Table of Contents (Detailed)
Title Page
Copyright / Publication Page
Books also by Professor Randall K. Nichols
Dedications
Disclaimers
Foreword
Preface
Acknowledgements
List of Contributors
Abbreviations and Acronyms
Table of Contents
Table of Figures
Table of Tables
Table of Equations
1: Propulsion and Fuels: Disruptive Technologies for Submersible Craft Including UUVs [Jackson]
Student Learning Objectives
Introduction
Drivers for Change
International Regulations
Fuels and Propulsion: Current Disruptive Technologies
Diesel Fuels
Biofuels
Liquid Natural Gas (LNG) Fuels
Gas Turbine Propulsion
Nuclear Propulsion
Battery Technology
Fuel Cells
Hydrogen Fuel
Future Disruptive Technologies for Propulsion and Fuels
Hybrid Propulsion
Energy Saving Devices
Hull Design (Appendages and Coatings)
Superconducting Electric Motors
Conclusions: Naval Architect’s Role
Questions
References
- Automation & Human-Machine Symbiosis [Mumm]
Student Learning Objectives
A Look Back at the Machine and Human Symbiosis Evolution
The Fifth Industrial Revolution
Human and Machine Joined – Cyborg or Evolutionary Inevitability?
Traversing the Seas with New Autonomous Technologies
Human Symbiosis Disrupts the Aviation Industry
Integrating Artificial Employees-The Changing Horizon of Human Resources
Conclusions
Questions
References
- UAS Regulation /Innovation /Safety 2020 / Privacy and Beyond [Hood]
Student Learning Objectives
Two New FAA Rules That make a Difference
Remote ID
Operations over People and at Night
Category 2 eligible
Category 3 eligible
Category 4 eligible
Operating Rules
Operations at Night
Operations Over People
Category 1 eligible aircraft
Category 2 eligible aircraft
Category 3 eligible aircraft
Category 4 eligible aircraft
Operations over moving vehicles
Remote Pilot Knowledge Test Changes
Design and production Rules for Manufacturers
Major Changes from Proposed Rule to the Final Rule
What Do These Two Rules Really Mean and Why are they Important?
Drone Privacy Laws Around the World
EUROPE
NORTH AMERICA
SOUTH AMERICA
MIDDLE EAST AND CENTRAL ASIA
OCEANA
AFRICA
Methodology & Sources
References
- UUVs, Advanced Sensors, Munitions Detection, & USVs [Nichols]
Student Learning Objectives (SLO)
What is the Advanced Weapons Problem that UUVs can solve?
NSWC PCD
Murky Waters
REMUS Group
REMUS 600
Bluefin 12 Buried Mine Identification (BMI) UUV System
Demonstration
Demonstration Results
Implementation Issues
Success Criteria and Performance Objectives
Performance Objectives (PO) Remote Environmental Measuring Units REMUS 100.
Performance Objectives – Real-Time Tracking Gradiometer (RTG) / Laser Scalar Gradiometer (LSG)
Performance Objectives – Buried Object Scanning Sonar (BOSS)
Performance Assessments
Remote Environmental Measuring Units 100 (REMUS 100)
BOSS Images
Summary – BOSS
Modern mine warfare challenges today
Clearing mines is an inexact science
Innovation seems to be the name of the game in UUV / USV Surveying
Conclusions: Why do the authors consider UUVs and USVs Disruptive Technologies of the future?
Questions
References
- Challenging the Ammo Companies from Grass Roots [Mai]
Student Learning Objectives
Introduction
Relevant History – From Muzzle loaders to Modern Cartridges
Summary
The Nub – Ammunition shortages and government suppression of stocks
Ammunition – Like water in an ocean, everywhere but not a drop to drink
Scarcity
Conclusions
Questions
References
- Future Proof Security [Shields]
Student Learning Objectives
Security Landscape
Security and Protecting Critical Assets
Protecting Industrial Control Systems via Comprehensive & Secure Integrity Management & Monitoring
Secure Communication & Integrity Management & Monitoring Challenges for Industrial Control Systems
Ideal Secure Communication & Integrity Management & Monitoring Requirements for Industrial Control Systems
Ideal Secure Communication Requirements for Industrial Control Systems
Unique Security Credentials per Relationship
No Communication of Shared Secrets
Continually Refreshed Security Credentials
Security Credentials Cannot be Derived/Predicted
Security Credentials should have Perfect Forward Secrecy
Security Credentials shall be Capable of Protecting Multipoint Networks (i.e., creating a Security Mesh)
Hardware Endpoints may Have Multiple, Overlaying Security Relationships
Authenticates Hardware Endpoint
Significantly Mitigates Latency
Provides Consistent High-Level Grade Security Regardless of Processing Capability
Initial Provisioning of New Security Credentials is Autonomous
Autonomous and Frequent Refreshed/Updated New Security Credentials
Elimination of Replay Attacks
Must be Quantum Resilient
Ideal Integrity Management Requirements for Industrial Control Systems
The IM&M Validates Hardware Endpoint
The IM&M Validates Every Software Component
Validates Every Subsystem
Validates Every System
The Integrity Management & Monitoring System Shall Enforce the System Configuration
Enforcement of the System Configuration shall occur Continuously in Periodic Intervals During Runtime
Subsystems within an Individual System
Normal Operation of the Ideal IM&M, including Enforcement of the System Configuration, Shall be Autonomous
Hardware Endpoints May be Members of Multiple Subsystems Simultaneously
All Communication Between Logical Elements within the System Shall be Secure
How do Current Solutions fit within the Outlined Ideal Framework for Secure Communication and Integrity Management & Monitoring?
