Automatically translated from Basque, translation may contain errors. More information here. Elhuyarren itzultzaile automatikoaren logoa

RQ-170 What Sentinel has told us about tomorrow's wars

  • In December 2011, the US Army drone RQ-170 Sentinel was forced to land in Iran. How did the Iranians manage to seize the entire avant-garde aircraft of the Yankees, rather than shoot it? It has many hidden keys inside, about the system of defensive attack organized by the United States in space and the cyber war of many states.
Duela urte bete, 2012ko apirilean, Irango Iraultzaren Zaindarien jeneral Amir Ali Hajizadeh-k bertako telebistaren kamerei erakutsi zien hilabete batzuk lehenago AEBetako armadari harrapatutako RQ-170 Sentinel pilotubako aireplanoa. Irango armada paralelo
Duela urte bete, 2012ko apirilean, Irango Iraultzaren Zaindarien jeneral Amir Ali Hajizadeh-k bertako telebistaren kamerei erakutsi zien hilabete batzuk lehenago AEBetako armadari harrapatutako RQ-170 Sentinel pilotubako aireplanoa. Irango armada paralelo berak zabaldutako irudietan ageri da hegazkina osorik, Khomeinik sortutako iraultza laudatu eta AEBak gaitzesten dituzten afixen aurrean, Amir Ali Hajizadeh teknikari baten azalpenak aditzen. Antza denez, Osama Bin Laden gertutik zaindu zuen Abbottabad herriko jauregian zegoela, AEBetako militarrek hil baino aste pare bat lehenago. RQ-170k ez darama armarik, inteligentziarako prestaturik dago, arerioaren komunikazioak behatzeko. Kamuflaje elektroniko oso sofistikatuak babesten du, radarrek hauteman ez dezaten. Iranen osorik lur hartu izanak bistan uzten du hango militarrak airean zebilela egin zirela bere jabe.

Will there be a computer war or a cyberwar that repeats? In early March the French weekly Courrier International declared La cyberguerre est déclarée. “Conflicts between States are increasingly being played in a virtual battlefield”, Courrier introduced with these words an interesting collection of articles within the formula he has long converted into a model: he collects weekly interviews and selected chronicles that have been published by the world’s leading media on issues that are currently at risk worldwide.

We do not need to explain to our readers why cyberwar is important. The development of informatics has digitized all the chapters of life, it's going to become numeric in Xilaba. The Internet has become a guarantee of economic and social development... and, at the same time, a risk of deterioration.

Cool War compared the cold war with the cool war that David Rothkopf has published in the American Foreign Policy: “This new cool of war is more temperate than cold, that is, based on a continuous attack; they are not exactly war actions, but they seek to weaken the enemy and gain advantage over it, breaking its sovereignty and overcoming its defensive lines.”

On February 19, the New York Times offered one of the latest examples of this type of war, denouncing that the 61398 unit of the Chinese Army in Shanghai is the one that systematically attacks the computer systems of the major states and companies of Oeste.Para
David Rothkopf, everyone knows that the Chinese, like the Russian and Iranian military, continue in that activity, but "no one believes that for (...) The Chinese violate our intellectual property, collect information about the economy of the EE.UU, stumble upon our fundamental companies and infrastructures, the security of the EE.UU. (...) but we give them a warm answer, because we are also doing the same thing all over the world.”

Rothkopf mentioned the Stuxnet virus, created by the Yankees and their allies, to infect their computers with Iran’s nuclear program. With this kind of warm attack, they want to achieve the goal that would otherwise require a warm attack, a bombing: Let Iran not take the atomic bomb.

“But,” says Rothkopf, they can do the same as we can to enemies. When you throw a bomb somewhere, not only do you destroy the target, but even the bomb goes apart. Instead, when you open the computer worm, its components remain intact and if it recovers it will be able to reuse its enemies for its benefit.” That is apparently what has happened to them with RQ-170. At least the Iranians have sold this. In other words, the Yankees and the Israelis have acquired control of the system used by the RQ-170 aircraft on the basis of knowledge of the computer viruses used against them, until they take the aircraft and land in full in Iran.

Drones are not toys.

When we talk about cyberwarfare, the reader may think that we are talking about the contamination of the computers we know the most. That is, viruses, computer worms, external control of a computer system, server lock, etc. It is in this area that most of the attacks are made known in the media. In France, for example, it was mentioned that last January, a day after the French decided to intervene militarily in Mali, two areas of the Ministry of Defence were blocked. Previously, in March 2011, someone had taken over the external control of 150 computers from the Ministry of Economy and Finance. In these cases, suspects are quickly cited: China, Russia, Iran, or even the United States itself…

But cyberwarfare is also played in areas far beyond computer programs. The security of satellites and other sophisticated infrastructures that digital communications need, and war-robots built again by technology are just parts of the same war.

At No Permission, Alfred W just offered clues to understand a little the measure at all. McCoyk Space War and the Future of U.S. Global Power.

