Hacking in Time of War: The US presents the Cyber ​​EC-130H

In Air & Space conference of the Air Force Association held on September 14-16, 2015 at Harbor του (κοντά στην Ουάσιγκτον), ο υποστράτηγος Burke Wilson αποκάλυψε ένα νέο project της Πολεμικής Αεροπορίας των ΗΠΑ, ένα διασκευασμένο Cyber EC-130H αεροπλάνο το οποίο θα εκτελεί hacking στις εγκαταστάσεις του εχθρού από αέρος.

EC-130H

Military networks around the world, regardless of country, are usually closed systems, meaning they do not have an Internet connection, notably to protect sensitive data from being hacked by external agents such as hackers or cyber- army of a rival country.

This means that the only way for someone to break into them is to try to infiltrate the networks using infected USB drives, spies that move around inside the buildings, or attack the network's local WiFi capabilities from somewhere near the of.

The Military News Website Breaking Defense reports that the US Air Force has modified a type aircraft EC-130H Compass Call to be able to carry out cyber attacks against ground enemy military networks. The plane EC-130H is often used by the US Air Force to block enemy transmissions into war zones.

This means that if the airplane passes the test successfully, the US Air Force will be able to deploy combat operations against a cyber-virus country, in addition to wreaking havoc with its bombs.

Incorporating this kind of cyber-attack tools into the US Army arsenal is not a far-fetched scenario, as General Wilson confirms their increased use in the last military high schools under the code name Red Flag.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).