Comments on: Full Spectrum Warrior
http://www.metafilter.com/137240/Full-Spectrum-Warrior/
Comments on MetaFilter post Full Spectrum WarriorThu, 06 Mar 2014 08:20:39 -0800Thu, 06 Mar 2014 08:20:39 -0800en-ushttp://blogs.law.harvard.edu/tech/rss60Full Spectrum Warrior
http://www.metafilter.com/137240/Full-Spectrum-Warrior
<a href="http://www.wired.com/threatlevel/2014/02/spectrum-warfare/">Inside the new arms race to control bandwidth on the battlefield</a> <br /><br /><a href="http://www.dodbuzz.com/2014/02/11/navy-places-priority-on-advancing-electronic-warfare/">Navy Places Priority on Advancing Electronic Warfare</a>
<a href="http://www.militaryaerospace.com/articles/2013/11/answer-program-solicitation.html">Air Force launches spectrum warfare program covering EW, optical, GPS, and cyber warfare</a>
<a href="http://www.defenseone.com/technology/2014/02/inside-armys-first-field-manual-cyber-electromagnetic-war/79498/">How the Army Plans to Fight a War Across the Electromagnetic Spectrum</a>
<a href="http://www.phantomreport.com/spectrum-warfare-the-cat-and-mouse-game-continues">Spectrum Warfare: The Cat-And-Mouse Game Continues</a> <blockquote>EA involves the use of the three primary weapons types to degrade, neutralize, or destroy enemy equipment, facilities, or personnel. That includes jamming or spoofing the enemy's own use of the electromagnetic spectrum and directed energy systems, including lasers, radio frequency (RF) weapons, and particle beams.
EP is the flip side, using defensive and counter-threat technologies to protect personnel, facilities, and equipment from all aspects of electronic attack.
ES, meanwhile, comprises actions tasked by an operational command- er to search for, intercept, identify, and pinpoint electromagnetic energy-weapons and common background-to determine what EW operations, offensive and defensive, are required to avoid and target enemy threats. Data gathered by ES operations also can be used for signals intelligence (SIGINT), electronics intelligence (ELINT), and communications intelligence (COMINT).</blockquote>post:www.metafilter.com,2014:site.137240Thu, 06 Mar 2014 08:10:56 -0800the man of twists and turnsewoldcrowelectronicwarfareelectromagneticspectrumwirelesswarfarewarjammingspoofingGPSairwavesradiocellphoneBy: atrazine
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450280
Eponysterical?comment:www.metafilter.com,2014:site.137240-5450280Thu, 06 Mar 2014 08:20:39 -0800atrazineBy: k5.user
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450288
twists and turns are on ballistics and kinetics, not EW ..comment:www.metafilter.com,2014:site.137240-5450288Thu, 06 Mar 2014 08:23:05 -0800k5.userBy: exogenous
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450292
Interesting stuff. Here's some more on the <a href="http://www.winlab.rutgers.edu/pub/docs/focus/ORBIT.html">ORBIT (Open Access Research Testbed for Next-Generation Wireless Networks) radio grid testbed</a> used in the <a href="http://www.darpa.mil/spectrumchallenge/">DARPA Spectrum Challenge</a>.comment:www.metafilter.com,2014:site.137240-5450292Thu, 06 Mar 2014 08:24:23 -0800exogenousBy: the man of twists and turns
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450294
<i>Eponysterical?</i>
More buttons, fewer dials.comment:www.metafilter.com,2014:site.137240-5450294Thu, 06 Mar 2014 08:24:35 -0800the man of twists and turnsBy: three blind mice
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450298
The sad and ironic thing will be seeing nuclear weapons used in war for no other reason than to disrupt communications.comment:www.metafilter.com,2014:site.137240-5450298Thu, 06 Mar 2014 08:27:27 -0800three blind miceBy: Steely-eyed Missile Man
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450306
<em>ORBIT (Open Access Research Testbed for Next-Generation Wireless Networks) radio grid testbed</em>
This is the most tortured acronym I have ever seen.comment:www.metafilter.com,2014:site.137240-5450306Thu, 06 Mar 2014 08:32:14 -0800Steely-eyed Missile ManBy: exogenous
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450310
<em>This is the most tortured acronym I have ever seen.
posted by Steely-eyed Missile Man</em>
MANPADScomment:www.metafilter.com,2014:site.137240-5450310Thu, 06 Mar 2014 08:35:03 -0800exogenousBy: Aizkolari
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450339
I used to talk to Iraqi mobile network operators for work and they all complained about the issue with US patrols jamming cell service around their immediate area.comment:www.metafilter.com,2014:site.137240-5450339Thu, 06 Mar 2014 08:47:08 -0800AizkolariBy: MikeWarot
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450356
The spectrum challenge was fun, I got hung up on a trick I was trying to pull to split my bandwidth among subcarriers, and got punted in the 2nd round.
