires, or transporting personnel, but they can accomplish some
of the previous missions of manned aviation, and take on entirely new tasks. Whether a
law enforcement agency can afford a helicopter or not, the need for large area searches
will sometimes occur. No matter the method used, the search will cost money from public
coffers (and anyone who thinks that running a large search with hundreds of volunteers is
free or cheap should ask an accountant for a Sheriff’s Office).
An effective response to a hypothetical mission like the one described above requires
some careful deliberation. Everyone who sees a cost sheet for a helicopter understandably
assumes that it is a very expensive option. This is not necessarily the case –a $6,000 bill
for an hour of flight time and crew is very reasonable if accomplishing the same mission
from the ground would require paying 30 sheriff’s deputies at their $50 overtime rate for
five hours, and possibly short the next shift a few patrol deputies as the impact of such an
operation compounds.
Drones can address a part of the need for aviation. They can be an eye in the sky for
pennies to the manned aviation dollar. But current technology and regulations conspire
to make drones more suitable to low-altitude, short-duration missions for several reasons.
Among the reasons for the popularity of small, rotary-wing platforms, and the relative
paucity of larger, long-endurance fixed-wing platforms are the limits on small UAS (sUAS)
to weigh less than 55 pounds, prohibition on flights beyond sight of the operator, high level
of difficulty in safely integrating medium-and high-altitude UAS into the busy NAS, and
the relative ease of launching and recovering rotary-wing UAS compared to fixed-wing
UAS, especially in urban environments.
Early drone programs within civilian public safety agencies faced considerable skepti-
cism as military technology was adapted for public safety use. Many stories, some surely
apocryphal, but some certainly true, circulated about public fears about military Predator
drones being used for local law enforcement. Elevating law enforcement’s watchful eyes
391
above the level on which most of us conduct daily activities led to reasonable public con-
cern about privacy.
Those early worries about drones recognized that UASs were categorically different from
tools that came before. Law enforcement has used manned aviation for decades, and rea-
sonable policies and court rulings guided such uses. The low barriers to entry into the UAS
world meant that the concept was widely adopted, challenging the ability of regulations
and policies to keep up. Simple safety rules that prevented certain uses of manned avi-
ation did not apply to UAS. No court case existed to directly answer the questions posed
by UAS about how low and close to a residence a law enforcement UAS was allowed to
fly. Activities that required physical entry onto premises, and therefore triggered warrant
requirements, could now be accomplished without ever physically touching a suspect’s
property. A concept every law enforcement officer in the United States is familiar with is
that homes as well as the area immediately outside of the homes where their residents con-
duct activities of daily life (known in legal parlance as “curtilage”) get special protections
from government intrusions under the law. How far does the curtilage extend vertically?
Is it OK to have a drone persistently surveil an area the size of a small city, capturing not
only a suspect’s movements, but also those of thousands of others? Once the data exist,
even if only as evidence of a particular crime committed by a particular suspect, can it be
exploited to find evidence of other crimes? This is just a sampling of the questions that
have floated to the surface of the public safety UAS policy world.
Concerns about privacy, and whether drones are appropriate for a particular public
safety mission, have not gone away, and should not go away. The public may realize now
that when a local agency talks about buying drones, they do not mean armed military
drones. This does not mean that public concern has been addressed, but rather that we
need to be prepared to answer harder questions. Some of those questions may be the same
as in the past, but others may be heavily biased toward UAS. If the neighboring agency
can cut overtime expenses by equipping their crime scene investigators with UAS, cutting
on-scene time for fatal accidents by 80%, why is your agency not doing it? If a neighboring
state chose to deploy effective counter-UAS technology to respond to drone threats in real
time, why is your state completely reliant on federal resources, which may take days to
mobilize?
The idea that a public agency has the right to operate UAS does not flow from the FAA’s
power to enable such operations, but rather from a recognition that the FAA’s power is
limited, and flows mainly out of the power of Congress to regulate commerce. The FAA
has asserted broad authority to determine what activities in the airspace above the United
States constitute commerce, and what activities are properly “government operations” if
those operations occur in the air. That claim of authority is largely untested by litigation,
but it potentially encroaches on the police power of the states –their inherent authority to
regulate activity within their territory for the safety, health, and welfare of their citizens.
As UASs become increasingly important to local public safety authorities, the tension
between the FAA’s authority to regulate commercial traffic and the need for the states to
assert the needs of their public safety communities will increase. This tension will manifest
itself in the counter-UAS space more sharply than in UAS operations. This makes sense
if you consider it from the perspective of a local law enforcement agency. Navigating the
cumbersome federal regulations may be inconvenient when launching your UAS program,
but it is understandable, and even if your constituents see the program as necessary, they
will probably forgive the delay and cost necessary to conform to the rules. Countering
rogue UAS presents a different problem. When a genuine threat presents itself in the form
392
of a capable UAS operated by a malicious actor, the public may be less understanding of
federal guidelines and limits of local authority.
States have the inherent power to regulate for the health, welfare, and safety of their citi-
zens, and citizens rightly expect that states will do so. The legal term of art for this power is
“state police power.” States may find that the exercise of this power to protect their citizens
from, say, a rogue drone equipped with a flamethrower flying over a county fair, comes
into direct conflict with claims of federal authority to regulate radio emissions from all
sources in the United States, or claims that all aircraft in the air over the United States are
operating within the National Airspace System, and therefore, subject to exclusive federal
regulation and enforcement.
Consider one possible scenario for dynamically managing the need to keep the NAS
safe and efficient, while still allowing local authorities to do what is necessary to effect-
ively respond to local incidents. A local police officer responds to a call where he quickly
determines that using a UAS has the potential to save lives, maybe because it will afford
the responding officers a look inside a building where a hostage is being held. This
location has the misfortune of being located near an airport, with an interesting mix of
airspace classifications all around it. The officer has no worries –he knows that everyone
from state authorities to the federal government arranged for a simple process. He keys up
the microphone on his radio, and advises his dispatcher of the situation. Within moments,
dispatch has contacted the FAA and communicated the officer’s needs –airspace up to
100 feet above the location of the incident, horizontal radius of 1,000 feet from the center
of the roof of the building. FAA has the capability to instantly transmit the parameters
of this now-restricted airspace to all air traffic via equipment that interface with the navi-
gation equipment required on all aircraft. The location of the drone is securely transmitted
to other public safety aircraft that come into the airspace with the incident commander’s
permission. What technology, regulations, and interagency arrangements are necessary
to enable this kind of process? What regulatory culture is required to create this level of
cooperation between agencies with different perspectives, responsible to entirely different
governments?
to use them for flying machines –the batteries that could store enough energy and dis-
charge it at a fast enough rate were simply too big and heavy to fly on small rotary-wing
platforms. As batteries became smaller and more powerful, it is now not uncommon to
see small rotary-wing commercial drones that can fly for approximately 30 minutes on
a charge. The low SWAP of sophisticated components means that flight controls can be
effectively augmented through the use of inertial measurement units (IMUs), sophisticated
obstacle-avoidance systems that use both ultrasound and video to help reduce pilot work-
load. The same trends have allowed even very small drones to carry relatively high-quality
sensors, whether electro-optical, thermal, or otherwise, making them more useful to public
safety organizations.
What do all of these technological advancements mean for public safety? The implications
are broad. The cost of a manned aircraft of any kind is often an insurmountable bar for
public safety agencies, but the price of the aircraft is just a small fraction of the cost of
an aviation program. Flying a Blackhawk helicopter safely requires constant and expen-
sive training, maintenance, fuel, insurance, hangar space, and extra staff dedicated to the
task. The miniaturization of aviation also democratizes it. Sophisticated, but very small
and inexpensive components enable UAS flight to be augmented in ways that shorten
operator training time by orders of magnitude. The small size of most UAS reduces risks
associated with their use. Missions that would previously risk a pilot’s life and therefore
were not even considered in the past might now, in a worst-case scenario, result in the loss
of a $1,000 drone –a price many incident commanders are willing to bear for important
information.
Information from airborne platforms that is likely to alter the incident commander’s
decisions (called “decision-quality data”) can now be obtained by more agencies on more
incidents. The quality of documentation of complex incidents has been transformed.
A three-dimensional model of a large crime scene was, until recently, an exotic technology
reserved for juries in only the most complex trials and requiring tremendous resources.
Accident investigators are now starting to routinely gather evidence for accident recon-
struction from the air, and are able to present evidence to juries in ways that transform
their understanding of events. As an additional benefit of the technology, the investigators
can now spend less time exposed to the dangers of working near traffic, and can often open
roads more quickly after accidents.
Constantly improving software interfaces between small drones and existing public
safety tools have been transforming how those tools are used. Relatively inexpensive
systems can now be used to perform tasks that, until recently, were only possible with
very costly military systems. Small UAS can now ingest data from the terrain and update
existing Geospatial Information Systems (GIS) in near real time, as events are occurring.
The improvement in situational awareness and the potential to speed up and improve
decision-making by incident commanders are significant, and the barriers to putting
this kind of technology in the field with a broad cross-section of agencies are dropping
quickly. It is difficult to explain to those outside of the public safety realm just how
valuable it is to know how large a landslide is soon after arriving on the scene, or how
important it is to be able to update safe evacuations routes, based on real-time data,
when managing a quickly emerging wildfire. The frustration of not having access to this
kind of critical, life-saving information even once should be enough to convince anyone
of the potential value of airborne platforms that are cheap enough to buy, easy enough
to use, and powerful enough to provide decision-quality data to just about any incident
commander anywhere.
394
17.6 Conclusion
UAS Technology is advancing at an exponential rate, with laws and regulations trying
to keep up. The effects are felt in all walks of life and occupations. Public safety can and
should lean in to this reality and invest in the modernization of its forces and capabilities
to capitalize on a technology that can save lives and money. UASs are just one part of the
big picture of a new and modern police force and fire service. Strong, practical policy,
training, and public communication are imperative to successfully adopting UAS tech-
nology within an agency.
While UASs have come a long way since this technology was first deployed in public
safety more than a decade ago and there are still new and useful ways to be discovered,
it is clear that future public safety operations will be safer and more efficient because
of UAS.
395
Discussion Questions
1. One of the foundations of the current air traffic management system in the United
States is that all airspace above the United States that is “navigable” is regulated
and managed by the federal government. This facilitates commerce by creating
a uniform set of rules for all aviation above the United States. But the concept
of navigable airspace has evolved with the advent of UAS. Navigable airspace
now includes the airspace at your knee level in your own back yard, since aircraft
(UAS) can now safely travel, take off, and land there. In light of current capabilities
of UAS, would you draw the line between federal authority and the authority of
state, local, and tribal governments differently? How?
2. Assuming that the responsibility for the safety of the NAS remains in the hands
of the federal government, how would you propose resolving the current conflict
between strict limits on state, local, and tribal authority to address any threats
posed by rogue drones and the practical reality that the FAA has only a small
handful (fewer than 10 by last count) law enforcement officers, and is unable to
respond to threats posed by rogue drones in anything approaching real time?
3. While the benefits of an elevated view of a public safety event are obvious and
thus has driven adoption of UAS by public safety, what other applications could
be beneficial as the use of UAS matures? In what way do these new applications
change the incident and provide more information or improved mobility to UAS
users in public safety?
4. Positive perception of any new technology in public safety, both by the public
and the users, is critical to programmatic success. While opinions may differ, it
is imperative that factual information is exchanged from adopter to stakeholder.
In what ways can adopters of UAS in public safety succeed in this information
exchange?
396
397
18
Cybersecurity Counter Unmanned Aircraft
Systems (C-UAS) and Artificial Intelligence (AI)
Randall K. Nichols
18.0 Problem –The Risk of Terrorist Attack vs. U.S. Air Defense System. . . . . . . . . . . . . 398
18.0.1 Contributing Technologies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
18.0.2 Attack/Defense Scenarios. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
18.0.3 Chapter 18 Plan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
18.1 Description of the sUAS/UAS Landscape. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
18.1.1 Autonomy vs. Automation Levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
18.1.2 UAS Collaboration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
18.2 Establishment of a Risk Metric and Attack/Defense Scenarios . . . . . . . . . . . . . . . . . 402
18.2.1 Risk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
18.2.2 Attack/Defense (A/D) Scenario Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
18.3 Discussion of Conventional Vulnerabilities of Air Defense Systems
(ADS), Attacks by sUASs, and Countermeasures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
18.3.1 What Is the Counter-UAS Problem? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
18.3.2 Operational Protection from Hostile UAS Attacks –
A Helicopter View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
18.3.3 Countering UAS Air Threats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
18.3.4 Vulnerabilities Perspective. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
18.3.5 Conventional Vulnerabilities of Air Defense Systems (ADS),
Attacks by sUAS, and Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
18.3.6 Conventional Countermeasures against sUAS / UAS. . . . . . . . . . . . . . . . . . . 409
18.3.6.1 Active Measures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
18.3.6.2 Passive Measures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
18.3.7 Aggressor Counter-Countermeasures Specific to UAS
Deployment – SWARM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
18.4 UAS Sense and Avoid Systems (SAA). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
18.4.1 Airborne Sensing Systems (AS). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
18.4.2 Sensor Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
18.4.3 Autopilot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
18.4.4 SAA Services and Subfunctions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
18.5 SCADA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
18.5.1 “UAS Are Just Flying SCADA Machines!” (Nichols R.-0., 2016). . . . . . . . . . . 413
18.5.2 SCADA Cyber Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
18.5.3 SCADA Cyberattack Vectors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
397
newgenprepdf
398
18.0 Problem –The Risk of Terrorist Attack vs. U.S. Air Defense System
The risk of successful terrorist attacks on U.S. Air Defense Systems (ADS) by small
unmanned aircraft system (sUAS)/ UAS is growing because of increased commercial
capabilities and accessibility of advanced small drones. They are capable of carrying
sophisticated imaging equipment and significant and potentially lethal payloads; have the
ability to perform extensive Intelligence, Surveillance, and Reconnaissance (ISR) missions;
and are readily available to civilians. A significant threat to civilian and military UAS
operations and safety is posed by UAS controlled by hostile actors, including large poten-
tial threats to ADS from UAS SWARMS.
UAS are being designed with increasingly advanced artificial intelligence (AI) and auto-
mation capabilities that can be both beneficial and harmful. The increased automation and
AI capabilities can be used to complete dull, dangerous, and dirty (DDD) missions in all
weather conditions and are capable of longer flying times and endurance at more effective
altitudes. Unfortunately, when human decisions are taken out of the loop, software and
firmware code can be intercepted, replaced, reengineered, spoofed, exploited, destroyed,
and used against the originator. Iran accomplished this in 2011 (Jaffe & Erdbrink, 2011).
The number and type of possible cyber exploits against UAS key control systems
(payloads, navigation, rotors, and battery) represent a large, diverse, and lethal attack
vector set. However, the UAS designer and operator is not without an effective arsenal of
counter unmanned aircraft systems (C-UAS) measures. (Nichols R. R., 2020)
TABLE 18.1
Automation Levels
Automation
Level Name Characteristics Examples
Level 1 Slave Assist with piloting, react to disturbance, Drone Parrot, Quad Flyer
Remote Control Tethers (RC) GAUI
Level 2 Automated Maintains its flying orders and receives higher Chinese Dove, DJI Phantom
level orders and commands. series, Raven, Scan Eagle,
Levels 1 and 2 are commonplace in the Harpy
market. They require pilot intervention
and continuous communication link(s).
Reasonable prices <$1500 US, small size,
weight < 10 lbs.:
Level 3 Automated - Automated Navigation (preprogrammed flight Dragonfly, Microdrone
Navigation plan, based on GPS coordinates). Some with
GMBH, Fly-n-Sense,
Follow Me autopilot settings enable the sUAS Mikrokopter,
to automatically follow the operator. Micro- ASN-205, GJ-1, aka Wing
UAS premium cost < $20,000 US. Loong I. Fire Scout, WASP
III, Shadow, Heron,
Hermes, Barracuda
Level 4 Contextual Response from contextual data (w/o human Predator, Reaper, Avenger,
Response intervention) for Collision Avoidance (CA). Global Hawk, BZK-005,
CA3 They use active SAA and require a mission Mantis, Soaring Dragon,
plan. Costs and missions are classified. Sentinel
Level 5 Decision Full AI does not require human intervention. Levels 4 and 5 are confined
Maker Includes AI Decision-making with heavily to laboratories
networked computer support, has perceptive X47C series
sensors for space and time. Can complete Classified Cost and Missions
complex missions in unknown environments,
capable of intelligent adjustments including
mission rescheduling and key word-adaptive
control. Decision-Maker (expert system)
works from contextual data with coordination
and collaboration of signals [Think
“Terminator”]
Sources: R. K. Nichols, Drone Wars: Threats, Vulnerabilites and Hostile Use of UAS, 2017 and
Nichols, Mumm, Lonstein, Ryan, & and Carter, 2018.
the rest will continue their mission without abatement (Nichols, Mumm, Lonstein, Ryan,
& and Carter, 2018).
Three known CMs for an SWARM are:
1. Disrupt or change the Strategic Global View of SWARM (its only real vulnerability)
2. Force defender collaboration
3. Long-range acoustical weapons aimed at MEMS to disrupt SCADA and rotor
subsystems
Research on acoustic CMs indicates that they are successful against SWARMS, and have
the secondary advantage of being able to IFF using searchable sound frequency libraries
(Nichols R. K., et al., 2019, 2020). China appears to be the leader in innovative UAS SWARM
intelligence, through the efforts of the Chinese Electronics Technology Group Corporation
(CETC) (Kania, 2017).
402
TABLE 18.2
UAS Collaboration
Type Name Advantages Disadvantages Countermeasures
Source: R. K. Nichols, Drone Wars: Threats, Vulnerabilites and Hostile Use of UAS, 2017.
weapons. The risks and consequences of successful terrorist attacks against U.S. ADS, and
the sUAS/UAS segment in particular, are higher because of the current UAS-expanded
capabilities to perform ISR and to carry lethal payloads. An effective risk metric is needed
to evaluate the various A/D scenarios, and the principle processes required to express
risk results in terms of hostile activity and available CMs. Cyberattacks on the aviation
industry are not novel. They are substantial and pose a threat to aviation safety in the NAS
(INFOSECInstitute, 2014).
The RN equations can provide a wide variety of INFOSEC techniques when used to
evaluate the risks of information loss of confidentiality, integrity, and availability; the trad-
itional CIA approach to INFOSEC (R. K. Nichols J. Ryan, 2000)4.
The RN qualitative Risk equations are:
In these equations, Risk is the qualitative metric of information loss or potentially dan-
gerous consequences of a cyberattack. Threats are real, natural, accidental, intentional, mali-
cious, terrorist initiated, or negligent. Threats applied in the absence of appropriate CMs
will increase the likelihood of a successful cyberattack but can be mitigated or countered
based on the attack circumstances.
Vulnerabilities are weaknesses in the system that a threat may or may not exploit. Impact
is an after-the-fact accounting of the cyberattack. No matter what the magnitude, it is a con-
stant. Impact is essentially an accounting figure, generally in dollars, of the cost of the loss.
CMs are defensive strategies, programs, protocols, technologies, and physical or cyber
barriers put in place to reduce risk. CMs are a host of technologies that can be applied to
mitigate threats and reduce risk. Increased threats mean increased risk. Increased CMs
result in decreased risk. Conversely, decreased threats mean decreased risk and decreased
CMs mean increased risk. In practice, these equations require a qualitative legend to make
comparable cases (Nichols R. K., 2016).
The RN information risk evaluation equations fit into a larger scope of information
security subjects described in detail in Defending (R. K. Nichols and J. Ryan, 2000). They
cover the world of digital5 espionage, information warfare, and INFOSEC in organizations.
They use the practical CMs of cryptography; access control; digital signatures; certifica-
tion authorities; classification schema; identification; Permissions Management and Policy,
Authorization and Authentication (PMIAA); biometric CMs; virtual private networks;
on-and off-site backups; intrusion systems; firewalls; network-based tests and programs;
and enterprise continuity policies of protect, detect, and correct followed by regular and
random auditing and monitoring of information transactions. Additional items that may
be included in CMs are organizational structure, procedures, rules, legal, and physical
barriers.
Vulnerabilities are weaknesses in the computer system that may or may not be exploited
by a threat, just like tornadoes and hurricanes are natural forces that act upon land. They
do not occur because there is a weakness in the land or the people, but because of an
interaction of forces in the weather pattern. People have no effect on naturally occurring
threats.6 In contract law, they call this principle Force Majeure.7
Looking at the variables in Equation 18.1, it is noted that risk, threats, and CMs are
all variables that change and can be evaluated with respect to time. Vulnerabilities and
impact are constants that do not change. Vulnerabilities exist independent of the threats,
404
and threats do not necessarily exploit them. Impact is a change-in-cost evaluation. For
example, the impact of 9/11 before the planes hit was zero, but after they hit, the impact
was enormous and far-reaching. However, the cost in lives, dollars, materials, policy
changes, and pain is still just a number, so in terms of risk, it is a constant.
Equation 18.2 uses a little calculus to reach the conclusion that the derivatives with
respect to time of the constants (vulnerabilities and impacts) equals 0. This drops vulner-
abilities and impact out of the equation. Therefore, Qualitative Risk is a direct function of
threats and an indirect function of CMs applied.
There are some interesting relationships that become evident with the RN equations.
These are true whether you address them as qualitative (i.e., High, Medium, Low, or Low-
Medium, Medium-High) or quantitative (i.e., 20%, etc.). They may be expressed as Worst-
Case, Normal-Case, or Best-Case analysis.8
• Risk = ƒ(threats). Risk is a direct function of the application of a threat. The greater
the threat, the greater the risk; but it is never higher than 100% or lower than 0%. In
practice, the range is from 3–5% to 90%.
• Vulnerabilities may or may not be acted upon. In Information Security, some con-
siderations are operating systems, hardware, smart cards, network devices, and
software errors (intentional or just poor programming). There can still be risk, even
without vulnerability.
• Threat is really a vector space where the derivative or change with respect to some
variable (like time) determines the maximum (for the attackers) or minimum (for the
defenders). These two calculations work out nicely to the worst-case and best-case
scenarios in terms of risk assessment.9
• Risk = ƒ(1/Countermeasures); an inverse function. Risk increases with threats, and
decreases with the application of appropriate CMs, but not at the same pace, cost, or
level of application. Technology boosts can be nonlinear, or at different levels, or may
only affect part of the A/D vector space.
A superior model for evaluation of INFOSEC was developed by Parker in 1998 (Parker,
2002). The Parkerian Hexad is a set of six elements of information security proposed by
Donn B. Parker. The Parkerian Hexad adds three additional attributes (Possession or
Control, Authenticity, and Utility) to the three classic security attributes (Confidentiality,
Integrity, and Availability) of the CIA triad. These attributes of information cannot be
broken down into further constituents; they are nonoverlapping unique aspects. Any infor-
mation security breach can be described as affecting one or more of these fundamental
attributes of information.
1. Choice of a Risk Legend to compare results. Equation 18.2 is used to generate a simple
Legend of Risk, and values are assigned by team members based on their years
of combined experience in the field. Figure 18.1 shows a Delta team assessment of
risk probabilities for a hypothetical A/D terrorist scenario.
2. Evaluation of the initial risk before any action has been taken. This is the baseline or ini-
tial risk assessment (IRA).
3. Evaluation of the risk after the action has been taken.
4. Comparison of the amount of risk after the action is taken to the baseline risk value (IRA).
This will determine the Actionable Risk (NET Risk).
5. In the A/D scenarios, attacks INCREASE risk. Defense actions DECREASE risk. Both
are positive vectors achieved through a technical boost to the system. The NET
between them is a positive risk number or probability, generally in favor of the
attacker. Defenders can rarely stop risk but can mitigate it with appropriate CMs.
There is no such thing as negative risk: but there can be positive risk in a negative
vector direction.
6. Nothing is static. Attackers can lose part of their effectiveness (small risk value)
because of an unexpected reaction by the defense or vice versa. This reduces the
Case Net Risk. These adjustments may be negligible, but not always. However,
they rarely change the risk value more than 5% in any direction. They work in
a 75%/25% ratio, similar to when two players are both drawing to a flush at a
poker table. Both “made” the hand, but one holds the higher card. One-fourth
times is a rule of thumb for effectiveness of the threat reactors (either attacker or
defender).
7. The Case Net equates to the dollars necessary for the Defender to budget for mitigation of
a particular threat.
8. Technical boosts to either side generally change the level of risk on the legend in item 1 by
one, or rarely two levels.
9. Analysts look at the worst case (attacker boost), expected case (actual data), and best case
(defender boost). These define the parameters and threat vector space.
406
FIGURE 18.1
RN Equation RISK Legend –team defined.
10. In the RN approach, vulnerabilities and impact are constants. Using calculus, they drop
out as 0 at the best-case and worse-case extremes. What is left is the cool equation
18.3; Risk is ONLY a function of Threats and CMs.
11. There are two types of cases. The single vector case is like the example above of a
UAS with a payload that can harm a football crowd. A multivector example would
be an attack on the entire electrical power grid, with cascading effects in other
DHS sectors (IT, oil and gas, healthcare, etc.). When complex CIS and multivector
interactions are being investigated, risk must be evaluated as a partial component
where the sum of the components is not more than 100% risk. What is sought is
a view of cascading effects. As a matter of practice, normally only two of the CIS
groups are affected by an attack on one, with the primary attack having the larger
portion of risk apportioned to it.
the country defend against a growing UAS threat? This is known as the Counter-UAS
Problem. General James D. Mattis, SECDEF (U.S. Secretary of Defense) summed up the
Problem succinctly:
Unmanned Aircraft are being developed with more technological systems and cap-
abilities. They can duplicate some of the capabilities of manned aircraft for both sur-
veillance/reconnaissance and attack missions. They can be small enough and/or slow
enough to elude detection by standard early warning sensor systems and could pose a
formidable threat to friendly forces.
(Chairman, 2012)
18.3.2 Operational Protection from Hostile UAS Attacks –A Helicopter View
According to LCDR Boutros of the Navy War College, developing technologies do not
paint a pleasant picture of the Counter-UAS problem (Boutros, Operational Protection,
2015). UAS has seen a widespread proliferation among both state and nonstate actors.
This is cause for concern to U.S. Operational Commanders. (Boutros, 2015). General James
D. Mattis, SECDEF concluded:
The proliferation of low cost, tactical unmanned aerial systems demands we think
about this potential threat now … we must understand the threat these systems pre-
sent to our joint force and develop the tactics, techniques and procedures to counter
the problem.
