Military<br />3.6 Politics and Government<br />
Cyberwarfare<br />“Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causi...
Cyberwarfare<br /><ul><li>Web vandalism
Changing websites, deleting information, etc.
Propaganda
Political messages being spread through the Internet.
Gathering data
Espionage from the other side of the world, secure data being abused.
Equipment disruption
Re-programming military systems. This kind of cyber-warfare is very dangerous.
Attacking critical infrastructure
Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack. </li></li></ul><li...
Laser guided bombs<br /><ul><li>Rely on targed being illuminated by laser target designator on the ground or aircraft.
Upcoming SlideShare
Loading in...5
×

Military

1,573

Published on

Published in: Education, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,573
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  • http://www.youtube.com/watch?v=YO8dLk_QGsM&amp;feature=player_embedded
  • Military

    1. 1. Military<br />3.6 Politics and Government<br />
    2. 2. Cyberwarfare<br />“Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.“<br />Richard A Clarke<br />
    3. 3. Cyberwarfare<br /><ul><li>Web vandalism
    4. 4. Changing websites, deleting information, etc.
    5. 5. Propaganda
    6. 6. Political messages being spread through the Internet.
    7. 7. Gathering data
    8. 8. Espionage from the other side of the world, secure data being abused.
    9. 9. Equipment disruption
    10. 10. Re-programming military systems. This kind of cyber-warfare is very dangerous.
    11. 11. Attacking critical infrastructure
    12. 12. Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack. </li></li></ul><li>Smart weapons development<br />
    13. 13. Laser guided bombs<br /><ul><li>Rely on targed being illuminated by laser target designator on the ground or aircraft.
    14. 14. Disadvantage of not being usable in poor weather where illumination cannot be seen.
    15. 15. The laser designator sends its beam in a series of encrypted pulses so the bomb is not confused by an ordinary laser. </li></li></ul><li>Millimeter-wave radar<br />The Lockheed-Martin Hellfire II light-weight anti-tank weapon uses the radar on the Boeing AH-64D Apache Longbow to provide fire-and-forget guidance for that weapon.<br />
    16. 16. Satellite-guided weapons<br /><ul><li>Use the GPS tracking system for guidance.
    17. 17. Can be used in any weather conditions, without support from ground units.
    18. 18. Precision of weapons rely on the precision of the GPS tracking system setting the coordinates of the target.
    19. 19. If the targeting information is accurate, satellite guided weapons are more efficient than any other precision guided weapon.</li></li></ul><li>Unmanned aerial vehicle<br />
    20. 20. “Short” list of hardware<br />Synthetic Aperture Radar (SAR) Antenna<br />Inertial Navigation System/GPS<br />Ku-Band Satellite Communications Antenna<br />Video Cassette Recorder<br />GPS Antennas (Left and Right)<br />APX-100 Identification Friend or Foe Transponder<br />Ku-Band Satellite Communications Sensor Processor Modem Assembly<br />Secondary Control Module<br />Synthetic Aperture Radar Processor/AGM-114 Electronics Assembly<br />Primary Control Module<br />Front Bay Avionics Tray<br />ARC-210 Receiver/Transmitter<br />Flight Sensor Unit<br />Video Encoder<br />De-ice Controller<br />Electro-Optical/Infrared Sensor/AN/AAS-52(V)1 Electronics Assembly<br />Front Bay Payload Tray<br />Ice Detector<br />Synthetic Aperture Radar (SAR) Receiver/Transmitter<br />Nose Camera Assembly <br />
    21. 21.
    22. 22. "The Predator is a system, not just an aircraft." <br />US Defense Department<br />A fully operational system consists of four Predators (with sensors), a ground control station (GCS) that houses the pilots and sensor operators, and a Predator primary satellite-link communication suite. <br />http://www.youtube.com/watch?v=kSpOYZR0klA<br />http://www.youtube.com/watch?v=kqBPDI6-FNQ<br />
    23. 23. Combat Training – Virtual Warfare<br />
    24. 24. Military<br />3.6 Politics and Government<br />

    ×