Cyber war can be won, by making everyone's computers secure. Trying to own spectrum is like trying to make water not wet.comment:www.metafilter.com,2014:site.137240-5450356Thu, 06 Mar 2014 08:52:15 -0800MikeWarotBy: atrazine
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450369
<em>twists and turns are on ballistics and kinetics, not EW ..</em>
It's all fun and games until someone subverts your communications system to make it look like no man is shooting at you.comment:www.metafilter.com,2014:site.137240-5450369Thu, 06 Mar 2014 08:55:56 -0800atrazineBy: Rock Steady
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450371
<a href="http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450356">MikeWarot</a>: <i>Cyber war can be won, by making everyone's computers secure.</i>
But isn't that like saying conventional war can be won by making everyone's skin bulletproof?comment:www.metafilter.com,2014:site.137240-5450371Thu, 06 Mar 2014 08:56:36 -0800Rock SteadyBy: happyroach
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450386
<em>The sad and ironic thing will be seeing nuclear weapons used in war for no other reason than to disrupt communications.</em>
That's highly unlikely, given the political role of nukes. Any nuclear weapons use will almost certain be restricted to a situation of all-out war.
So on the plus side, if someone used a number to fry your iPad, you can probably expect the city-busters to hit in twenty minutes or so.comment:www.metafilter.com,2014:site.137240-5450386Thu, 06 Mar 2014 09:01:17 -0800happyroachBy: lupus_yonderboy
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450541
> The sad and ironic thing will be seeing nuclear weapons used in war for no other reason than to disrupt communications.
(How is that "ironic" by any stretch of the imagination:?)
But no one's going to do that. If you wanted to generate an electromagnetic pulse, there are better ways to do that, ways where you can control the intensity and even the direction of the pulse, ways where you can re-use the equipment even.
> > Cyber war can be won, by making everyone's computers secure.
> But isn't that like saying conventional war can be won by making everyone's skin bulletproof?
Not the same thing. It's quite easy to make a computer secure (assuming your operators are all trusted, and if your operators are subverted there's really nothing you can do) - simply cut it off from all network communications. From that basis, creating your own proprietary highly-authenticated network is quite a lot of work but doesn't require any theoretical or engineering breakthrough to accomplish.comment:www.metafilter.com,2014:site.137240-5450541Thu, 06 Mar 2014 10:05:52 -0800lupus_yonderboyBy: tonycpsu
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5450949
<a href="/137240/Full-Spectrum-Warrior#5450541">lupus_yonderboy</a>: "<i> simply cut it off from all network communications</i>"
I think Rock Steady's analogy holds, because the utility of having computers networked is so much higher than not having them networked that "just unplug it from the network" is rarely an acceptable option, and even in this <i>reductio ad absurdum</i> case, bad things happen -- malware can now jump airgaps via USB keys and other channels, and operators make mistakes, no matter how trusted they are.comment:www.metafilter.com,2014:site.137240-5450949Thu, 06 Mar 2014 13:38:16 -0800tonycpsuBy: MikeWarot
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5451024
I said: "Cyber war can be won, by making everyone's computers secure."
The Reply: <em>But isn't that like saying conventional war can be won by making everyone's skin bulletproof?</em>
Actually, multilevel secure computing has been a real thing since the 1970s... it'll be on your machine in about 10-20 years, I think.
On the other hand, you'll never be able to completely jam an RF communication system via purely technological means. And if that wasn't enough... you can always shift to using longitudinally polarized systems, which go through Faraday cages, and can't possibly work according to most physics books, in spite of evidence to the contrary.comment:www.metafilter.com,2014:site.137240-5451024Thu, 06 Mar 2014 14:18:51 -0800MikeWarotBy: tonycpsu
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5451065
With all due respect, while some (but not all) security problems have theoretical solutions that have been successful mostly on classified / closed networks in areas where the controlling entity is willing to pay for that level of security in dollars and performance tradeoffs, none of them have been put into a workable system without those unacceptable tradeoffs for the average user. You even acknowledge that it will take 10-20 years for this to trickle down to everyday machines, but you also say "cyber war can be won." No, it can't, at least not at a cost that people are willing to bear.comment:www.metafilter.com,2014:site.137240-5451065Thu, 06 Mar 2014 14:36:48 -0800tonycpsuBy: surplus
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5451083
From the article
<blockquote>... low-power GPS jammer ...