(Chairman, 2012; Myer, 2013)
It can be argued from the quantity and diversity of production that China is the current
leader in this technology, and China is thoroughly exercising its UAS capabilities in the
Spratly Islands (Nichols, Mumm, Lonstein, Ryan, & and Carter, 2018). However, more than
90 countries and nonstate actors have UAS technology and many foster terrorism. “Most
of the UAS systems, except for China, Russia, USA, Turkey, Saudi Arabia, and Iran inven-
tories are low-technology, Intelligence, Surveillance, and Reconnaissance (ISR) platforms”
(Boutros, 2015). Experts believe that by 2025, China will produce over 50% of UAS systems
(Yan, 2017). Yan predicts that China’s commercial drone market will top $9B USD in 2020
(Yan, 2017). The market value will triple to 180 billion yuan by 2025, according to the
guidelines from the Chinese Ministry of Industry and Information Technology. This esti-
mate is much higher than a forecast by an iResearch report last year (iResearch, 2016),
which said that the overall market of UAVs, commonly known as drones, could reach 75
billion yuan by 2025 in China (Yan, 2017).
Iran has supplied long range, low technology Ababil UAS weapons systems to Syria
and Sudan, and to extremist groups such as Hezbollah, Hamas, and ISIS. Hezbollah’s
inventory is estimated at over 200 UAS, which concerns the Israeli military commanders
(Zwijnwenburg, 2014).
The DoD’s 2018 Joint Publication (JP) 3-01 “Countering Air and Missile Threats” identi-
fies friendly assets that an adversary may attack during a campaign using UAS. A theater
commander must plan for counter-UAS actions against air defense sites, logistics centers,
and national critical infrastructure (Boutros, 2015). “Due to their small size and unique
flying signatures, many UAS are difficult to detect, identify, track, and engage with current
joint air defense systemsADS. The increasing proliferation of global UAS has exposed a
critical vulnerability in the protection function of operational commanders, requiring joint
408
efforts to include intelligence, electronic warfare (EW), cyber warfare, (CW) and FIRES (the
use of weapons systems to create a specific lethal or non-lethal effect on a target)” (Boutros,
2015). But UASs are not invincible. Neutralizing threats or mitigating risk includes active
and passive defense methods with kinetic and nonkinetic FIRES11 (DoD, JP 3-0 Joint
Operations, 2018).
Later in this chapter, unique research into acoustic CMs with a dual purpose of defense
and IFF will be presented (Randall K. Nichols D., 2018).
Shorter range, tactical, small/micro UAS may not have the distance or payload cap-
acity of more advanced systems, but they can impact a campaign (or U.S. Homeland
Defense) in equally serious ways. Because of their size, their heat signatures are almost
nonexistent and easily evade detection. They offer more freedom of action. They can be
launched from within US air defense zones and fly to their targets in less time than it
takes for a coordinated response.
(Boutros, 2015)
(Nightmare alert: Imagine a SWARM of UAS carrying small potent binary bomb
payloads attacking a U.S. carrier at port less than 1 mile away from the UAS launch point.)
The enemy can effectively balance space, time, and force, and arguably frequency, too.
(Beaudoin, 2011). “Small UAS (sUAS) can perform short-range ISR, be outfitted with explo-
sive charges or chemical and biological agents for aerial dispersion, or simply fly over
troops or civilians to demoralize” (Boutros, 2015). Given the effectiveness of enemy use
of IEDs in Iraq and Afghanistan, a mobile, airborne version would take the problem to an
entirely new level! (Nichols R.-0., 2016).
1. Active Radar Surveillance –generate waves and use rebound echoes from the
UAS to locate and estimate distance, approach speed, size, penetration vector, and
short-term trajectory.
2. Passive Monitoring –cover the EM spectrum of visible, thermal infrared, and
radio waves on common communications channels.
When considering hostile UAS defense, planners need to consider several issues. The U.S.
ADS is optimized for missiles and aircraft deployed at high altitudes and speeds. ADS
data fusion (detection, identification, weapon lock-on, execute CMs) works better with
larger targets, not very small ones like UAS/sUAS. The U.S. ADS is effectively reactive for
longer ranges; close reactive engagements, such as sUAS /UAS, are suboptimal (Nichols
R. K., 2016).
There are clear vulnerabilities of the U.S. ADS to UAS:
• sUAS can be launched into action close to the target(s) less than 1 mile.
• sUAS exhibit a small radar signature so that the detection phase is hindered.
• Reactive action dictates a quick response near the target. This is not always
possible.
• sUAS/ UAS are designed for slow, low flight. Low flying sUAS avoid radar
identification.
• sUAS/UAS electric motors are both quiet and have limited thermal signature. This
makes for difficult noise detection, which is especially true if stealth technologies
have been employed (Nichols, Mumm, Lonstein, Ryan, & and Carter, 2018).
• sUAS /UAS operate in urban areas. The urban sphere presents additional problems
and potential collateral damage (Nichols R.-0., 2016).
• GTA efficiency against sUAS, reactive targets is reduced, and is even less efficient in
urban zones where civilians are at risk.
• Simultaneous attacks on multiple fronts (see Team or SWARM formats, Table 18.2)
make CMs very difficult to apply and defense measures are mitigated.
UAS CM research is improving. The goal is to increase the ability of Ground-to-Air
(GTA) to react and improve their capabilities to a defined saturation limit. Team for-
mation allows decoys and shields. SWARM formation is easier to detect; the arrival
of a cloud of robot drones is hard to mask, but tough to neutralize. Commercial
company Liteye has developed an Anti-UAV Defense System (AUDS) that is able
to detect, track, and disrupt sUAS operations using pulsed, brief focused broadcasts
of directional frequency jamming. Liteye has also developed a mobile version call
M-AUDS (Liteye, 2018). China has developed a “5-sec” laser weapon to shoot down
sUAS at low altitude (500 m) with a 10 KW high-energy laser beam. Its range is 1.2 mi
and handles sUAS at speeds up to 112 mph (Nichols R.-0., 2016).
measures and means that the ADS computer networks must process, detect, identify, and
target information (and make critical decisions) significantly faster and more effectively
than their enemies. Cost is an additional vulnerability factor. SWARMS can be assembled,
delivered, and targeted in a relatively inexpensive weapons package and can use local
counter jamming on target nets (Nichols R. K., 2016). Encouraging research suggests that
SWARM UAS is vulnerable to loud acoustic sound, near resonance frequency, directed
at its MEMS components, which disables the rotor systems and forces the UASs to crash
(Randall K. Nichols D., 2018) (Yunmonk Son, 2015).
18.4.3 Autopilot
Table 18.5 shows the common components found in UAS autopilots. These provide the
means for UAS to affect movement, control, communications, detection, emergency
operations, battery, waypoint delivery, and payloads. These are high-value cyber targets.
412
TABLE 18.3
Shows Typical Sensor Coordinate Systems. (Angelov, 2012)
Sensor Technology Coordinate System
TABLE 18.4
Standard Sensor Parameters (Angelov, 2012)
Sensor Function
Field of View Describes angular sector within sensor making measurements. Outside this
field of view, sensor is blind.
Range Distance measured by sensor, within which is some good probability of target
detection
Update Rate Interval at which sensor provides measurements
Accuracy Uncertainty of position measurement –usually a single dimension
Integrity Probability that measurement falls beyond some normal operation limit
Data Elements Cooperative sensors –specific data to enhance ISR platform, ex: trajectory, identity,
intent
TABLE 18.5
Common components found in UAS autopilots
• Main Program/Processor: processing sensor data and implementation of control of UAV
• Magnetometer: measuring direction
• GPS: determine global position
• Airspeed/Altimeter: measure air speed and altitude
• UAV Wireless Communication: communicating with ground station
• Power System: provides power to UAV
• Inertial Measurement Unit: measures movement of UAV
• Boot Loader Reset Switch loads programs into main program board
• Actuators: receives commands from main processing board and moves control surfaces
• Manual Flight Control: overrides autopilot and gives control of UAV control surfaces to ground station
(Boutros, 2015; Clothier, 2011)
To achieve these services, the following list of SAA design subfunctions is required:
• Detect –various hazards and objects such as other aircraft, weather, and terrain
• Track –detected motion of object, determination of position and trajectory
• Evaluate –tracked objects, against criteria that would need an SAA maneuver
• Prioritize –tracked objects based on evaluation and tests performed
• Declare –that paths of the object and its own aircraft reach a point of decision for
movement
• Determine –specific maneuver based on geometry of encounter
• Command –own aircraft to perform maneuver
• Execute –commanded maneuver (Angelov, 2012)
From a cyberattack standpoint, taking computer charge of any of these subfunctions and
reprogramming them for hostile purposes is desirable. This is true whether the reprogram-
ming is done on the hardware chips (or built in by manufacturer), or whether software
after a control signal is intercepted, spoofed, destroyed, or jammed. Think like the CIA-
availability is a key INFOSEC principal CM. Reprogramming a UAV to miss its waypoints
in an emergency or to corrupt its GPS navigation systems can be an effective cyberattack,
and it is not so difficult. Prof. Todd Humphries and his University of Texas student team
successfully spoofed the GPS systems on an $80MM Yacht, the “White Rose of Drachs” and
sent it off course (News, 2013). The year before, he hacked the GPS systems of a drone with
equipment costing less than $1000 (Goldman, 2012). Weaponizing a consumer drone is a
reality (Greenwood, 2016). Protecting against this possibility is behind the curve (Randall
K. Nichols J. J., 2018).
18.5 SCADA
SCADA stands for Supervisory Control and Data Acquisition. Globally, there are
hundreds of millions of SCADA systems used to control every practical machine imagin-
able. SCADA started in the 1940s to control manufacturing processes such as flow
rates, temperatures, valves, pressure, and density, and now manages processes of all
kinds: chemical, mechanical, electrical, optical, IoT,13 frequency, UAS SAA and payloads,
communications, battery, cars, trains, airplanes, and satellites. Everything! (Nichols R.,
Nov 28–30, 2006).
SCADA systems have improved significantly over the decades in all areas except one –
security. SCADA systems are a security sieve. Figures 18.2 and 18.3 show examples of
SCADA Architectures (Nichols R., Nov 28– 30, 2006). An interesting example is the
automated and computerized system in modern cars. Everything is controlled by
SCADA: tires, engine, seat belts, safety bags, oil pressure, even door locks. However,
cyber hackers can exploit SCADA to disable a car remotely, while the driver is still in it
(Greenburg, 2015).
18.5.1 “UAS Are Just Flying SCADA Machines!” (Nichols R.-0., 2016)
Table 18.6 shows the principal functions that apply to all SCADA systems, including
UAS.
414
TABLE 18.6
Principal SCADA Functions
Supervisory Control and Data Acquisition (SCADA) systems facilitate management with remote access to real-
time data:
• Channel to issue automated or operator-driven supervisory commands to remote station control devices
• A human–machine interface (HMI) is responsible for data presentation to the human operator
• A console that makes it possible to monitor and control processes,
• Remote Terminal Units (RTUs) are microprocessor-controlled electronic devices that interface sensors to
SCADA by transmitting telemetry data
SCADA systems for computerized real-time monitoring and control typically consist of:
• Master Control Unit (MCU)
• Remote Terminal Unit (s) (RTU)
• Communication Links
Enterprise Firewall
network
Application Internet/business partners
Workstations Printer server
Hub/switch
Outside world
(may include vendors, customer
and other business partners)
Control System
Human-machine
Engineering interface (HMI)
Supervisory workstation
control and Redundant
monitoring application
station servers
Modern Modern
Handheld device Handheld device
FIGURE 18.2
For corporate SCADA system.
18.5.4.1 Espionage
First, some elements must be defined. There is espionage by foreign hackers; the main
culprits are the Chinese, who encourage stealing state secrets and have been quite
successful (Brenner, 2011). Hackers have successfully attacked U.S. Transportation
Command (TRANSCOM) networks and have stolen designs for advanced U.S. weapons
systems (Sood A.K. & Enbody, 2014). Table 18.9 shows the effectiveness of espionage.
There are three vulnerability classes exploited in UAS cyberattacks: software-based,
insider threats, and hardware-based. Software and hardware vulnerabilities are the result
of poor coding practices and the developers’ lack of security knowledge. Hardcoded
passwords exist because programmers prefer an effortless method of recovery for purposes
such as debugging. “Vulnerabilities have drastic impact on the security of software” (Sood
A.K. & Enbody, 2014). “Developers or programmers with malicious intent may implant
416
SCADA Client
Graphics
Tren- Active X 3rd Party
Editor HMI Alarm Log
ding Controls Applic.
ASCII Display Display
File
Editor Active X Container
Library
Client / Server / Publish / Subscribe - TCP/IP
SCADA SCADA Server
Recipe
Developt.
ASCII DB RT and Event Manager
Environ
Files
Recipe Data Report
Export/ Managt Proces- Alarm Log Archive
Gener.
Import sing
Ref.
Alarm DB Log DB Archive DB
Commercial Ref. DB SQL
DB DB
Project ODBC
Editor
DDE
Data
Commercial R/W API/DLL
Developt. Driver
tools Toolkit Private
Driver OPC EXCEL
Application
FIGURE 18.3
UAS SCADA system internals.
TABLE 18.7
Examples of SCADA Design Vulnerabilities
• Ease of operation outweighs security
• Commonly set up on operating systems with known vulnerabilities
• Poor authentication systems in place
• Remote access allowed for maintenance and/or IT support
• Interconnectivity to vulnerable corporate networks
• Weak access control lists on firewalls
• Proper Network Access Control (NAC) is most crucial to prevent unauthorized connection within network
• First target of compromise for an attacker
• No use of standard IT defense software
• Wireless technology is common
• System connected to unsecured remote processors
• SCADA software not designed with robust security features
• Public information often available on specific systems
• Poor physical security on remote access points (Kilman, 2003)
417
TABLE 18.8
Common Attack Vectors against SCADA Systems
Common Vectors:
• Backdoors and holes in network perimeter
• Attacks on field devices through cyber means
• Database attacks
• Communications hijacking and man-in-the-middle attacks
• Cinderella attack on time provision and synchronization
• Vulnerabilities in common protocols
To a control engineer, the possible attacks can be grouped into the following categories:
• Bogus input data to controller introduced by compromised sensors and/or exploited network link between
controller and sensors
• Manipulated and misleading output data to actuators/reactors from controller due to tampered actors/
reactors or compromised network link between controller and actuators
• Controller historian –feed forward control
• Denial of Service –missing deadlines for needed task actions
Attacks on Software:
• No Privilege Separation in Embedded Operating System
• Buffer Overflow
• Structured Query Language Injection
Auxiliary tools:
• Password Theft
• Wireshark
• Man-In-the-Middle Attacks
• Trojan Horse Virus
• Distributed Denial of Service Attacks (R. K. Nichols, 2016)
computer hardware with code as part of a targeted attack. Insider threat vulnerabilities
are difficult to assess due to human element involved. Multi-layer defenses are required to
combat vulnerabilities in software/hardware world” (Sood A.K. & Enbody, 2014).
TABLE 18.9
Espionage Thefts in last 20 years
• F-35 Joint Strike Fighter
• F/A-18 Fighter Jet
• Patriot Missile System
• RQ-4 Global Hawk Drones
• P-8 Poseidon Reconnaissance Aircraft
• UH-60 Black Hawk Helicopter
• Littoral Combat Ship
• Army’s Terminal High Altitude Area Defense Missile Defense System
• Navy’s Aegis Ballistic Missile Defense Program
• Compromised White House computer systems for espionage against military offices; interoffice
communication was targeted
• Nuclear codes
• Took temporary control of National Oceanic and Atmospheric Administration’s (NOAA) weather satellites
• Civil Reserve Air Fleet systems by compromising defense contractor’s computers (Sood A.K. &
Enbody, 2014)
This security issue persists due to inability of systems to implement granular control
through proper authentication and authorization checks. File uploading attacks exploit
a system’s inability to determine the type of files being uploaded on server” (Sood
A.K. and Enbody, 2014).
• Password Theft
• Wireshark
• Man-In-the-Middle Attacks
• Trojan Horse Virus
• Gain Scheduling
• Fuzzing (Rouse, 2019)
• Digital Update Rate,
• Distributed Denial of Service,
• Buffer Overflow.” (Rani, 2016)
Password cracking or theft. “Even complex passwords can be cracked using software tools
such as dictionary attacks and brute force attacks.” Cracking programs are easy to obtain.
“Statistical methods such as Aircrack-ng”, which is a “Wired Equivalent Privacy and Wi-Fi
Protected Access Pre-Shared Key cracking program”, is freeware (Rani, 2016).
Wireshark. A robust tool to analyze and capture packets on wireless networks provides
the valuable and sensitive information in transmitted packets. Wireshark allows effortless
access to the client system and the ability to gain control over it through the display of a list
of available interfaces. A victim’s username and password can be obtained on a graphical
user interface (GUI).
Man-in-the-Middle (MIM) attack is another cyber- goodie. “Attacker gains control of
sensitive data by furtively modifying the communication link between two parties. End
users are usually unaware of manipulation performed by the attacker” (Rani, 2016). “The
attacker forms fake connections between the server and client.”
Forms of MIM attacks are:
• URL manipulation
• Rogue Domain Name Server
• Address Resolution Protocol poisoning
• Duplication of Media Access Control
• False Emails (Rani, 2016) (Randall K. Nichols and Lekkas, 2002)
Trojan Horse Virus. It is a malicious program with detrimental effects. It can monitor traffic
over a network, damage hard drives, leverage a security glitch, multiply and replicate like
a rabbit, and give the attacker access to a system remotely. “Trojan can continuously delete
files and ultimately demolish the Operating System and cannot be easily identified by anti-
virus programs” (Rani, 2016).
Gain Scheduling. A special form of cyberattack. There are four classes: fuzzing, digital
update rate, Distributed Denial of Service (DDoS), and buffer overflow. “Gain scheduling
is used to control non-linear UAS systems and hybrid UAS systems” (Rani, 2016). UAS
need different gains for control, depending on the state of the UAS: Mass, Altitude, Speed,
Flaps down. In a hybrid system, the system is assumed to have multiple modes of oper-
ation corresponding to takeoff, landing, and cruising.
421
UAS will have different gains for controlling the vehicle that are often precomputed and
trusted. Gain parameters are coded into onboard autopilots. Without strict monitoring of
the UAS software, an override of gains goes undetected. Changes to gains or gain sched-
uling logic can cause decreased performance in the autopilot or instability the in UAS
(Rani, 2016). The attacker can manually override the safety systems for an hour, shut down
the system, and take control. Not much is required; the IP address of SCADA Server, a path
to the server, and then a Trojan or back door can be installed (Nichols R.-0., 2016). Gain
scheduling attack methods vary depending on UAS SAA systems. There are generally five
methods of attacks:
Fuzzing. In an UAS autopilot system, random inputs with expected distributions are
not uncommon, and Gaussian noise inputs are routinely accounted for. However, unex-
pected, invalid, or completely random inputs can cause unknown behaviors. An attacker
can access any data flow between components and corrupt them with bogus values.
Attackers use malicious fuzzing to discover SAA vulnerabilities. Intentional white-box
and black-box fuzzing tests can determine the system robustness of Guidance, Navigation
and Control (GNC) algorithms. Avionic and UAS programmers develop GNC algorithms
for unmanned rotatory and fixed-wing aircraft that are key to counterterrorist activities
and targeting high-value targets (HVTs). “Consequences for a fuzzing attack: Aircraft
instability, Process lock-up and/or invalid outputs to next SAA/GNC process. Common
fuzzing attack methods include buffer overflow attacks, sending malicious packets with
invalid payload data to UAS, and adding malicious hardware between components”
(Kim, 2012).
Digital Update Rate. UAS autopilots are digital computers. Inputs and outputs to and
from the autopilot are discretized (Zaharia, 2012). “Any continuous inputs to autopilots
are converted to digital inputs through discrete sampling. If the autopilot was designed
with a continuous controller, it is also converted to a discretized form. For a discretized
system, as sample time increases, the system becomes unstable/uncontrollable. For data
collection, longer sampling periods will increase probability of data aliasing” (Kim, 2012).
Hackers, knowing the above, have created a few methods of cyberattacks; “changing sam-
pling time of analog-to-digital converters through buffer overflow, hardware manipulation
and Denial of Service (DOS) or Distributed [networked] Denial of Service (DDOS) attacks
that prevent the processor from running the controller or navigator at desired update rate”
(Kim, 2012).
Distributed Denial of Service (DDoS). “A large-scale intrusion method performed by a
host source which causes detrimental effects to legitimate users by withholding services.
This either causes the system to shut down completely or rapidly drains system resources,
such as computing power and bandwidth” (Rani, 2016). “Once the attacker gains access,
new tools can be installed to enable control of the host. Infected systems continue to look
for other vulnerable systems and attack them too. Distributed Denial of Service (DDoS)
attacks result in a master-slave process where the affected victim is controlled by the
attacker. The attacker comes into control of many systems.” Resources of the system are
422
TABLE 18.10
Steps in initiating a complex DDoS attack
Compilation of vulnerable agents
• Network first scanned for vulnerable agents and attacker compiles a list of agents to attack
• Possible to attack systems by setting up automated software to scan the network and take over vulnerable
agents
Defuse
• Flaws in security and agent vulnerability are misused by attacker
• Software codes are used to automatically attack and prevent the owner from controlling the system
• Actions are taken by the attacker to safeguard the code planted from being identified as Distributed Denial of
Service (DDoS)
Connection
• Protocols such as TCP or UDP are used to connect with numerous agents and plan attacks
• Attacks can be performed on either single or multiple agents
Intrusion
• Features of the victim, such as port numbers, are confirmed
• Attacker launches the attack and alters properties in favor of the attacker since alteration of packets would
lead to complications in the identification of the source of attack (Rani, 2015)
Distributed Denial of Service (DDoS) System Shutdown for at least five minutes:
• UAS operations can no longer monitor or control process conditions
• SCADA locks up, must be rebooted
• When comes back online, it locks up again
exhausted rapidly, and flooding of packets occurs on the victim’s end. The attacker then
removes all traces that could lead to locating the source of the attack by using a spoofed
Internet Protocol addresses. This prevents the victim from penetrating the source of the
illegal traffic targeted toward them (Rani, 2016). How is a DDoS attack initiated and how
is it related to UAS? Think about team or SWARM configuration controlled at a ground-
station network. See Table 18.10.
Buffer Overflow SCADA Attack. A buffer overflow vulnerability is exploited when some
control information is overwritten to modify the flow of control in a program, exploiting
and compromising control information to give control to the attacker’s code. It involves
overwriting the return address stored on the stack to transfer control to a code placed in the
buffer or past the end of the buffer. On hardware implementations, the stack grows down-
ward toward the lower memory addresses. When a function is called, the address of the
instruction following the function call is pushed onto the stack, so that the function knows
where to return control when it is finished. While the called function is being executed,
423
it allocates local variables on the stack, variables, and buffers at a lower memory address
than the return address. The process permits writes to the base address of buffer plus an
offset to the return address, and it overwrites the value of the return address.
In a buffer overflow SCADA attack, if the return address is overwritten with some arbi-
trary value, control will be transferred either to an invalid location in the memory or to a
location that does not contain valid executable code. This results in a segmentation fault.
If the overflow SCADA attack return address is overwritten in a clever manner, it can
transfer control to code inserted by the attacker in a buffer overflow. The attacker can place
executable code into the buffer, and then overwrite the return address with the address of
buffer. Control will then be transferred to the executable attack code contained in the buffer
(Nichols R.-0., 2016).
Control Acquisition Attack (CAA). The objective of attacker in a CAA is to assume direct
control of the unmanned vehicle. A proven example is to use GPS spoofing to shift the
flight path of the UAS to suit the purposes of attacker with limited control. If the attacker
can gain complete control of an unmanned vehicle, a man-in-the-middle attack is possible.
The attacker could send falsified data to the original controller to make it appear that the
vehicle is behaving normally, when, in fact, it is being controlled by attacker. CAA is an
undetectable attack that is especially dangerous (Nichols R.-0., 2016).
TABLE 18.11
Defensive Targeting Area Dimensions for a sUAS / UAS
Defensive Target Area Dimensions
apply to the air vehicle; the internal SAA systems that control and create noise, heat, and
EM emissions; and changes in surface reflection (Nichols R. K., et al., 2018). For U.S. ISR
platforms and missions, it is essential that their UAS systems be undetected during oper-
ation, especially since it is best to assume that the enemy is using counter-UAS operations
and weapons. From a personal privacy standpoint in civil airspace, it is desirable to have
the UAV stealth features turned off.
A good portion of UAS signatures are a function of the operating height of the vehicle,
bandwidth, and operating frequencies.
visual signatures. Most acoustic detection systems are limited in range due to environ-
mental variables; only 350–500 ft [Experimental/educational research] (Yunmonk Son,
2015). LRAD, Inc. has designed a Long-Range Acoustic Device (LRAD) –LRAD 450XL
whose published range is 5577 ft all directions (LRAD, 2019). An LRAD used as a sonic
weapon can be a cost-effective way to defend a small area, especially against SWARM
attacks (Nichols R. R., 2020).
FIGURE 18.4
MEMS gyroscope unit.
only to the resonant frequency, so that the application systems can cancel out the resonant
output from the main gyroscope.
competitive-driven hobbyist area of the economy (Zeitlin, 2012). They want to understand
how UAS are used by people with bad intentions, but it is very hard for the U.S. govern-
ment to keep pace with that much variation (Wyvern, 2018).
• U.S. forces are essentially “numb” to UAS presence. Recent combat experience in Iraq
and Afghanistan indicates that troops are highly accustomed to having friendly UAS
always available.
• Enemy UAS on the battlefield have been nonactors to this point but that may
change. U.S. forces lack UAS recognition training, making it difficult to observe the
characteristics of enemy UAS visually.
• All military leaders must take C-UAS into planning considerations
• Small, slow, and low profiles have proved to be significant challenges to traditional
air defenses.
• Reduction of dedicated SHORAD units creates potential gaps in air defense coverage
• The C-UAS problem is compounded by the ever-increasing proliferation of new UAS
designs and off-the-shelf systems sold to multiple countries
• U.S. military doctrine has not kept pace with the threat
• C-UAS training has not been a priority for most units
• Many military units have not updated plans to address the hazards UAS present
(Wyvern, 2018).
430
18.7 Conclusions
Unmanned Aircraft Systems represent some of the most advanced U.S. air assets. They are
critical to the USA ADS. However, because they were designed with open communications;
SCADA controls; Internet interactions for ground, air, sea, and satellite support; and use
COTS software/hardware, they are vulnerable to a host of cyberattacks. Based on the
sheer diversity and number of potential cyber weapons that can be used at every stage
of the UAS mission, and the significant growth of UAS for defense purposes, the risk of
their hostile use against U.S. ADS is steadily increasing. Couple this with a huge growth
and increased sophistication of the UAS commercial technologies, the threat of hostile use
cannot be minimized (R. K. Nichols et al., 2019, 2020).
