Table of Contents (Detailed)

Title Page

Copyright / Publication Page

Books also by Professor Randall K. Nichols

Dedications

Disclaimers

Foreword

Preface

Acknowledgements

List of Contributors

Abbreviations and Acronyms

Table of Contents

Table of Figures

Table of Tables

Table of Equations

 

1: Propulsion and Fuels: Disruptive Technologies for Submersible Craft Including UUVs [Jackson]

 

Student Learning Objectives

Introduction

Drivers for Change

International Regulations

Fuels and Propulsion: Current Disruptive Technologies

Diesel Fuels

Biofuels

Liquid Natural Gas (LNG) Fuels

Gas Turbine Propulsion

Nuclear Propulsion

Battery Technology

Fuel Cells

Hydrogen Fuel

Future Disruptive Technologies for Propulsion and Fuels

Hybrid Propulsion

Energy Saving Devices

Hull Design (Appendages and Coatings)

Superconducting Electric Motors

Conclusions: Naval Architect’s Role

Questions

References

 

  1. Automation & Human-Machine Symbiosis [Mumm]

 

Student Learning Objectives

A Look Back at the Machine and Human Symbiosis Evolution

The Fifth Industrial Revolution

Human and Machine Joined – Cyborg or Evolutionary Inevitability?

Traversing the Seas with New Autonomous Technologies

Human Symbiosis Disrupts the Aviation Industry

Integrating Artificial Employees-The Changing Horizon of Human Resources

Conclusions

Questions

References

 

  1. UAS Regulation /Innovation /Safety 2020 / Privacy and Beyond [Hood]

 

Student Learning Objectives

Two New FAA Rules That make a Difference

Remote ID

Operations over People and at Night

Category 2 eligible

Category 3 eligible

Category 4 eligible

Operating Rules

Operations at Night

Operations Over People

Category 1 eligible aircraft

Category 2 eligible aircraft

Category 3 eligible aircraft

Category 4 eligible aircraft

Operations over moving vehicles

Remote Pilot Knowledge Test Changes

Design and production Rules for Manufacturers

Major Changes from Proposed Rule to the Final Rule

What Do These Two Rules Really Mean and Why are they Important?

Drone Privacy Laws Around the World

EUROPE

NORTH AMERICA

SOUTH AMERICA

MIDDLE EAST AND CENTRAL ASIA

OCEANA

AFRICA

Methodology & Sources

References

 

  1. UUVs, Advanced Sensors, Munitions Detection, & USVs [Nichols]

 

Student Learning Objectives (SLO)

What is the Advanced Weapons Problem that UUVs can solve?

NSWC PCD

Murky Waters

REMUS Group

REMUS 600

Bluefin 12 Buried Mine Identification (BMI) UUV System

Demonstration

Demonstration Results

Implementation Issues

Success Criteria and Performance Objectives

Performance Objectives (PO) Remote Environmental Measuring Units REMUS 100.

Performance Objectives – Real-Time Tracking Gradiometer (RTG) / Laser Scalar Gradiometer (LSG)

Performance Objectives – Buried Object Scanning Sonar (BOSS)

Performance Assessments

Remote Environmental Measuring Units 100 (REMUS 100)

BOSS Images

Summary – BOSS

Modern mine warfare challenges today

Clearing mines is an inexact science

Innovation seems to be the name of the game in UUV / USV Surveying

Conclusions: Why do the authors consider UUVs and USVs Disruptive Technologies of the future?

Questions

References

 

  1. Challenging the Ammo Companies from Grass Roots [Mai]

 

Student Learning Objectives

Introduction

Relevant History – From Muzzle loaders to Modern Cartridges

Summary

The Nub – Ammunition shortages and government suppression of stocks

Ammunition – Like water in an ocean, everywhere but not a drop to drink

Scarcity

Conclusions

Questions

References

 

 

  1. Future Proof Security [Shields]

 

Student Learning Objectives

Security Landscape

Security and Protecting Critical Assets

Protecting Industrial Control Systems via Comprehensive & Secure Integrity Management & Monitoring

Secure Communication & Integrity Management & Monitoring Challenges for Industrial Control Systems

Ideal Secure Communication & Integrity Management & Monitoring Requirements for Industrial Control Systems

Ideal Secure Communication Requirements for Industrial Control Systems

Unique Security Credentials per Relationship

No Communication of Shared Secrets

Continually Refreshed Security Credentials

Security Credentials Cannot be Derived/Predicted

Security Credentials should have Perfect Forward Secrecy

Security Credentials shall be Capable of Protecting Multipoint Networks (i.e., creating a Security Mesh)

Hardware Endpoints may Have Multiple, Overlaying Security Relationships

Authenticates Hardware Endpoint

Significantly Mitigates Latency

Provides Consistent High-Level Grade Security Regardless of Processing Capability

Initial Provisioning of New Security Credentials is Autonomous

Autonomous and Frequent Refreshed/Updated New Security Credentials

Elimination of Replay Attacks

Must be Quantum Resilient

Ideal Integrity Management Requirements for Industrial Control Systems

The IM&M Validates Hardware Endpoint

The IM&M Validates Every Software Component

Validates Every Subsystem

Validates Every System

The Integrity Management & Monitoring System Shall Enforce the System Configuration

Enforcement of the System Configuration shall occur Continuously in Periodic Intervals During Runtime

Subsystems within an Individual System

Normal Operation of the Ideal IM&M, including Enforcement of the System Configuration, Shall be Autonomous

Hardware Endpoints May be Members of Multiple Subsystems Simultaneously

All Communication Between Logical Elements within the System Shall be Secure

How do Current Solutions fit within the Outlined Ideal Framework for Secure Communication and Integrity Management & Monitoring?