To prevent the smuggling of these devices, which are illegal in the US, the Air Force Research Laboratory is developing a jammer detector that can be installed at border crossings.</blockquote>
That's not the first place a detector like that would be deployed. The whole blurb seems odd -- like disinformation.comment:www.metafilter.com,2014:site.137240-5451083Thu, 06 Mar 2014 14:48:39 -0800surplusBy: surplus
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5451097
I wonder if the military is working on a wireless optical communication system, at least for GPS, if not for aircraft communications.comment:www.metafilter.com,2014:site.137240-5451097Thu, 06 Mar 2014 14:55:34 -0800surplusBy: exogenous
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5451231
NASA is using <a href="http://esc.gsfc.nasa.gov/267/271.html">laser communications</a> with the LADEE lunar spacecraft. I imagine on a battlefield all the smoke and dust would be an issue, not to mention the line of sight requirement unless you bounce lasers off satellites or something.comment:www.metafilter.com,2014:site.137240-5451231Thu, 06 Mar 2014 16:00:24 -0800exogenousBy: surplus
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5451285
I agree, <b>exogenous</b>. Smoke is too easy a countermeasure on land.comment:www.metafilter.com,2014:site.137240-5451285Thu, 06 Mar 2014 16:54:40 -0800surplusBy: Blazecock Pileon
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5451340
All we have to do is drop the Comcast on our enemies.comment:www.metafilter.com,2014:site.137240-5451340Thu, 06 Mar 2014 17:40:19 -0800Blazecock PileonBy: sneebler
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5451532
<i>The whole blurb seems odd -- like disinformation.</i>
The problem is that disinformation is hard to distinguish from dumbth.comment:www.metafilter.com,2014:site.137240-5451532Thu, 06 Mar 2014 19:55:54 -0800sneeblerBy: homunculus
http://www.metafilter.com/137240/Full-Spectrum-Warrior#5451712
Interesting post. Thanks, the man of twists and turns.comment:www.metafilter.com,2014:site.137240-5451712Fri, 07 Mar 2014 00:23:17 -0800homunculus
"Yes. Something that interested us yesterday when we saw it." "Where is she?" His lodgings were situated at the lower end of the town. The accommodation consisted[Pg 64] of a small bedroom, which he shared with a fellow clerk, and a place at table with the other inmates of the house. The street was very dirty, and Mrs. Flack's house alone presented some sign of decency and respectability. It was a two-storied red brick cottage. There was no front garden, and you entered directly into a living room through a door, upon which a brass plate was fixed that bore the following announcement:¡ª The woman by her side was slowly recovering herself. A minute later and she was her cold calm self again. As a rule, ornament should never be carried further than graceful proportions; the arrangement of framing should follow as nearly as possible the lines of strain. Extraneous decoration, such as detached filagree work of iron, or painting in colours, is [159] so repulsive to the taste of the true engineer and mechanic that it is unnecessary to speak against it. Dear Daddy, Schopenhauer for tomorrow. The professor doesn't seem to realize Down the middle of the Ganges a white bundle is being borne, and on it a crow pecking the body of a child wrapped in its winding-sheet. 53 The attention of the public was now again drawn to those unnatural feuds which disturbed the Royal Family. The exhibition of domestic discord and hatred in the House of Hanover had, from its first ascension of the throne, been most odious and revolting. The quarrels of the king and his son, like those of the first two Georges, had begun in Hanover, and had been imported along with them only to assume greater malignancy in foreign and richer soil. The Prince of Wales, whilst still in Germany, had formed a strong attachment to the Princess Royal of Prussia. George forbade the connection. The prince was instantly summoned to England, where he duly arrived in 1728. "But they've been arrested without due process of law. They've been arrested in violation of the Constitution and laws of the State of Indiana, which provide¡ª" "I know of Marvor and will take you to him. It is not far to where he stays." Reuben did not go to the Fair that autumn¡ªthere being no reason why he should and several why he shouldn't. He went instead to see Richard, who was down for a week's rest after a tiring case. Reuben thought a dignified aloofness the best attitude to maintain towards his son¡ªthere was no need for them to be on bad terms, but he did not want anyone to imagine that he approved of Richard or thought his success worth while. Richard, for his part, felt kindly disposed towards his father, and a little sorry for him in his isolation. He invited him to dinner once or twice, and, realising his picturesqueness, was not ashamed to show him to his friends. Stephen Holgrave ascended the marble steps, and proceeded on till he stood at the baron's feet. He then unclasped the belt of his waist, and having his head uncovered, knelt down, and holding up both his hands. De Boteler took them within his own, and the yeoman said in a loud, distinct voice¡ª HoME²¨¶àÒ°´²Ï·ÊÓÆµ ѸÀ×ÏÂÔØ ѸÀ×ÏÂÔØ
ENTER NUMBET 0016www.jtzher.com.cn www.nb9dx.net.cn www.wanzitv.com.cn www.tjfuwy.com.cn www.vimily.com.cn tuinaxue.org.cn rncxyy.com.cn tealove.com.cn nhchain.com.cn upleif.com.cn