Notes
1 Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelli-
gent machines that work and react like humans. Some of the activities computers with artificial
intelligence are designed for include:
Speech recognition, learning, planning, problem solving and decision- making.
Research associated with artificial intelligence is highly technical and specialized. The
core problems of artificial intelligence include programming computers for certain
traits such as: knowledge, reasoning, problem solving, perception, learning, planning
and ability to manipulate and move objects.
(Technopedia, 2019)
2 Dr. Julie J.C.H. Ryan is a superstar in the INFOSEC community. Her research is prolific. See:
www2.seas.gwu.edu/~jjchryan/research.html. So is Dr Dan J. Ryan. See: https://security.iri.isu.
edu/ViewPage.aspx?id=926and rebuild=true
432
3 Some Level 3 UASs have capabilities that fall into Level 4 category. Datasheets do not necessarily
follow neatly into the author’s taxonomy.
4 The author praises the Velez and Morana text (2015) for its excellent presentations on the subject
of threat modeling (Morana, 2015). However, the RN equation is improperly cited on page 62.
The RN equation was published in book form in 2000 as part of the RSA #1 book launch in
San Francisco at RSA 200 Cryptographer Convention. The reduced forms of the RN equation
and application to A/Ds for my students is the author’s work. The discussion of the economic
relevance and the impacts of the RN equation started on page 54 of (Randall K. Nichols J. R.,
2000) and was based on a paper by Dr. Dan J. Ryan published in 1993 in the Colloquy of Security
Affairs (Ryan D. J., May, 1993) 26 years earlier.
5 Computers are ubiquitous, and this is why cyber threats are so integrally related to ADS.
6 In the author’s opinion only, this is contrary to the side of the climate change debate that feels the
world will soon end because of people’s interactions on physical climate. For an alternate view,
consult Gregory Wrightstone’s FACTUAL book: Inconvenient Facts: The Science that Al Gore doesn’t
want you to know. See: www.inconvenientfacts.xyz (Wrightstone, 2017)
7 Force majeure –or vis major (Latin) –meaning “superior force”, also known as casus fortuitus
(Latin) “chance occurrence, unavoidable accident”,] is a common clause in contracts that essen-
tially frees both parties from liability or obligation when an extraordinary event or circumstance
beyond the control of the parties, such as a war, strike, riot, crime, or an event described by the
legal term act of God (hurricane, flood, earthquake, volcanic eruption, etc.), prevents one or both
parties from fulfilling their obligations under the contract. In practice, most force majeure clauses
do not excuse a party’s nonperformance entirely, but only suspend it for the duration of the force
majeure. (A/CN.4/315, 1977)
8 Any decision in life ultimately is a risk decision where we are interested in the worst and the best
actions or results that can happen as a change from the norm SQ. Decisions that appear to yield
less risk are usually chosen. [Extreme sports enthusiasts fail this commonly accepted criterion.]
In legal terms, this is called performing Due Diligence. The object is to reduce, prevent or mitigate
the risk of an event of action.
9 This is the nub of the Attack /Defense Scenario (A/D) analysis.
10 Semtex is a general-purpose plastic explosive containing RDX and PETN. It is used in com-
mercial blasting, demolition, and in certain military applications (Pike, 2017). It is the terrorist’s
favorite choice of explosive weapon.
11 FIRES definition (US DoD –JP 3-0) the use of weapon systems to create a specific lethal or
nonlethal effect on a target. (DoD, Dictionary of Military Terms, 2018)
12 Danger Close Definition www.benning.army.mil/infantry/magazine/issues/2013/May-June/
Myer.html Nov 14, 2013 -1) danger close is included in the “method-of-engagement” line of a
call-for-fire request to indicate that friendly forces are close to the target. ... Danger close is a term
that is exclusive from risk estimate distance (RED) although the RED for 0.1 percent PI is used
to define danger close for aircraft delivery. Pi = Probability of incapacitation. 2) Definition of
“danger close” (US DoD) In close air support, artillery, mortar, and naval gunfire support fires, it
is the term included in the method of engagement segment of a call for fire which indicates that
friendly forces are within close proximity of the target.
13 IoT –Internet of Things, the newest way to electronically connect everything imaginable.
Combined with Blockchain security, we see a technology revolution. (Author) “IoT is short for
Internet of Things. The Internet of Things refers to the ever-growing network of physical objects
that feature an IP address for Internet connectivity, and the communication that occurs between
these objects and other Internet-enabled devices and systems.” (Stroud, 2019)
14 Skyjack Drone© hack. Drone that flies around seeking wireless signal of any other drone in area.
Forcefully disconnects wireless connection of true owner of target drone. Authenticates with
target drone pretending to be its owner. Feeds commands to it and all other zombie drones.
SkyJack© primarily a Perl application that runs off a Linux. Detect drones by seeking out wireless
connections from MAC addresses. (Kamar, 2016)
433
15 Aircrack-ng© To put wireless device into monitor mode to find drones and drone owners.
Deauthenticate true owner of drone. Once deauthenticated, connect as drone waiting for owner
to reconnect (Aircrack-ng.org, 2016).
16 Snoopy© is a software that can hack into Wi-Fi and steal data attached to drones. Composed of
various existing technologies. Uses distributed tracking and profiling framework. Runs client-
side code on any device that has support for wireless monitor mode. Collects probe request and
uploads to a central server. Exploits handsets looking for wireless signal. Most leave their device
Wi-Fi setting on spoof network available to Wi-Fi searchers to use. Once connected to rogue net-
work, data are stolen. Differs from other rogue access points in the way data are routed. Traffic
is routed via an OpenVPN connection to a central server. Able to observe traffic from all drones
in field at one point. Traffic manipulation only done on server. Allows basic data exploration and
mapping (Glenn, 2012).
17 Many navigation systems rely heavily on GPS signals to determine their location in time and
space. By transmitting false GPS signals to these systems, it is possible to remotely take them
over. This has potential applications to the problem of rogue drones. The GPS is composed of a
network of satellites that continually broadcast timestamped messages describing their locations
in space. GPS receivers use these timestamped messages to determine how long it took for the
signals from each satellite to reach the receiver. Multiplying this time by the speed of light gives
the distance between the receiver and each satellite. These “pseudo ranges” may be combined to
solve for the receiver’s position and the time of day. The structure of the GPS signal is known to
the public and the frequencies that it uses are low enough to be generated with commercial-off-
the-shelf equipment.
This means that it would not be difficult (or expensive) for an adversary to build a
system that creates signals that would appear to a receiver to be from GPS satellites.
Transmitting these false GPS signals to receivers may cause them to lock onto the false
signals instead of the authentic satellite signals. This is called GPS spoofing (Bhatti,
2015) (Humphreys, 2009) (Chapman, 2019) (Kerns, 2014). Systems that rely heavily on
GPS to determine their location, such as ships at sea, are highly vulnerable to being
spoofed (Bhatti, Humphreys, 2015).
18 For those not familiar with this WWII horrific tactic: A Kamikaze was a member of a special corps
in the Japanese air force charged with the suicidal mission of crashing an aircraft laden with
explosives into an enemy target, especially a warship. sUAS/UAS can do the same thing but with
a larger number of deployed AC.
19 The author thinks that this is a waste of time. China currently outstrips UAS production by a large
factor. No way they decide to stop their growth in view of their stated military New Silk Road
Land and Sea strategy (Nichols R. K., et al., Counter Unmanned Aircraft Systems Technologies
and Operations, 2020) (Nichols R. K., 2019).
Bibliography
A/CN.4/315. (1977, June 27). “Force majeure” and “Fortuitous event” as circumstances precluding wrong-
fulness: Survey. Retrieved from International Law Commission: http://www.un.org/law/ilc/
index.htm
Adamy, D. (2015). EW 104 EW against a New Generation of Threats. Boston: Artech House.
Adamy, D. (2001). EW 101 A First Course in Electronic Warfare. Boston, MA: Artech House.
Adamy, D. (2009). EW 103 Tactical Battlefield Communications Electronic Warfare. Boston, MA:
Artech House.
Adamy, D. L. (2004). EW 102 A Second Course in Electronic Warfare. Boston: Artech House.
434
Adamy, D.-L. (1998). Lesson 4: the basic link for all EW functions. (electronic warfare) (EW Reference
& Source Guide). Journal of Electronic Defense, Jan 1998 Issue.
Administrator. (2019, May 17). Harmonic Frequencies. Retrieved from electronicshub.org: www.
electronicshub.org/harmonic-frequencies/
Aircrack-ng.org. (2016, March 12). Aircrack-ng Documentation. Retrieved from Aircrack-ng.: www.
aircrack-ng.org/
Alford, L. (2000). Cyber Warfare: Protecting Military Systems. Acquisition Review Quarterly.
Angelov, P. (2012). Sense and Avoid in UAS Research and Applications. Hoboken, NJ: John Wiley.
Army, U. (1992, November 23). US Army Field Manual FM 34- 40-
7. Communications Jamming
Handbook.
Austin, R. (2010). “Design for Stealth”, Unmanned Aircraft Systems: UAVS Design Development and
Deployment. New York: John Wiley.
Barker, W. (2003, August). SP 800–59 Guidelines for Identifying an Information System as a National
Security System. Retrieved from NIST: https://csrc.nist.gov/publications/detail/sp/800–59/
final
Beaudoin, L. e. (2011). Potential Threats of UAS Swarms and the Countermeasures Need. ECIW.
Bhatti, J. &. (2015). Hostile control of ships via false GPS signals. Navigation, p. in review.
Boutros, D. (2015, May 15). US Navy War College. Retrieved from Operational Protection from
Unmanned Aerial Systems: www.dtic.mil/dtic/tr/fulltext/u2/a621067.pdf
Brenner, J. (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and
Warfare. New York: Pilgrim Press.
Burch, D. (2015). RADAR for Mariners. New York: McGraw-Hill.
CDR Craig Baldwin, L. I. (2008). Catastrophe Preparation and Prevention. Boston, MA: McGraw Hill.
Chairman, U. (2012, March 23). Countering Air and Missile Threats, final coordination, JP 3-01. CJCS.
Chapman, A. (2019, May 31). GPS Spoofing. Retrieved from Tufts University -Tech Notes 2017: https://
sites.tufts.edu/eeseniordesignhandbook/files/2017/05/Red_Chapman.pdf
Clothier, R. R. (2011). The Smart Skies project. IEEE Aerospace and Electronic Systems Magazine.
CVE. (2019, May 27). Vulnerabilty Assceccments from cvedetails.com/top-50-products.php?year=2018,.
Retrieved from top-50-products.php?year=2018: www.cvedetails.com/top-50-products.php?
year=2018
Dictionary.com. (2019, May 31). Kamikazi Attack. Retrieved from Dictionary.com: www.dictionary.
com/browse/kamikaze
DoD. (2018). Dictionary of Military Terms. Retrieved from JCS.Mil: www.jcs.mil/doctrine/dod_
dictionary/
DoD. (2018). Joint Publication (JP) 3-01 Countering Air and Missle Threats. Washington, DC: DoD.
DoD. (2018). JP 3-0 Joint Operations. Washington, DC: DoD.
Drones, Q. S. (2017, July 11). quadcopters-have-hit-the-sound-barrier/. Retrieved from quadstardrones.
com: https://quadstardrones.com/2017/07/11/quadcopters-have-hit-the-sound-barrier/
Editor. (2012, April 22). RT Question More. Retrieved from Iran starts cloning of American spy
drone: www.rt.com/news/iran-spy-drone-copy-667/
FAA. (2009). FAA Risk Management Handbook. RiisskkMMaannaaggeemmeennttHHaannddbbooook
k((FFAAAA--HH--88008833--22))NNootteeAnerratasheetindicatingthecontentandgrammatica
lerrorsdiscowww.faa.gov/library/manuals/aviation/.
Gelfand, S. A. (2009). Essentials of Audiology, 3rd Edition. Stuttgart, DE: Thieme.
Gelfand, S. A. (2019, May 16). entokey.com/acoustics-and-sound-measurement/. Retrieved from entokey.
com/ a coustics- a nd- s ound- m easurement/ : https:// e ntokey.com/ a coustics- a nd-sound-
measurement/
Glenn. (2012). Glenn. (2012). SensePost | Snoopy: A distributed tracking and profiling framework.
Retrievedblog/2012/snoopy-a-distributed-tracking-and-profiling-framework/. Retrieved from Glenn.
(2012). SensePost | Snoopy: A distributed tracking and profiling framework. Retrieved
March 11, 2016, fromsensepost.com/blog: Glenn. (2012). SensePost | Snoopy: A distributed
tracking and profiling framework. Retrieved March 11, 2016, www.sensepost.com/blog/2012/
snoopy-a-distributed-tracking-and-profiling-framework/
435
Goldman, J. (2012, July 2). Threats. Retrieved from eSecurity Planet: www.esecurityplanet.com/
hackers/drone-aircraft-hacked.html
Greenburg, H. (2015). Hackers Remotely Kill a Jeep on the Highway—With Me in It. Retrieved from
Wired: www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
Greenwood, J. (2016, February 14). Greenwood, J. (Blog). Retrieved from The Phantom Menace –
Weaponizing a consumer drone: Greenwood, J. (2015). The Phantom Menace –Weapon
www.4armed.com/blog/phantom-menace-weaponising-drones
Hartman, K. a. (2013). The Vulnerability of UAVs to Cyber Attacks -An Approach to the Risk
Assessment. 2013 5th International Conference on Cyber Conflict. Tallin: NATO CCD COE
Publications.
Heinman, C. (2019). Hearing Loss Tests Patrient D v-105. Carlisle, PA: Brown Optical Hearing Aid
Service.
Horowitz, M. C. (2014). Droning On: Explaining the Proliferation of Unmanned Aerial Vehicles. University
of Pennsylvania and Texas A&M Universities.
Huang, E. (2017, Feb 13). Watch a record-setting 1,000 drones take to the sky in China to celebrate the
lantern festival. Retrieved from Quartz: https://qz.com/908927/watch-a-guinness-record-
setting- 1 000- d rone- s how- i n- g uangzhou- c hina- c elebrating- l antern- f estival- a nd- e nd- o f-
chinese-new-year/
Hubbard, R. K. (1998). Boater’s Bowditch. Camden, MA: International Marine.
Humphreys, T. e. (2009, January 1). Assessing the Spoofing Threat: Development of a Portable Civilian
GPS Spoofer. Retrieved from Cornell University: https://gps.mae.cornell.edu/humphreys_
etal_iongnss2008.pdf, Cornell University
INFOSECInstitute. (2014, April 8). Cyber Threats against the Aviation Industry. Retrieved from Resources
infosec Institute: http://resources.infosecinstitute.com/cyberthreatsaviationindustry/
iResearch. (2016, June 21). iResearch Forecasts China’s Civilian Small Drone Trend. Retrieved from
iResearch: www.iresearchchina.com/content/details7_23815.html
Jaffe, G., & Erdbrink, T. (2011, December 5). Iran says it downed U.S. stealth drone; Pentagon acknow-
ledges aircraft downing. The Washington Post.
Julie J. C. H. Ryan, D. J. (2006). Computers & Security. Retrieved from Expected Benefits of Information
Security: www.semanticscholar.org/paper/Expected-benefits-of-information-security-Ryan-
Ryan/de8d637d1be35617e82e3af6b92eca8f10093832
Kamar, S. (2016, February 24). SkyJack. Retrieved from SkyJack: http://samy.pl/skyjack/
Kania, E. (2017) China’s Artificial Intelligence Revolution: A new AI development plan calls for China to
become the world leader in the field by 2030. Retrieved from The Diplomat: https://thediplomat.
com/2017/07/chinas-artificial-intelligence-revolution/
Kerns, A. J. (2014). Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics,
31(4), 617–636.
Kilman, D. &. (2003). Framework for SCADA Security Policy. Albuquerque, NM: Sandia National
Laboratories. Retrieved from Energy.gov: https://www.energy.gov/sites/prod/files/
Framework%20for%20SCADA%20Security%20Policy.pdf
Kim, A. G. (2012, June). Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles. Retrieved
from Infotech@Aerospace.com: https://www.researchgate.net/publication/268571174_
Cyber_Attack_Vulnerabilities_Analysis_for_Unmanned_Aerial_Vehicles
Kirk, J. (2015, August 5). sounds-can-knock-drones-sky. Retrieved from www.computerworld.com.
au/article/581231: https://www.computerworld.com.au/article/581231/sounds-can-knock-
drones-sky/
Lagrone, S. (2017, August 21). Chain of Incidents Involving U.S. Navy Warships in the Western Pacific
Raise Readiness, Training Questions. Retrieved from news.usni.org/ 2017: https://news.
usni.org/2017/08/21/chain-incidents-involving-u-s-navy-warships-western-pacific-raise-
readinesstraining-questions
Lagrone, S. (2017, September 14). Cyber Probes to be Part of All Future Navy Mishap Investigations After USS
John S. McCain Collision. Retrieved from https://news.usni.org: https://news.usni.org/2017/
09/14/cyber-probes-part-future-navy-mishap-investigations-uss-john-s-mccain-collision
436
Liteye. (2018, August 25). AUDS. Retrieved from Liteye Corporation: http://liteye.com/products/
counter-uas/auds/
LRAD. (2019, May 189). LRAD 450XL Datasheet. Retrieved from LRADX: http://www.lradx.com/
wp-context/uploads/2015/05/LRAD_datasheet_450XL.pdf
Merriam-Webster. (2019, May 17). Merriam-Webster Online Dictionary.
Monahan, K. (2004). The Radar Book: Effective Navigation and Collision Avoidance. Anacortes,
WA: Fineedge Publications.
Morana, T. U. (2015). Risk Centric Threat Modeling. Hoboken, NJ: John Wiley.
Myer, G. (2013, May–June). Danger Close Definition. Retrieved from US Army Magazine: www.
benning.army.mil/infantry/magazine/issues/2013/May-June/Myer.html
News, U. (2013, July 29). Science and Technology. Retrieved from UT News at Austin: https://news.
utexas.edu/2013/07/29/ut-austin-researchers-successfully-spoof-an-80-million-yacht-at-sea/
Nichols, R. K. (1996). Classical Cryptography Course, Volume I. Laguna Hills, CA: Aegean Park Press.
Nichols, R. K. (2008, September 05). Counterintelligence & Sensitive Compartmented Information
Facility. (SCIF) Needs –Talking Points.
Nichols, R. K. (2017, October 4). Drone Wars: Threats, Vulnerabilites and Hostile Use of UAS. 2nd
Annual Cyber Forum Event. Wichita, KS: Wichita State University.
Nichols, R. K. (2019, March 14). Hardening US Unmanned Systems Against Enemy Counter
Measures. Invited Speaker /Panelist (13–14 March 2019) 7th Annual DoD UAV Countermeasures
Summit (p. Hardening USA Unmanned Systems Against Enemy Countermeasures). Alaxandria,
VA: Proceedings of 7th Annual UAV Countermeasures DoD Summit.
Nichols, R. K., Mumm, H. C., Lonstein, W. D., Ryan, J. J., & and Carter, C. (2018). Unmanned Aircraft
Systems (UAS) in the Cyber Domain: Protecting USA’s Advanced Air Assets. Manhattan, KS: New
Prairie Press (NPP) eBooks. 21.
Nichols, R. K., Ryan, J. J., Mumm, H., Lonstein, W., Carter, C., & Hood, J. P. (2019). Unmanned Aircraft
Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd ed. Manhattan, KS: New
Prarie Press. https://www.newprairiepress.org/ebooks/27.
Nichols, R. K., Ryan, J., Mumm, H., Lonstein, W., Carter, C., & Hood, J. (2020). Counter Unmanned
Aircraft Systems Technologies and Operations. Manhattan, KS: Pressbooks: https://kstatelibraries.
pressbooks.pub/counterunmannedaircraft/.
Nichols, R. K., Ryan, J., Mumm, H., Lonstein, W., Carter, C., & Hood, J. P. (2018). Unmanned Aircraft
Systems (UAS) in Cyber Domain: Protecting USA’s Advanced Aircraft Assets. Manhattan, KS: New
Prairie Press (NPP) Ebooks. Retrieved from https://newprairiepress.org/ebooks/21
Nichols, R. (Nov 28–30, 2006). Cyber Terrorism, Critical Infrastructure, & SCADA Presentation. In
R. Nichols (Ed.), Defense Threat Reduction Agency Conference. Shirlington VA: Utica College,
Utica NY.
Nichols, R. R. (2020). Counter Unmanned Aircraft Systems Technologies and Operations. Manhattan: New
Prairie Press #31.
Nichols, R. (2016, March 29). NCIE UAS SAA Final Rev 4. 2016 INFOWARCON conference presen-
tation April 4–7, Nichols, R.K. et. al. (3-29-2016) Presentation to INFOWARCON April 4–7
on NCIE UAS SAA Final Rev 4, presented to 2016 INFOWARCON Conference, Memphis
TN. Available as PPTx presentation download from author or in CANVAS. Memphis, TN,
USA: INFOWARCON16.
NIST. (September 2012). Guide for Conducting. Washington, DC: GPO.
NTSB. (2009, September 16). National SCADA testbed Documents and Media. Retrieved from
National SCADA Testbed Fact Sheet: https://www.energy.gov/sites/prod/files/oeprod/
DocumentsandMedia/NSTB_Fact_Sheet_FINAL_09-16-09.pdf
Office of CNO, U. N. (2020, May 14). Collision Reports for USS Fitzgerald and USS John S McCain
2017 Incidents in Pacific. Retrieved from https://s3.amazonaws.com/CHINFO: https://
s3.amazonaws.com/CHINFO/USS+Fitzgerald+and+USS+John+S+McCain+Collision+Repo
rts.pdf
Parker, D. B. (2002). Toward a New Framework for Information Security. In Seymour & M. E.
Kabay (Eds.), The Computer Security Handbook, 4th ed.) Parker, Donn B. (2002). “Toward a New
437
Framework for Information Security.” In S. Bosworth & M. E. Kabay (Eds.). New York, NY: John
Wiley. ISBN 0-471-41258-9.
Pettit, R. (1982). ECM and ECCM Techniques for Digital Communication Systems. Belmont, CA: Lifetime
Learning Publications.
Pierson. (2019, May 16). tuning-fork-waves-sound. Retrieved from airfreshener.club -Pierson
Education: https://airfreshener.club/quotes/tuning-fork-waves-sound.html
Pike, J. (2017, December 7). Explosives -Compounds. Retrieved from globalsecurity.org: www.
globalsecurity.org
Randall K. Nichols, & Lekkas, P. C. (2002). Wireless Security: Threats, Models, Solutions. New York City,
NY: McGraw Hill.
Randall K. Nichols, D. (2018). Chapter 20 Acoustic CM & IFF Libraries V SWARMS Rev 1 05142019. In
R. K. Nichols, H. C. Mumm, W. D. Lonstein, & J. S. Hood (Eds.), Unmanned Aircraft Systems (UAS)
in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd ed. Manhatten, KS: NPP Press.
Randall K. Nichols, J. J. (2018). Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA’s
Advanced Air Assets. Manhattan, KS: New Prairie Press.
Randall K. Nichols, J. R. (2000). Defending Your Digital Assets against Hackers, Crackers, Spies and
Thieves. New York City, NY: McGraw Hill.
Rani, C. M. (2016). Security of unmanned aerial vehicle systems against cyber-physical attacks. The
Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 13, 331--342.
Richard K. Barnhart, S. B. (2012). Introduction to Unmanned Aircraft Systems. Boca Raton, FL: CRC Press.
Rouse, M. (2019, June 2). Fuzzing. Retrieved from TechTarget Network: https://searchsecurity.
techtarget.com/definition/fuzz-testing
Ryan, D. J. (May, 1993). Economic Implications of Information Security Failures. Colloquy, 14, 14 ff.
Ryan, J. J. (2005, March 18). Wiley Online Library. Retrieved from Proportional Hazards in Information
Security: https://doi.org/10.1111/j.0272-4332.2005.00573.x
Ryan, J. J. (September/ October 2008). Performance Metrics for Information Security Risk
Management. IEEE: Security & Privacy, 38–44, Vol 6. doi:10.1109/MSP.2008.125
Sahel Elite. (2017, November 16). Retrieved July 2018, from Sahel Elite Mali: https://httpsahel-
elite.com/2017/11/16/mali-understanding-the-g5-sahel-joint-force-fighting-terror-building-
regional-security/
Said Emre Alper, Y. T. (December 2008). A compact angular rate sensor system using a fully
decoupled silicon-on-glass MEMS gyroscope. Journal of Microelectromechanical Systems, 17(6),
1418--1429.
Signia. (2019, May 16). Signia Hearing Aids. Retrieved from Signia Hearing Aids -Hear across
America: www.signiausa.com
slideshare.net. (2019, May 16). ProudParas/sound-waves-loudness-and-intensity, slide 12. Retrieved from
slideshare.net: www.slideshare.net/ProudParas/sound-waves-loudness-and-intensity
Sood A.K. & Enbody, R. (2014, December 19). www.georgetownjournalofinternau-s-military-
defense-systems-the-anatomy-of-cyber-espionage-by-chinese-hackers. Retrieved from geo
rgetownjournalofinternationalaffairs.org/ o nline- e dition:https:// w ww.georgetownjour
nalofinternationalaffairs.org/online-edition/u-s-military-defense-systems-the-anatomy-
of-cyber-espionage-by-chinese-hackers
Staff. (2016, April 17). Equal Loudness Contours. Retrieved from Gutenberg Organization: http://cen-
tral.gutenberg.org/article/WHEBN0001046687/Equal-loudness%20contour
Stroud, F. (2019, June 2). Define IoT. Retrieved from Webopedia: https://www.webopedia.com/
TERM/I/internet_of_things.html
Studios, D. D. (2017). Boaters Ref. USA.
Technopedia. (2019, May 28). Technopedia. Retrieved from Artificial Intelligence: https://www.
techopedia.com/definition/190/artificial-intelligence-ai
The Shepard News Team. (2018, September 12). Liteye Receives Follow-on Contract for C-AUDS -DB -
Digital Battlespace. Retrieved from Aerospace, Defense and Security News and Analysis -
Shephard Media, The Shepard Press, Ltd: www.shephardmedia.com/news/digidigital-
battlespace/liteye-receives-follow-contract-c-auds
438
Toomay, J. (1982). RADAR for the Non –Specialist. London; Lifetime Learning Publications. London: Lifetime
Learning Publications.
