Online: | |
Visits: | |
Stories: |
The resurrection of the Cold War perceptions concerning the U.S. and Russia are just the outset of the an growing landscape of digital weaknesses and jolts to the system that could de-activate the grid, cut off grocery and supply lines or leave millions not having power in the cold. With global antagonism, the pretext could come from anywhere:
Link to the Norse site: http://map.ipviking.com/
The forthcoming era could be the age of electronic trouble, as ATMs, power grids, bank accounts, Internet servers and other critical entities in society are intercepted, taken down, hacked or shut off by criminals and commandos in the continuing cyberwar. Dissidents will be flagged and cut off from their accounts. Natural catastrophes will compound with these factors, testing the infrastructure and the condition of the people themselves, who are in peril of devolving into civil unrest.
With the likelihood of outright war with Russia or another power, DARPA is in the hunt for advances in disruptive technologies for this rapidly evolving age of electronic warfare that will center near domain dominance in a battlefield that has many intricate dimensions. Russia has strategically placed itself to take advantage of this strategy of modern warfare, and Putin has expended significant capitol into building these technologies, which utilize RF frequency to accomplish a wide-range of goals.
Currently, President Obama is beefing up the cyberwarfare command, broadening its offensive engagements, and splitting its mission from more traditional NSA communication intercept actions.
During his final weeks in office, he gave new powers and agency independence to the dual-hat Cybercom mission that was developed in 2009 under the NSA. Weaponizing information is at the center of its pursuits, which are at this point due to take on a new role during a time of heightened antagonism with Russia, China and other probable competitors.
suggests Washington Post:
With weeks to go in his tenure, President Obama on Friday moved to end the controversial “dual-hat” arrangement under which the National Security Agency and the nation’s cyberwarfare command are headed by the same military officer.
… U.S. Cyber Command, or Cybercom, needed its own leader to become a full-fledged fighting force…. Cybercom has since matured”
Cybercom’s mission is, when ordered, to disrupt and destroy adversaries’ networks. It is also to defend the nation against incoming threats to critical systems and to protect the military’s computers from cyberattack.
The NSA also has a defensive mission – to protect the government’s classified networks – but is better known for its role in conducting electronic spying on overseas targets to gather intelligence on adversaries and foreign governments.
[…]
“The Congress . . . should not place unnecessary and bureaucratic administrative burdens and conditions on ending the dual-hat arrangement at a time when the speed and nature of cyber threats requires agility in making decisions about how best to organize and manage the nation’s cyber capabilities,” [Obama] wrote.
Regardless, information warfare has dominated U.S. matters over the past several years of Obama’s administration, where Edward Snowden, Julian Assange and Chelsea Manning figured prominently. The last election cycle observed statements of Russian hacking, however suspicious, leaks from whistleblowing organizations, and a shadow government system with offline emails these days to some extent revealed.
Propaganda passes down from official channels, and swirls around on the forums of the Internet; cyberwarfare soldiers at the DoD and NSA are involved in data collection, profiling, infiltration and disinfo trolling operations online with risk groups across the range.
And there will be a lot more where that originated from.
An designation for a contract published at FedBizOpps shows that DARPA is deeply aiming to shape new strategies in electronic warfare to restore dominance in a field that this grant itself confesses: “military use of GPS [and other electronic communication devices] has evolved from strategic advantage to vulnerability.”
Specifically, as Russian and Chinese forces have become progressively sophisticated, only state-of-the-art strategic technologies, tuned to exact frequency ranges are applicable. It is a extremely sophisticated and secretive field. Part of the summary for DARPA’s grant says:
DARPA is seeking innovative ideas and disruptive technologies that offer the potential for significant capability improvement across the Strategic Technology Office focus areas. This includes technology development related to Battle Management, Command and Control (BMC2), Communications and Networks, Electronic Warfare, Intelligence, Surveillance, and Reconnaissance (ISR), Position, Navigation, and Timing (PNT), Maritime, and Foundational Strategic Technologies and Systems.
Technologies and systems of particular interest would address challenges of operating in contested, denied, and/or austere environments.
Proposed research should investigate approaches that enable revolutionary advances in science, devices, or systems.
[…]
1.1.1 Battle Management, Command and Control (BMC2)
Warfare is increasingly conducted by networks of platforms, weapons, sensors, and EW systems. The BMC2 of such networks poses complex algorithmic and software challenges, particularly with intermittent connectivity, limited data rates, and robustness against network disruption from electronic and physical attack. Of particular interest are BMC2 technologies and systems for mixtures of manned and unmanned systems. Efforts in this area should develop and incorporate realistic assumptions concerning allocation of functions between human operators and automated systems.