Current Solutions vs. the Ideal Secure Communication Solution
How Do PKI + TLS Address the Ideal Requirements for Secure Communication?
Unique Security Credentials per Relationship
No Communication of Shared Secrets
Continually Refreshed Security Credentials
Transportation Terrorist Scenario
Security Credentials Cannot be Derived/Predicted
Security Credentials should have Perfect Forward Secrecy
Security Credentials shall be Capable of Protecting Multipoint Networks (i.e., creating a Security Mesh)
Hardware Endpoints may Have Multiple, Overlaying Security Relationships
Authenticates Hardware Endpoint
Significantly Mitigates Latency
Provides Consistent High-Level Grade Security Regardless of Processing Capability
Initial Provisioning of New Security Credentials is Autonomous
Autonomous and Frequent Refreshed/Updated New Security Credentials
Elimination of Replay Attacks
Must be Quantum Resilient
Current Solutions vs. the Ideal Integrity Management & Monitoring Solution
How Does Blockchain Address the Ideal Requirements for Integrity Management & Monitoring?
Provide Solutions that Address the Goals for Ideal Secure Communication and Integrity Management & Monitoring (IMM)
Autonomous Key Management (AKM), the Ideal Secure Communication Solution
AKM Based IM&M, the Ideal Secure Communication Solution
Summary
Using AKM & AKM-Based IM&M for Solving the Most Difficult Problems Plaguing IT Communication and Systems
Conclusions
Questions
References
- Failure of Climate Change [Nichols]
Student Learning Objectives (SLO)
Introduction
The Open Mind
Scientific Method
Replication
External review
Scientific Inquiry
Properties of scientific inquiry
Beliefs and biases
Global Warming – Status Quo ( as applied to the aviation industry)
Greenhouse Gases – our security blanket
Fact 1 Carbon dioxide is NOT the primary greenhouse gas.
Analysis
Fact 2 The warming effect of CO2 declines as its concentration increases.
Facts 3 (Combined) CO2 is not the demon causing catastrophic global warming; it is in fact an essential plant food. It means more plant growth, more food for people worldwide, and moister soil.
Fact 4 400 PPM of CO2 is not a tipping point, not science and is disinformation (propaganda)
Fact 5 Our current geological period (Quaternary) has the LOWEST average CO2 levels in the history of the Earth
Michael Mann
Temperature Measurement
HadCET
Fact 6 Modern Warming began long before SUVs, Model T’s or coal-fired plants, or modern planes
Fact 7 The current warming trend is a natural and predictable result of driving forces since the last ice age (aka The Little Ice Age (1250-1850)
Forest Fires
Fact 8 Forest fires in the northern hemisphere are decreasing
Tornadoes
Facts 9 (combined)
- The number of tornados is decreasing with 2016 showing the lowest on record
- CO2 global emissions has increased at the same time severe tornados ( F3+) has decreased
- US tornado deaths per million population continues to fall through 2000
- Science and data show no correlation between tornadoes and rising temperatures over the last 50 years
Hurricanes
Fact 10 There has been no increase in frequency of hurricanes in recent data
Fact 11 There is no significant increase in hurricane intensity due to warming
Conclusions
Questions
References
Endnotes
- Nightmare Technologies [Nichols]
Student Learning Objectives (SLO)
Emerging vs Disruptive Technologies
Surveillance Technologies
Alexa / Siri / Cortona [ASC group]
Addiction
AI Cloning (Deep Fakes)
De-Censoring Images
Can I uncensor a face or a bikini?
Weaponized Algorithmic Addiction (Social Asymmetric Warfare) and Asymmetric Warfare
On Asymmetric Thinking / Warfare / Fear (Nichols R. , 2017)
Terrorism
Knowledge War and Fear
Aggregation
Coping with Asymmetric Warfare
FEAR
Weaponized Algorithmic Addiction (aka Asymmetric Social Warfare)
COVID-19
Twitter© & Facebook© Actions
Drone Swarms
IoT and ACG Devices in the Home – The spy in the home
Smart Electric Meters
Facial Recognition
Ransomware
Smart Dust (MEMS)
Fake News Bots
Lethal Autonomous Robots
Conclusions
Questions
References
- Social Media – The Next Battleground in Information Warfare [Lonstein]
Student Learning Objectives
History of Information Warfare
The 21st Century Communication, Social Media, Instant, Global, Personal
Enter Donald Trump – Social Media Disruptor
Election 2020 : Disrupting The Disruptor
Take Away The Microphone
Create A Communications Bottleneck
Marginalize The Messenger – Toxify The Message
Let The Battle Begin
How Will Law, Policy and Markets React?
Counter-Censorship- Social Media Resiliency Strategies and Technology
Conclusions
Questions
References
- Bioterrorism and Advanced Sensors [Sincavage & Carter]
Student Learning Objectives – What Questions Will Be Answered
BIOLOGICAL TERRORIST AGENTS
Biological Weapons – A Historical Primer
First Bioterrorism Attack in the United States
Dark Winter
PATHOGENS
Bacterial Agents
Viruses / Viral Weapons
Galveston National Laboratory
Biological Toxins / Toxic Weapons
Existing U.S. Biodefense – BioWatch
NEXT GENERATION – DNA to GENOME
Nanowire
Conclusions
Post Analysis from a Terrorist Point of View
References
Endnotes