Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Law

La Salle University

Cybersecurity

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

Malicious Digital Penetration Of United States Weaponized Military Unmanned Aerial Vehicle Systems: A National Security Perspective Concerning The Complexity Of Military Uavs And Hacking, Edwin Bell May 2019

Malicious Digital Penetration Of United States Weaponized Military Unmanned Aerial Vehicle Systems: A National Security Perspective Concerning The Complexity Of Military Uavs And Hacking, Edwin Bell

Mathematics and Computer Science Capstones

The United States’ (US) military unmanned aerial vehicle (UAV) has seen increased usage under the post 9/11 military engagements in the Middle East, Afghanistan, and within American borders. However, the very digital networks controlling these aircrafts are now enduring malicious intrusions (hacking) by America’s enemies. .

The digital intrusions serve as a presage over the very digital networks the US relies upon to safeguard its national security and interests and domestic territory. The complexity surrounding the hacking of US military UAVs appears to be increasing, given the advancements in digital networks and the seemingly inauspicious nature of artificial intelligence and …