Table of Contents – Detailed

TABLE OF CONTENTS -DETAILED

 

Front Matter (Nichols)

Title Page

Cover Art (Sincavage, Carter)

Copyright / Publication Page

Books also by Professor Randall K. Nichols and the KSU Wildcat Team

Dedications

Disclaimers (Lonstein)

Foreword (LTC Jerry Drew USARMY CAC DJIMO)

Preface         (Nichols)

Acknowledgments

List of Contributors

Abbreviations and Acronyms

Table of Contents

Table of Figures

Table of Tables

Table of Equations

 

 

SECTION 1: C4ISR AND EMERGING SPACE TECHNOLOGIES

 

  1. Current State of Space Operations (Pritchard)

 

Student Objectives

Introduction

Space Domain

Space Technologies

Launching and moving space mobility and logistics .

Exploring and mapping the solar system with robotics

Conducting research on the International Space Station

Building and operating telescopes to study the universe

Searching for space mining

Enhancing Space Operations: Top Technological Priorities

Space Domain Awareness

Machine Learning & Autonomous Systems

Cyber-Human Systems

Modeling & Simulation

Cyberspace within Space

Space Manufacturing & Mining

Remote Sensing & Surveillance

Celestial Positioning Systems

Conclusions

References

Endnotes

 

  1. Satellite Killers and Hypersonic Drones (Slofer)

 

Student Objectives

Overview of Satellite Technology

Atmospheric layers

Types and Shapes of Orbits

Inclination

Shape

Orbits by Attitude

LEO

GEO

HEO

Orbital Congestion and Debris

The weaponization of Space and Methods of Satellite Attrition

Debris weaponization

Surface/Air to Space missiles (DA-ASAT, non-DEW

DA-ASAT challenges

Co-Orbital (CO-ASAT

Direct collision or Kinetic Kill Vehicles

Radiofrequency Jammers

Microwave bombardment

Cyber-attacks

Laser weaponry

Chemical sprayers

Satellite robotic mechanisms

Orbiting Hypersonic Missile Platforms

Summary

References

 

  1. Space Electronic Warfare, Jamming, Spoofing, and ECD (Nichols & Mai)

 

Student Objectives

EW Definitions

ISR – Intelligence, Surveillance, and Reconnaissance

ISR Systems and Technology from Space

Eichelberger Collective Detection (ECD) Definitions / Counter Spoofing Concepts

Scope

Decibel math

Plane trig / equations

Plane Trigonometry:

Spherical Trigonometry:

Napier’s Rules

Orbital mechanics

Earth traces

Look angles

Location of Threat to Satellite

Calculating the Look Angles:

EMS

Detection Signatures

Electromagnetic Spectrum (EMS)

Acoustic waves and Sound Waves in Air

Radio Waves and Light Waves in a Vacuum

RADAR / EW / Range Equation

One–Way Link Equation

Effective Range

Example

Propagation loss models

Propagation Loss Models

Satellite Links

Link Vulnerability To EW: Space-Related Losses, Intercept (Jamming) & Spoofing

Space-Related Link Losses

GPS/GNSS/ADS-B SPOOFING

ECD: EICHELBERGER COLLECTIVE DETECTION

Qualitative Risk Assessment Opinion based on FAA SRM Reference Guidelines

Risk Assessment Spoofing Classes

Dependence on GPS and vulnerability

Spoofing
Gps Signal
Classic Receivers
A-Gps (Assisted GPS) – Reducing The Start-Up Time
Course – Time Navigation
Snapshot Receivers
Collective Detection
ECD
Research To 2016: Survey Of Effective GPS Spoofing Countermeasures
A-F Analysis
GPS Spoofing Research: Out-Of-The-Box Brilliance To ECD Defense

Maximum Likelihood Localization

Spoofing  Mitigation

Successive Signal Interference Cancellation

GPS Signal Jamming

Two Robust GPS Signal Spoofing Attacks and ECD

Seamless Satellite-Lock Takeover (SSLT)

Navigation Data Modification (NDM)

ECD Algorithm Design

Branch And Bound

ADS-B Security

ADS-B Standards

ADS-B Security Requirements

Vulnerabilities in ADS-B system

Broadcast Nature of RF Communications

No Cryptographic Mechanisms

ADS-B COTS

Shared Data

Dependency On The On-Board Transponder

Complex System Architecture and Passthrough Of GNSS Vulnerabilities

Threats to ADS-B system

Eavesdropping

Data-Link Jamming

Two Types of Jamming Threats for ADS-B

Ground Station Flood Denial (GSFD)

Aircraft Flood Denial (A/C FD)

ADS-B Signal Spoofing

Ground Station Target Ghost Injection / Flooding

Aircraft Target Ghost Injection / Flooding

ADS-B message deletion

ADS-B message modification

HAPS

Security of GNSS

Conclusions

References

Endnotes

 

 

  1. Manufacturing in Space (Jackson & Joseph)

 

Student Learning Objectives:

Introduction

Manufacturing standards

Harmony of standards

Manufacturing on Earth

Manufacturing of space devices on Earth

Manufacturing construction in space

Facilities

Manufacturing in Space

Manufacturing in Space and the Circular Economy

Circular versus linear economic model

Circular economy versus sustainability

Applying the circular economy in space

Applying circular economy principles in space for manufacturing

Efforts in the US

Efforts in the EU

Future Possibilities

Questions

References

 

 SECTION 2: SPACE CHALLENGES AND OPERATIONS

 

