Foreword [Col. Joel D. Anderson (Ret) – KSU OVPR (Ret)]

When I was asked to do this forward, I was in the process of retiring from academia after 10 years in the scientific, technical and research arena of higher education. At first, I was hesitant to accept this honor but reminded myself that I had amassed nearly 5 decades of experience relevant to the topics covered in this text. I reminded myself that I had been designated a subject matter expert (SME) by the Homeland Defense & Security Information Analysis Center (HDIAC) while at Kansas State University. I considered that before arriving at Kansas State University I had spent three years in industry supporting technical innovation efforts as both a technical director for a major international corporation, and as the inaugural director for a small company leading its autonomous systems group (ASG). I reminded myself that I had enjoyed a 26 ½ year career as an intelligence professional, imagery officer, space operations officer, a DAWIA level III certified program manager, and as a strategic intelligence planner.

I decided that my past experiences provided me with potentially unique insights into strategic, operational, tactical, and technical intelligence and research related to the topics discussed herein. In reviewing the sections I did so not only looking at the value of its content for the student, but in assessing broader critical insights that the text might provide to others in government, industry and academia having served in each sector.

Cyber-Human Systems, Space Technologies and Threats is the 8th in a series of seminal texts focused on influencing student and workforce development, critical thinking, and discovery. I found the topics in this text to accurately reflect the complexity and realities of the emerging human machine world we live in here on earth and in newfound discoveries that await us in space. A world where human/machine interactions are blending and merging in ways that were unimaginable just a few short years ago. This text focuses on important considerations for highly technical and demanding disciplines associated with cyber-human systems, space technologies and real and emerging threats. Each section and chapter covers a myriad of deeply insightful topics and considerations from expert practitioners in their respective fields. It provides a logical and practical framework for learning not only for the student, but for those already in the workforce looking for continuing education, certification, and credentials necessary to support national security at the critical emerging technology level. The authors have effectively captured topics of critical importance to our sustaining technological competitiveness, national security, economic growth, and workforce development.

In 1962, during his “We Choose the Moon” speech, President John F. Kennedy stated that “The growth of our science and education will be enriched by new knowledge of our universe and environment, by new techniques of learning and mapping and observation, by new tools and computers for industry, medicine, the home as well as the school.”  He proceeded to articulate this simply by stating “We choose to go to the moon….and do the other things, not because they are easy but because they are hard….”  This text embodies this message in its fullest. We have come a long way since 1962. We still have a long way to go.

In laying out this text, the authors have chosen to tackle hard subjects that we must consider for our next generation of leaders and practitioners. They have done so in a manner that not only captures a current understanding of the technological and threat playing field, but have artfully set their sights outward to the future by logically laying out things to consider and, where needed, challenging conventional norms. As I reviewed the content, not only was I pleased with the technical expertise of the authors, but found that each chapter left me wanting more. It reminded me of a phrase that Neil deGrasse Tyson is attributed as saying: “There are times, at least for now, when we must be content to love the questions themselves.”

I am confident that you will find the subject matter relevant, deeply enriching, and as either student or practitioner–leaving you with a thirst for wanting more. I am confident that those using this text will find answers in the material provided and energized by its content. I am also confident that in using this text, you will also find yourself asking many questions as you work through this now and hopefully many more in the future.

I applaud the authors for assembling its content and commend Cyber-Human Systems, Space Technologies and Threats for wide distribution and use. They have not only provided the facts and answers, but they will have also stimulated the questions of a new generation.

I am hopeful that in using this text you not only learn from it, but do so knowing that at one point in time we chose the moon.

Enjoy, learn, challenge and be challenged.

 

 

Joel D Anderson

Colonel USMC (Ret)

KSU (Ret)

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Cyber-Human Systems, Space Technologies, and Threats Copyright © 2023 by Nichols, R. K.; Carter, C.M., Diebold, C., Drew, J. , Farcot, M., Hood, J.P, Jackson, M.J., Johnson, P., Joseph, S., Khan, S., Lonstein, W.D., McCreight, R., Muehlfelder, T., Mumm, H.C., Ryan, J.C.H., Sincavage, S. M., Slofer, W., & Toebes, J. is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book