Macoy, a professor of history at the University of Wisconsin, after a century of explaining the path of the United States Army in the field of technology, has striven to sewing the footprints of his military’s plans by 2020, to complete the puzzle used by the Defense Advanced Research Projects Agency.

According to Macoy, the United States collects the shields that are being organized for both defense and attack in the surrounding space of the earth, the new weapons and electronic devices that it has developed in recent decades, such as drones without pilot, communication satellites, etc. The shield is divided into three layers.

The closest layer to the Earth’s crust consists of the drones operating on the lowest flight, which are currently used for both spying and attack, as well as the new generation Global Hawk that is being built. They will be equipped with missiles and bombs, ready to fire anywhere in Europe, Asia or Africa, where fire fighters will be installed. The famous RQ-170 was a component of this layer, which until the Iranians stole it and showed it was also a secret for American citizens.

The Vultures giants, which will move with solar energy, will also be in the same 12-mile layer 19 kilometers – with a wing of 121 meters wide.

For the upper layer, the new Falcon Hypersonic aircraft is developing at a height of up to 200 kilometers, ready to fly at a speed of 22 times that of sound (21,000 kilometers per hour! ), despite the fact that being tested for the first time, they have been beaten.

In the third layer of this gigantic network, in an orbit of 200 kilometers or more, they already have tested the special drone X37B, which is run without pilots despite being 29 meters in length. These new groups will monitor the satellites of friends and, where appropriate, those of attack enemies.


You are interested in the channel: Teknologia
2024-12-23 | Julene Flamarique
They detect in Germany a Telegram channel with 70,000 participants to share tips on how to rape women
Over 70,000 men around the world participate in a chat group to talk about how to drug and rape women. Two journalists from the German public radio ARD have carried out an investigation for a year and have shown that in some cases the victims were their partners, their sisters... [+]

Technology
When we are unable to

When you work with older people or people with physical and neural diversity, you realize that the idea of competition in our society limits us a lot as a species. That is, our system puts you in value by doing things specifically, and what it doesn't do is incapable of the... [+]


Elon Musk Xtoa and the Guardians of Truth

The presence of Elon Musk in the media advances like a rocket after landing in the garden of the White House. Other powers, apparently, have been altered by the power and influence it is acquiring, and to reduce its influence, have charged the X network. In recent weeks, media... [+]


2024-12-19 | Julene Flamarique
TikTok’s carbon footprint is higher than the annual emission in Greece, according to a study
TikTok is the most opaque social network: it does not publish data on its emissions. It's more polluting than the rest of social media. He said that he has committed himself to making it "neutral carbon" by 2030.

Social networks
Leaving the X, where are we going now?
These days an “eXodo” is being produced on social networks. Many users have decided to abandon the X platform, to the point of refuting the “toxic” evolution of the entrepreneur Elon Musk’s hand, and have jumped to Mastodon or Bluesky. The report has focused on these... [+]

Technology
Feet on the ground

On the Internet comes the title of a movie that I still saw when I was growing up looking for the word Willow. In this fantasy film, the protagonist, a small man named Willow, transformed the world by liberating its inhabitants from an oppressive kingdom. Google just launched a... [+]


The content free translation service of Fedibertso al Euskera Mastodon.eus has been included
The Basque language Mastodon.eus is the main language, but Fedibertsoa is a living, global community that speaks hundreds of languages. For this reason, they have started using the free tool Libretranslate to make translations. As a result, we can read in our language what... [+]

One of the largest data centers in Europe in Álava: Who is behind the project?
The Madrid company Merlin Propertiers is building a large-scale data centre with a capacity of 300 megawatts in the city of Ribabellosa. Billions of euros are being spent throughout the Iberian Peninsula on infrastructures that are supposedly state-of-the-art “sustainable”... [+]

Technology
What is said ...

Perhaps one of the weaknesses of human beings is the tendency we have to listen to and care for the majority. It has certainly been an important feature of the development of our species and necessary for survival. But with digitalization, that characteristic that we have makes... [+]


Technology
A strong digital world

In Bilbao, I worked for five years with groups at risk of exclusion around the digital divide, especially with women. Along the way, I came across machistan violence and many other problems. In a very organic way, I began to relate to myself and to understand the work of the... [+]


2024-12-04 | Sustatu
Altxa Burua Group calls for a ban on mobile phones in CAV Secondary Education Schools
The Altxa Burua group calls for the removal of mobiles in secondary schools in the CAV, by applying a regulatory ban. This week a request has been made to the Basque Parliament for the Department of Education to designate schools as mobile free spaces.

The Munstro app leads us to bring together fearsome beings in a frenetic puzzle game
Threes! Julen Irazoki and Ibai Aizpurua have prepared together with composer Mikel Dale a version of 2048 classics. On Android you can download the video game for free in Basque.

Technology
Because to receive is to give

The evolution that the Internet has taken over the last 15 years, together with its technological and business model, makes us think that it is a tool to increase the worst aspects of humanity. Around the world, agents have been created that are not satisfied with this idea... [+]


Eguneraketa berriak daude