1.1.2 Communications and Networks
The success of military operations depends on assured, secure, communications at every military echelon, from the continental U.S. to the forward-deployed warfighter. DARPA seeks system concepts and enabling technologies that will provide assured high-capacity mobile communication capabilities in space, air, ground, sea surface, and underwater environments. This will include systems with and without access to infrastructure. The goal is delivering relevant and timely information to the warfighter anytime and anywhere while denying the same capabilities to our adversaries. Approaches to this goal include developing new system concepts and technologies that: improve network availability; increase network capacity and scaling; enable tolerance to network degradation; mitigate extremely high levels of man-made and natural electromagnetic interference; defeat network and RF exploitation techniques; and counter denial of service techniques.
DARPA is interested in approaches that leverage commercial infrastructure when it is available as well… These commercial leveraging approaches will need to consider the reliability, robustness, and security of commercial infrastructure, devices, and applications in a military environment. Also of interest are approaches and technologies for preventing or disrupting the adversary’s capability for assured communications.
Of special interest are: approaches for greater spectrum efficiency in complex RF environments; new spectrum use technologies such as dynamic use of space/time, as well as access to new modalities, such as high frequency Radio Frequency (RF) and optical polarization; intra- and cross-modality (radar, communications, and sensing) spectrum access techniques; spatial reuse through higher frequency operations; interference avoidance and tolerance; and large-scale testing of complex RF environments.
1.1.3 Electronic Warfare
The proliferation of highly capable RF technology has created a new emphasis on positive control of the electromagnetic (EM) spectrum. Many adversaries are increasing their reliance on RF sensing and communications in order to provide significant improvements to their offensive and defensive systems. This includes short-range tactical communications, long-range C2 communications networks, networked defensive systems, and RF seekers. DARPA is looking for system approaches for active and passive EW techniques in order to counter these advanced networked and agile systems using technologies such as distributed systems, coherent systems, disposable systems providing asymmetric capabilities, and close-in remote sensing coupled with advanced jamming and spoofing.
The EW capabilities that the U.S. military will encounter are also becoming much more sophisticated. Many advanced capabilities that were only available for use by the U.S. military are now available to be used against U.S. military systems. The commercial investments in RF materials, components, and subsystems are immense and the cost threshold to deploy high power, agile systems continues to drop.
[…]
1.1.5 Position, Navigation, and Timing (PNT)
The U.S. military has become increasingly dependent on the Global Positioning System (GPS) for accurate and precise position, navigation, and timing in a wide variety of operational environments. However, as U.S. military operations are increasingly being carried out in areas where GPS is denied, unreliable, or not accessible, military use of GPS has evolved from strategic advantage to vulnerability. GPS access can now be readily blocked by jamming or environmental conditions. Many environments in which our military operates (under heavy foliage, underground, underwater, in buildings, and in cities) have limited or even no access to GPS.
As Alternative media reported before, every key branch of the armed services is actually upgrading its technological capabilities as electronic warfare progressively dominates the new age of warfare, where stress are ever rising, and the danger of another world war has never been more obvious.
Though the situations have been little discussed, air traffic networks, government computer systems, train systems and other crucial infrastructure have all been hacked in recent months. The accountable parties have been seldom determined, and could signify a foreign enemy, a terrorist cell, punk kids and hackers, or tests with the shadow government’s own cyberwarfare army.
Here’s a review of Russian advances in the battlefield of the future, right now:
BIN NOTE: Most people who use social media have figured out that Facebook and Google are in cahoots with the government, for those who are well aware of the issues it’s high time you switched over to Seen.life. It is a website that is similar to Facebook but without all the censorship.
These People Are A Danger To Themselves And Others! Wake Up!!!!!!
Spread the word! LIKE and SHARE this article or leave a comment to help direct attention to the stories that matter.
Contact Fusion Laced Illusions by email.
You can reach us at [email protected] Letters may be published. Want to see other people talking about Fusion Laced Illusions? Check out our letters to the editor.
The Hope & Change Crew has been infiltrating America for the past 8 yrs.
What they cannot sell out to China, and Other Countries, they start their groups “Hives” and their blind followers are mere idiot “drones”.
Their MSM platforms pump out Propaganda Fake News.
They have already let other countries have Americans/Personal, and most secret Data.
Did you fall for the Hope&Change BS?, they Used the BS “Hope & Change” jingle to plant their operatives, and destabilize America.
They already sold America out, and gave out info, under BS smokescreen Propaganda crap.
If you’re concerned about a grid down event and get your water from a well, you may want to check out http://www.emergencywelltube.com. The Emergency Well Tube allows the user to draw water from a well without power.