TRS, S. (2018, July 10). Tontechnic-Rechner-Sengpielaudio. Retrieved from Tontechnic- Rechner-
Sengpielaudio Calculator: www.sengspielaudio.com/calculator-wavelength.htm
Uni-wuppertal. (2019, May 15). Inverse Square Law, General. Retrieved from hydrogen.physik.uni-
wuppertal.de/hyperphysics/: http://hydrogen.physik.uni-wuppertal.de/hyperphysics/
hyperphysics/hbase/forces/isq.html
Vergun, D. (2018, August 23). Proliferation_of_drones_posing_risk_for_us_military_army_expert_says.
Retrieved from Army News Service: https://www.army.mil/article/210257/proliferation_of_
drones_posing_risk_for_us_military_army_expert_says
Warner, J. &. (2013). A Simple Demonstration That the Global Positioning System (GPS) is Vulnerable
to Spoofing. Retrieved from Journal of Security Administration: https://pdfs.semanticscholar.
org/8ddb/89f56dd3e2ae265047822bc47cfb06815d9a.pdf, LAUR-03-6163
Weise, E. (2017, August 23). could-hackers-behind-u-s-navy-collisions. Retrieved from USATODAY:
https://www.ruidosonews.com/story/tech/news/2017/08/23/could-hackers-behind-u-s-
navy-collisions/594107001/
Wiki-E. (2018, August 26). Equal Loudness Contours. Retrieved from Wikipedia: https://en.wikipedia.
org/wiki/Equal-loudness_contour
Wiki-G. (2018, August 26). Geo-Fencing. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/
Geo-fence
Wikipedia. (2018, August 26). Human Hearing Range. Retrieved from Wikipedia: https://en.wikipedia.
org/wiki/Hearing_range
Wiley, R. G. (1993). Electronic Intelligence: The Analysis of Radar Signals, 2nd ed. Norwood, MA:
Artech House.
Wilson, J. R. (2018, November 1). The-new-world-of-counterdrone-technology. Retrieved from Military
Areospace Electronics: https://www.militaryaerospace.com/unmanned/article/16707131/
the-new-world-of-counterdrone-technology
Wilson, M. (2012). The Use of Low-Cost Mobile Radar Systems for Small UAS Sense and Avoid. Sense
and Avoid in UAS Research and Applications.
Wrightstone, G. (2017). Inconvenient Facts: The Science That Al Gore Doesn’t Want You to Know. Allison
Park, PA: Silver Crown Productions.
Wyvern, T. (2018). National Critical Intelligence Estimate: Counter Unmanned Aircraft Systems (C-UAS)
in the US. Salina, KS: KSUP.
Yan. (2017, December 23). China’s commercial drone market to top 9 bln USD by 2020. Retrieved from
Xinhuanet: http://www.xinhuanet.com/english/2017-12/23/c_136847826.htm
Yu, X. &. (2015). Sense and avoid technologies with applications to unmanned aircraft systems: Review
and prospects. Progress in Aerospace Sciences, 74, 152–166.
Yunmonk Son, H. S. (2015, August 12– 14). Rocking Drones with Intentional Sound Noise on
Gyroscopic Sensors. Proceedings of 24th Usenix Security Symposium. Washington, DC: USENIX.
Retrieved from https://www.usenix.org/conference/usenixsecurity15/technical-sessions/
presentation/son
Zaharia, M. D. (2012). Discretized Streams: An Efficient and Fault-Tolerant Model for. Retrieved from
UNIX Org: https://www.usenix.org/system/files/conference/hotcloud12/hotcloud12-
final28.pdf
Zeitlin, A. (2012, April 11). Performance Tradeoffs and the Development of Standards. Retrieved from
Wiley Online Library: https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119964049.ch2
Zwijnwenburg, W. (2014, October 8). ZwijnwenbDrone-tocracy? Mapping the Proliferation of Unmanned
Systems. Retrieved from Sustainable Security.org.
439
19
Unmanned Traffic Management (“UTM”)
Michael S. Baum
Unmanned Traffic Management by Michael Baum (CRC Press, 2020) introduces unmanned
traffic management (UTM) and how it integrates unmanned aircraft operations into
national airspace systems to forge an aviation future that is agile and resilient, with
innovative and viable new services. This introductory, extensively annotated book begins
with a history of UTM and explains how the UTM concept has progressed through exten-
sive collaborative research and testing with private and public entities such as NASA’s
UAS Traffic Management Project, the UTM Pilot Program (UPP), the UAS Test Site
Program, and private sector applications, including initial UAS package delivery services,
enterprise fleet services, and data services necessary to implement UTM. Other national
governments making significant contributions to UTM research and development are
also discussed.
Chapter 2, UTM Concept of Operations (ConOps) outlines UTM Concept of Operations and
identifies global variations of a notional architecture of UTM-based operations and how
they may eventually enhance or merge with legacy air traffic management systems. This
chapter identifies and describes many UTM participants, including UAS operators, UAS
Service Suppliers (USS), Supplemental Data Service Providers (SDSPs), Air Navigation
Service Providers (ANSPs), Civil Aviation Authorities (CAAs), and other participants and
stakeholders; it also describes data and data exchanges necessary for safe and secure UAS
operations. The scope and characterization of possible UTM services are described, to
include, in part, registration, discovery, strategic coordination, conformance monitoring,
constraint management, UAS remote identification, and associated security services.
Because UTM harbors a heightened attack surface from its developing federated infra-
structure (analogous to those of Internet and cloud services), due attention is given to
cybersecurity standards development, secure operations, and awareness. The chapter
also presents centralized versus federated architectural considerations. It gives focus to
Flight Information Management Systems (FIMS), and mentions System-Wide Information
Management Systems (SWIM) and other supporting elements of notional UTM architec-
ture. Discovery (the essential process by which a USS finds relevant peer USS to help UAS
avoid one another in the same airspace) is described and various approaches to implemen-
tation are explained. The chapter introduces discovery methods and lexicon, the discovery
and synchronization service (DSS), data rights and privacy management, and detect and
avoid (DAA) technology.
Since UTM is infeasible without standards, Chapter 3, Standards-Making for UTM, surveys
leading and relevant standards development organizations (SDOs) and their work product.
There are a growing number of SDOs contributing to UTM development, with particular
leadership by ASTM International, and certain regional and domain-specific SDOs.
439
440
into, if not permeated a broad swath of aviation’s fabric. It is synthesizing new capabilities
from disparate disciplines and modes of transportation—whether terrestrial, airborne, or
beyond—reshaping the future of both manned and unmanned aviation. While its effect
may still be largely unfelt, since its most significant impact is to future infrastructure and
operations, we can be assured that UTM will be central to the future of aviation.
Note
1. Kopardekar, Parimal, Ph.D., et al., NASA Ames, Unmanned Traffic Management (UTM) Concept of
Operations, 16th AIAA Avi. Tech., Integration, and Ops. Conf. (June 2016), p. 16, https://utm.arc.
nasa.gov/docs/Kopardekar_2016-3292_ATIO.pdf
442
newgenprepdf
443
20
The Future of Unmanned Aircraft Systems
20.1 Introduction
Heraclitus of Ephesus (c. 535–475 bc), an ancient Greek philosopher, was noted for his
observance of the constancy of change in the universe. Nowhere is that constancy more
evident than in the high-tech world of unmanned aircraft systems (UASs). The very term
itself has been the subject of debate in some sectors, including many in the media, who
have adopted the term “drone” instead of UAS. Other sectors have migrated to the term
443
444
“remotely piloted aircraft.” To proponents of this last term, the usage of “unmanned” is a
liability when attempting to explain publically just what these aircraft do. As such, writing
about the future of the UAS is a bit slippery. Therefore, the majority of this chapter will
focus on broader and more enduring industry trends as opposed to attempting to make
specific predictions in this highly dynamic area.
By all accounts, the worldwide UAS market forecast continues to indicate strong growth for
the foreseeable future. Major UAS market research firms agree that the industry will con-
tinue to experience strong growth over the next 5–10 years. The Teal Group Corporation,
a team of integrated market research analysts, estimates in their 2019 World Civil UAS
Market Profile and Forecast that the total revenue market will be $90 billion over the next
10 years worldwide for nonmilitary UAS production. The fastest anticipated growth is in
the commercial sector. The inclusion of military UAS research expenditures would increase
the forecast by an additional 70–80 billion dollars spent over the next decade. Worldwide
UAS expenditures in the commercial sector will continue to experience a compound
445
9 $16,000
8 $14,000
7
$12,000
6
$10,000
5
Value
Units
$8,000
4
$6,000
3
$4,000
2
1 $2,000
0 0
2019 2020 2021 2022 2023 2024 2025 2026 2027 2028
FIGURE 20.1
Teal Group’s World Civil Unmanned Aerial Systems –2019 Market Profile & Forecast.
annual growth rate of approximately 8.5% as the industry begins to explore technology
innovations for expanded and nonsegregated UAS operations such as beyond-visual-line-
of-sight. The inherent need for enhanced data communication and data transfer technolo-
gies, advanced remote sensing payload, detect and avoid, and counter UAS applications
will lead toward this exponential increase in the coming years. Figure 20.1 depicts the Teal
Group’s civil UAS production forecast, which anticipates that the UAS market will triple
in size by 2028.
The FAA has long divided flight operations into two broad categories depending upon
whether the responsible entity is public or private. As defined under 14 CFR 1.1, public (or
public use), aircraft are those “aircraft owned [or leased for at least 90 days] and operated
by the government of a State, the District of Columbia, or a territory or possession of the
United States or a political subdivision of one of these governments,” or by a branch of the
U.S. military. Under 14 CFR 1.1, private aircraft are those that are “not public aircraft,” that
is, those that are privately owned and commercially operated. These definitions have been
extended by the FAA to include UASs.
333 Exemption). Before that point, the primary regulatory mechanisms for most UASs to
operate in the National Airspace System (NAS) were to apply to the FAA for either an alter-
nate type of airworthiness certificate (i.e., special airworthiness certificate) in the experi-
mental category or a Certificate of Authorization (COA) that established a wide spectrum
of controls and limitations for specified UAS operations. COAs have typically only been
available to public agencies, thereby excluding commercial operations. Until this need was
addressed by the interim regulation, the COA process played a vital role in airspace access
for those operating UASs defined under 14 Code of Federal Regulations (CFR) as public
aircraft. To date, if a proposed public use operation falls outside the allowances of any
regulation, then the implementation of the COA process may still be necessary. Thus, the
COA process is expected to continue to play a role in UAS operations in the foreseeable
future for public operations that fall outside the constructs of 14 CFR Part 107.
In June of 2016, the FAA amended regulations to Title 14: Aeronautics and Space to add
sUAS to the proposed rule. As defined in Title 14 CFR Part 107, an small UAS (sUAS)
is a remotely operated aircraft that weighs less than 55 pounds. Applied exclusively to
sUAS, this rule currently limits operations to daylight hours when the vehicle operator is
within visual line of sight of the vehicle (among other restrictions). Title 14 CFR Part 107
has provided a small segment of the UAS industry with initial operating procedures to
introduce low-risk, visual-line-of-sight UAS operations into the NAS. Although this is a
noteworthy effort on the part of the FAA to implement sUAS regulations, further research
is necessary to address issues that remain unresolved. For instance, access to airspace
for large-scale UAS and UAS operations is still prohibited due to the potential safety
challenges and the associated risks that larger systems pose when sharing airspace with
conventional aircraft in expanded and nonsegregated operations. Similarly, expanded and
nonsegregated operations for sUAS are prohibited under this rule. Entities who wish to
operate their UAS outside the auspices of 107 must petition the FAA for an exemption
to waive aspects of the final rule or apply to operate under Title 49 USC 44807, formerly
referred to as the “Section 333 Exemption”.
The potential for commercial UAS applications seems to have no limit and is growing
daily. As more people and industries become aware of the game-changing potential of this
technology, new applications will emerge, driven by technological enablement and the
light at the end of the regulatory tunnel. As Kyle Snyder of North Carolina State University
has said, “Show me an industry and I’ll show you [one or more applications] for UAS.”
Universities across the nation are seeing rather dramatic rises in external relationships
developing around the commercial potential of this technology. These industries include
energy, real estate, public safety, transportation, public resource management, animal
health, journalism, TV/Film, and the list goes on.
As of this writing, the regulatory landscape of UAS is ever-changing and is evolving
rapidly. In 2017, a Presidential mandate initiated the selection of the UAS Integration Pilot
Program (IPP). This initiative has provided state, local, and tribal governments with an
opportunity to experiment and evaluate the integration of civil and public UAS operations
into the NAS. They are pushing the regulatory envelope to identify the advantages and
shortcomings of its regulatory and technological underpinnings. The IPP initiative has
generated meaningful dialogue among the FAA and lead IPP participants as they evaluate
specific use cases, concept of operations (CONOPS), and effective approaches to future
rulemaking and the full-scale integration of UAS into the NAS.
That same year, however, the Department of Interior restricted UAS operations over crit-
ical infrastructure because enforcement of the sUAS rule has proven to be challenging.
447
test standards for complex operations, are likely to be prescribed. It is also probable that
the airworthiness standards, at least for some vehicles, will consist of industry consensus
standards following a model similar to the light-sport aircraft certification process that
the FAA implemented approximately 10 years ago. Another possibility is the traditional
model of certification (i.e., 14 CFR Part 21.17(a) will be used, especially with systems like
the General Atomics MQ-9 Reaper that are classified in the Group 4 category.
Current work at Kansas State University is exploring low-risk UAS-type certification with
a new framework, the durability and reliability (D&R)-based-type certification process.
The D&R has been authored by the Small Airplanes Standards Branch, Policy & Innovation
Division. The goal is to establish and provide Original Equipment Manufacturers (OEMs)
with an unambiguous and prescriptive method to produce a consistent, repeatable, and
scalable framework for functional flight testing as a mechanism to demonstrate safety
assurance and document the reliability of their systems. The successful integration of a
mechanism to demonstrate safety assurance may relieve the tension on regulations for
airworthiness compliance. This work serves as an extension of previous efforts in conjunc-
tion with the FAA to validate consensus standards by applying airworthiness standards
developed for sUAS by a group of industry representatives as a part of the American
Society of Testing and Materials (ASTM) F-38 committee structure. In the aforementioned
analysis, an sUAS that was representative of aircraft available for commercial operations
was selected for evaluation. To assess the relevancy of F-38 standards, K-State researchers
conducted a series of tests that replicated a wide variety of potential operational conditions
and determined at each stage of the evaluation whether ASTM guidelines were appro-
priate to ensure the safe operation and integrity of the aircraft and associated systems.
Other groups are currently working through similar validation processes to develop
and evaluate airworthiness standards in areas that include UAS electronics and operator
certification.
Many universities are now creating UAS- focused degree programs that center on
vehicle operations, system integration, and data collection. Examples include Kansas
State University, the University of North Dakota, Embry-Riddle Aeronautical University,
Middle Tennessee State University, Purdue University, and multiple 2-year colleges such
as Sinclair Community College in Ohio, and Cochise College in Arizona.
20.5.1 Miniaturization
Driven by advances in materials and processing technology, the size of many platforms
will continue to become smaller. Each evolution of electronics technology allows designers
to incorporate greater capabilities into increasingly smaller platforms. The limiting factor
in miniaturization is often the dissipation of heat energy; more energy is released as more
is being accomplished in these small spaces. In the future, as this problem is solved, it
is likely that all the components necessary for vehicle operation in the NAS (navigation,
communication, position reporting, etc.) will be located on one small printed circuit board
that could be easily removed and placed in another vehicle. As miniaturization technology
evolves, micro air vehicles (MAVs –wingspan smaller than 6 inches) and nano air vehicles
(NAVs –wingspan smaller than 3 inches) will become more prevalent in the future (see
Figures 20.2 and 20.3).
FIGURE 20.2
Microchip. Permission is granted to copy, distribute, and/or modify this document under the terms of the GNU
Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with
no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the
section entitled GNU Free Documentation License. (From Wikimedia search for Microchip.)
FIGURE 20.3
MAV. This image or file is a work of a Defense Advanced Research Projects Agency (DARPA), an agency of
the United States Department of Defense, employee, taken or made as part of that person’s official duties.
As a work of the U.S. federal government, the image is in the public domain. (DARPA website: Information
presented on www.darpa.mil/is considered public information and may be distributed or copied unless
otherwise specified. Use of appropriate byline/photo/image credits is requested. Additional information may
be found in: Wikimedia Commons Search for Micro Air Vehicle.)
452
to reduce their environmental impact, making this type of energy more popular in the
future.
Developments in reciprocating engine technology include the latest in digital engine
control. These controls permit the engines to vary the ignition timing and compression
ratios to allow these engines to burn a variety of bio-and fossil-based fuels, making them
highly flexible and adaptable to a range of operating environments and conditions.
Solar technology continues to hold great promise as a renewable fuel source for UASs.
Current limitations include limited payload sizes, the number of solar arrays required to
develop sufficient power, and battery and other weight penalties. Efficiencies here will
allow researchers to translate more solar energy into electricity using less surface area,
and to store that energy in lighter and more efficient ways. The hope for solar power con-
tinues to lie in advances in material technology that will allow more energy to be extracted
and stored using less weight, and advances in electronics that will allow solar-powered
vehicles to use less power to operate. Google’s Titan project is one such example. The Titan
aircraft has a 15.5 m wingspan and can carry a 32 kg (70 lb.) payload. It is powered by 3000
solar cells and can provide up to 7 kW of power that is stored in lithium-ion and lithium-
sulfur batteries.
FIGURE 20.4
LiPo battery. Source: I, the copyright holder of this work, release this work into the public domain. This applies
worldwide. (Wikimedia Search LiPo Battery.) (From Wikimedia search for LiPo Battery or Lithium Polymer
Battery.)
453
FIGURE 20.5
Composite material –carbon fiber. Source: I, the copyright holder of this work, hereby publish it under the
following licenses: This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported
license. (From Wikimedia search for Carbon Fiber.)
large part, on composite technology and will no doubt become lighter, more durable, and
easier to manufacture, maintain, and repair. Costs for these advanced materials are sure to
escalate accordingly; however, the prices for current composite materials may correspond-
ingly go down. Some current limitations of composite aircraft structures include a lack of
long-term structural integrity, especially when exposed to abnormal conditions such as
in a contaminated or caustic environment. However, advances in nondestructive testing
(NDT) technology are working to reduce this limitation. One recent advance in composites
technology, which will continue to enhance fabricators’ ability to use composite material
in more intricate and cost-effective ways, is resin infusion molding (RIM) technology, a
technology that allows parts to be fabricated without the use of an autoclave –something
that is often prohibitively expensive for smaller fabrication shops. Also, thin-ply tape tech-
nology now makes it easier to fabricate complex parts with intricate shapes and curves (see
Figure 20.5).
Other material advances now and in the future will allow the shape of the air vehicle
structure to become dynamic depending on the needs and conditions of the flight. Principles
of aerodynamics dictate that the structural configuration of an aircraft is different when
optimized for high-speed flight than for low-speed flight. Typically, altering the shape of a
wing (the structural member most typically modified) has required the use of complex and
heavy variable-sweep mechanisms. For example, a wing configured for high-speed flight
will be very smooth (laminar) with low camber and will often sweep aft. Wings for low-speed
flight are typically the opposite, with high camber, low sweep, and may have technology that
disrupts laminar flow in favor of lift-enhancing technology such as vortex generators, flaps,
and leading-edge slats. Military aircraft of the past have used complex variable wing sweep
technology to assist in the transition from high-speed to low-speed flight. Materials in the
future will allow the shape of the structure to be modified as the mission requires without the
use of heavy, complex infrastructure. They may also be able to flex so that the requirement to
have traditional control surfaces (flaps and ailerons) is eliminated.
The concept of recyclable thermoset plastics is now becoming a reality. This will allow
certain structural plastics, traditionally discarded once the shape was “set” by heating past
454
a certain point, to be recycled. This will make these materials more desirable for use in cer-
tain aircraft applications and will help reduce permanent waste.
Other advances in the materials sciences will allow UAS structures and components to
become self-repairing when damaged, or will make the aircraft suddenly “invisible” to
observers by using a material that assumes the color and texture of the background behind
it. Although not a material per se, advanced adaptive flight control technology will interact
with these new materials to allow an aircraft to instantly reconfigure to an optimum “fly-
away” state should it become damaged in flight.
20.6.4 Commonality/Scalability
Given the proliferation of UAS technology produced by multiple manufacturers, it is
the publically expressed desire of the military to move toward technical commonality to
increase efficiencies in acquisition, support equipment, training, servicing, and support.
As an analogy, some manned aircraft operators choose to operate only one common model
of aircraft with different variants to increase the familiarity of their aircraft operators,
servicers, and maintainers with the equipment. Much of the training and many of the
features are similar, which allows those who work with the aircraft to become much more
efficient at performing their jobs. Likewise, the military is seeking similar system com-
monality for many of the same reasons. It is inefficient to attempt to field a multitude of
unrelated vehicles. The concept of scalability, closely related to the concept of common-
ality, allows the features of one vehicle to be “up-” or “down-sized” based on the mission
requirements. The technological advances discussed in the preceding sections will enable
greater commonality among UASs and allow unmanned aircraft to be more facilely and
efficiently scaled, in less time, at a lower cost.
FIGURE 20.6
UCAV X-45A. This work is in the public domain in the United States because it is a work of the United States
Federal Government under the terms of Title 17, Chapter 1, and Section 105 of the U.S. Code. See Copyright.
(From Wikimedia search for UCAV or Unmanned Combat Air Vehicle.)
457
Discussion Questions
20.1 List the advantages and disadvantages of the term “Unmanned Aerial System.”
What are some alternate terms?
20.2 Refer to the eight basic segments of the UAS market in Section II of this chapter. Use
the internet to list one current development (within the last 90 days) in each area.
458
References
Federal Aviation Administration (FAA). Integration of Civil Unmanned Aircraft Systems (UAS) in the
National Airspace System (NAS). November 2013. Washington, DC: FAA Communications.
www.faa.gov.
Flaherty, N. Aiming for the high life. Unmanned Systems Technology. November 2014. High
Power Media.
Frost and Sullivan. Global military unmanned aerial vehicles market assessment market research
media. Market Research Media Premium Market Analysis. Web. 9 January 2014. <www.
marketresearchmedia.com/?p=509>.
The Teal Group 2014. UAV Integrated Market Analysis. Web. 17 July 2014. <www.tealgroup.com/
index/php/about-teal-group-corporation/press-releases/118-2014-uav-press-release>.
The Teal Group 2020. 2019 World Civil Unmanned Systems Market Profile & Forecast. Web.
26 February 2020. www.tealgroup.com/index.php/pages/press-releases/60-teal-group-
predicts-worldwide-civil-drone-production-will-almost-triple-over-the-next-
Epilogue
Douglas M. Marshall
This third edition has provided the reader with an in-depth look at the major challenges and
issues flowing from the rapidly evolving technology of unmanned aircraft systems. There
have been many advances in systems, capabilities, policies, and regulations since publica-
tion of the Second Edition of Introduction to Unmanned Aircraft Systems. The chapters in
this edition that appeared in the second edition of this series have been updated to cover
recent developments in the technologies discussed, and new content has also been added.
Unmanned aircraft systems (UAS) technologies and the uses to which they have been
applied have evolved dramatically since the publication of the first edition of this book.
Arguably, the most disruptive element of this evolution has been the introduction into
the world market of relatively affordable multirotor vertical takeoff and landing aircraft
equipped with gimbaled high-definition or multispectral cameras capable of delivering
quality images and video from a stable platform. The ensuing “Cambrian explosion”
of manufacturers offering a wide variety of systems and components has generated an
untold number of entrepreneurs and new categories of UAS operators. Much of this expo-
nential growth has continued even while this third edition was being written, and while
the preceding 20 chapters have been intended to provide the reader with descriptions and
summaries of the state of the art of the technology, by necessity informed by past history,
it is likely that some of the information the authors have shared will be overtaken by new
advances and developments even as this edition goes to press.
It is useful, however, to summarize the high points of each chapter in an effort to bring
some order to the chaos of this dynamic and exhilarating industry. What follows reflects
the editors’ takeaways from each chapter.
Chapter 1
This chapter traces the history of unmanned aviation from ancient Chinese kites, through
early unmanned aircraft, to the Wright brothers and beyond, accelerated by military usages
in WWI and WWII.
It was in the crucible of “the war to end all wars” that aviation came of age, and along
with this wave of technological advancement came the critical but little recognized neces-
sity of achieving effective flight control.
Unmanned aircraft paved the way for the development of manned aircraft (Chinese
kites and hot air balloons), and the process has reversed as systems advances in manned
aviation led to the integration of manned technologies into unmanned systems.
459
460
The developmental process is the same for manned and unmanned aircraft and is par-
allel in all respects. Structures, propulsion, flight control systems, stabilization systems,
navigation systems, and the integration of all these components into flight automation
systems made the nearly parallel development of manned and unmanned aircraft systems
possible.
The reader is introduced to the three Ds: dangerous, dirty, and dull. Dangerous means that
either someone is trying to bring down the aircraft or the life of the pilot may be at undue
risk operationally. Dirty is where the environment may be contaminated by chemical, bio-
logical, or radiological hazards precluding human exposure. Finally, dull is where the task
requires long hours in the air, making manned flight fatiguing, stressful, and not desirable.
Nicola Tesla invented radio control and perhaps the radio itself (before Marconi), to
guide torpedoes. Lawrence Sperry developed the first practical gyro-control system for the
same reason. These inventions led to the first useful mechanical autopilot. In 1918, Sperry
teamed with Glenn Curtiss to create the first operational unmanned aircraft, the Curtiss
N-9 Aerial Torpedo (the first “drone” was never put into production). The Army answered
with the Kettering aerial bomb, or “Bug,” the first mass-produced unmanned aircraft.
The interwar period (1919–1939) produced a demand for target drones, which proved
effective against antiaircraft guns during tests by U.S. and British navies, and which led to
air power doctrine that favored aircraft carriers to defend the fleet.
The famous British actor Reginald Denny, model aircraft enthusiast, created an unmanned
target drone for the U.S. Army, and eventually produced over 15,000 OQ-1 Radioplanes
(TDD-1-Target Drone Denny-for the Navy), the most popular drone of WWII. U.S. and
Royal navies continued to develop newer versions of bigger and heavier target drones to
train antiaircraft crews during gunnery trials, with great success.
