Table of Contents

Front Matter (Nichols) √

Title Page

Cover Art

Copyright / Publication Page

Books also by Professor Randall K. Nichols and the KSU Wildcat Team

Dedications

Disclaimers (Lonstein)

Foreword  (Joel D. Anderson OVPR) √

Preface              (Nichols)

Acknowledgments

List of Contributors

Abbreviations and Acronyms

Table of Contents

Table of Figures

Table of Tables

Table of Equations

 

SECTION 1: CYBER-HUMAN SYSTEMS (CHS)

  1. The Technological Future – Merging with Machines [Toebes] √

Objectives Introduction Replacement – Mechatronics Biomechatronics Exoskeletons Giant Exoskeletons

Extra Body Parts

3d Printing Bio Parts
Modifying The Body From The Inside
Biohacking
Biohacking – Implants
Biohacking – DNA
Connecting The Body
Reading The Brain

Augmented Reality (AR) and Virtual Reality (VR) Vision

Other Senses In VR
Avatars

Conclusions

References

 

2.  CHS Sensors and the Law (Lonstein) √

Student Learning Objectives

Introduction

New Technology Same Old Humans: New Technology – Same Old Humans : Guns, Explosives, Biologics and Chemicals, Consumer Products And Cyber

Guns

Explosives

Biologics and Chemicals

Consumer and Commercial Technology Weaponization

Internet and Social Media

Can Technology Be Inherently Evil?

Its 2023 and the Concerns of Human Misuse of Technology Grows

Just Because We Can Does Not Mean We Should

What are Ethical and Legal Considerations?

First Law

Second Law

Third Law

Retribution

Incapacitation

Deterrence

Rehabilitation

Counter -AI

Conclusions

References

 

3. Artificial Brains and Body (Mumm)  √

Student Learning Objectives

Why are Autonomous Systems/Robots in the form factor of humans?

The Sum of its Parts, The Body-What is the Optimum Form Factor?

Why are Autonomous Systems/Robots in the form factor of humans?

The Robotic “Evolution”

AI-The Trainable Brain

Securing The Instructions/Quantum Revolution

Conclusions

Questions

References

 

4.  AI / ML And Agriculture And Food Industries (Nichols, Hood, Sincavage)   √

Learning outcomes

Introduction

Artificial intelligence and agriculture: how intelligent technologies can help feed the world

Types of artificial intelligence

Ag landscape

Surveying the potential of ai in agriculture

Ai potential to improve agriculture

Surveillance

Crop yield prediction

Yield mapping

Drones and pests

Farm employee trouble? AI to rescue

Track and traceability (T&T)

Water

Livestock

Robots and AI

5 ways AI improves food manufacturing

WIZATA

AI and restaurants

India and Ethiopia

Soil monitoring (SM)

Robocrop

Predictive analytics

Intelligent AI and agriculture intersection

Bio-threats to agriculture from space

Diseases have a significant negative impact on agricultural productivity

What are the agriculture, livestock, and companion animal weapons?

Potential targets of agricultural bioterrorism

Containment, eradication & control

Agricultural bioterrorist attack requires relatively little expertise or technology

Monitoring of plant pathogens

MASINT

Monitoring of invasive plants

Feedlot density detection

Conclusions

References

Endnotes

 

5.  The Reality of Cyborgs and the Look of the Future (Johnson) √

 

Learning Outcomes

What Is A Cyborg?

How Are Cyborgs Created?

How Are Modifications Made?

The Current State Of Cyborgs (2023)

Where Are We Headed (With Cyborgs)?

