Sarah Nilsson, JD, PhD, MAS
Sarah Nilsson, JD, PhD, MAS

UAS Risky Bu$ine$$?

Adobe Acrobat document [347.7 KB]
Adobe Acrobat document [488.4 KB]
Adobe Acrobat document [1.4 MB]


FAA - UAS Sightings Report 


International Helicopter Safety Team - Learn how to implement an SMS Program


Adobe Acrobat document [1.2 MB]
Adobe Acrobat document [519.9 KB]
What the US can learn.pptx
Microsoft Power Point presentation [1.3 MB]
Microsoft Word document [428.2 KB]
Microsoft Power Point presentation [2.9 MB]
Microsoft Power Point presentation [680.0 KB]
Adobe Acrobat document [1.9 MB]
Thesis - Josh Hundley.pdf
Adobe Acrobat document [2.2 MB]
Adobe Acrobat document [62.5 KB]
Adobe Acrobat document [775.2 KB]
Adobe Acrobat document [3.4 MB]
Adobe Acrobat document [3.2 MB]
Adobe Acrobat document [1.9 MB]
Adobe Acrobat document [1.5 MB]
Adobe Acrobat document [1.9 MB]
Adobe Acrobat document [774.9 KB]
Adobe Acrobat document [2.7 MB]
Adobe Acrobat document [4.3 MB]
Adobe Acrobat document [4.9 MB]
Adobe Acrobat document [3.9 MB]
Adobe Acrobat document [4.3 MB]
Adobe Acrobat document [586.4 KB]
UAS Handbook 2 revised 033115.pdf
Adobe Acrobat document [1.1 MB]

Insect-sized drones

The following excerpt from "The Future of Violence" by Benjamin Wittes and Gabriella Blum.


You walk into your shower and find a spider. You are not an arachnologist. You do, however, know that the tiny crawling octopod could be, at a minimum, one of FOUR things.


1. The spider could be real and harmless.


2. The spider could be real and venomous.


3. It could, conversely, be a personal surveillance spider, purchased from "Drones R Us" for $49.95 and set loose by your next-door neighbor, who dislikes your noisy dog and is monitoring the spider on her iPhone form a sports bar downtown. The pictures of you undressed, taken by the spider, are now being relayed on several screens during a break in an NFL game at a local bar for the neighborhood's amusement.


4. You also harbor some small, perhaps paranoid concern about a more menacing possibility: your business competitor may have just sent a drone attack spider, purchased from a bankrupt military contractor, to take you out. There has been a rash of these killings in recent years, by organized crime and even by some ruthless elements of the business world. Upon spotting you with its sensors, before you have time to weigh your options, the spider - if it is, indeed, an attack spider - shoots an infinitesimally thin needle into your left leg and takes a blood sample. As you beat a retreat out of the shower, your competitor tests the sample on his smartphone for a DNA match to ascertain your identity. He compares the blood sample against a DNA profile of you that is already on file at (Everything about Everybody), an international DNA database (with access available for $179.99). Once the match is confirmed, (a matter of seconds), the spider will follow you into your bedroom, pausing only long enough to dart another needle, this time containing a lethal dose of a synthetically produced poison. Your assassin, who is on a summer vacation in Provence, will then direct his spider under the crack of your bedroom door and out of the house and initiate its  self-destruct function. No tract of the spider will ever be found by law enforcement authorities. 



micro air vehicle (MAV), or micro aerial vehicle, is a class of Miniature UAVs that has a size restriction and may be autonomous. Modern craft can be as small as 15 centimetres. 

PlayStation mentality refers to the disassociation between combatants and the consequences of their actions, as a result of the use of weapon interfaces which resemble video games. The effect is named after the PlayStation games console, and is commonly cited in discussions of the problems of drone warfare, such as that conducted by the CIA in the Pakistan tribal areas, typically using predator drones.

See article below for more information

Adobe Acrobat document [1.2 MB]

2012 James Bond Film Skyfall

Features 007 fighting a former agent turned all-powerful hacker who is out for revenge against M, the head of M16

A subplot has M, facing a commission of inquiry for operational failures on her watch, while the hacker launches an armed attack on the hearing at which she is testifying

M gives this short speech in repsonse to her critics, contemptuously schooling her inquisitors about the state of the world she confronts...

You decide if this was a deep, forward-looking question of political theory....

where the individual actor is empowered to wreck havoc because such technology is readily available to us all...

Commercial UAV Expo.pptx
Microsoft Power Point presentation [3.6 MB]
Global sUAS Risk Management and the Law.[...]
Microsoft Word document [154.7 KB]

Contact Me

Sarah Nilsson, J.D., Ph.D., MAS


602 561 8665


You can also fill out my 

online form.

Get Social with Me

View Sarah J. Nilsson's profile on LinkedIn



Legal Disclaimer

The information on this website is for EDUCATIONAL purposes only and DOES NOT constitute legal advice. 

While the author of this website is an attorney, she is not YOUR attorney, nor are you her client, until you enter into a written agreement with Nilsson Law, PLLC to provide legal services.

In no event shall Sarah Nilsson be liable for any special, indirect, or consequential damages relating to this material, for any use of this website, or for any other hyperlinked website.





Steward of 

Little Free Library

Print Print | Sitemap
© Sarah Nilsson