Military

  • 1,427 views
Uploaded on

 

More in: Education , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,427
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
0
Comments
0
Likes
2

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • http://www.youtube.com/watch?v=YO8dLk_QGsM&feature=player_embedded

Transcript

  • 1. Military
    3.6 Politics and Government
  • 2. Cyberwarfare
    “Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.“
    Richard A Clarke
  • 3. Cyberwarfare
    • Web vandalism
    • 4. Changing websites, deleting information, etc.
    • 5. Propaganda
    • 6. Political messages being spread through the Internet.
    • 7. Gathering data
    • 8. Espionage from the other side of the world, secure data being abused.
    • 9. Equipment disruption
    • 10. Re-programming military systems. This kind of cyber-warfare is very dangerous.
    • 11. Attacking critical infrastructure
    • 12. Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack.
  • Smart weapons development
  • 13. Laser guided bombs
    • Rely on targed being illuminated by laser target designator on the ground or aircraft.
    • 14. Disadvantage of not being usable in poor weather where illumination cannot be seen.
    • 15. The laser designator sends its beam in a series of encrypted pulses so the bomb is not confused by an ordinary laser.
  • Millimeter-wave radar
    The Lockheed-Martin Hellfire II light-weight anti-tank weapon uses the radar on the Boeing AH-64D Apache Longbow to provide fire-and-forget guidance for that weapon.
  • 16. Satellite-guided weapons
    • Use the GPS tracking system for guidance.
    • 17. Can be used in any weather conditions, without support from ground units.
    • 18. Precision of weapons rely on the precision of the GPS tracking system setting the coordinates of the target.
    • 19. If the targeting information is accurate, satellite guided weapons are more efficient than any other precision guided weapon.
  • Unmanned aerial vehicle
  • 20. “Short” list of hardware
    Synthetic Aperture Radar (SAR) Antenna
    Inertial Navigation System/GPS
    Ku-Band Satellite Communications Antenna
    Video Cassette Recorder
    GPS Antennas (Left and Right)
    APX-100 Identification Friend or Foe Transponder
    Ku-Band Satellite Communications Sensor Processor Modem Assembly
    Secondary Control Module
    Synthetic Aperture Radar Processor/AGM-114 Electronics Assembly
    Primary Control Module
    Front Bay Avionics Tray
    ARC-210 Receiver/Transmitter
    Flight Sensor Unit
    Video Encoder
    De-ice Controller
    Electro-Optical/Infrared Sensor/AN/AAS-52(V)1 Electronics Assembly
    Front Bay Payload Tray
    Ice Detector
    Synthetic Aperture Radar (SAR) Receiver/Transmitter
    Nose Camera Assembly
  • 21.
  • 22. "The Predator is a system, not just an aircraft."
    US Defense Department
    A fully operational system consists of four Predators (with sensors), a ground control station (GCS) that houses the pilots and sensor operators, and a Predator primary satellite-link communication suite.
    http://www.youtube.com/watch?v=kSpOYZR0klA
    http://www.youtube.com/watch?v=kqBPDI6-FNQ
  • 23. Combat Training – Virtual Warfare
  • 24. Military
    3.6 Politics and Government