Cyborgs, What Are The Risks?
Risk To Society, A Perspective
Risk To Cyborgs, A Case Study
Conclusion 1, The Singularity
Conclusion 2, Cyborgs And Space

Final Thoughts

References

 

6.  Machines Hacking Machines – Turing’s Legacy (C. Carter)

Student objectives

Introduction

The Turing machine

Enigma machine v. Bombe machine

Enigma: Lessons Learned

The Turing Test

Conclusions

References

 

7.  Management Challenges for Mixed Human-Machine Teams (Ryan)   √

Management Challenges for Human-AI Teams

Student Learning Objectives

Prologue

The Roles of Machines and Humans

The Need for Combined Talent Management

Management of AI-Human Teams

Behavioral and Cognitive Issues

Issues of Trust

The Talent Supply Chain

Final Thoughts

Endnotes

 

8.  Neurostrike – The Cyber, Cognitive, Nanotech And Electronic Gateway To Mindfully Impaired Metaverse And CHATGPT  (McCreight) √

Purview

The Tautology Of Trusting In Technology

Grasping The Era Of Neurostrike

Neurostrike—Considering Its Cyber Dimensions   IOT / CHATGPT

Dealing With The Cognitive, Nanotech And The Electromagnetic Gateway

Building Neurostrike Resilience In The Midst Of Technology Tsunami

Neurostrike: A Metaverse Impaired Minefield

Strategic Myopia And China Blindness

Primary Principles And The Primacy Of The Poo Poo Pashas

Finding A Way Forward Against Neurostrike

References

 

     SECTION 2: SPACE THREATS

9.  Biological Threats and Growth in Space (Sincavage & Muehlfelder & Carter) √

Abstract

Student Objectives

Introduction

Definition Of Biological Threats In Space

Importance Of Studying Biological Threats In Space

Historical Overview Of Biological Threats In Space

Early Space Missions

Modern Space Missions

International Space Station (ISS)

Biomolecule Extraction And Sequencing Technology (BEST)

Mars Science Laboratory (MSL)

Exomars

The Biosentinel Mission:

Bion-M

The Mars Sample Return Mission Will Occur In The 2030s

Emergence Of Biological Threats In Space

Types Of Biological Threats In Space

Bacteria

Fungi

Viruses

Radiation

Extraterrestrial Pathogens

Impact Of Biological Threats On Space Exploration

Health Risks To Astronauts

Impact On Spacecraft And Equipment

Economic Impacts

Impact On Mission Costs

Investment Uncertainty

Impact On International Collaboration

Public Perception And Support

Regulatory Compliance

Mitigating Biological Threats In Space

Sterilization Techniques

Quarantine Measures

Use Of Protective Equipment

Future Challenges And Opportunities For Growth

The Role Of Advanced Technologies

Crispr

Synthetic Phages:

Artificial Intelligence (A.I.) And Autonomous Systems:

Digital To Biological Converters:

Quantum Computing:

Reflections

Collaborative Efforts With International Space Agencies

Reflection On The Importance Of Addressing Biological Threats In Space

Recommendations For Future Research And Development

Enhancing Bio-Surveillance Systems:

Developing Space-Specific Pathogen Detection Methods:

Establishing Onboard Diagnostic Capabilities:

Implementing Pre- And Post-Mission Monitoring:

Conducting Long-Term Microbiome Studies:

References

 

10.  Space Electronic Warfare (Nichols) √

 

Purview

Objectives

Orbital Mechanics – The Language Of The Skies

Look Angles

Location Of Threat To Satellite

Calculating The Look Angles

Propagation Loss Models

Received Power At The Receiver

One-Way Link Equation

Intercepted Communication Signal

Jammed / Spoofed Communications Signal

Satellite Links

Link Vulnerability To EW: Space-Related Losses, Intercept Jamming & Spoofing

Space-Related Link Losses

GPS/GNSS Spoofing – Practical Spoofing

ECD: Eichelberger Collective Detection

Spoofing

GPS Signal

Classic Receivers

Snapshot Receivers

Collective Detection

ECD

Spoofing Techniques

GPS Signal Jamming As A Precursor To Spoofing Attack

Two Robust GPS Signal Spoofing Attacks And ECD

Seamless Satellite-Lock Takeover (SSLT)

Navigation Data Modification (NDM)

ECD Algorithm Design

Signals Intelligence (SIGINT), EW, and EP

Successful Intercept

The Intercept Link Equation

Conclusions

References

Endnotes

 

