What's new

PAF & Future Cyber Warfare

Perhaps your looking at cyber attacks from the wrong end BB, its exciting to contemplate hacking a plane in flight to turn off weapon systems but the most vunerable part of the chain is the logistics side not the weapon side.

Imagine trying to move troops about to respond to a threat, get them suplies etc when the local power grid, phone system and the pumps at the local sewag station have all been hacked.

Traffic lights gone, street lights gone, roads flooded with sewage, chaos from people out on the streets trying to find out whats going on. No ability to broadcast to get people inside, no phones or radio to recall people that are off base. There are all sorts of ways to make life hard with out hitting secured military computers.

Though even "secured comunication" may not be as safe as people belive. Supposedly 128 bit encryption was unhackable.



DailyTech - Researchers Crack 3G GSM 128-bit Encryption in Under 2 Hours


I appreciate your help vassanti , both posts are informative .

Thanks once again.:):pakistan:
 
.
A high-altitude nuclear detonation produces an immediate flux of gamma rays from the nuclear reactions within the device. These photons in turn produce high energy free electrons by Compton scattering at altitudes between (roughly) 20 and 40 km. These electrons are then trapped in the Earth’s magnetic field, giving rise to an oscillating electric current. This current is asymmetric in general and gives rise to a rapidly rising radiated electromagnetic field called an electromagnetic pulse (EMP). Because the electrons are trapped essentially simultaneously, a very large electromagnetic source radiates coherently.
The pulse can easily span continent-sized areas, and this radiation can affect systems on land, sea, and air. The first recorded EMP incident accompanied a high-altitude nuclear test over the South Pacific and resulted in power system failures as far away as Hawaii. A large device detonated at 400–500 km over Kansas would affect all of CONUS. The signal from such an event extends to the visual horizon as seen from the burst point.

The EMP produced by the Compton electrons typically lasts for about 1 microsecond, and this signal is called HEMP. In addition to the prompt EMP, scattered gammas and inelastic gammas produced by weapon neutrons produce an “intermediate time” signal from about 1 microsecond to 1 second. The energetic debris entering the ionosphere produces ionization and heating of the E-region. In turn, this causes the geomagnetic field to “heave,” producing a “late-time” magnetohydrodynamic (MHD) EMP generally called a heave signal.


Initially, the plasma from the weapon is slightly conducting; the geomagnetic field cannot penetrate this volume and is displaced as a result. This impulsive distortion of the geomagnetic field was observed worldwide in the case of the STARFISH test. To be sure, the size of the signal from this process is not large, but systems connected to long lines (e.g., power lines, telephone wires, and tracking wire antennas) are at risk because of the large size of the induced current. The additive effects of the MHD-EMP can cause damage to unprotected civilian and military systems that depend on or use long-line cables. Small, isolated, systems tend to be unaffected.
Military systems must survive all aspects of the EMP, from the rapid spike of the early time events to the longer duration heave signal. One of the principal problems in assuring such survival is the lack of test data from actual high-altitude nuclear explosions. Only a few such experiments were carried out before the LTBT took effect, and at that time the theoretical understanding of the phenomenon of HEMP was relatively poor. No high-altitude tests have been conducted by the United States since 1963. In addition to the more familiar high-yield tests mentioned above, three small devices were exploded in the Van Allen belts as part of Project Argus. That experiment was intended to explore the methods by which electrons were trapped and traveled along magnetic field lines.

I have just one question.

Why can't the makers, discoverers and users be put to justice,
After all this is essentially a dirty bomb.
 
. .
thanks Vassnti for explaining my post....also there is another dimension to cyber warfare ...it called forced deplition u compleatly destroy adversary's economic data digitally and manually and create a havoic in the public of a false war senario where ppl take out their possessions frm accounts and lockers thus leaving the government a little weaker and then strike at them with big projects hosted by friendly un deniable countries thus creation an economic load over them ...a few intelligence created disasters ll be help ful ....this way the enemy ll disintegrate within it self.its a long process but works..still needs stronc cyber and intelligence warfare we have one of them but still can work on the other...thanks
 
.
how do you come up with that ?

and what exactly do you mean by paralizing a whole nation by exploding a nuke on that height ?
for the nuke part Vassnti said it all.the rest well if u go to our army ghq u ll not see any heigh tech command or danger rooms our entire radar network is controlled with at site computers(at least 98%of it)and only info is sent to HQs the press of button is still done on sam or radar site .our nuke delivery sys is soft at ground but once in air it becoms very hard fo a foren signel to lock on it proper frequency and location .our tanks ferform duties in isolated squads.hq only provides verbal or in AKs case digital intel..if we go economical well our on line banking is not very developed and the ons that r have international companies guarding their system ,thats what i mean ...:coffee:
 
.
Think like this.

