Table of Contents – Detailed
TABLE OF CONTENTS -DETAILED
Front Matter (Nichols)
Title Page
Cover Art (Sincavage, Carter)
Copyright / Publication Page
Books also by Professor Randall K. Nichols and the KSU Wildcat Team
Dedications
Disclaimers (Lonstein)
Foreword (LTC Jerry Drew USARMY CAC DJIMO)
Preface (Nichols)
Acknowledgments
List of Contributors
Abbreviations and Acronyms
Table of Contents
Table of Figures
Table of Tables
Table of Equations
SECTION 1: C4ISR AND EMERGING SPACE TECHNOLOGIES
- Current State of Space Operations (Pritchard)
Student Objectives
Introduction
Space Domain
Space Technologies
Launching and moving space mobility and logistics .
Exploring and mapping the solar system with robotics
Conducting research on the International Space Station
Building and operating telescopes to study the universe
Searching for space mining
Enhancing Space Operations: Top Technological Priorities
Space Domain Awareness
Machine Learning & Autonomous Systems
Cyber-Human Systems
Modeling & Simulation
Cyberspace within Space
Space Manufacturing & Mining
Remote Sensing & Surveillance
Celestial Positioning Systems
Conclusions
References
Endnotes
- Satellite Killers and Hypersonic Drones (Slofer)
Student Objectives
Overview of Satellite Technology
Atmospheric layers
Types and Shapes of Orbits
Inclination
Shape
Orbits by Attitude
LEO
GEO
HEO
Orbital Congestion and Debris
The weaponization of Space and Methods of Satellite Attrition
Debris weaponization
Surface/Air to Space missiles (DA-ASAT, non-DEW
DA-ASAT challenges
Co-Orbital (CO-ASAT
Direct collision or Kinetic Kill Vehicles
Radiofrequency Jammers
Microwave bombardment
Cyber-attacks
Laser weaponry
Chemical sprayers
Satellite robotic mechanisms
Orbiting Hypersonic Missile Platforms
Summary
References
- Space Electronic Warfare, Jamming, Spoofing, and ECD (Nichols & Mai)
Student Objectives
EW Definitions
ISR – Intelligence, Surveillance, and Reconnaissance
ISR Systems and Technology from Space
Eichelberger Collective Detection (ECD) Definitions / Counter Spoofing Concepts
Scope
Decibel math
Plane trig / equations
Plane Trigonometry:
Spherical Trigonometry:
Napier’s Rules
Orbital mechanics
Earth traces
Look angles
Location of Threat to Satellite
Calculating the Look Angles:
EMS
Detection Signatures
Electromagnetic Spectrum (EMS)
Acoustic waves and Sound Waves in Air
Radio Waves and Light Waves in a Vacuum
RADAR / EW / Range Equation
One–Way Link Equation
Effective Range
Example
Propagation loss models
Propagation Loss Models
Satellite Links
Link Vulnerability To EW: Space-Related Losses, Intercept (Jamming) & Spoofing
Space-Related Link Losses
GPS/GNSS/ADS-B SPOOFING
ECD: EICHELBERGER COLLECTIVE DETECTION
Qualitative Risk Assessment Opinion based on FAA SRM Reference Guidelines
Risk Assessment Spoofing Classes
Dependence on GPS and vulnerability
Spoofing
Gps Signal
Classic Receivers
A-Gps (Assisted GPS) – Reducing The Start-Up Time
Course – Time Navigation
Snapshot Receivers
Collective Detection
ECD
Research To 2016: Survey Of Effective GPS Spoofing Countermeasures
A-F Analysis
GPS Spoofing Research: Out-Of-The-Box Brilliance To ECD Defense
Maximum Likelihood Localization
Spoofing Mitigation
Successive Signal Interference Cancellation
GPS Signal Jamming
Two Robust GPS Signal Spoofing Attacks and ECD
Seamless Satellite-Lock Takeover (SSLT)
Navigation Data Modification (NDM)
ECD Algorithm Design
Branch And Bound
ADS-B Security
ADS-B Standards
ADS-B Security Requirements
Vulnerabilities in ADS-B system
Broadcast Nature of RF Communications
No Cryptographic Mechanisms
ADS-B COTS
Shared Data
Dependency On The On-Board Transponder
Complex System Architecture and Passthrough Of GNSS Vulnerabilities
Threats to ADS-B system
Eavesdropping
Data-Link Jamming
Two Types of Jamming Threats for ADS-B
Ground Station Flood Denial (GSFD)
Aircraft Flood Denial (A/C FD)
ADS-B Signal Spoofing
Ground Station Target Ghost Injection / Flooding
Aircraft Target Ghost Injection / Flooding
ADS-B message deletion
ADS-B message modification
HAPS
Security of GNSS
Conclusions
References
Endnotes
- Manufacturing in Space (Jackson & Joseph)
Student Learning Objectives:
Introduction
Manufacturing standards
Harmony of standards
Manufacturing on Earth
Manufacturing of space devices on Earth
Manufacturing construction in space
Facilities
Manufacturing in Space
Manufacturing in Space and the Circular Economy
Circular versus linear economic model
Circular economy versus sustainability
Applying the circular economy in space
Applying circular economy principles in space for manufacturing
Efforts in the US
Efforts in the EU
Future Possibilities
Questions
References
SECTION 2: SPACE CHALLENGES AND OPERATIONS
- Exploration of Key Infrastructure Vulnerabilities from Space-Based Platforms (McCreight)
Student Objectives
Background
The ground segment