Current Solutions vs. the Ideal Secure Communication Solution

How Do PKI + TLS Address the Ideal Requirements for Secure Communication?

Unique Security Credentials per Relationship

No Communication of Shared Secrets

Continually Refreshed Security Credentials

Transportation Terrorist Scenario

Security Credentials Cannot be Derived/Predicted

Security Credentials should have Perfect Forward Secrecy

Security Credentials shall be Capable of Protecting Multipoint Networks (i.e., creating a Security Mesh)

Hardware Endpoints may Have Multiple, Overlaying Security Relationships

Authenticates Hardware Endpoint

Significantly Mitigates Latency

Provides Consistent High-Level Grade Security Regardless of Processing Capability

Initial Provisioning of New Security Credentials is Autonomous

Autonomous and Frequent Refreshed/Updated New Security Credentials

Elimination of Replay Attacks

Must be Quantum Resilient

Current Solutions vs. the Ideal Integrity Management & Monitoring Solution

How Does Blockchain Address the Ideal Requirements for Integrity Management & Monitoring?

Provide Solutions that Address the Goals for Ideal Secure Communication and Integrity Management & Monitoring (IMM)

Autonomous Key Management (AKM), the Ideal Secure Communication Solution

AKM Based IM&M, the Ideal Secure Communication Solution

Summary

Using AKM & AKM-Based IM&M for Solving the Most Difficult Problems Plaguing IT Communication and Systems

Conclusions

Questions

References

 

  1. Failure of Climate Change [Nichols]

 

Student Learning Objectives (SLO)

Introduction

The Open Mind

Scientific Method

Replication

External review

Scientific Inquiry

Properties of scientific inquiry

Beliefs and biases

Global Warming – Status Quo ( as applied to the aviation industry)

Greenhouse Gases – our security blanket

Fact 1 Carbon dioxide is NOT the primary greenhouse gas.

Analysis

Fact 2 The warming effect of CO2 declines as its concentration increases.

Facts 3 (Combined) CO2 is not the demon causing catastrophic global warming; it is in fact an essential plant food. It means more plant growth, more food for people worldwide, and moister soil.

Fact 4 400 PPM of CO2 is not a tipping point, not science and is disinformation (propaganda)

Fact 5 Our current geological period (Quaternary)  has the LOWEST average CO2 levels in the history of the Earth

Michael Mann

Temperature Measurement

HadCET

Fact 6 Modern Warming began long before SUVs, Model T’s or coal-fired plants, or modern planes

Fact 7 The current warming trend is a natural and predictable result of driving forces since the last ice age (aka The Little Ice Age (1250-1850)

Forest Fires

Fact 8 Forest fires in the northern hemisphere are decreasing

Tornadoes

Facts 9 (combined)

  1. The number of tornados is decreasing with 2016 showing the lowest on record
  2. CO2 global emissions has increased at the same time severe tornados ( F3+) has decreased
  3. US tornado deaths per million population continues to fall through 2000
  4. Science and data show no correlation between tornadoes and rising temperatures over the last 50 years

Hurricanes

Fact 10 There has been no increase in frequency of hurricanes in recent data

Fact 11 There is no significant increase in hurricane intensity due to warming

Conclusions

Questions

References

Endnotes

 

  1. Nightmare Technologies [Nichols]

 

Student Learning Objectives (SLO)

Emerging vs Disruptive Technologies

Surveillance Technologies

Alexa / Siri / Cortona [ASC group]

Addiction

AI Cloning (Deep Fakes)

De-Censoring Images

Can I uncensor a face or a bikini?

Weaponized Algorithmic Addiction (Social Asymmetric Warfare)  and Asymmetric Warfare

On Asymmetric Thinking / Warfare / Fear (Nichols R. , 2017)

Terrorism

Knowledge War and Fear

Aggregation

Coping with Asymmetric Warfare

FEAR

Weaponized Algorithmic Addiction (aka Asymmetric Social Warfare)

COVID-19

Twitter© & Facebook© Actions

Drone Swarms

IoT and ACG Devices in the Home – The spy in the home

Smart Electric Meters

Facial Recognition

Ransomware

Smart Dust (MEMS)

Fake News Bots

Lethal Autonomous Robots

Conclusions

Questions

References

 

  1. Social Media – The Next Battleground in Information Warfare [Lonstein]

 

Student Learning Objectives

History of Information Warfare

The 21st Century Communication, Social Media, Instant, Global, Personal

Enter Donald Trump – Social Media Disruptor

Election 2020 : Disrupting The Disruptor

Take Away The Microphone

Create A Communications Bottleneck

Marginalize The Messenger – Toxify The Message

Let The Battle Begin

How Will Law, Policy and Markets React?

Counter-Censorship- Social Media Resiliency Strategies and Technology

Conclusions

Questions

References

 

 

  1. Bioterrorism and Advanced Sensors [Sincavage & Carter]

 

Student Learning Objectives – What Questions Will Be Answered

BIOLOGICAL TERRORIST AGENTS

Biological Weapons – A Historical Primer

First Bioterrorism Attack in the United States

Dark Winter

PATHOGENS

Bacterial Agents

Viruses / Viral Weapons

Galveston National Laboratory

Biological Toxins / Toxic Weapons

Existing U.S. Biodefense – BioWatch

NEXT GENERATION – DNA to GENOME

Nanowire

Conclusions

Post Analysis from a Terrorist Point of View

References

Endnotes

License

Share This Book