The first detection device on a drone was a primitive 75-pound RCA TV camera in the
nose of a TDN-1 Assault Drone (flown from another manned guiding aircraft). Later
versions were deployed successfully in the Pacific Theater during WWII. Eventually, the
Navy and Army air forces outfitted four-engine bombers with Sperry three-axis autopilots,
radio control links, and RCA TV cameras in the cockpit. They were loaded with explosives,
the idea being that crews would control it during takeoff, set up the automatic functions,
and aim to the target, and then bail out. The tests and early missions were largely unsuc-
cessful, resulting in abandonment of the program, but not before one such aircraft’s pay-
load detonated prematurely and killed the two pilots, one of them being President John
F. Kennedy’s older brother Joseph P. Kennedy.
The Germans produced the most advanced unmanned aircraft of the era with the V-1 Buzz
Bomb, which terrorized England for much of the war. The device was the first successful,
mass-produced, cruise-missile-type unmanned aircraft, and its design influenced many
postwar unmanned aircraft designs. Over 25,000 were built, which made it the highest
production unmanned combat aircraft in history, excluding modern hand-launched small
unmanned aerial vehicles (UAVs). Most were ground-launched, but some were deployed
from aircraft, making them the first air-launched unmanned system as well. While rela-
tively primitive with regard to accuracy and navigability, the V-1 was mass produced,
and, employing many firsts for autonomously flown aircraft, it influenced future designs
and provided the historical context to fund many more sophisticated unmanned programs
during the following Cold War. The U.S. Navy reverse-engineered a captured V-1 for use
in the invasion of Japan and made later improvements on it to evolve into the first naval-
launched, jet-powered, unmanned cruise missile.
The Germans developed other weapons systems throughout WWII. The lines between
guided missile and unmanned aircraft are not always clear, and the V-1 assault drones,
461
Epilogue 461
chain of responsibility in the military weapons delivery arena, which suggests that a fully
autonomous system would not be allowed to employ lethal force.
Chapter 2
The purpose of this chapter is to introduce readers to the numerous applications of unmanned
aircraft systems. Much of this chapter has been updated from the previous versions to
showcase new commercial applications and software available for commercial UAS uses
today. New UAS applications are occurring at a rapid pace now that commercial UAS
applications can occur in the National Airspace System (NAS). Commercial applications
for UASs have increased tenfold since the FAA issued the certification requirements for
remote pilots under 14 CFR Part 107, 14 CFR Part 135 air carrier cargo operations such
as Wing and UPS, and 14 CFR Part 137 agricultural drone applications. This chapter
introduces methods for controlling UASs with a focus on the automated control methods.
This includes using software to manage a fleet of drones for a large commercial operations
and employing autopilot software to operate complex missions. Due to the amount of data
commercial UAS users can generate, sensor data management is key to working in situ-
ations where people and missions are spread out around the world. This chapter defines
the uses of analytical photogrammetry software and showcases change detection machine
learning with computer vision and autonomous flight path algorithms. Some of the new
commercial UAS applications added to the chapter include building/roof inspections, air-
craft inspections, power line inspection, and small and large unmanned cargo delivery. The
reader is encouraged to do more research in the UAS application that is of most interest. The
references in this chapter are a good place to begin performing more research.
Chapter 3
This chapter introduces the reader to the components that make up an “unmanned aircraft
system.” Whether military or civilian, the system typically consists of the human compo-
nent, the command and control system, the aircraft itself, the communication data link, the
payload, and the launch and recovery element.
The systems described may have different names, such as remotely piloted aircraft, or
remotely piloted vehicle, in addition to “unmanned aircraft system.” Whatever the name,
they are commonly categorized by weight, and in the future perhaps by risk-based criteria.
The physical and operational characteristics of both fixed-wing and vertical takeoff and
landing UAS platforms are described.
The elements of the command and control component consist of an autopilot, a pro-
grammable lost-link procedure, and some degree of autonomy in navigation. The ground
control station (CS) can be land-or sea-based, and can range in size from a handheld trans-
mitter to a workstation that can accommodate multiple personnel, such as a pilot and
sensor operator.
The communication data link connects the ground CS to the autopilot on the aircraft
and can be line-of-sight or beyond-visual-line-of-sight (BVLOS), with varying choices for
463
Epilogue 463
Chapter 4
This chapter takes the reader through a comprehensive review of the key characteristics
of the payloads commonly found on UAS of varying sizes and lift capacities. The primary
reason that UASs are flown at all is to collect some form of data. Data can be generated in
situ (in place) or remotely with sensors, and the types of sensors that can accomplish this
task are the focus of this chapter.
There are two types of remote sensing sensors: spot sensors and imaging sensors. The
former measures a single location, such as identifying surface melt water on sea ice,
whereas the latter records multiple data points utilizing a number of different methods.
The most common remote sensors are cameras, which can be visible-spectrum cameras,
near-infrared cameras, long-wave infrared cameras, and hyperspectral imagers. Each has
its own unique capability of collecting and storing data, and the choice for the user is
to match the type of camera or imager with the mission and the type of platform to be
employed to carry it.
Other devices for data collection include light detection and ranging (LIDAR) and syn-
thetic aperture radar (SAR). LIDAR is useful for measuring distance to the ground from the
aircraft, and SAR radars are often used for mapping and have the advantage of being able
to “see” through clouds, smoke, and dust. SARs are also able to pick up surface features,
and they have high spatial resolution.
Remote sensing technologies support many applications in academic research and
science. They also offer much potential in emergency response and search and rescue
operations.
Other uses of the technology include creation of background imagery for mapping, 3D
point cloud/modeling, and measuring vegetation health, which has proved to be a signifi-
cant tool in precision agriculture and thermal mapping, as well as forestry and vegetation
management. Since the turn of the century, the industries that use remote sensing tools
have witnessed an explosion of digital technology that has been the foundation for the
464
growth of the UAS market as a whole, and of the remote sensing component in particular.
However, the field of UAS remote sensing is in its adolescence and developers are still
exploring its possibilities.
Chapter 5
Chapter 5 provides a broad overview of the complexities of the aviation regulatory system
within which manufacturers, developers, users, and operators of unmanned systems must
navigate to stay on the compliance side of the law. The reader is introduced to a brief
history of the U.S. regulatory system in general, the FAA’s “tool box” in particular, and
the methods by which the FAA enforces those regulations, policies, orders, and guidance
documents.
Regulations applying to unmanned systems cannot be read in isolation from inter-
national regulations and standards, so additional attention is given to the International Civil
Aviation Organization (ICAO) and other European government aviation organizations
and commissions that have also developed or are in the process of developing compre-
hensive regulations for unmanned aircraft in sovereign as well as international airspace.
A brief exposition of the differences and similarities between regulations and consensus-
based industry standards is offered, with further exploration of how the standards process
has and will impact UAS/RPA operations and airworthiness requirements in the United
States and globally.
How the regulatory process works in the United States, from proposal and crafting of
regulations, to implementation, and then compliance and enforcement policies, is outlined
to inform the reader and the “prudent entrepreneur” on how to access, understand, and
comply with the relevant regulations and policies, with the ultimate goal being to avoid
the enforcement phase of the process. Brief summaries of similar processes in Europe and
elsewhere around the world are offered for comparison and analysis of attempts at global
harmonization of UAS regulations, rules, and standards.
Finally, a way forward is proposed, with suggestions to the user community as well
as the regulators on possible methods to reduce the pain of the “sausage making” pro-
cess in the development of reasonable, logical, and enforceable rules and regulations for
unmanned aircraft. The rule-making process is ongoing and evolving as this book goes
to press, and there may be some basis for predicting how future UAS rules may read, but
it is recommended that industry and user groups be involved from beginning to end so
that all voices are heard and the best outcome that maintains the high level of safety in the
U.S. and international aviation system can be achieved.
Chapter 6
While remotely piloted aircraft (RPA) are often referred to as unmanned, it is clear that the
humans involved and their actions are critical elements to safe operations. The goal of human
factors research is to provide operators and support personnel with the necessary knowledge,
skills, and abilities and to achieve the overall goal of safe, effective, and efficient operations.
465
Epilogue 465
The aim of this chapter is to provide a broad discussion of human factors concepts and
their application to the field of RPA operations. The chapter provides the reader with
an overview and in-depth analysis of the core challenges to all who are interested in or
committed to the development and evolution of unmanned systems, which is how to inte-
grate a wide range of operators and their experiences with equipment of varying capabil-
ities flying very different missions in often unpredictable conditions.
Many of the human factors concepts discussed are common to manned as well as
unmanned systems, and appear across other professions operating in complex, dynamic
settings. The scope of the problem is enormous.
The pitfalls of hindsight bias (the “belief that an event is more predictable after it
becomes known than before it became known”) are explained with reference to addressing
the concerns arising from the transition from manned aircraft to RPA systems. Examples
such as imaging technologies being used for sensing and avoiding hazards, the capabilities
of human vision versus the limitations of RPA visual displays as they influence in-flight
maneuvers, and differences in perception, peripheral vision, and relative motion demon-
strate that the transition faces many challenges.
Charles Wickens’ multiple resource theory was developed to explain human-cognitive
challenges of performing simultaneous and/ or difficult tasks. “Attention” is defined
as the management of brain resources, which can be managed in several ways, and are
referred to as attention types. Those types are categorized as “selective attention” (utilizing
a systematic visual scan of information sources that involves the operator’s skill to select
and process these information sources); “focused attention” (directing brain resources to
a single task, potentially resulting in poor distraction management and loss of situation
awareness); “divided attention” (performing two tasks simultaneously such as an RPA
pilot observing visual displays for optical images while controlling the aircraft, made more
difficult when tasks share resources); and “sustained attention” (the process of monitoring
the environment for changes, which may or may not be foreseen, such as an RPA operator
monitoring an automated system for failures, flight performance, and navigation, subject
to degradation over time).
Human errors occur when an action results in an outcome that was not intended, even
if the actions performed are intended. It is evident that well-trained and current operators
still commit errors. The nature of human error involves a wide range of activities, from
overall strategy and planning errors, to inadequate monitoring of information systems, to
poor technical execution of a skill. Some errors are inconsequential, which means that there
is no negative outcome if they are not identified and corrected. Many errors are identified
and corrected, through monitoring actions of operators or other individuals. Anticipating,
monitoring, identifying, and correcting errors are common tasks in the aviation industry.
When trained and qualified individuals commit errors, it is seen as an unexpected event.
In reality, errors are common and should be expected. Training professionals in RPA
operations should include active monitoring and expectation of errors.
Negative transfer is a common error when transitioning to new systems with similar
layouts. Negative transfer is using a previous, well-established skill in a new setting in
which the action is incorrect.
Threat and error management strategies began evolving in the 1970s with the beginning
of “cockpit resource management” (CRM) to assist crew interactions with regard to com-
munication, crew coordination, team building, and decision-making. The work of James
Reason, Douglas Wiegmann, Thomas Shappell, and others further identified ways to clas-
sify errors and contributing causes, with the intent to identify trends and develop effective
countermeasures. Shappell and Wiegmann’s publication of the human factors analysis and
466
classification system (HFACS) provided a framework to identify and classify errors and
contributing factors.
Crew resource management may be defined as “using all available resources—
information, equipment, and people—to achieve safe and effective flight operations,”
a concept arising out of a series of crew coordination incidents in the 1970s. Team con-
cept principles stem from manned aviation operations, where the goal is to train pilots
and other crewmembers to work together in a coordinated fashion, sharing information,
decision-making, and actions. In RPA operations, there are likely to be others outside the
operations team that would provide input or direct operations. The initial goals of CRM
training involved increasing participative management and assertiveness in the crews.
While a clear chain of command is important in RPA operations, participative manage-
ment refers to leaders who involve other crewmembers in the decision-making and actions
of the team. This discussion involves the use of power distance, effective communication,
ambiguity resolution, distraction management, and avoidance of negative transfer. These
are a few of the topics in advanced crew coordination coursework, but are considered cen-
tral issues in safe operations of unmanned systems.
Situation awareness is critical in unmanned aircraft operations. In spite of the diversity
of professions involved in situation awareness training, common cognitive processes are
used. Mica Endsley defined situation awareness as “an internalized mental model of the
current state of the flight environment.” Delta Air Lines’ training programs state that it is
“the ability to recognize events occurring to you and around you then reacting correctly
to those events.”
The task of vigilance requires individuals to direct their attention to information (e.g.,
aircraft position, instrument readings, airspace conflicts, and structures), which has the
most immediate impact on safety. Vigilance not only is managing the appropriate type of
attention but also requires knowledge of the operations to identify and correctly assess
the risks involved. Vigilance is commonly degraded by distractions. When using focused
attention to provide inputs to the control systems, even momentary distractions can lead
to significant problems. Distraction management strategies are designed to improve vigi-
lance of tasks.
When working in complex systems, correctly identifying and understanding a
developing situation (“diagnosis”) can be challenging. Achieving the correct diagnosis
involves many skills. Gary Klein describes the process as creating a story to explain
the findings, and using experience to shape the explanation. One challenge to make a
correct diagnosis can arise from the clarity of the information presented to the operator.
Incomplete, inaccurate, misleading, or conflicting information can impair this process. As
aviation professionals, training emphasizes the need to consider abnormal readings that
cannot be explained.
Risk analysis asks, “What is the likelihood and consequence of failure of each option I am
considering?” “Vicarious learning” is defined as an individual whose prior poor choices
and safety risks have not resulted in negative outcomes and, as a result, the individual
does not have a realistic assessment of the risks they are taking.
Individuals who exhibit appropriate vigilance correctly identify the problems occurring,
and have selected an appropriate course with regard to risk assessment may still fail in
that they do not act to correct the problem appropriately. Individuals who commit errors
may not be willing to identify and correct the error, as this will bring attention and possibly
blame and liability.
The goal when designing workstations (control modules, information displays, etc.)
is to create a system the operators can use efficiently and effectively (human–machine
467
Epilogue 467
interface). Often, the control systems are analogs of previously designed control systems,
such as video gaming, aircraft controls, or computer keyboards.
In man–machine interfacing, compatibility refers to the consistency of the information
and control systems to the operator’s expectations. When transitioning to a new worksta-
tion, attention to compatibility can identify aspects that need modification or additional
training to achieve compatibility. Conceptual compatibility is the effective use of symbols,
colors, sounds, or other indicators to convey information. Spatial compatibility refers to
the organization of the information and control systems. Are the information systems
located where the operator would expect them? Movement compatibility refers to the dir-
ection and sensitivity of the movement. The direction and sensitivity of controls can lead to
operator error. Controlling a small, radio-controlled RPA through direct visual observation
is a good example of movement compatibility challenges. Systems that are poorly compat-
ible will increase demands on the users. Human–machine interactions can be challenging.
Proficiency, currency, and developing correct mental models of the systems you are using
cannot be overemphasized.
Chapter 7
In this chapter, the reader is introduced to system safety tools aimed at promoting the
safe integration of UAS into the National Airspace System (NAS). As organizational safety
measures and procedures are increasingly being prioritized at the “system” or manage-
ment level to ensure appropriate implementation, this chapter applies some of the time-
tested principles of safety management system (SMS) theory to a UAS setting and provides
the reader with practical tools that can be applied to any UAS operation as a system safety
enhancement.
Although not a step-by-step how-to guide for SMS implementation, this chapter examines
the hazard analysis process, which is a key foundational step in any SMS program, whereby
potential operational hazards are identified and quantified. Closely associated with that is
the “change analysis” process, which investigates organizational changes in light of their
impact on safety and informs the hazard analysis process. The reader can then use the risk
assessment tool to begin to assess risks in their own organization. The chapter continues
with a look at flight test cards and their role in the safety process, as well as a look at how
these tools can enhance the airworthiness process. Finally, the chapter concludes with acci-
dent investigation considerations specific to UAS.
Chapter 8
This chapter is a comprehensive treatment of the export control regulations related to
unmanned aircraft systems in the United States. The chapter starts with a glossary of
important terms related to export control. The discussion continues with an outline of
the sources of export controls in the United States and describes in detail the U.S. policies
that underlie the export control regulations. Also covered in this chapter is the multitude
of statutes, executive orders, and regulations that make up the U.S. export control system.
468
Many examples are given of products that are covered by the export control system and
would potentially require an export license to transfer, ship, or move outside of the United
States, and a full list of “exports” as defined by International Trade in Arms Regulations
(ITAR) is provided.
The Export Administration Regulations (EAR) and ITAR regulations are very
complicated, and the unwary faces significant sanctions for noncompliance. The chapter
explores the purpose of export control, the underlying purpose or justification for enacting
export control regulations, the purpose of the export control license, who must obtain
an export control license, which federal agency issues such licenses, and describes the
Arms Export Control Act (AECA) and ITAR regulations. The authors describe how these
regulations apply to UAS and associated technologies, and also explain the differences
between ITAR and EAR regulations, which agency controls exports under the latter regu-
lation, and what is meant by the term “export” under ITAR regulations.
The reader is provided with information to be able to describe in detail EAR regulations,
to list and describe those UAS technologies that have been removed by the Departments
of State and Commerce from EAR and ITAR control, why export controls are described as
“strict liability” laws, and to describe the Missile Technology Control Regime (MTCR) and
corresponding annex in detail.
The chapter also explains the ITAR categories, including those categories and sections
that refer to UAS, describes what is meant by a compliance program, and explains why it
is important to have one if there is potential EAR and ITAR application.
Chapter 9
This chapter introduces the reader to the assumptions and processes that go into the
selection and execution of the design of an unmanned aircraft system. The design pro-
cess is outlined, emphasizing the philosophy that the design should be driven by the
mission to be accomplished by the aircraft and the system. A brief history of UAS devel-
opment, from military to public to commercial operations in the United States, beginning
in the early twentieth century and continuing through the present, provides context for
the evolution of mission-driven UAS designs. Raymer’s “design wheel” illustrates the
iterative nature of the process where preceding trade studies sets requirements, concepts
are derived from requirements, the design analysis may generate new concepts, and the
cycle may repeat.
The chapter covers design tools, airframe materials and components, propulsion systems
(battery-powered electric motors, gas turbine, and internal combustion engines), flight
control systems (autopilots, wireless remote, stability augmentation, auto takeoff, and
landing), control stations (GCS, handheld controllers, CS interface), payloads (cameras,
meteorological sensors EO/IR sensors, LIDAR, SAR), and communications, command,
and control (C3, wireless data links).
The ASTM International F38 Committee on Unmanned Systems is developing engin-
eering standards supporting UAS-type certification. RTCA Special Committee 203 was
established to develop standards for sense- and-avoid and C3 criteria and SC 228 is
developing minimum operational performance standards for detect-and-avoid equipment
and C2 command and control data links.
469
Epilogue 469
Hardware-in-the-loop (HIL) testing is widely used for the UAS design verification of the
aircraft control system, sensor/payload integration, and the CS interface. After systems
verification, a simulated environment might be used to prepare for mission validation, or
for pilot/operator training, where the tasks of an actual mission might be simulated.
Chapter 10
UAS Airframe Design outlines the airframe design considerations as influenced by mission
goals and performance and payload constraints, while providing a general overview of
common designs and the reasoning behind the selection of a particular design over others
in a diverse field of alternative platforms. Probing even deeper into the design process
as described by the previous chapters, UAS Propulsion System Design examines engine
designs, propellers, and how those components are integrated to provide the most efficient
powers source for an unmanned aircraft, principles that are equally applicable to large or
small UAS. In comparison to the design choices available to those who engineer and create
manned aircraft, a much larger number of configuration options inhere to the creation
of unmanned aircraft, particularly small UAS or sUAS. Should the vehicle be a single-or
multirotor or fixed-wing aircraft? If a fixed-wing design, should it be a flying wing, con-
ventional configuration, or canard? Should the tail be a cruciform, T-tail, inverted-T, a Y-
tail, V-tail, or inverted V? Should the structure be traditional monocoque or composite?
These are but a few of the many alternatives that UAS operators and developers must con-
sider when addressing the requirements of the contemplated mission or use of the system.
Chapter 11
This chapter provides and in-depth treatment on the subject of UAS power plants, which
are very similar to (and in many cases the same as) traditional aircraft powerplants with
a few emerging nuances. This chapter covers detailed technical descriptions from a
nonengineering perspective. Covered in this chapter is a complete and detailed discus-
sion of all types of reciprocating and gas-turbine internal combustion powerplants. On the
reciprocating side, powerplant designs discussed include 4-stroke, 2-stroke, diesel, and
rotary engines. Gas turbine designs are broken down into turboprop, turboshaft, turbojet,
and turbofan engines with the advantages and disadvantages of each.
Emerging electric propulsion systems are discussed, along with propeller/rotor choices
and integration. Overall, as in the airframe (Chapter 10), propulsion system design consid-
erations are detailed for designers who are looking to integrate airframes with appropriate
power plants in light of the intended mission profile. The concept of maintainability is also
discussed as it relates to designing for ease of continued airworthiness.
Other topics discussed in this chapter include emerging certification efforts related to
aircraft as well as training and certification aimed at technicians and operators. Finally, a
discussion of design-safety considerations is also included, covering both reliability and
risk assessment considerations.
470
Chapter 12
An electrical system is essential to the operation of all controllable unmanned aircraft (UA).
Even the least complex RPA relies upon electrical power to receive, process, and distribute
input signals to achieve command and control, and often for propulsion. The intricacy and
sophistication of the onboard systems of large unmanned aircraft are comparable to those
of large, turbine-powered manned aircraft—and some make the case that, due to payload
and command and control requirements, large UASs are more complex than comparably
sized manned aircraft. The electrical system interconnects all subsystems, and therefore, is
the systemic nexus common to all UASs.
The evolution of UAS capabilities and the expansion of mission profiles will result in
larger, more sophisticated UAS coming into service. This circumstance will impact compo-
nent and subsystem design, which, in turn, will drive the evolution of larger, more complex
electrical systems and associated components. Brushless generators and starter/generators
have already been developed for UAS applications. A continuation of this trend will see
the replacement of hydraulic system components and fluid lines with electrical actuators
and wires. This will require more efficient and possibly higher capacity generators, larger
electrical distribution system components (to handle heavier current flows), and greater
complexity throughout the entire interconnecting subsystem nexus.
Chapter 13
Chapter 13 takes a look at UAS communication systems. This chapter starts with a prac-
tical way to explain UAS communication to the novice and moves into a more detailed
discussion. Items discussed in this chapter include electromagnetic wave propagation in
free space, and basic communication systems and its elements, which includes modulation
and frequency hopping.
A comprehensive outline of a basic communication system and its elements follows.
The elements should consist of modulation devices, transmitters, the channel for the
wireless link (antenna directivity, antenna gain, and polarization issues), the receiver
(signal-to-noise ratio, receiver sensitivity, dispreading the signal), and demodulation
design strategies. System design requires the establishment of bandwidth requirements
and effective link design. A summary of design principles is provided, along with a
discussion of bandwidth requirement and the associated problems for EMI (electromag-
netic interference) internal interference, jamming, and multipath (the different pathways
a signal can take to a receiver and how some of these signals arrive at the receiver after
bouncing around).
Chapter 14
The command and control (C2) components comprise the UAS subsystem that enables
controllable and autonomous flight. An essential C2 element is human, and the term
471
Epilogue 471
operator “in the loop” implies direct control of the vehicle through pilot intervention,
and operator “on the loop” indicates that the operator is monitoring autonomous flight.
Other components most generally comprising the C2 subsystem are the ground control
station (GCS) and associated software and electronics, antennae, ground-based and air-
borne transceivers, the autopilot to enable autonomous flight, air data and GPS systems,
MEMS gyros, accelerometers and magnetometers for navigation and vehicle control, the
interconnecting circuits and data buses, and onboard intelligences for computing and
data processing. Larger UASs may also include auto-takeoff and autolanding systems.
Although UAS command and control may occur via other methods (e.g., light transmission
or through the umbilical cable of a tethered vehicle), C2 is most commonly accomplished
via two-way transmissions that communicate commands to the UAS through an uplink
and telemetry from the aircraft to the GS through the downlink. The medium through
which this communication is accomplished is the radio frequency (RF) portion of the elec-
tromagnetic spectrum.
The proliferation of UASs has paralleled improvements in binary computing devices
and associated electronics. The miniaturization of these devices and their incorporation
into microcircuits was enabled by developments in materials sciences, quantum physics/
solid-state theory, and semiconductor manufacturing techniques. As C2 systems continue
to evolve and mature to become more compact, less expensive, and more capable, it is
likely that the requisite level of human intervention will correspondingly decrease, just
as occurred in manned flight where transport crews have shrunk from five (pilot, copilot,
navigator, radio operator, and flight engineer) to two as the result of improved tech-
nologies. If predictions that unmanned transports will one day carry passengers to their
destinations prove true, the ability to do so will be dependent not only upon the evolution
of C2 systems to become nearly 100% reliable, but also the integration of detect-and-avoid
components into the command and control subsystem.
Chapter 15
The integration of subsystems into unmanned aircraft is what allows the aircraft to carry
out its intended mission. Payload subsystems come in a variety of sizes and configurations,
from extremely complex, with heavy computational capabilities, to relatively simple
designs. Each system tries to meet the objectives of the operator. The myriad applications
of UAS with their respective payloads provide great opportunity for researchers in many
fields to implement and exploit the capabilities of UAS.
The integration of subsystems onto UAS ideally uses a systems engineering approach to
design. Payloads typically involve many components that must be integrated together to
carry out the desired mission. This approach necessitates multiple steps on the way
to designing a complete UAS subsystem. Those steps typically consist of concept devel-
opment and trade studies, preliminary design review, critical design review, fabrication,
system testing, and flight testing.
This chapter provides guidelines that have been proven to be successful for UAS pay-
load development in a number of settings. As regulations and airspace operations con-
tinue to develop in this rapidly evolving industry, increasingly specialized regulations and
requirements will be imposed, and these new rules will in all likelihood become standards
for legal operation and development.
472
Chapter 16
One of the foundational tenets of flight is the responsibility of the pilot to see and safely
avoid other aircraft. From the dawn of manned flight, pilots have been expected to main-
tain vigilance so as to remain “well clear” from other aircraft. The advent of UAS has
changed how we approach technology’s role in supporting or replacing functions once
solely performed by human pilots.
The systems that allow a means of compliance with “see and avoid” requirements and
remaining “well clear” are called detect and avoid (DAA) systems. The legal definition of
“well clear”—a quantified specification of the time, distance, or both that must separate
aircraft—provides UAS a means to not only meet, but likely exceed the ability of aircraft
with onboard pilots to avoid a potential collision. This same definition supports the intro-
duction of similar systems into manned aircraft, allowing pilots the benefit of increased
situation awareness as well as reliable alerting for aircraft that may present a collision risk.
For UAS, the challenge is demonstrating compliance with the rules of the air—ensuring
that the aircraft, even when not under direct pilot control, is capable of maneuvering suffi-
ciently so as to avoid a potential collision hazard. This challenge requires execution of two
main tasks: (1) avoid a collision and (2) remain “well clear.”