The space segment
The link segment
Critical Infrastructure, [Ci] A Foundational Achilles Heel, Today and Tomorrow
A Brief Excursion into Cyber/Satellite Attacks on CI
Grasping Space Systems and Platforms as New Critical Infrastructure
Greater Dependency of CI on Space Systems Creates New Security Concerns
Space and Satellite Systems and Platforms can Monitor CI
Communications
Optical images
SAR images
Thermal images
Pipeline monitoring
Power line
Railway monitoring
Taking a Look at UUV/Underwater Threats to CI
Spaced Based Systems as Actual Space Weapons Threats to CI
Particle Beam systems
High Energy Lasers
Kinetic-Energy Weapons
EMP weapons
KA Band Weapons
Microsatellites and Nanosatellites
Radio Frequency Weapons
Orbital interceptors
ASATs [Anti Satellite Weapons]
Counter Space Operations, Countermeasures and Protection of Space Systems
IT Vulnerability in Space Systems and the Importance Of Penetration Testing for CI
Humans and Their Essential Role in CI Systems and Space Systems
Consider the Extra Achilles Heel: Devising Resilience Standards for Space and CI
Outlining Threat Dynamics and Vulnerabilities for CI from Cyber and Space
FBI—NGB Role//Homeland Defense and Estimating CI Protection Priorities
Reinforcing CI Systems Against Space Based Threats
Conclusions
References
- Trash Collection and Tracking in Space (Hood & Lonstein)
Student Learning Objectives
The Challenge of Orbital Debris in Space
Current International Policy and Laws on Space Trash
Recent accidents that continue to clutter the orbital space around Earth: ISS Swerves
Looming changes that may further destabilize international space operations adding more clutter to an already dirty problem: Russia leaves ISS
Clean This Mess: The Kessler Syndrome and the challenges of cleaning orbital space debris before it’s too late
Questions
References
- Leveraging Space for Disaster Risk Reduction and Management (Carter)
Student Objectives Introduction
The Sendai Framework For Disaster Risk Reduction 2015 – 2030
Climate Change
Global Health
COPERNICUS
Conclusions
References
- Bio-Threats to Agriculture – Solutions from Space (Sincavage, Carter & Nichols)
Student Objectives
Definitions
Introduction
Diseases have a Significant Negative impact on Agricultural Productivity.
What are the Agriculture, Livestock, and Companion Animal Weapons?
Potential Targets of Agricultural bioterrorism
Containment, Eradication & Control
Agricultural Bioterrorist Attack Requires Relatively Little Expertise Or Technology
Bio-Threats To Agriculture – Solutions From Space (Agro-Terrorism)
Monitoring of plant pathogens
What is needed?
MASINT
Monitoring of Invasive Plants
Feedlot density detection
Conclusions
References
Endnotes
- Modeling, Simulations, and Extended Reality (Oetken)
Student Learning Objectives
Foundations of Immersive Systems Technology
Virtual Reality
Augmented and Mixed Reality
Basics of Dynamic Modeling in Virtual Environments
Interaction and Simulation in Complex Systems
Degrees of Freedom in Immersive Simulation
Use of Motion Control Platforms
Future Thinking in Immersive Systems Technology
References
SECTION 3: HUMANITARIAN USE OF SPACE TECHNOLOGIES
- Drones and Precision Agriculture Mapping (Mumm)
Student Learning Objectives
A Look Back at the Traditional Agriculture Monitoring Systems
Outer Space to the Subsoil
Integrated Autonomous Systems
Autonomous Ground Vehicles
Different platforms used in autonomous agricultural vehicle
Types of Platforms
Varieties
Applications as Autonomous Vehicles
Automated Weeders and Crop Eradication for Food Crops
Crop Eradication for Illegal Crops
Space Farming-Unlocking the Possibilities
Automating the Last Mile
Conclusions
Questions
References
- Civilian use of Space for Environmental, Wildlife Tracking, and Fire Risk Zone Identification (Ryan)
Student Learning Objectives
Introduction
Applications
Current Systems
Water-Focused Topics
Marine Mammals and Fisheries
Sea Levels
Land-Focused Topics
Natural Disasters
Population Density and Movements
Atmosphere Focused Missions
Lightning
Ozone layer
Magnetic shield
References
- Humanitarian Use of Space Technologies to Improve Global Food Supply and Cattle Management (Larson)
History of space technology used for agriculture
Key areas of success implementing space technology in agriculture
Geographical information systems – Surveying and mapping
Geographical information systems – Environmental Stewardship
Geographical information systems – changing labor force in agriculture
Remote sensors for weather monitoring
Opportunities for integration of space technology into cattle management
Emerging cattle management technology: satellite systems
Emerging cattle management technology: remote health sensors
Emerging cattle management technology: feed management equipment
Developer considerations for end-user of emerging technology