Hacking in Time of War: The US presents the Cyber ​​EC-130H

In Air & Space conference της Air Force Association που έγινε στις 14-16 Σεπτεβρίου 2015 στο National Harbor του (κοντά στην Ουάσιγκτον), ο υποστράτηγος Burke Wilson αποκάλυψε ένα νέο project της Πολεμικής Αεροπορίας των ΗΠΑ, ένα διασκευασμένο Cyber το οποίο θα εκτελεί hacking στις εγκαταστάσεις του εχθρού από αέρος.

EC-130H

Military networks around the world, regardless of country, are usually closed systems, meaning they have no connection to , κυρίως για την προστασία ευαίσθητων δεδομένων για να μην πέσουν θύματα hacking από εξωτερικούς παράγοντες, όπως or by the cyber-army of an adversary country.

This means that the only way for someone to break it is to try to infiltrate the networks using infected USB drives, in-house spies, or attack the local WiFi network capabilities somewhere near its area.

The Military News Website Breaking Defense reports that the US Air Force has modified a type aircraft EC-130H Compass Call to be able to carry out cyber attacks against ground enemy military networks. The plane EC-130H is often used by the US Air Force to block enemy transmissions into war zones.

This means that if the airplane passes the test successfully, the US Air Force will be able to deploy combat operations against a cyber-virus country, in addition to wreaking havoc with its bombs.

Incorporating this kind of cyber-attack tools into the US Army arsenal is not a far-fetched scenario, as General Wilson confirms their increased use in the last military high schools under the code name Red Flag.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).