  1. Exploration of Key Infrastructure Vulnerabilities from Space-Based Platforms (McCreight)

 

Student Objectives

Background

The ground segment

The space segment

The link segment

Critical Infrastructure, [Ci] A Foundational Achilles Heel,  Today and Tomorrow

A Brief Excursion into Cyber/Satellite Attacks on CI

Grasping Space Systems and Platforms as New Critical Infrastructure

Greater Dependency of CI on Space Systems Creates New Security Concerns

Space and Satellite Systems and Platforms can Monitor CI

Communications

Optical images

SAR images

Thermal images

Pipeline monitoring

Power line

Railway monitoring

Taking a Look at UUV/Underwater Threats to CI

Spaced Based Systems as Actual Space Weapons Threats to CI

Particle Beam systems

High Energy Lasers

Kinetic-Energy Weapons

EMP weapons

KA Band Weapons

Microsatellites and Nanosatellites

Radio Frequency Weapons

Orbital interceptors

ASATs [Anti Satellite Weapons]

Counter Space Operations, Countermeasures and Protection of Space Systems

IT Vulnerability in Space Systems and the Importance Of Penetration Testing for CI

Humans and Their Essential Role in CI Systems and Space Systems

Consider the Extra Achilles Heel:  Devising Resilience Standards for Space and CI

Outlining Threat Dynamics and Vulnerabilities for CI from Cyber and Space

FBI—NGB Role//Homeland Defense and Estimating CI Protection Priorities

Reinforcing CI Systems Against Space Based Threats

Conclusions

References

 

  1. Trash Collection and Tracking in Space (Hood & Lonstein)

 

Student Learning Objectives

The Challenge of Orbital Debris in Space

Current International Policy and Laws on Space Trash

Recent accidents that continue to clutter the orbital space around Earth: ISS Swerves

Looming changes that may further destabilize international space operations adding more clutter to an already dirty problem: Russia leaves ISS

Clean This Mess: The Kessler Syndrome and the challenges of cleaning orbital space debris before it’s too late

Questions

References

 

  1. Leveraging Space for Disaster Risk Reduction and Management (Carter)

 

Student Objectives Introduction

The Sendai Framework For Disaster Risk Reduction 2015 – 2030

Climate Change

Global Health

COPERNICUS

Conclusions

References 

 

  1. Bio-Threats to Agriculture – Solutions from Space (Sincavage, Carter & Nichols)

 

Student Objectives

Definitions

Introduction

Diseases have a Significant Negative impact on Agricultural Productivity.

What are the Agriculture, Livestock, and Companion Animal Weapons?

Potential Targets of Agricultural bioterrorism

Containment, Eradication & Control

Agricultural Bioterrorist Attack Requires Relatively Little Expertise Or Technology

Bio-Threats To Agriculture – Solutions From Space (Agro-Terrorism)

Monitoring of plant pathogens

What is needed?

MASINT

Monitoring of Invasive Plants

Feedlot density detection

Conclusions

References

Endnotes

 

  1. Modeling, Simulations, and Extended Reality (Oetken)

 

Student Learning Objectives

Foundations of Immersive Systems Technology

Virtual Reality

Augmented and Mixed Reality

Basics of Dynamic Modeling in Virtual Environments

Interaction and Simulation in Complex Systems

Degrees of Freedom in Immersive Simulation

Use of Motion Control Platforms

Future Thinking in Immersive Systems Technology

References

 

 

SECTION 3: HUMANITARIAN USE OF SPACE  TECHNOLOGIES

 

  1. Drones and Precision Agriculture Mapping (Mumm)

 

Student Learning Objectives

A Look Back at the Traditional Agriculture Monitoring Systems

Outer Space to the Subsoil

Integrated Autonomous Systems

Autonomous Ground Vehicles

Different platforms used in autonomous agricultural vehicle

Types of Platforms

Varieties

Applications as Autonomous Vehicles

Automated Weeders and Crop Eradication for Food Crops

Crop Eradication for Illegal Crops

Space Farming-Unlocking the Possibilities

Automating the Last Mile

Conclusions

Questions

References

  

  1. Civilian use of Space for Environmental, Wildlife Tracking, and Fire Risk Zone Identification (Ryan)

 

Student Learning Objectives

Introduction

Applications

Current Systems

Water-Focused Topics

Marine Mammals and Fisheries

Sea Levels

Land-Focused Topics

Natural Disasters

Population Density and Movements

Atmosphere Focused Missions

Lightning

Ozone layer

Magnetic shield

References

 

  1. Humanitarian Use of Space Technologies to Improve Global Food Supply and Cattle Management (Larson)

 

History of space technology used for agriculture

Key areas of success implementing space technology in agriculture

Geographical information systems – Surveying and mapping

Geographical information systems – Environmental Stewardship

Geographical information systems – changing labor force in agriculture

Remote sensors for weather monitoring

Opportunities for integration of space technology into cattle management

Emerging cattle management technology: satellite systems

Emerging cattle management technology: remote health sensors

Emerging cattle management technology: feed management equipment

Developer considerations for end-user of emerging technology

 

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Space Systems: Emerging Technologies and Operations Copyright © 2022 by Nichols, R. K., Carter, C. M., Hood, J. P., Jackson, M. J., Joseph, S., Larson, H., Lonstein, W. D., Mai, R. W., McCreight, R., Mumm, H. C., Oetken, M. L., Pritchard, M. J., Ryan, J., J.C.H., Sincavage, S. M., Slofer, W. is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book