11.  Space Systems Modelling and Simulation (Diebold) √

Purview

Learning Objectives

Key Takeaways

Introduction

Space Launch History And Context

Evolving Threat Context

Modeling And Simulation In Doctrine

Modeling And Simulation Framework

Modeling And Simulation Tools

Improved Many On Many (IMOM)

Advanced Framework For Simulation, Integration, And Modeling (AFSIM)

Extended Air Defense Simulation (EADSIM)

General Mission Analysis Tool (GMAT)

Systems Tool Kit (STK)

Freeflyer

Conclusions

References

Endnotes

 

12.  Deep Space Warfare and Space Dominance (Nichols) √

Purview

ADS Vulnerabilities to SUAS

Objectives

Interstellar Basics

Anarchical Environment

Space Distance

Dark Energy And Dark Matter

Naval Model

Space RPO

All Or Nothing

Supplying Space Forces – A Logistics Nightmare

Logistics – Supplying Space Forces

Space Forces Options

Atmospheric Concerns

Gravity

Space Dominance

Spacecraft Carrier

Targeting And Priorities

Option 1 – Equal Value

Option 2 – Value

Option 3 – Instant Thunder

Conclusions

References

Endnotes 

 

SECTION 3: SPACE WARFARE, HYPERSONICS, & MATERIALS

  1. Progress in Hypersonic Missiles and Space Defense (Slofer) √

Student Objectives

Overview

The speed spectrum

Time is everything

Aerodynamic drag

Progress in airframe design and maneuverability

Advancements in computer development and Artificial Intelligence

Enhancements to Delivery Systems

Revisions in defensive strategies

Intercept and defense capabilities.

Summary

References

 

  1. The Rise of Cyber Threats in Space – Future of Cyberwar (Farcot) √

Historical Overview:

Cold War

Chinese entry

Corporatization

The Current Situation:

Players Involved, Interests

Technological Advancements And Current Capabilities

Satellite System Overview; Relation Between Ground, Link, & Space

Effect Of Surface Conflicts On Space Systems

Known Threat Assessment:

Relationship Between Threats & Risk

Threat Evolution

Threat 1: Kinetic Kill Anti-Satellite Systems

Threat 2: Electronic/Cyber Attack

Threat 3: Orbital Collisions

Vulnerabilities Acknowledgement

Threat Summaries & Conclusions:

Anti-Satellite Weaponry

Remote Threats

Environmental Elements

Conclusions

References

 

  1. Strategy and Economics of Space Missions (Jackson & Joseph) √ 

Student Learning Objectives

Introduction

Manufacturing in Space

Additive Manufacturing for the Space Mission

Stereolithography (SLA)

Fused Deposition Modelling

Stair-Stepping Phenomenon

Layer Thickness

Effects of CAD Geometry

Part Orientation

Support Structures

Space Structures and Space Complexes

Economy-Orientated Space Missions and Strategies

Economic Feasibility of Space-related Activities and Missions

Conclusions

Questions

References & Bibliography

 

  1. Quantum Technologies And Their Applicability To Space Operations (Drew)  √

Objectives

Introduction

Unusual quantum properties

Quantum computers

Satellites: nodes on the network

Encryption

Measurement

Implications for space operations

Conclusions

References

 

  1. Wireless Power for Space Applications (Khan) √

Executive Summary

Introduction

Basics Of WPT Systems

Near Field Shaping

Early Results

Background

Analysis Of Preliminary Results

Experimental Methods

Future Work

Summary

Acknowledgement

References

 

APPENDIX A  dB Math and Plane / Spherical Trigonometry Primer

Decibel Math

Plane Trig / Equations

Plane Trigonometry

Spherical Trigonometry

Napier’s Rules

Rules for Napier’s right spherical triangles

 

 

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Cyber-Human Systems, Space Technologies, and Threats Copyright © 2023 by Nichols, R. K.; Carter, C.M., Diebold, C., Drew, J. , Farcot, M., Hood, J.P, Jackson, M.J., Johnson, P., Joseph, S., Khan, S., Lonstein, W.D., McCreight, R., Muehlfelder, T., Mumm, H.C., Ryan, J.C.H., Sincavage, S. M., Slofer, W., & Toebes, J. is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book