The task description for DAA consists of two major functions: self-separation (SS), the
ability of the system to remain “well clear” of other aircraft; and collision avoidance (CA),
the ability of the system to prevent a collision with another aircraft.
To support the core functions of SS and CA, it is necessary to identify and sequence the
component subfunctions that support a safe and reliable SS or CA maneuver. The FAA SAA
Workshop identified eight subfunctions for SAA. The U.S. Department of Defense (DoD)
SAA Science and Research Panel (SARP) provided its own decomposition, which included
the addition of three new subfunctions. These 11 subfunctions, in time- linear order,
are: detect target, track target, fuse target tracks, “orient” tasks, identify object, evaluate
threat, prioritize threat, decide tasks, declare/alert, determine maneuver, command man-
euver, execute maneuver, and return to course.
The role of the pilot (pilot in-the-loop, pilot on-the-loop, pilot-independent), and the role
of air traffic control are also examined as a foundation for a description of the DAA system
components (sensors, avoidance algorithms, and displays).
In 2013, the DoD SARP was tasked with defining a means of compliance with “well clear”
for UAS. As a foundation for their approach, the SARP arrived at five guiding principles
for UAS to comply with “well clear”:
The result of this effort was the creation of a model that accounted for both time and dis-
tance from other aircraft, and provided a sufficient vertical (altitude) separation to support
appropriate avoidance maneuvering (including a minimum time to closest point of
473
Epilogue 473
approach of 35 s, a minimum horizontal distance of 4000 ft, and a minimum vertical dis-
tance of 700 ft from other aircraft).
Chapter 17
This chapter examines the history, practice, and implications of UAS in the service of public
safety in the United States. Starting with the earliest mentions of UAS in official documents
from the FCC and the FAA, the chapter surveys the development and current state of
laws affecting UAS operations by public entities such as law enforcement and firefighting
agencies. The authors discuss public aircraft operations, and the tension on the boundary
of federal aviation laws and regulations, and local public safety realities.
The chapter also surveys the technology, which continues to democratize the ability to
see and do things from the air for agencies that could never contemplate access to such
tools before UAS. The differences and strengths of manned and unmanned aircraft as
applied to public safety missions are discussed, as well as the interaction of regulations
and technology to define what is possible today. The authors also include a brief discussion
of the novel legal questions in the area of search and seizure presented by UAS. Discussion
questions at the end of the chapter are designed to get students’ thinking and discussing
the state of public safety UAS operations, and question their current form to ponder what
could be improved.
Chapter 18
Chapter 18 covers cybersecurity, counter unmanned aircraft systems (C-UAS) and auto-
mation. It describes the sUAS/UAS landscape that includes the automation, collaboration,
and vulnerabilities of the Air Defense Systems (ADS) and their countermeasures; the role
of AI; the importance of SCADA (Supervisory Control and Data Acquisition); and SCADA
systems and their vulnerabilities. Consider that UASs are just Flying SCADA systems.
What follows is a discussion focusing on a qualitative tool, the Ryan-Nichols equations as
a way to evaluate the threats posed to and by sUAS/UAS cyberattacks and cybersecurity,
and to measure and judge qualitative Information Security (INFOSEC) risk relationships.
The RN equations are a versatile qualitative method that evaluates attack/defense scenarios
to determine the normal, best, and worst risk cases based on the Threats, Vulnerabilities,
Impact and Countermeasures of the scenario. Dr. Daniel J Ryan and Dr. J.J.C.H. Ryan
developed the core/fundamental concepts of this approach in a series of papers. The
author uses the consolidated form of the RN equations and lethality matrix in teaching
qualitative risk scenario evaluations.
Automation of sUAS/UAS is explored with emphasis on collaboration capabilities of
SWARMS, which deserve special emphasis because they pose the highest risk to assets
and personnel.
Sense and avoid systems (SAA) are critical to UAS because they affect both attack and
defense scenarios using sUAS/UAS, as are cyber SCADA threats and vulnerabilities in
and to SAA and UAS. Cyber Terrorism using UAS (i.e., “just flying SCADA Machines”)
474
include spoofing GPS, CAS sensory deprivation, disabling of gyroscope and MEMS, and
resonance. A taxonomy of traditional cyberattacks is presented and a brief look at present
C-UAS advances, including Electronic Warfare (EW) and Electromagnetic (EM) Jamming,
Acoustical Signatures, Countermeasure (CM) and Identify Friend or Foe (IFF) Libraries,
and Stealth Design conclude the chapter.
Chapter 19
The current UAS industry, social and cultural contexts, and operational environments are
dynamic, and specific predictions are sometimes difficult to formulate with any degree
of confidence. However, the continuation of certain established trends is probable, and
consequently, is a more reliable predictor of the future of the UAS enterprise than more
inconstant, speculative, uncertain aspects of the industry. Driven by robust technological
advancement, the market for UAS manufacturing and support services that began as a
minor segment of the industry has become a major component of global commerce in the
relatively short span of 15–20 years. All projections give credence to the expectation that
this strong growth will continue. And just as technology drives the market, economics, in
turn, will encourage the continued improvement of technology in terms of better manu-
facturing techniques, stronger, lighter, more suitable, and facilely applied materials and
smaller, faster, more capable, and less expensive microprocessors, avionics, autopilots,
and related UAS electronics. As regulations continue to evolve in concert with technology,
larger unmanned aircraft with more complex and rigorous mission profiles will emerge.
At the confluence of these trends will be an expanding job market for those involved in the
UAS segment of the aerospace industry.
With a longer time horizon, the development of alternative energy sources that
include fuel cells and hydrogen fuel pellets would afford another means of improving
UAS performance. Several companies, including Airbus, Boeing (Phantom Works), and
AeroVironment (in conjunction with NASA), are developing solar-powered UASs with
expected mission durations of 5 years or more. Sometimes termed atmospheric satellites,
these UAS platforms are being developed to act as weather and earth observatories and
telecommunications relay stations. Improvements in battery chemistries and construction
techniques will improve both range and endurance of electrically powered UASs, as well
as the useful load of such platforms. In-flight refueling to recharge the batteries of electric
UASs is also being explored as a means of extending flight parameters.
Updates to this chapter include a discussion of the role of artificial intelligence in UAS
automation as well as a discussion of emerging career opportunities. Also included are
discussions regarding emerging certification and training standards for vehicles and
operators in addition to the emerging market found in point-to-point delivery services.
As one peers further into the future, accurate predictions become more difficult.
A continued acceleration of the pace of technological advancement in this area will
not be surprising. Neither will be an increasing diversity of UAS mission profiles and
proliferation of the technology. As has often been stated, the future is unlimited and
unmanned.
475
Epilogue 475
Chapter 20
This chapter is a condensed outline of a companion book by the same author, Michael Baum,
that covers in great detail the history, a concept of operations, standards making efforts,
governance, selected initiatives, and implementations, offering a look into the future of
unmanned traffic management (UTM) systems. UTM is a highly automated, distributed
system of systems for facilitating the safe and efficient integration of unmanned aircraft
operations into a nation’s airspace system. UTM and related concepts such as Europe’s
U-space are intended to manage unmanned aircraft system traffic without overloading
current air traffic control systems. UTM shares certain attributes with legacy air traffic
management (ATM) systems to provide separation, flow control, and navigation services.
As with ATM, airspace management, traffic flow management, and control systems are
considered the core element of UTM. Yet, UTM is different from ATM in important aspects.
While humans such as pilots and air traffic controllers play a central role in legacy ATM
systems, UTM relies on computing infrastructure to manage several key roles and provides
an all-encompassing framework for managing multiple UAS operations simultaneously.
UTM is based upon predefined protocols for cooperative data exchanges, is managed by
exception, and relies upon third-party services and service oriented architectures.
Despite their differences, UTM and ATM should not be viewed as competing systems.
Rather, they are complementary means to provide essential traffic management services.
Industry experts envision that UTM services will increasingly coordinate and eventually
merge into a universal ATM, creating a unified, seamless, and transparent infrastructure
regardless of operations. However, it is integrated, UTM will introduce new third-party
service providers, change communications paradigms and protocols, define new per-
formance requirements, and spur reexamination of the relationships, responsibilities, and
capabilities of aviation actors including civil aviation authorities (CAAs), air navigation
service providers (ANSPs), UAS, and other airspace users, both manned and unmanned.
Depending on the jurisdiction and implementation, CAAs and ANSPs may delegate
certain operational functions, while CAAs continue to focus on their regulatory, safety
oversight, and security roles. Moreover, given the fast pace of innovation, UTM must pro-
vide an extensible architecture to accommodate future applications, including urban air
mobility (UAM), and beyond. UTM will transform the architecture of ATM.
476
477
Index
AAI Aerosonde vehicle-top launch cradle, 70 AECA see Arms Export Control Act of
AAI RQ-2 Pioneer, 14–15 1976 (AECA)
AAI RQ-7A/B Shadow, 13, 201–2, 215, 221, aerial: mapping, 13, 20–2, 23, 25, 27–8, 32–4,
228, 250, 401, 461; see also unmanned aerial 38–40, 43; surveying, 20, 25, 34, 39, 41, 45, 54;
vehicles (UAVs) torpedo 1, 3–8, 12–13, 184, 200, 460; see also
AAM see advanced air mobility (AAM) unmanned aerial vehicles (UAVs)
Abbott technologies, 287 aerodynamic center (AC), 225; efficiency, 223,
above ground level (AGL), 59, 80, 110 231, 233, 234
AC see advisory circulars (AC); aerodynamic aeromapper EV2, 221, 227
center (AC); alternating current (AC) aeronautical information publication (AIP), 121
AC 43.13–1B, 270 Aerosonde Mark 4.7, 68
AC 91–57, 131 aerovel flexrotor, 59
AC-91–57B, 120, 135 aerovironment, 43, 63, 67–8, 229, 240, 277, 476;
AC 107–2, 114 Puma, 238; Raven, 13, 43, 59, 67–8, 99, 217, 229,
AC 150/5200–37, 120 240, 277, 284, 402–3; Wasp, 215, 230, 238, 401
academy of model aeronautics (AMA), xxi, Aeryon Labs Scout quadcopter, 255, 256, 282
120, 134 Aeryon Skyranger, 59
accelerometer, 337–8, 340–1, 345, 471 AESA see active electronically scanned
accident investigation considerations, 153–4, array (AESA)
163, 469; human factors, 137–52, 153–65, 207, air carriers, 104, 122, 389, 455
465–7; investigation roster, 165–6; software airframe design see unmanned aircraft
and hardware, 23, 29, 153, 163, 165, 344–5, system design
417; suggestions, 153, 165, 466; see also safety AFS see FAA Flight Standards Service (AFS)
assessments AFSIM see advanced framework for simulation,
ACO see Los Angeles Aircraft Certification integration and modeling (AFSIM)
Office (ACO) AFS-400 UAS Policy Statement, 105, 108, 111,
acoustical gun, 410 134–5, 388
acoustical signatures, 398, 400, 425, 474 AGL see above ground level (AGL)
acoustic countermeasures, 402 AIAA see American Institute of Aeronautics and
active electronically scanned array (AESA), 205 Astronautics (AIAA)
active radar surveillance, 409 Aibotix X6, 59
active sensors, 19, 27, 74–5, 77, 95, 382, 411; AIP see aeronautical information
see also remote sensing publication (AIP)
AD see airworthiness directives (AD) AIR see FAA Aircraft Certification Service
adaptive flight control, 454 AIR-130 see FAA Avionics Systems Branch
ADCOM YABHON-R, 232 airborne sensing system (AS), 397, 411
additive manufacturing, 454; see also unmanned aircraft detection technology, 368
aircraft technological trends aircraft gas turbine, 250–2; axial-flow compressor,
ADM-20 Quail see McDonnell ADM-20 Quail 251; centrifugal compressors, 251; cold section,
Administrative Procedures Act of 1946, 102 251; components, 251, 259–65; five events in
ADS-B see automatic dependent internal combustion engine, 250–2; hot section,
surveillance-broadcast (ADS-B) 251, 269; Lockheed Martin Polecat engines, 253,
advanced air mobility (AAM), 440 255; thrust, 251–4, 256, 260–4; turbofans, 252–3,
advanced framework for simulation, integration 255; turbojets, 245, 250, 253–4; turboprop-
and modeling, 208, 211 powered UAS, 252; turboprops, 251, 252;
advanced launch and recovery system (ALRS), turboshaft, 235–6, 245, 250–3, 256, 264, 469; two
241; see also launch and recovery (L&R) Williams F44 turbofans, 255; UAS turboshaft
advisory circulars (AC), 102, 134–5, 263, 287 installation, 252–3; see also powerplant designs
477
478
478 Index
aircraft subsystems, 21, 193, 198, 241, 342 ANSI see American National Standards Institute
airdrop launch, 238–9; see also launch and ANSPs see air navigation service providers
recovery (L&R) (ANSPs)
air navigation service providers (ANSPs), 123, antenna, 28, 37, 62, 163, 291, 296–319, 324–7, 336,
125, 439, 475 340–5; directional tracking, 340; gain, 273,
airplane 3–5, 10, 27, 43, 104, 120, 218, 228, 239, 291, 300–2, 309–12, 315, 326, 338–9, 470; horn,
332, 463 296–303; isotropic, 300–3, 310, 328; isotropic
Airport and Airway Development Act of radiator, 300–1; jamming, 291, 315, 472;
1970, 105 monopole, 89, 296–7, 302; patch, 296–7, 302;
Airport and Airway Improvement Act of polarization, 291, 300–4, 309, 312, 317, 472;
1982, 105 point source, 79, 301–2; spatial processing,
Airport and Airway Safety and Capacity 316; spiral, 296, 297; see also channel dipole
Expansion Act of 1987, 105 AOA see angle of attack (AOA)
airspace integration, 49, 125, 157 AOI see area of interest (AOI)
air taxis, 440 APA see Administrative Procedure Act of 1946
air traffic, 104, 120–1, 124–5, 131–2, 160, 370, 373, application logic security, 423
389, 394, 397, 441, 449, 457, 477 AQM-34 Lightning Bug and Firebee series
air traffic control (ATC), 47, 122, 125, 142, 160, 11–12, 228, 238, 240, 254 see also unmanned
295, 367–8, 379, 381, 411, 455, 472, 475 aerial vehicles (UAVs)
air traffic organization (ATO), 111, 120 AR see aspect ratio (AR)
air transport association (ATA), 121, 218 ARAC see Aviation Rulemaking Advisory
air vehicle operator (AVO), 162 Committee (ARAC)
airworthiness, 105, 108, 110–14, 119, 121–3, 125, Arava STOL, 228
128–30, 132, 153, 160–3, 208–9, 234, 242, 264–7, ARC see Aviation Rulemaking
289, 255, 448–51, 466, 469, 471; continuing, Committee (ARC)
163, 263, 265 ARC International, 188–9
airworthiness certification, 105, 129, 132, 153, Arcturus UAV, 238
161–3, 265, 440, 448 ArduPilot, 29, 330
airworthiness directives (AD), 104 area of interest (AOI), 39, 41
all-electric Penguin BE payload bay, 275; see also ARINC, 218
sUAS electrical systems Armada see Drone Data Book
All The World’s Aircraft: unmanned see Jane’s Arms Export Control Act of 1976 (AECA), 170,
Jane’s, All the World’s Aircraft 183, 468; see also export control
ALR see automatic launch and recovery Arnold, Colonel Henry “Hap” 5
(ALR), advanced launch and recovery Article 8 of the Chicago Convention, 122
system (ALRS) Artificial intelligence 2, 17, 31, 274, 340, 397, 431,
alternating current (AC), 269 443, 454, 458, 474
alternator, 246, 257, 261–2, 283, 286 aspect ratio (AR), 214, 220, 226, 233, 242
alternative energy, 443, 450, 474 Association for Unmanned Vehicle Systems
altitude reporting transponder, 374 International (AUVSI), 41, 49, 55, 90, 92, 97,
AMA see academy of model aeronautics (AMA) 135, 218
Amazon, 49, 84, 195, 200, 400, 455 ASSURE, 14, 49, 447
American National Standards Institute ASTM see American Society of Testing and
(ANSI), 118 Materials (ASTM)
ambiguity, 146–7, 466; see also human factors in ATA see Air Transport Association (ATA)
unmanned aerial systems ATA-100 coding system, 218
American Institute of Aeronautics and ATC see Air Traffic Control (ATC)
Astronautics (AIAA), 207, 243, 289, 345, 385 ATF see Department of Justice, Bureau of
American Society of Testing and Materials Alcohol, Tobacco, Firearms and Explosives
(ASTM), 118, 449 atmospheric satellites, 443, 455, 474
American Wire Gauge (AWG), 269 AutoCopter Corp., 234
AN-grade hardware, 355 Aviation Services International, 188
angle of attack, 222–6, 233–4, 257 atmospheric sampling, 47–8
479
Index 479
ATO see Air Traffic Organization (ATO) baseline vibration excitation test, 358; see also
ATO-R see FAA Office of Systems Operations payload
and Safety BATMAV see WASP III Battlefield Air Targeting
attack vector, 399, 414, 417 Micro Air Vehicle (BATMAV)
attention cue, 139; see also human factors in battery capacity, 129, 200, 277, 288
unmanned aerial systems battery chemistry, 277–8; see also sUAS electrical
attention types, 140, 142, 465; channeled, 137, systems
141; divided, 137, 141; focused, 137, 141, battery elimination circuit see battery eliminator
147–8, 150; selective, 137, 140, 467; sustained, circuit (BEC)
137, 142 battery eliminator circuit (BEC), 281, 289
attenuator, 327, 344 Battlefield Air Targeting Micro Air Vehicle
Aurora Flight Sciences, 196 (BATMAV), 230
Australia, 125, 136, 183, 455 battle zone communications, 292; see also
Autoland (systems), 323, 471 communication systems
autonomous aerial cargo utility system see Bekaa Valley conflict (Operation Peace for
Boeing/Aurora Flight Sciences Galilee), 14–15, 461
Automatic Dependent Surveillance-Broadcast BEC see battery eliminator circuit (BEC)
(ADS-B), 374, 380–1, 411–12, 430 Berkeley Software Distribution (BSD), 342
automatic launch and recovery (ALR), 341, 345; Bernoulli’s equation, 222
see also large UAS navigation systems beyond line-of-sight (BLOS), 62, 203, 321, 327,
automated flight profiles, 21; control, 19, 21–2; 389; communication, 62–4, 69, 241, 298, 321,
autonomous flight path algorithms, 19, 32, 462 327–8, 344
automation levels, 397, 400–1, 424 beyond radio line-of-sight (BRLOS), 57, 64
autopilot 1, 3, 4, 8, 9, 13, 19, 21–2, 29, 57, 59–62, Beyond Visual Line-of-Sight (BVLOS), 36, 62,
65, 69, 79, 194, 200, 203, 207–9, 231, 241, 255, 69, 118, 126–9, 151, 292, 448, 462–3
268, 272, 282, 321, 329–45, 357, 377, 397, 401, binary phase shift keying (BPSK), 315
411–12, 421–3, 460, 462, 471; components, Bing Maps, 88
333–5; hardware attack, 423; software, 19, 29, biofuel technology, 450; see also unmanned
464; unit, 61; see also small unmanned aircraft aircraft technological trends
autopilot systems biplane 4–6
AUVSI see Association for Unmanned Vehicle BIS see Bureau of Industry and Security (BIS)
Systems International (AUVSI) Black Hornet Nano helicopter, 214, 234, 268,
Aveox 27/26/7-AV inrunner BLDC motor, 282; 333, 336, 352
see also sUAS electrical systems Black Hornet Nano micro-aerial vehicle,
aviation quality wire, 269 214, 268
Aviation Rulemaking Advisory Committee BLDC see brushless DC motors (BLDC motors)
(ARAC), 218, 287 BLM see Bureau of Land Management (BLM)
Aviation Rulemaking Committee (ARC), 102, BL motors see brushless DC motors (BLDC
116, 119, 132, 167, 218 motors)
AVO see air vehicle operator (AVO) blockchain, 432, 440
AWG see American Wire Gage (AWG) BLOS see beyond line-of-sight (BLOS)
Boeing: Hummingbird, 234; SolarEagle, 214;
backscatter, 27 X-48, 224; X-51 Waverider, 219, 220, 238
B4UFLY, 115 Boeing/Aurora (autonomous aerial cargo utility
BNSF rail system, 114 system), 196
B-17 Flying Fortress 8, 226–7; see also fixed-wing Boeing Insitu RQ-21A Blackjack, 240; integrator,
designs 240; ScanEagle, 67, 69, 80, 202, 224, 230, 240;
B-52 (bomber), 11, 239, 461 SkyHook™ 67, 69, 239–40
bandwidth, 13, 64, 291, 300, 303–8, 313–14, Boeing 787 Dreamliner, 272, 278, 287
317–18, 327, 421, 425, 470 Boltzman constant, 314, 318
Bard College, 210 Boolean logic tree, 161, 262
barometric pressure sensors, 335; see also small boresight visual displays, 139
unmanned aircraft autopilot systems Boutros, LCDR, 407–8, 412, 434
480
480 Index
BPSK see Binary phase shift keying (BPSK) CETC see Chinese Electronics Technology
Brayton cycle powerplants, 250, 252 Group Corporation (CETC)
Brazil, 122, 125–6, 136, 183 CFD see computational fluid dynamics (CFD)
Bright Lights USA, 189 CFR see U.S. Code of Federal Regulations (CFR)
BRLOS see beyond radio line-of-sight (BRLOS) change analysis, 153, 156, 159, 467
brushless DC motors (BLDC motors), 254–6, change detection and machine learning, 19, 30;
274, 275, 280–2, 289 algorithms, 19, 25, 32, 34, 93, 203, 208, 340,
brushless starter/generator (BS/G), 286 367, 380–1
BSD see Berkeley software distribution (BSD) channel, 291, 299–300, 302, 304–5, 307–9, 317–18,
BS/G see Brushless starter/generator (BS/G) 325, 331, 357, 409, 414, 423, 470; antenna
BuckEye Project (U.S. Army), 93, 97 directivity, 291, 300, 317; antenna gain, 291,
buffer (holding area), 107, 328 301, 317, 470; antenna polarization, 291,
buffer overflow, 417, 420–3 302; isotropic antenna, 300–1, 310; isotropic
bug, the see AQM-34 Lightning Bug and radiator, 300–1; radiation pattern of radiator,
Firebee series 303; see also communication systems
built-in flight data recorder 165, 334; see also channel dipole, 296
small unmanned aircraft autopilot systems checksum, 329, 331, 344
Bureau of Industry and Security (BIS), 170, Chicago Conference see International Civil
174–7, 185, 188, 192 Aviation Conference
Bureau of Land Management (BLM), 43, 389 China, 126, 136, 182, 188, 189, 248, 389, 401, 407,
Buzz Bomb see Fieseler Fi, 103 410, 419, 428, 433
BVLOS see beyond visual line-of-sight (BVLOS) Chinese Electronics Technology Group
Corporation (CETC), 401
C2 see command-and-control (C2) Chinese Ministry of Industry and Information
C3 see communications, command, and Technology, 407
control (C3) CIR see color infrared (CIR)
CA see collision avoidance (CA) circuit protection devices, 271, 284, 288
CAA see civil aviation authority (CAA) CIS see critical infrastructure sectors (CIS)
camera 7, 12–13, 26, 30–3, 37, 39–40, 43, civil aviation authority (CAA), 127, 129; see also
64–5, 74–9, 82, 87, 94–6, 205, 238, 268, 323, UAS Regulations, Standards and Guidance
340–1, 347 (see also remote sensing); UAS civil infrastructure, 19, 35
sensing-theory and practice; export control; CJ see commodity jurisdiction (CJ)
international traffic in arms regulation (ITAR) CloudCap Technology Piccolo™ 60, 61, 63, 198
Canada, 126, 136, 182–3, 185 cloud storage, 83–5; see also UAS Sensing-
Canards, 224 Theory and Practice
capacity of cell, 278; see also sUAS electrical closed-loop circuit, 271
systems COA see certificate of waiver or
capacity rate (C-rate), 277, 289 authorization (COA)
carbon fiber, 221, 228, 271, 281, 453 coaxial line (or cable), 294
cooling shroud, 281 Cochise College, 450
carbon footprint, 450 Cockpit Resource Management (CRM), 144,
cargo aircraft delivery see unmanned aircraft 152, 465
system applications collision avoidance (CA), 111, 117, 323, 367–8,
career opportunities, 443, 449, 474 370–1, 378–81, 385, 400–1, 411–12, 431, 436,
catapult launchers, 238; see also launch and 447, 454, 472; rule, 111; see also detect and
recovery (L&R) avoid systems (DAA systems)
