Presentation is loading. Please wait.

Presentation is loading. Please wait.

Military 3.6 Politics and Government. Cyberwarfare “Actions by a nation-state to penetrate another nation's computers or networks for the purposes of.

Similar presentations


Presentation on theme: "Military 3.6 Politics and Government. Cyberwarfare “Actions by a nation-state to penetrate another nation's computers or networks for the purposes of."— Presentation transcript:

1 Military 3.6 Politics and Government

2 Cyberwarfare “Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.“ Richard A Clarke

3 Cyberwarfare Web vandalism Changing websites, deleting information, etc. Propaganda Political messages being spread through the Internet. Gathering data Espionage from the other side of the world, secure data being abused. Equipment disruption Re-programming military systems. This kind of cyber- warfare is very dangerous. Attacking critical infrastructure Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack.

4 Smart weapons development

5 Laser guided bombs Laser guided bombs rely on the target being illuminated, or "painted," by a laser target designator on the ground or on an aircraft. They have the significant disadvantage of not being usable in poor weather where the target illumination cannot be seen, or where it is not possible to get a target designator near the target. The laser designator sends its beam in a series of encrypted pulses so the bomb cannot be confused by an ordinary laser, and also so multiple designators can operate in reasonable proximity.

6 Millimeter-wave radar The Lockheed-Martin Hellfire II light-weight anti-tank weapon uses the radar on the Boeing AH-64D Apache Longbow to provide fire-and-forget guidance for that weapon.

7 Satellite-guided weapons These make use of the United States' GPS system for guidance. This weapon can be employed in all weather conditions, without any need for ground support. The precision of these weapons is dependent both on the precision of the measurement system used for location determination and the precision in setting the coordinates of the target. The latter critically depends on intelligence information, not all of which is accurate However, if the targeting information is accurate, satellite-guided weapons are significantly more likely to achieve a successful strike in any given weather conditions than any other type of precision-guided munition.

8 Unmanned aerial vehicle

9 “Short” list of hardware Synthetic Aperture Radar (SAR) Antenna Inertial Navigation System/GPS Ku-Band Satellite Communications Antenna Video Cassette Recorder GPS Antennas (Left and Right) APX-100 Identification Friend or Foe Transponder Ku-Band Satellite Communications Sensor Processor Modem Assembly Secondary Control Module Synthetic Aperture Radar Processor/AGM-114 Electronics Assembly Primary Control Module Front Bay Avionics Tray ARC-210 Receiver/Transmitter Flight Sensor Unit Video Encoder De-ice Controller Electro-Optical/Infrared Sensor/AN/AAS-52(V)1 Electronics Assembly Front Bay Payload Tray Ice Detector Synthetic Aperture Radar (SAR) Receiver/Transmitter Nose Camera Assembly

10

11 "The Predator is a system, not just an aircraft." US Defense Department A fully operational system consists of four Predators (with sensors), a ground control station (GCS) that houses the pilots and sensor operators, and a Predator primary satellite-link communication suite.

12 Combat Training – Virtual Warfare

13 Military 3.6 Politics and Government


Download ppt "Military 3.6 Politics and Government. Cyberwarfare “Actions by a nation-state to penetrate another nation's computers or networks for the purposes of."

Similar presentations


Ads by Google