If ur missile coordinates are changed.

If ur data access to the satellite is blocked or manipulated.

;) ;) ;)
 
.
Hi all
I hav a small question.
i have read that internet is administered by the Internet Corporation for Assigned Names and Numbers (ICANN), headquartered in Marina del Rey, California. ICANN is the authority that coordinates the assignment of unique identifiers for use on the Internet, including domain names, Internet Protocol (IP) addresses, application port numbers in the transport protocols, and many other parameters. Globally unified name spaces, in which names and numbers are uniquely assigned, are essential for the global reach of the Internet.



The US government continues to have the primary role in approving changes to the DNS root zone that lies at the heart of the domain name system. ICANN's role in coordinating the assignment of unique identifiers distinguishes it as perhaps the only central coordinating body on the global Internet.


My question is "Does US have the power to shut down Ip addressees of a particular country"??? :buba_phone:
:big_boss:
 
.
Hi all
I hav a small question.
i have read that internet is administered by the Internet Corporation for Assigned Names and Numbers (ICANN), headquartered in Marina del Rey, California. ICANN is the authority that coordinates the assignment of unique identifiers for use on the Internet, including domain names, Internet Protocol (IP) addresses, application port numbers in the transport protocols, and many other parameters. Globally unified name spaces, in which names and numbers are uniquely assigned, are essential for the global reach of the Internet.



The US government continues to have the primary role in approving changes to the DNS root zone that lies at the heart of the domain name system. ICANN's role in coordinating the assignment of unique identifiers distinguishes it as perhaps the only central coordinating body on the global Internet.


My question is "Does US have the power to shut down Ip addressees of a particular country"??? :buba_phone:
:big_boss:
Yes we can. Of course, that country can petition another country to allow pass-through but then who would want to be severed from the Internet for facilitating an enemy of the US?
 
.
Is it possible to disconnect a country from Network by consistent Cyber Attacks & Cut down their Oceanic data Cable if possible ?
 
.
Think like this.

If ur missile coordinates are changed.

If ur data access to the satellite is blocked or manipulated.

;) ;) ;)

First u have to destroy security policies......and this cant be happen coz the communication is not from one channel.
 
.
i would like to mention a few things

1) indian and pakistani armies have virtually no battlefield computers to hack into. its almost like our "backwardness" in the intergration of computers in the armed forces is protecting them from such attacks.
2) the few "computers" that exist are not joined to any giant network from which a hacker can access them. the networking will be small like the ones between the AWACS and the aircraft around, so effectively one can not access the network and hack into it unless one is in physical posessions of one of the nodes (computers/aircraft)
3) what the computer controls can be termed tertiary functions, in an aircraft most of the essential stuff is hardwired and in a ship or battalion everything is done by other less digital systems which can not be hacked.

the above can effectively rule out a "independence day" type of scenario.

as to what the hacking can really achieve is off the battlefield. i disagree with vassnti that a hacker can can effectively hamper the logistics of an army. again, the army has its own network which can not be accessed by the hacker at any point. a lot of the same kind of things can be said about the "traffic lights" and railway lines. all these are controlled by networks not connected to the internet making it very very hard to hack into them.

hacking can be used on a very different level. for example armies WILL have data stored on computers. much of it confidential. the computers with confidential data is usually kept "off the network" and this can not be hacked into. but some data is kept on computers which are connected to the internet and they can be hacked into to get the "some data". it might give an insight into what the opponent might be planning.

so cyberwarfare is more effective off the battlefield and less on it where, there is very little to hack into.

feel free to correct me
 
.
^Dear moorakh one day we will go digital and to tell you the Truth PA has Already given an order for Digitalizing the military.

So what i am saying is that we won't be living in stone age technology anymore & it will create a huge space for Cyberwarfare.

Thanks
 
.
if alians attack the world america and other super powers ll be compleatly jammed and countries like pak and ind ll defend the world ....lol ...dont want to miss when that happens...:)
 
.
Back
Top Bottom