Uploaded on


More in: Education , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Military
    3.6 Politics and Government
  • 2. Cyberwarfare
    “Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.“
    Richard A Clarke
  • 3. Cyberwarfare
    • Web vandalism
    • 4. Changing websites, deleting information, etc.
    • 5. Propaganda
    • 6. Political messages being spread through the Internet.
    • 7. Gathering data
    • 8. Espionage from the other side of the world, secure data being abused.
    • 9. Equipment disruption
    • 10. Re-programming military systems. This kind of cyber-warfare is very dangerous.
    • 11. Attacking critical infrastructure
    • 12. Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack.
  • Smart weapons development
  • 13. Laser guided bombs
    • Rely on targed being illuminated by laser target designator on the ground or aircraft.
    • 14. Disadvantage of not being usable in poor weather where illumination cannot be seen.
    • 15. The laser designator sends its beam in a series of encrypted pulses so the bomb is not confused by an ordinary laser.
  • Millimeter-wave radar
    The Lockheed-Martin Hellfire II light-weight anti-tank weapon uses the radar on the Boeing AH-64D Apache Longbow to provide fire-and-forget guidance for that weapon.
  • 16. Satellite-guided weapons
    • Use the GPS tracking system for guidance.
    • 17. Can be used in any weather conditions, without support from ground units.
    • 18. Precision of weapons rely on the precision of the GPS tracking system setting the coordinates of the target.
    • 19. If the targeting information is accurate, satellite guided weapons are more efficient than any other precision guided weapon.
  • Unmanned aerial vehicle
  • 20. “Short” list of hardware
    Synthetic Aperture Radar (SAR) Antenna
    Inertial Navigation System/GPS
    Ku-Band Satellite Communications Antenna
    Video Cassette Recorder
    GPS Antennas (Left and Right)
    APX-100 Identification Friend or Foe Transponder
    Ku-Band Satellite Communications Sensor Processor Modem Assembly
    Secondary Control Module
    Synthetic Aperture Radar Processor/AGM-114 Electronics Assembly
    Primary Control Module
    Front Bay Avionics Tray
    ARC-210 Receiver/Transmitter
    Flight Sensor Unit
    Video Encoder
    De-ice Controller
    Electro-Optical/Infrared Sensor/AN/AAS-52(V)1 Electronics Assembly
    Front Bay Payload Tray
    Ice Detector
    Synthetic Aperture Radar (SAR) Receiver/Transmitter
    Nose Camera Assembly
  • 21.
  • 22. "The Predator is a system, not just an aircraft."
    US Defense Department
    A fully operational system consists of four Predators (with sensors), a ground control station (GCS) that houses the pilots and sensor operators, and a Predator primary satellite-link communication suite.
  • 23. Combat Training – Virtual Warfare
  • 24. Military
    3.6 Politics and Government