military 3.6 politics and government. cyberwarfare “actions by a nation-state to penetrate another...

13
Military 3.6 Politics and Government

Upload: bryan-woods

Post on 29-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Military

3.6 Politics and Government

Cyberwarfare“Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.“Richard A Clarke

Cyberwarfare• Web vandalism• Changing websites, deleting information, etc.

• Propaganda• Political messages being spread through the Internet.

• Gathering data• Espionage from the other side of the world, secure data

being abused.• Equipment disruption• Re-programming military systems. This kind of cyber-

warfare is very dangerous.• Attacking critical infrastructure• Power, water, fuel, communications, commercial and

transportation are all vulnerable to a cyber attack.

Smart weapons development

Laser guided bombs

Laser guided bombs rely on the target being illuminated, or "painted," by a laser target designator on the ground or on an aircraft.

They have the significant disadvantage of not being usable in poor weather where the target illumination cannot be seen, or where it is not possible to get a target designator near the target.

The laser designator sends its beam in a series of encrypted pulses so the bomb cannot be confused by an ordinary laser, and also so multiple designators can operate in reasonable proximity.

Millimeter-wave radar

The Lockheed-Martin Hellfire II light-weight anti-tank weapon uses the radar on the Boeing AH-64D Apache Longbow to provide fire-and-forget guidance for that weapon.

Satellite-guided weaponsThese make use of the United States' GPS system for guidance.This weapon can be employed in all weather conditions, without any need for ground support. The precision of these weapons is dependent both on the precision of the measurement system used for location determination and the precision in setting the coordinates of the target. The latter critically depends on intelligence information, not all of which is accurateHowever, if the targeting information is accurate, satellite-guided weapons are significantly more likely to achieve a successful strike in any given weather conditions than any other type of precision-guided munition.

Unmanned aerial vehicle

“Short” list of hardwareSynthetic Aperture Radar (SAR) AntennaInertial Navigation System/GPSKu-Band Satellite Communications AntennaVideo Cassette RecorderGPS Antennas (Left and Right)APX-100 Identification Friend or Foe TransponderKu-Band Satellite Communications Sensor Processor Modem AssemblySecondary Control ModuleSynthetic Aperture Radar Processor/AGM-114 Electronics AssemblyPrimary Control ModuleFront Bay Avionics TrayARC-210 Receiver/TransmitterFlight Sensor UnitVideo EncoderDe-ice ControllerElectro-Optical/Infrared Sensor/AN/AAS-52(V)1 Electronics AssemblyFront Bay Payload TrayIce DetectorSynthetic Aperture Radar (SAR) Receiver/TransmitterNose Camera Assembly

"The Predator is a system, not just an aircraft." US Defense Department

A fully operational system consists of four Predators (with sensors), a ground control station (GCS) that houses the pilots and sensor operators, and a Predator primary satellite-link communication suite.

Combat Training – Virtual Warfare

Military

3.6 Politics and Government