CCL see commerce control list (CCL) color coding, 322–3
CDR see critical design review (CDR) color infrared (CIR), 78; see also remote sensing
CEMF see counter-EMF (CEMF) command-and-control (C2), 57–8, 60, 62, 119,
Centaur (Aurora Flight Sciences), 196 203, 205, 206, 207, 240, 243, 288, 321–8, 337–8,
certificate of waiver or authorization (COA), 343, 356–8, 364, 377–9, 383, 423, 457, 462, 468,
108, 110–13, 160–1, 165, 388–9, 446; see also 470–1; discussion questions, 343–5; frequency
UAS in public policy hopping, 64, 291, 300–1, 304–5, 308, 315, 470;
481
Index 481
482 Index
Index 483
484 Index
EM radiation see electromagnetic radiation (EM traffic in arms regulation (ITAR), 183–5;
radiation) issues in real life, 185–6; license, 170–9, 181–3,
EM spectrum see electromagnetic spectrum (EM 186–90; military items, 171, 175–6; military
spectrum) know how, 171, 172, 174, 176–7, 181, 186,
encryption functionality, 172 330; Missile Technology Controls Policy, 176;
Endsley, Mica, 147, 466 nonmilitary, 170, 178, 444; protecting products
energy density, 269, 275, 277–8, 289, 392 of, 186–8; re-export, 172, 182, 186; sources of,
energy systems, potential 2 173; terms for, 171–3; Trading with the Enemy
enterprise fleet services, 439 Act, 170; transfer (of controlled articles), 170,
entry-level quadcopter with gimbal, 79, 87, 88 172–3; violations, 170, 186, 187–90; work
environmental impact, 452 outside of United States, 189–90; see also
EO see executive order (EO) export administration regulations (EAR);
EO cameras see electro-optical cameras (EO International Traffic in Arms Regulations
cameras) (ITAR)
EP see external pilot (EP) export control classification numbers (ECCN),
equivalent series resistance (ESR), 278 177–9, 181–2, 192; on CCL, 169, 177–81, 186,
error, human, 142–4; see also human factors in 192; see also export control for unmanned
unmanned aerial systems aircraft
error correcting code (ECC), 333 externally mounted missile system, 354
error correction strategies, 143 external pilot (EP), 22, 60, 162, 165, 323, 326, 338;
ESCs see electronic speed controllers (ESCs) console, 22
ESR see equivalent series resistance (ESR) external wing pod, 355
European Organization for Civil Aviation
Equipment (EUROCAE), 118, 122–4; see also FAA see Federal Aviation Administration (FAA)
UAS Regulations, Standards and Guidelines FAA Aircraft Certification Service, 111
European Organization for the Safety of Air FAA Avionics Systems Branch, 111
Navigation (EUROCONTROL), 122, 124–5, FAA Extension, Safety and Security Act of
127, 136; see also UAS Regulations, Standards 2016, 114
and Guidelines FAA Flight Standards Service, 111
European Aviation Safety Agency (EASA), 110, FAA Flight Standards Service (AFS), 111; see also
118, 122–7, 130, 133; see also UAS Regulations, Federal Aviation Administration (FAA)
Standards, and Guidance FAA Flight Technologies and Procedures
E-vector see electric field vector (E-vector) Division (AFS-400), 111
executive order (EO), 116, 170, 176, 183, FAA Modernization and Reform Act of 2012
191–2, 467 (FMRA), 102, 104, 108, 110, 113–14, 120, 131–3,
Executive Order 11958, 170, 183, 191–2 135; see also UAS Regulations, Standards, and
exogenous design factors, 218, 242, 287; see also Guidance
unmanned aircraft systems design FAA Order 1000.37B, 120
experimental airworthiness certificate, 112 FAA Order 1100.161 CHG 1, 120
Export Administration Act (EEA), 177 FAA Order 2150.3C, 105
Export Administration Regulations (EAR), FAA Order 8000.365, 120
169–74, 176–9, 181–2, 185–92, 466; commerce FAA Order 8000.369B, 120
control list (CCL), 177–82, controlled items, FAA Order 8040.4B, 120
177; Export Administration Act of 1979, 177; FAA Reauthorization Act of 2018, 106, 115,
Export Control Reform Act of 2018, 170; 135, 389
import, 170–1, 416; MTCR Annex, 180; UAS FAA SAA Workshop, 372, 377, 472
items, 181–2; see also export control FAA TSO c-211 and c-212, 369
export control, 173; AECA, 170, 176, 183, 190, Factory TDN-1, 7–8, 227, 458
468; agency responsibility, 175; compliance failure modes, effects, and criticality analysis
program, 186–7, 190–1, 468; Department of (FMECA), 160–1, 261–2, 265
Commerce License Review Process, 187; Fairey Scout, 6
discussion questions, 191; export controlled far infrared (FIR), 67
data, 174, 187; flowchart, 179; international FARs see Federal Aviation Regulations (FARs)
485
Index 485
486 Index
14 CFR 91, 123, 379 Germany, 18, 126–7, 136, 172, 182–3, 243, 289
14 CFR 91, 181, 379 Getting Started with Defense Trade (DDTC
14 CFR 101.11, 134 publication), 186
14 CFR 101.21, 134 GFE see government furnished
14 CFR 101.31, 134 equipment (GFE)
14 CFR 107, 33, 132, 287, 388–9, 394, 446, 462 gimbal mounting system, 65
14 CFR 125, 224, 371 GIS see geographic information systems (GIS)
14 CFR 135, 455, 462 Global Hawk, 47, 54, 59, 73, 195, 201–3, 209,
14 CFR 137, 462 214–17, 224, 228, 238, 240–1, 251, 253, 268, 271,
47 CFR §215 (FCC), 388 284, 286, 289, 333, 350–1, 401, 408, 418
49 USC, 44807, 446 global positioning system (GPS), 13, 15, 16, 32,
FPV see first person view (FPV) 40, 46, 53, 83, 143, 268, 302, 319, 330–1, 334,
France, 13, 126, 136, 182–3, 227 336–7, 341, 346, 356–7, 360–1, 374, 400–1,
frequency hopping, 64, 291, 300–1, 304–5, 308, 408–13, 419, 424, 429, 433, 461, 471, 474;
315, 318, 325; see also communication systems receivers, 336, 408; spoofing, 400, 408, 410,
frequency shift modulation (FSK), 299–300, 413, 423–4, 429–1, 433, 434, 435, 438; see also
305, 308, 315, 317–28; see also communication small unmanned aircraft autopilot systems
systems Global UTM Association (GUTMA), 118
frequency synthesizer, 299–300, 305, 316 GNDVI see green normalized vegetation index
FSK see frequency shift modulation (FSK) (GNDVI)
FTA see fault tree analysis (FTA) Goodwin, Paul, 139, 152
full motion video (FMV), 26, 35–8, 43, 45, 51, 65 Google Earth, 88
full spectrum spark-gap transmitter 3 Google’s Titan project, 452, 455; see also
fuzzing, 420–1 unmanned aircraft technological trends
GoPro gimbal, 87
gains, 198, 338, 345, 420–1; see also proportional, government furnished equipment (GFE), 269
integral, differential (PID), small unmanned GPS see global positioning system (GPS)
aircraft autopilot systems GPS No-Fly Zones, 409
gain scheduling, 420–1 GPU see generator power unit (GPU)
GAM-67 (Crossbow), 11 graphical software interface, 22
Gatewing X100, 226, 232 green normalized vegetation index (GNDVI),
GCS see ground control station (GCS) 89–90, 92
GCU see generator control unit (GCU) ground control station (GCS), 61–3, 203, 205,
Geiger Mode LiDAR, 80 209, 217, 241, 292, 294, 298–9, 302, 306, 315,
General Atomics Altair, 268 317, 322–3, 338, 344, 471; AeroVironment
General Atomics Avenger, 214, 254, 401 handheld, 63; General Atomics MQ-1
General Atomics MQ-9 Reaper (Predator B), 66, Predator, 62; for larger military UAS, 61;
201–2, 215, 221, 253, 289, 449 Piccolo™ Command Center, 63
General Atomics MQ-9B SkyGuardian, Groupe Speciale Mobile Association
203–4, 286 (GSMA), 118
General Dynamics F-16, 219, 225; see also ground support equipment (GSE), 216–17
fixed-wing designs ground-to-air defense (GTA), 410, 424
general public license, 342 ground waves, 327
generator control unit (GCU), 283–4, 289 GSE see ground support equipment (GSE)
generator motoring see motoring GSMA see Groupe Speciale Mobile
generator power unit (GPU), 283 Association (GSMA)
geographic (or geospatial) information systems GTA see ground-to-air defense (GTA)
(GIS), 30, 35, 41, 54, 82, 85, 88, 98, 100, 393 guidelines for safety-critical structures: payload
geometric pitch, 222, 242, 256 flight equipment requirements (NASA), 339,
geospatial data types, 71, 81; raster, 81; 358–9, 364
vector, 82 GUTMA see Global UTM Association
geospatial imagery, 81; georeferenced, 81–2, 84; Gypsy Moth (De Havilland) see Queen Bee
geotagged, 81–2; orthographic, 81–2 gyro-control system 3, 460
487
Index 487
gyros 3, 13, 203, 337–8, 340–1, 345, 471 human factors in unmanned aerial systems, 137;
gyrodyne, 235 action, 149; ambiguity, 146; attention, 140, 147;
cognitive, 138, 140–2, 147, 152; compatibility,
HALE see high-altitude, 149–50; crew resource management, 145–6;
long-endurance (HALE) diagnosis, 148; distraction management,
hall effect device, 280 141, 146–8, 150, 465–6; divided attention,
hard-iron compensation, 335, 345; see small 141–2; effective team management, 146;
unmanned aircraft autopilot systems enormity of scope, 138; fatigue, 137, 144–5;
hardware, 19, 23, 29, 35–8, 79, 153, 158, 160, focused attention, 141; hindsight bias, 137–9,
163–6, 207–9, 324, 327–8, 330, 342–3, 352–3, 150–2, 465; human element, 57, 58, 68, 321–2,
355, 363–4, 398, 404, 413, 415, 417–19, 421–3, 417, 463; human error, 142–4, 465
430, 469 human–machine interfacing, 149; layered
hardware-based vulnerabilities, 398, 419 error defenses, 145; load stress, 140; multiple
hardware-in-the-loop (HIL), 207–9, 469 resource theory, 140; negative transfer, 143,
hazard analysis, 153–6, 467; change analysis, 146, 149, 151, 465, 466; peripheral vision, 139,
156–9, 467; hazard list, 153–5; initial hazard 465; power distance, 146; relative motion,
identification tool, 156; preliminary hazard 139–40, 465; risk analysis, 148–50; saturation,
analysis, 153, 155–6; purpose, 156–9; review 137; selective attention, 137, 140–1; situation
and analysis, 153, 156–7; see also safety awareness, 147; spatial disorientation, 137,
assessments 148; supervisory influence, 144; sustained
Hazardous Materials Transportation Act attention, 137, 142, 465; team concept
106 principles, 145; threat and error management,
heavier-than-air craft 3, 221 144–5; vigilance, 147–8; see also remotely
heavy fuel engines (HFEs), 214, 249; see also piloted aircraft (RPA)
powerplant designs human machine interface, 148, 414, 418
heavy fuels (HFs), 214, 249 human perception, 137, 139
Hellfire missile, 59 Humphries, Todd, 413
Hepperle, Martin, 223 hydrogen fuel, 450, 474
Heraclitus of Ephesus, 443 hyperspectral imagers, 65, 67, 71, 77–9, 93, 96–9,
Heinkel, 111 bomber 9 463; see also remote sensing
Hewitt-Sperry Automatic Airplane, 226, 237
HFACS see human factors analysis and IAI see Israel Aerospace Industries (IAI)
classification system (HFACS) IC see internal-combustion (IC)
HFEs see heavy fuel engines (HFEs) ICAO see International Civil Aviation
HFs see heavy fuels (HFs) Organization (ICAO)
Hi Aero (Gabbiano), 221, 224 ICAO UAS Advisory Group (UASAG), 122;
high-gain directional antennas, 306, 328 see also RPAS Panel
Highly Maneuverable Aircraft Technology Icarus 1
(HiMAT), 232 ICDs see interface control documents (ICDs)
high fidelity graphical interfaces, 208 Idaho National Lab, 93, 98
HIL see hardware-in-the-loop (HIL) identification friend or foe (IFF), 340, 400–1, 408,
HiMAT see Highly Maneuverable Aircraft 426, 428, 437, 474
Technology (HiMAT) IDETEC Stardust, 221
hindsight bias, 137–9, 150–2, 465; see also human IEEE see Institute of Electrical and Electronic
factors in unmanned aerial systems Engineers (IEEE)
holding area, 328 IEEPA see International Emergency Economic
Honeywell RQ-16 T-Hawk, 214, 236, 243 Powers Act (IEEPA)
Honeywell Tarantula Hawk landing, 238; IETF see internet engineering task force (IETF)
see also rotary-wing designs IFF see identification friend or foe (IFF)
horsepower (hp), 222, 235, 247, 280, 282 IFF acoustic library files, 428
Huerta, Michael, 114, 135 IFR see instrument flight rules (IFR)
human factors analysis and classification image stabilization, 65; see also UAS
system (HFACS), 144–5, 152, 466 sensing-theory and practice
488
488 Index
imaging sensor, 71, 75–7, 463; see also UAS International Council on Systems Engineering
sensing-theory and practice (INCOSE), 196, 210
impulse noise, 304, 317; see also receiver International Emergency Economic Powers Act
IMU see inertial measurement unit (IMU) or (IEEPA), 189
inertial management unit (IMU) International Organization for Standardization
INCOSE see International Council on Systems (ISO), 74, 118, 178
Engineering (INCOSE) International Traffic in Arms Regulations
induced drag, 219–20, 224, 230, 236 (ITAR), 169, 170–9, 181–91; categories dealing
induced power, 233 with UAS, 177, 181–5, 191; -specific export
inductance (of wiring), 268, 270, 273 compliance program, 186; violations, 169–70,
industrial inspection, 19, 35 186, 187, 188–91; see also export control
industrial, scientific and medical (ISM), 62, 64, International Telecommunications Union
293, 295, 315, 325, 343 (ITU), 118
inertial measurement unit (IMU), 321, internet engineering task force (IETF), 118
340–1, 345 internet of things (IoT), 413, 432, 437
inertial navigation system (INS), 11, 321, 331, interrupts mechanism, 334–5
340, 341, 345 Interstate TDR-1, 7, 227
Information Security (INFOSEC), 399, 403–4, Inverted-T, 213, 224, 226–7
413, 431, 435, 473 investigation roster (sUAS) see safety
INFOSEC see Information Security (INFOSEC) assessments
infrared cameras (IR cameras), 71, 78, 463 InView Unmanned Aircraft System, 229–30, 247;
infrastructure inspection, 25, 35, 71, 84, 88, 113 see also fixed-wing designs
Inmarsat Network, 292, 317, 319, 327 Ion Tiger, 224, 275
inner control loop see flight control systems IoT see internet of things (IoT)
Innovative Power Solutions LLC, 286 Ireland, 127, 136, 183
INS see inertial navigation system (INS) Iridium satellite system, 64, 327
insider threat vulnerabilities, 398, 417, 419 IR cameras see infrared cameras (IR cameras)
in situ see remote sensing ISM see industrial, scientific, and medical (ISM)
integral planetary gear reduction systems, 282 isotropic antenna, 300–3, 310, 318
integral component see proportional, integral, isotropic radiator, 300–1
differential (PID) ISR see intelligence, surveillance, and
intermodulation noise, 303 reconnaissance (ISR)
internet connection sharing (ICS), 283, 417–18 Israel Aerospace Industries (IAI), 14, 214, 221,
Instituto de Agricultura, 93 228, 243, 247, 248, 249, 252, 275, 461; Arava
Institute of Electrical and Electronic Engineers STOL, 228; Decoy, 461; Eitan, 252; Ghost,
(IEEE), 98, 99, 118, 293, 295, 301, 319, 434, 437 235; Heron, 249, 221, 228, 249, 401; Heron
instrument flight rules (IFR), 111, 123, 368, 379, II, 241; Hunter, 203–4, 223, 228–30, 239, 247;
383, 447 Mabat, 13, 228, 461; Malat Mosquito, 214, 230;
intelligence, surveillance, and reconnaissance Mastiff, 221; Panther tiltrotor, 275; Pioneer,
(ISR), 45, 58–9, 87, 88, 184, 268, 398, 403, 228; Scout, 14, 228; Searcher, 228, 248
407–8, 411–12, 425 ISO see International Organization for
interdependent synergism, 215 Standardization (ISO)
interface control documents (ICDs), 352–3 Italy, 54, 127, 136, 182–3
Interim Operational Approval Guidance 08-01 ITAR see International Traffic in Arms
(FAA), 105, 108, 134 Regulations (ITAR)
intermodulation noise, 303; see also receiver ITAR-specific export compliance program, 186
internal-combustion (IC), 200, 246, 247, 249, 251, ITU see International Telecommunications
274, 364, 426, 468, 469; see also UAS Propulsion Union (ITU)
System Design
international aviation regulations, 101, 103, 120 JAA see joint aviation authorities (JAA)
International Civil Aviation Conference, 121 jamming, 11, 13, 17, 64, 268, 292, 315–16, 318–19,
International Civil Aviation Organization 400, 410–11, 424–5, 429–30, 434, 461, 470, 474;
(ICAO), 18, 101, 135, 369, 385, 464 see also communication systems
489
Index 489
Jane’s, All the World’s Aircraft: unmanned, 210 239; Boeing Insitu RQ-21A Blackjack, 240;
Japan, 6, 8, 10, 13, 48–9, 55, 127, 136, 182, 183, catapult launchers 4, 9, 59, 67–9, 223, 237–9,
433, 460–1 463; Global Hawk’s, 240; hand-launched UAS,
JARUS see joint authorities for rulemaking on 67–8, 68, 237; launch techniques, 238; MQM-
unmanned systems (JARUS) 57, 238; RATO/JATO launch systems, 238–9;
JARUS JAR doc 06 SORA package, 123–4, 130, recovery phase of operation, 239; recovery
136, 440 systems 239–40; Vireo, 237, 255–6, 275; see also
JATO see jet-assisted takeoff (JATO) unmanned aircraft system design
jet-assisted takeoff (JATO), 238–9 launch and recovery element (LRE), 67–8, 240,
joint authorities for rulemaking on unmanned 243; see also launch and recovery (L&R)
systems (JARUS), 118, 124, 130, 133, 440; law of conservation of angular momentum,
see also UAS Regulations, Standards, and 233, 281
Guidance lead-acid (LA), 277
joint aviation authorities (JAA), 123; see also leakage drag, 219, 221, 277
UAS Regulations, Standards and Guidance LiDAR see light detection and ranging (LiDAR)
Joint Publication (JP) 3-01 “Countering Air and life-cycle costs, 196, 217
Missile threats”, 407, 434 lift, 18, 199, 218–26, 230–4, 237–9, 242, 245,
Joule cycle powerplants see Brayton cycle 257, 282, 453; see also unmanned aircraft
powerplants system design
Joule, James Prescott, 269 light detection and ranging (LiDAR), 19, 23, 27,
31, 35–6, 55, 65, 71, 77, 79–80, 82, 93, 95, 97–9,
Kalman filters, 333, 341, 344 205, 295, 340, 380–1, 412, 463, 468; see also
Kaman K-MAX K-1200, 235, 252 remote sensing
Kansas State University, 22–3, 38, 40, 42, 44, 46, lightweight biplane 4, 5
49, 449–50 light sport aircraft certification process, 449
Kettering, Charles 4, 5, 17, 460 Lilienthal, Otto 2, 17–18, 237
Kennedy, Lt. Joseph P. 8, 460 linear regulators, 283
Klein, Gary, 148, 152, 466 line impedance stabilization network (LISN), 271
K-MAX rotor system, 235; see also rotary-wing line-of-sight (LOS), 15, 36, 57, 62, 64, 114, 203,
designs 292, 321, 326, 327, 389, 446, 462
know-how see export controls link design, 291, 308–9, 470; examples, 308–9;
losses at transmitting antenna, 309; losses
LAANC see low altitude authorization and due to free space propagation, 309–10; power
notification capability (LAANC) in decibel milliwatts, 313; power received at
L&R see launch and recovery (L&R) receiving antenna, 311–12; receiver sensitivity,
LA see lead-acid (LA) 314; reflection antenna–cable junction,
Landstar/Yi-Lan Chen, 189 308–9; S/N ratio at receiver, 313–14; see also
Lauber, John K. 145, 152 communication systems
lead-acid (LA), 277 LiPo battery, 452; see also unmanned aircraft
Laliberte, Andrea, 93, 98 technological trends
Langley, Dr. Samuel P. 3, 17, 237 LISN see line impedance stabilization
large UAS navigation systems, 340; alternative network (LISN)
navigation, 345; autolanding systems, 323, Liteye Anti-UAV Defense System (AUDS),
471; automatic launch and recovery, 341; auto- 410, 436–7
takeoff, 204, 205, 241, 341, 345, 468, 471; BLOS Livingston, Ralph, 287, 289
communication, 327–8; direct reckoning, 341; LNA see low-noise amplifier (LNA)
see also command-and-control (C2) load stress, 140
large unmanned helicopters, 234 Lockheed Martin/Boeing Tier III-(minus) RQ-3
larynx 6 DarkStar, 221, 272
launch and recovery (L&R), 57–9, 67, 155, 213, Lockheed Martin: Indago, 34; M-21/D-21,
216, 237, 239–41, 243, 321, 327, 341, 362–3, 239; MQM-105 Aquila, 14; Polecat, 253–5;
462, 463; airdrop launch, 238–9; automatic QF-16, 219; RQ-3, 231, 272; RQ-170, 231, 424;
(ALR), 341, 345; belly skid recovery, 237, Sentinel, 268; Skunkworks, 238; Stalker, 238
490
490 Index
long-range acoustic device (LRAD), 426, 436; MAVLink see Micro Air Vehicle Communication
see also communication systems Protocol (MAVLink)
long wave infrared (LWIR), 19, 24–6, 65, 67, 75, MAVTL see minimum acceptance vibration test
78, 86, 92, 95; cameras, 26, 65–6, 71, 75–9, 86, levels (MAVTL)
92, 95; see also remote sensing Maxwell’s equations, 270
LORAN networks, 11 Mayrow General Trading, 188–9
Lorentz Force Law, 270 MCAI see mandatory continuing airworthiness
LOS see line-of-sight (LOS) information (MCAI)
Los Angeles Aircraft Certification Office McDonnell ADM-20 Quail, 11; see also
(ACO), 287 unmanned aerial vehicles (UAVs)
loss of signal (LOS), 410 MCE see mission control element (MCE)
lost link procedures, 60, 323–4, 334, 462 MCSO see Mesa County Sheriff’s Office (MCSO)
low altitude authorization and notification means of compliance, 162–3, 262–3, 269–70, 472
capability (LAANC), 33, 194, 440 mean time between critical failures (MTBCFs),
low noise amplifier (LNA), 299, 302 160, 262
low-pass (LP), 273, 288 mechanical power, 233
LRAD see long-range acoustical device (LRAD) medium altitude long endurance (MALE),
LRE see launch and recovery element (LRE) 232, 258
L-3 Mobius, 232 memory effect, 278; see also sUAS electrical
LWIR see long wave infrared (LWIR) systems
MEMS see micro-electrical mechanical
Mabat UAS, 14, 228, 461 systems (MEMS)
M&S see modeling and simulation (M&S) MEMS gyroscope, 398, 427, 437
machine code, 342, 345 messenger aerial torpedo (MAT), 6, 226
Magicfly UAS, 280 metadata, 26, 30, 334, 352
magnetometers, 335, 338, 471 metal-oxide-semiconductor field-effect
maintenance man-hours per flight hours transistor (MOSFET), 280
(MMHFH), 208 Mexico, 127
MALE see medium altitude long micro-aerial vehicle (MAV), 230, 234, 268, 321,
endurance (MALE) 329–31, 450–1; see also unmanned aircraft
malware analysis, 404 technological trends
mandatory continuing airworthiness Micro Air Vehicle Communication Protocol
information, 163, 263 (MAVLink), 29, 32, 34, 321, 329–32, 344–5
man-in-the-middle attack (MIM), 420 microbolometer, 78, 94
manned-unmanned teaming, 205 microchip, 451; see also emerging trends in
manual on remotely piloted aircraft systems, technology
122, 135; see also ICAO RPAS Panel microcontroller, 332, 342
manufacturing codes, standards and micro-electric mechanical systems (MEMS),
regulations, 119 16, 94, 338, 341, 345, 392, 398, 401–2, 411, 424,
market growth, 443–4 427–8, 437, 461, 471, 474
market segments, 443–4, 447 Micro Spectrometer Instrument Suite
mars rover, 457 (NASA), 77
MASPS see minimum aviation system Micro Unmanned Aircraft Systems Aviation
performance standards (MASPS) Rulemaking Committee, 116
Mastiff (Tadiran Electronics Industries), 221, microwave range, 293
228 Middle Tennessee State University, 450
MAT see messenger aerial torpedo (MAT) mid-wave infrared (MWIR), 19, 24–6, 65,
MAV see micro-aerial vehicle (MAV) 67, 75, 86
MAVTL see minimum acceptance vibration test MIL-HDBK-516, 161, 162
levels (MAVTL) MIL-HDBK-274, 271
materials science, 454, 471 MIL-SPEC-881D, 210
Mattis, James D. SECDEF (Secretary of MIL-STD-461F Appendix A, 271
Defense), 407 MIL-STD-464, 271
491
Index 491
MIL-STD-704/704F, 269–70 MQ-9 Predator B, 66, 201–2, 252–3, 285; see also
MIL-STD-810, 270 unmanned aircraft system design
MIL-STD-882D/E, 154–7, 159, 164 MQ-9B SkyGuardian, 203–4, 286
MIL-W-5088L, 270 MQM-105 Aquila see Lockheed Martin
MIM see man-in-the-middle attack (MIM) MRAM see mishap risk assessment
miniaturization, 15, 94, 205, 274, 280, 350, 393, matrix (MRAM)
443, 450, 471 MTBCFs see mean time between critical failures
minimum acceptance vibration test levels (MTBCFs)
(MAVTL), 339, 358–9, 364; see also payload MTCR see Missile Technology Control
minimum aviation system performance Regime (MTCR)
standards (MASPS), 119 MT1 controls see Missile Technology 1 (MT1)
minimum operational performance standards controls
(MOPS), 119, 207, 369, 385 MTS-A sensor ball see MQ-1B Predator Multi-
minimum safe altitude, 107 Spectral Targeting System
mishap probability levels, 164; see also safety MTS-B sensor pod see multi-spectral targeting
assessments system-B sensor pod (MTS-B sensor pod)
mishap risk assessment matrix (MRAM), 164; multimodal aerial ride sharing, 440
see also safety assessments multiple resource theory, 140, 465
mishap severity categories, 164 multiplexer, 340, 345
Missile Technology Control Regime (MTCR), multi-rotor systems, 235–6; see also rotary-wing
171–5, 178, 181–2, 191–2, 468; annex, 169, 171, designs
182, 191; countries in, 182–3; see also export multi-spectral targeting system-B sensor pod
control (MTS-B sensor pod), 66
Missile Technology 1 Controls, 181 MUM-T see manned-unmanned teaming
Missile Technology Controls Policy, 176 MWIR see mid-wave infrared (MWIR)
mission control element (MCE), 241, 273
mission-derived design, 205; see also unmanned N2C-2 Target Drone, 6; see also unmanned aerial
aircraft system design vehicles (UAVs)
Mission Planner software, 23 N-9 Aerial Torpedo, 4, 460
mission planning, 20, 33, 51, 163, 400 NAA see National Aviation Authorities (NAA)
Mistletoe Bombers 1, 10, 461; see also unmanned NACA Report No. 824, 231
aerial vehicles (UAVs) nano air vehicles (NAVs), 450; see also emerging
