1 / 13

Military

Military. 3.6 Politics and Government. Cyberwarfare. “Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption .“ Richard A Clarke. Cyberwarfare. Web vandalism Changing websites, deleting information, etc. Propaganda

tryna
Download Presentation

Military

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Military 3.6 Politics and Government

  2. Cyberwarfare “Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.“ Richard A Clarke

  3. Cyberwarfare • Web vandalism • Changing websites, deleting information, etc. • Propaganda • Political messages being spread through the Internet. • Gathering data • Espionage from the other side of the world, secure data being abused. • Equipment disruption • Re-programming military systems. This kind of cyber-warfare is very dangerous. • Attacking critical infrastructure • Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack.

  4. Smart weapons development

  5. Laser guided bombs Laser guided bombs rely on the target being illuminated, or "painted," by a laser target designator on the ground or on an aircraft. They have the significant disadvantage of not being usable in poor weather where the target illumination cannot be seen, or where it is not possible to get a target designator near the target. The laser designator sends its beam in a series of encrypted pulses so the bomb cannot be confused by an ordinary laser, and also so multiple designators can operate in reasonable proximity.

  6. Millimeter-wave radar The Lockheed-Martin Hellfire II light-weight anti-tank weapon uses the radar on the Boeing AH-64D Apache Longbow to provide fire-and-forget guidance for that weapon.

  7. Satellite-guided weapons These make use of the United States' GPS system for guidance. This weapon can be employed in all weather conditions, without any need for ground support. The precision of these weapons is dependent both on the precision of the measurement system used for location determination and the precision in setting the coordinates of the target. The latter critically depends on intelligence information, not all of which is accurate However, if the targeting information is accurate, satellite-guided weapons are significantly more likely to achieve a successful strike in any given weather conditions than any other type of precision-guided munition.

  8. Unmanned aerial vehicle

  9. “Short” list of hardware Synthetic Aperture Radar (SAR) Antenna Inertial Navigation System/GPS Ku-Band Satellite Communications Antenna Video Cassette Recorder GPS Antennas (Left and Right) APX-100 Identification Friend or Foe Transponder Ku-Band Satellite Communications Sensor Processor Modem Assembly Secondary Control Module Synthetic Aperture Radar Processor/AGM-114 Electronics Assembly Primary Control Module Front Bay Avionics Tray ARC-210 Receiver/Transmitter Flight Sensor Unit Video Encoder De-ice Controller Electro-Optical/Infrared Sensor/AN/AAS-52(V)1 Electronics Assembly Front Bay Payload Tray Ice Detector Synthetic Aperture Radar (SAR) Receiver/Transmitter Nose Camera Assembly

  10. "The Predator is a system, not just an aircraft." US Defense Department A fully operational system consists of four Predators (with sensors), a ground control station (GCS) that houses the pilots and sensor operators, and a Predator primary satellite-link communication suite.

  11. Combat Training – Virtual Warfare

  12. Military 3.6 Politics and Government

More Related