Mitchell General Billy 5 trends in technology
MMHFH see maintenance man hours per flight NANO SAR Circa 2008, 81
hours (MMHFH) NAS see National Airspace System (NAS)
mobile truck test, 360–1; see also payload NASA Centurion, 275
model aircraft, 16, 103, 107, 109–13, 120, 125, NASA Global Hawk, 47, 54, 195; see also Global
127–8, 130–1, 388, 450 Hawk; Northrop Grumman Global Hawk
modeling and simulation (M&S), 207, 437 NASA Helios, 224, 275–6; see also sUAS electrical
Montgolfier Brothers 2 systems
MOPS see minimum operational performance NASA Ikhana, 195, 268
standards (MOPS) NASA Sierra, 77, 98
MOSFET transistor see metal-oxide- National Airspace System (NAS), 28, 54, 58, 103,
semiconductor field-effect (MOSFET) 105, 112, 133, 135, 153, 214, 278, 392, 439, 446,
transistor 458, 462, 467
MotoCalc, 200, 209 National Aviation Authorities (NAA), 124; see
motoring, 284, 289; see also sUAS electrical also UAS Regulations, Standards and Guidance
systems National Institute of Standards and Technology
MQ-1B Predator Multi-Spectral Targeting (NIST), 434, 436
System, 347, 348 National security, 85, 121, 128, 169, 178–9, 187,
MQ-1C Gray Eagle, 203–5 190–1, 388, 419, 434
MQ-8 Northrop Grumman Fire Scout, 59, 215, National Transportation Safety Board (NTSB),
234, 401 109, 116, 134, 141, 145, 151, 414, 436
492
492 Index
Index 493
494 Index
Index 495
496 Index
SAE AS50881 (on wire gauge sizing), 270 sensitive facilities, 389
safety assessments, 153; mishap probability SESAR see Single European Sky ATM Research
levels, 164 ; mishap risk assessment matrix, (SESAR)
164; mishap severity categories, 164; see also SFARs see Special Federal Aviation Regulations
accident investigation considerations; hazard (SFARs)
analysis; risk assessment; safety evaluation SFM see structure from motion (SFM)
safety evaluation, 160; airworthiness Shadow see RQ-7
certification, 161–2; airworthiness test card, Shannon-Hartley limit, 307; see also bandwidth
162; flight test cards, 161; risk assessment, Shappell, Thomas, 144–5, 152, 465
160; see also safety assessments shaft horsepower (shp), 222, 235
safety management system (SMS), 50, 120, 128, Shannon–Hartley relation, 317
130, 165, 467 SHORAD see Short Range Air Defense
SAMs see surface-to-air missiles (SAMs) (SHORAD)
SAR see search and rescue (SAR) short-circuits see sUAS electrical systems
SARP see SAA Science and Research short-haul urban air transportation, 440
Panel (SARP) Short Range Air Defense (SHORAD), 429
SARPS see standards and recommended short-wave infrared (SWIR), 19, 24–6, 67, 75
practices (SARPS) shp see shaft horsepower (shp)
SATFOR see Special Air Task Force (SATFOR) signals intelligence (SIGINT), 46
satellite-based augmentation system (SBAS), 336 signal interference, 64
sausage making process, 131 signal-to-noise ratio (S/N ratio), 291, 302, 303,
SBAS see satellite-based augmentation 305, 307, 313–14, 326; see also receiver
system (SBAS) signal strength, 61–2, 326–8
SBIR see Small Business Innovation simple storage system (S3), 84
Research (SBIR) simultaneous localization and mapping
SC-203 see Special Committee, 203; Unmanned (SLAM), 341, 346
Aircraft Systems (SC-203) Sinclair Community College, 450
SCADA see Supervisory Control and Data single-acting propeller governor, 257
Acquisition (SCADA) Single European Sky ATM Research (SESAR),
scalability, 443, 456 118, 122; see also UAS Regulations, Standards
ScanEagle™, 67, 69, 80, 202, 224, 230, 240 and Guidance
Scout see Israel Aerospace Industries single-pilot operations, 455
Schmidt, Paul, 9, 18 single-wire system, 271, 284; see also sUAS
SDO see standards development electrical systems
organization (SDO) situation awareness, 137, 141, 146–50, 369, 465,
SDSPs see supplemental data service providers 466, 472; see also human factors in unmanned
(SDSPs) aerial systems
SEAD see suppression of enemy antiaircraft size, weight, and power (SWaP), 350, 392–3
destruction (SEAD) SkyGuardian, 203, 204, 286
search and rescue (SAR), 20, 25, 33, 45–6, 59, 87, SkyHook™, 67, 69, 239, 240
97, 112, 121, 128, 146, 268, 292, 347, 364, 463 Skyports, 440
Secretary of Defense (SECDEF), 183, 210, 372, 407 Skywalker X8, 224, 230
Secretary of State, 183–4 sky waves, 327
Secretary of the Treasury, 183 SLAM see simultaneous localization and
Section, 333; Exemption, 43, 113–15, 135, 446 mapping (SLAM)
see and avoid requirement, 111, 472 Small Airplanes Standards Branch, Policy &
self-separation (SS), 378, 412; see also detect and Innovation Division, 449
avoid systems (DAA systems) Small Business Innovation Research (SBIR), 286
Senders and Moray, 142 Small Business Technology Transfer (STTR), 286
sense and avoid (SAA), 111, 131, 207, 347, 364, small unmanned aircraft autopilot systems,
369, 372, 397, 399, 411, 412, 434, 438, 454, 468; 332; attenuator, 327; barometric pressure
sub-functions, 378; see also detect and avoid sensors, 335; built-in flight data recorder
systems (DAA systems) 333; checksum, 329, 331; command and
497
Index 497
control transceivers, 324; data link modems, spectrum, 24–6, 37, 64–5, 67, 71, 73, 75–8, 80, 89,
326–7; differential pressure transducer, 123, 291, 292–6, 300, 315, 321, 324–6, 338, 357,
335–6; external pilot controllers, 338; flight 409, 440, 471; see also UAS Sensing-Theory
control systems 2, 29, 181, 184, 338, 460, 468; and Practice; electromagnetic spectrum
gains, 198, 338, 421; GPS receivers, 336, 408; (EM spectrum); Federal Communications
hard iron compensation, 335; inner control Commission (FCC)
loop, 203; interfaces, 22, 119, 207–8, 210, Sperry Aircraft Corporation see messenger
270, 322, 323, 333, 384, 393; interrupts, 333; aerial torpedo (MAT)
magnetometers, 335, 338, 471; pitot/static Sperry, Elmer, 3, 4, 6, 8, 200, 237
tube with sensor, 336; pressure transducer, Sperry, Lawrence, 4, 6, 237, 460
335; soft iron compensation, 335; stabilized Sperry Messenger lightweight biplane 6
control, 19, 21–2, 43, 51; steady-state error, spoofing GPS, 400, 408, 410, 474; see also global
339; see also small unmanned aircraft systems positioning systems
(sUAS), command and control spot sensors, 71, 76–7, 463; see also remote
small unmanned aircraft systems (sUAS), sensing
113, 115, 120, 167, 267, 364; command Spratly Islands, 407
and control transceivers, 324; electric spread spectrum technique see frequency
powerplants, 354–5; ground control system hopping
interface with waypoints time, 332; IMU/ SQL injections, 418, 419
INS stabilization systems, 321, 340–1; SR-71 Blackbird, 239
line of sight communication, 321, 325–6; SS see self-separation (SS)
multirotors, 60, 213, 214, 235–6, 256; rotor SSA see system safety assessment (SSA)
blade dynamics, 232–4, 252; space waves, STA see Strategic Trade Authorization (STA)
325; see also command- and-control (C2); UAS STANAG, 4586, 119, 210
Regulations, Standards and Guidance; UAS STANAG, 4671, 203, 287
in Public Safety; small unmanned aircraft Standards and Recommended Practices
autopilot systems (SARPS), 101, 121, 122; see also UAS
SMS see safety management system (SMS) Regulations, Standards and Guidelines
S/N ratio see signal-to-noise ratio Standards Development Organization (SDO),
(S/N ratio) 116, 118, 439
Snowden, Edward, 419 standard sensor parameters, 411, 412
Society of Automotive Engineers (SAE), 118, state police power, 392
207, 218, 270 stator, 249, 255, 274, 279–80, 282–4
soft-iron magnetic field see small unmanned steady-state error, 339; see also small unmanned
aircraft autopilot systems aircraft autopilot systems
solar technology, 452; see also emerging trends in stealth design, 400, 426, 474
technology steering commands, 203
solid-state circuit breakers see sUAS electrical STM see space traffic management (STM)
systems S3 see simple storage system (S3)
SORA, 123–4, 130, 440; see also JARUS JAR doc Strategic Trade Authorization (STA), 181
06 SORA package strict liability regime, 189; see also export control
source code, 342 structure from motion (SFM), 39–40, 71, 82
South Africa, 129, 136, 172, 183 STTR see small business technology
space traffic management (STM), 440 transfer (STTR)
space waves, 325 sUAS electrical systems, 274; all-electric
Special Air Task Force (SATFOR), 8 Penguin BE payload bay, 277; all-electric
Special Airworthiness Certificate, 108, 111, 113, sUAS, 267, 274–5, 281; Aveox, 27/26/7-AV
114, 446 inrunner BLDC motor, 282; battery chemistry,
Special Committee, 203; Unmanned Aircraft 277–8; BEC, 281; brushed motor, 274, 279–80,
Systems (SC-203), 119, 207, 210 282; brushless motors, 255, 280, 289; capacity
Special Federal Aviation Regulations of cell, 277; carbon fiber cooling shroud,
(SFARs), 103 281; carbon fiber forward-facing air scoop,
spectral reflectance see remote sensing 281; commutator, 255, 279, 282, 286; current
498
498 Index
limiter, 285; electric sUAS propulsion, 279–82; Target Drone Denny 1 (TDD-1), 6, 460; see also
electrolysis, 276; electronic commutation, unmanned aerial vehicles (UAVs)
280; electronic speed control, 280–1; energy target drones 5–6; Larynx 6; Navy Research Lab
conversions in electrochemical cell, 222, N2C-2 Target Drone 6; OQ-1 Radioplane 6,
276–8; energy density, 269, 275, 277, 278, 392; 227; Queen 6, 7; Queen Bee 7, 15, 226; Sperry
GCU, 283–4; memory effect, 278; motoring, Messenger biplane 6, 226; in formulating
284; NASA Helios, 275, 276; nominal cell power doctrine 6
voltages, 276; nonelectrically powered sUAS, targeting area dimensions, 426–7
282–3; Northrop Grumman RQ-4/MQ-4 TASE 400 Gimbal, 86
fuselage, 284; Penguin BE, 48-cell, 278; power TCAS see traffic alert and collision avoidance
density, 277, 310; power source, 268, 270–1, system (TCAS)
279, 283–4; short-circuit failures, 269; single- TDC see top dead center (TDC)
wire system, 271, 284; solid-state circuit TDD-1 see Target Drone Denny 1 (TDD-1)
breaker, 271, 284–5; stator field, 279–80; TDN-1, 8
superconductors, 269, 270; switch-mode TDR-1 Assault drone 7
regulators, 281, 283; system redundancies, Teal Group Corporation, 444, 458
194; 2S, 277; voltage regulation, 274, 283; technical assistance agreements (TAA), 171; see
see also unmanned aircraft electrical system also export control
subsonic flow, 221 technical standards order (TSO), 104–5, 269
superconductors see sUAS electrical systems teleautomation 3
Supervisory Control and Data Acquisition Tempest UAS see VORTEX-2
(SCADA), 399–401, 409, 411, 413–24, 430 temporary flight restrictions (TFR), 105, 160
supervisory influence, 144–5; see also human Tesla, Nikola 3
factors in unmanned aerial systems test ranges, 113
suppression of enemy antiaircraft destruction tethered aircraft, 322, 471
(SEAD), 11 TFR see temporary flight restrictions (TFR)
supplemental data service providers thermal Infrared cameras, 57, 64–5, 75, 78,
(SDSPs), 439 409, 463
surface-to-air missiles (SAMs), 11 thermal noise, 303, 304, 313; see also receiver
surveying, 20, 25, 34, 39–41, 45, 54 thermal testing, 360; see also payload
swarming UAS, 184, 443, 457 thermographic cameras see long wave infrared
Sweden, 129, 136, 183 (LWIR) cameras
SWIM see system-wide information thin-ply tape technology, 453
management system (SWIM) 3rd Generation Partnership Project (3GPP), 118
SWIR see short-wave infrared (SWIR) three D’s 2, 461
switch-mode regulators, 282, 283; see also sUAS 3-D printing, 454
electrical systems 3GPP see 3rd Generation Partnership
symmetric key, 332 Project (3GPP)
synthetic aperture radar (SAR), 19, 27, 28, 31, 65, thrust, 200, 214, 218–23, 229, 230, 233–8, 245–7,
71, 77, 80–1, 97–8, 205, 340, 463, 468; NANO 251–4, 256, 260–4, 280, 282; see also aircraft gas
SAR Circa, 2008, 81; see also remote sensing turbines; unmanned aircraft system design
system complexity, 165 tilt-rotor designs, 60
Systems Operations Support Center, 389 Title 14 of the Code of Federal Regulations, 104
system safety assessment (SSA), 123, 160 Title 49 U.S.C. § 44809, 110
System Safety for the 21st Century (Stephens), 167 top dead center (TDC), 246, 249
system testing, 347, 349, 357–8; see also payload topographical maps, 41
system-wide information management system Torque effect, 235, 236; see also small unmanned
(SWIM), 439 aircraft systems; rotor blade dynamics
tower/antenna inspection, 19, 37
TAA see technical assistance agreements (TAA) Trading with the Enemy Act, 170
tail rotor, 234–5, 249 traffic alert and collision avoidance system
tail designs see unmanned aircraft (TCAS), 117, 371–2, 374, 377, 379, 380, 382,
systems design 385, 411, 412
499
Index 499
training and certification, 443, 447–9 sausage making process, 131, 466; standards
training and education, 444 and guidance vs. regulations, 118–20
Transportation Command (TRANSCOM), 469 UAS Service Suppliers (USS), 437
transceivers, 299, 324, 325, 327, 471 UAS SWARMS, 398, 432
TRANSCOM see transportation command UAS Test Site Partnership, 115
(TRANSCOM) UAS Traffic Management Project (NASA), 437
transmitter, full-spectrum spark-gap 3 UAVs see unmanned aerial vehicles (UAVs)
T-Rex small helicopter, 234 UAV Factory, 226–7, 236, 246, 253, 273, 276, 279,
tribal governments, 446 280, 283
Trojan Horse virus, 417, 420 UCAV see unmanned combat air
TRW, 229, 239; see also IAI RQ-5 Hunter vehicle (UCAV)
TSO see technical standards order (TSO) UCAV X-45A, 454
turbine wheel (T-wheel), 251 UCAV X-47B, 229, 236, 249, 251
turbofans, 252, 253, 255 UCLASS see unmanned carrier-launched
turbojets, 253–4; see also aircraft gas turbine airborne surveillance and strike (UCLASS)
turboprops, 252–3 UHF see ultra high frequency (UHF)
turboshaft, 252–3 UIUC see University of Illinois
turret mounting system see gimbal Urbana-Champaign (UIUC)
mounting system ultra high frequency (UHF), 338
22 C.F.R. § 120–130, 170 ultrasonic frequency resonance, 423
22 U.S.C. 2778 see Arms Export Control Act of ultraviolet (UV), 24, 67, 293
1976 (AECA) United Kingdom, 129, 136, 182, 183
T-wheel see turbine wheel (T-wheel) University of Illinois Urbana-Champaign
twin boom pushers 1, 13–14; see also unmanned (UIUC), 197
aerial vehicles (UAVs) University of Nebraska-Lincoln (UNL), 49, 55
two-cycle engines, 247, 249 UNL see University of Nebraska-Lincoln
2S battery, 277; see also sUAS electrical systems (UNL)
2019 World Civil UAS Market Profile and University of North Dakota, 134, 345, 348
Forecast (Teal), 444 unlicensed frequencies, 323, 324, 342
Unmanned Aircraft Systems Advisory
UA see unmanned aircraft (UA) Group-ICAO, 122
UAM see urban air mobility (UAM) Unmanned Aircraft Systems (UAS) Registration
UAS see unmanned aircraft systems Task Force (RTF), 116
(UAS), unmanned aircraft systems unmanned aerial vehicle control system (UCS),
engineering (UASE) 119, 205, 208
UASAG see Unmanned Aircraft Systems unmanned aerial vehicle factory Penguin BE,
Advisory Panel-ICAO 226, 253, 254, 273, 276, 279, 280; see also
UAS Cyber Attack Taxonomy, 414 fixed-wing designs
UAS Data Exchange and Manufacturer’s unmanned aerial vehicles (UAVs), 2; AAI
Toolkit, 115 RQ2 Pioneer, 14, 15, 201–2, 221, 224, 228,
UAS grouping, 158, 160 238, 248, 250; aerial torpedo 1, 3, 4–7, 198;
UAS Integration Office, 385, 445 amateur-built unmanned aircraft 1, 15–16;
UAS Integration Pilot Program (IPP), 115, AQM Lightning Bug, 12, 461; autonomous
448 operation, 13; Curtiss prototype 4; Desert
UAS Regulations, Standards and Guidance Storm, 14–15; early aviation development
101–3; collision avoidance rule, 111; 1–2; early reconnaissance aircraft, 10–11; first
enforcement and sanctions, 105–10; FMRA helicopter, 12–13; long-range reconnaissance,
of 2012, 102, 104, 108, 110, 113, 114, 120, 131, 11–12; and manned aircraft, 15–16; need
132; future of UAS regulations, 130–2; history for effective control 2–3; overcoming
of, 103; ICAO, 120; informal rulemaking, 116, manned pilot bias, 15; radar decoys, 11;
117; international aviation regulations, 120–4; radio and autopilot 3–4; target drone 5–7;
process, 116–18; public aircraft, 108, 111–12; teleautomation 3; three D’s 2; twin boom
regulation of unmanned aircraft, 110–16; pushers 1, 13–14; U.S. Army Liberty Eagle 5;
500
500 Index
WWII German Mistletoe, 10; WWII German system, 347, 348; Northrup Grumman Global
V-1 Buzz Bomb 9–10; WWII U.S. Navy Hawk UAS, 351; payload subsystems, 347;
Assault Drone 7–8; see also Federal Aviation systems engineering, 196–8, 210, 347, 349, 370,
Administration (FAA) 471; system testing, 356, 357–61; temperature
unmanned aircraft electrical systems, 265; ratings, 356; test plan, 362; thermal chamber,
aviation quality wire, 267; AWG system, 360; thermal testing, 360; trade studies, 347,
267–8; electrical power, 266; electronic filters, 349–50; vibration excitation test, 358, 360,
271; EMI-suppression strategy, 271; EMI 364; weight budget, 353; see also payload;
gaskets, 354; excitation frequencies, 356; for unmanned aircraft system design
large UASs, 283–4; general characteristics, unmanned aircraft system applications, 19,
266–72; impedance, 268–9; LEMO connectors, 33; aerial chemical application, 20, 48–9;
353; Lockheed Martin/Boeing Tier III-(minus) aerial filming, 43; aerial mapping, 39–40;
RQ-3 DarkStar, 270; miniaturization, 14, 94, aerial photography, 43; aerial surveying,
203, 272, 278, 348, 441, 448; nonconductive 40; atmospheric information collection, 47;
composites, 267; Ohm’s law, 267; power cargo/package delivery, 49, 50; chemical
source, 266–7, 273; resistance of conductor, applications, 48; civil infrastructure, 35–6;
267; wire selection, 268–69, 284; see also sUAS communications relay, 47; computer vision,
electrical systems 28, 31–2, 88; electric power industry,
unmanned aircraft market segments, 441, 445; 36–7; filmmaking, 43–4; hazardous
airspace access, 446; career opportunities, 447; material detection, 48; hydrocarbon/
emerging trends, 448; future applications, methane emission, 48; image recognition,
453; private/commercial, 443–4; public, 445; 31; industrial/infrastructure inspection, 35;
routine airspace access, 446; training and intelligence, surveillance, and reconnaissance,
certification, 446; see also unmanned aircraft 45; law enforcement, 45; marketing,
systems (UAS) 44; meteorology, 47; natural resource
unmanned aircraft sensing, 24, 72–6; aircraft as management, 43; news reporting, 44; oil and
sensor platform, 74; drone silhouette chart gas inspection, 34–5; orthomosaic maps, 34;
for scale comparison, 73; infrared sensors, photogrammetric applications, 39; precision
78; in situ sensing, 72–3; jamming, 315; laser agriculture, 41–3; radioactive material
designator, 67; laser illuminator, 347; platform detection, 48; real estate, 44; remote sensing,
considerations, 74; point cloud, 27, 29, 40, 82; 43, 49, 73, 74 (see also remote sensing);
RGB (red, green, blue) cameras and sensors, search and rescue, 45–6; signals intelligence
23–6, 31, 33, 77, 99; sensor packaging, 351; (SIGINT), 46–7; 3-D model of cornfield, 26;
size categories, 73; spectrum analyzer, 355; tower/antenna inspection, 37–8; video
tethered aircraft, 322, 471; see also remote capture, 20; volumetrics, 41; water sampling,
sensing 49; wind turbine inspection, 37; see also
unmanned aircraft subsystems, 198; airframe, unmanned aircraft systems (UAS)
198–200; airframe cost relative to payload unmanned aircraft system design, 193;
capacity, 201; communications, command, airframes, 198; battery, 200; converting shaft
and control, 205–6; control station, 203–5; horsepower to thrust, 222; CS interface,
design tools, 196–7; flight control system 203, 205, 207; drag, 216, 218–23; economic
200–3; fraction of system cost vs. airframe influences on design process, 217; exogenous
empty weight, 201; NetUASC3, 205–6; factors affecting, 218; form follows function,
payloads, 205; performance of representative 216–17; heavier-than-air craft, 221; high
UAS over a range of sizes, 196, 202; aspect ratio wings, 214, 220–1; incompressible
propulsion system, 200; servos, 194, 208, 267, airfoil theory, 222; lift, 218–23; mission-
273, 275, 277, 338; see also unmanned aircraft derived design, 205; primary flight display,
system design 322; process, 193–7, 207, 213, 215–18, 223,
unmanned aircraft subsystem integration, 347; 236–7, 347, 349, 350, 353, 365; safety, 207,
Black Hornet nano helicopter, 352; externally 261, 264, 323, 339, 358, 359 (see also safety
mounted missile system, 354; external wing assessments); Skunk Works® 3 + Mach
pod, 355; flight testing, 361–3; laser range D-21, 219; standards, 206–7; subsonic flow,
finder, 65, 67, 86; multi-spectral targeting 221; tail designs, 213, 225, 228; verification
501
Index 501
and mission validation, 207–8; wheel, unmanned aircraft technology, 21; automated
251–2, 258; X-51 Waverider, 219–20, 238; control, 22–3; control methods, 21; external
see also unmanned aircraft subsystem; pilot console, 22; full motion video, 26;
fixed-wing designs; launch and recovery manual control, 21; metadata, 26; Mission
(L&R); powerplant designs; rotary-wing Planner software, 23; payloads, 23; stabilized
designs control, 21; still imagers, 26
unmanned aircraft systems (UAS), 57–8; AAI unmanned carrier-launched airborne
Aerosonde vehicle-top launch cradle, 70; surveillance and strike (UCLASS), 231
airframes, 198; air transportation, 455–6; unmanned combat air vehicle (UCAV), 231, 238,
anticipated market growth, 444; arresting 251, 253, 456
cable, 67, 69; atmospheric satellites, 453; unmanned gliders, 2; see also unmanned aerial
automation, 60; autopilot, 60–1; autopilot vehicles (UAVs)
systems for, 60–1; autopilot unit, 60; beyond unmanned spaceflight, 457
line-of-sight operations, 203, 389; career unmanned technology, 20, 21
opportunities, 449–50; catapult launcher, unmanned traffic management (UTM), 439–41
67; classification system, 58–9; command UPP see UTM Pilot Program (UPP)
and control element, 58, 60; commonality/ urban air mobility (UAM), 440, 475
scalability, 456–7; communication data link, U.S. Air Defense System (ADS), 397, 398, 406
62; data processing and analysis, 51, 52, U.S. Army Liberty Eagle, 5
82, 85; electro-optical cameras, 57, 65, 73, U.S. Code of Federal Regulations (CFR), 104,
205, 268, 280, 393, 412; elements of, 58; 109, 135, 226, 325, 446, 472; see also U.S.
fixed-wing UAS, 58–9; Frost & Sullivan Aviation Regulatory System
forecast, 458; future of, 329, 444–5; gimbal, U.S. Department of Agriculture (USDA), 389
65, 86, 87; ground control station, 37, 60–1, U.S. Department of Defense (DoD), 166, 170,
162, 203, 204, 217, 292, 322, 323, 343, 444; 186, 241, 372, 385, 428, 432, 434
human element, 68; laser, 67; launch and U.S. Department of Commerce, 97, 170, 176,
recovery, 67–8; line-of-sight operations, 188–9, 192–3
114, 203; lost-link procedures, 61; market U.S. Department of Interior (USDOI),
expenditures, 444; military, 61, 64, 65; 43, 446
mission planning, 20, 33, 51, 165, 400; USDOI see U.S. Department of Interior (USDOI)
payload, 64; spectral imaging payloads, use cases, 446
67; swarming UAS, 184, 424, 426, 445, 459; U.S. export control regulations see export
Teal Group’s forecast, 447; thermal infrared control
cameras, 65–7; UCAV X-45A, 231, 238, 251, U.S. Fish and Wildlife Service (USFWS), 43
253, 456; unmanned combat air vehicle U.S. Forest Service, 389
(see UCAV X-45A); vertical takeoff and USFWS see U.S. Fish and Wildlife Service
landing, 59–60; see also unmanned aircraft (USFWS)
system applications; unmanned aircraft U.S. Geological Survey (USGS), 43, 55
market segments; unmanned aircraft USGS see U.S. Geological Survey (USGS)
technological trends U.S. Munitions List (USML), 173, 174, 176,
unmanned aircraft systems engineering 181, 184–6
(UASE), 347 U.S. Navy’s QH-50 DASH, 11–12; see also
unmanned aircraft technological trends, 450; unmanned aerial vehicles (UAVs)
alternative energy, 450; biofuel technology, U-space, 124, 125, 130, 136, 440, 475
450; carbon fiber, 453; computing and artificial USS see UAS Service Suppliers (USS)
intelligence, 454; electric options, 452; LiPo U.S. State Department, 170, 174, 191, 192
battery, 452; materials improvements, 452–4; UTC Vireo, 237, 255, 256, 275
MAV, 451; microchip, 451; miniaturization, UTM architecture, 439
450; power solutions, 450; reciprocating UTM governance, 440
engine technology, 452; revolutionary UTM standards-making, 439
manufacturing, 454; solar technology, 452; UTM see unmanned traffic management (UTM)
3-D printers, 454; see also unmanned aircraft UTM Pilot Program (UPP), 115, 439
systems (UAS) UV see ultraviolet (UV)
502
502 Index