美军“舒特”系统 2009-11-28 21:05:58| 分类: 赛博战 | 标签: |字号大中小 订阅 .
在网络中心战思想的指引下,美军正在大力发展侦察-打击一体化的作战网络。“舒特”就是美国空军发展网络中心战的一个计划。
水稻倒伏
自驾车旅游2001年7月27日,美国国防部呈交国会的《网络中心战》报告(附件)是披露“舒特”计划的最高级别文件,具有一定的权威性。它指出:“舒特”计划是美国空军实现从传感器到射击器的无缝一体化作战网络的计划之一。“舒特”计划的目的是将情报、监视与侦察(RC-135V/W“联合铆钉”电子侦察飞机)与进攻性反信息作战(EC-130H“罗盘呼叫”电子战飞机)和进攻性防空作战(F-16CJ)进行横向一体化集成。其中,EC-130H与RC-135V/W的一体化是通过先进战斗空间信息系统(ABIS)来实现的,ABIS是一个与通用数据链(CDL)兼容的广播网;F-16战斗机则通过改进的数据调制解调器加入网络。这样,执行侦察任务的传感器平台就通过指挥所与武器平台连接成一体化的作战网络。一旦发现目标(如移动导弹发射架),就可以迅速将目标信息传输给武器装备,实施打击平台,从而将信息优势转化为作战优势。
项目是从03年开始的,到08年已经是V,也就是第五期了,每年投资约在500万美元左右
训练有素的意思
wiki上的介绍:
舒特系统是BAE系统公司开发的军用计算机系统,负责攻击敌方计算机网络和通信系统。该项目有美国空军的一个秘密部门“Big Safari”负责管理。他集中关注空军防御系统的计算机融合。
该系统已经发展了三代。第一代使得操作者能监视敌方雷达所能看到的画面,第二代系统能控制敌方网络并引导他们的传感器。第三代系统是在2006年夏天进行测试的,能入侵敌方时敏目标的链路,如战略导弹的发生或移动的地对空导弹发射架。
该程序已经在EC-130, RC-135, and F-16CJ等武器中进行了测试,并在伊拉克和阿富汗的战斗中进行了使用。美国空军官员特别提到2007年以色列和阿富汗战斗中,以色列空军使用舒特系统对付了叙利亚的雷达,并藉以侵入其领空。而规避空军雷达却是另外的事,因为以色列空军的F-15s and F-16s 并没有装备该系统。
Suter is a military computer program developed by BAE Systems that attacks computer networks and communications systems belonging to an enemy. Development of the program has been managed by Big Safari, a cret unit of the United States Air Force. It is specialid to interfere with the computers of integrated air defence systems.[1]
Three generations of Suter have been developed. Suter 1 allows its operators to monitor what enemy radar operators can e. Suter 2 lets them take control of the enemy's networks and direct their
nsors. Suter 3, tested in summer 2006, enables the invasion of links to time-critical targets such a
多宝鱼的营养价值s battlefield ballistic missile launchers or mobile surface-to-air missile launchers.
U.S. Air Force officials have speculated that a technology similar to Suter was ud by the Israeli Air Force to thwart Syrian radars and sneak into their airspace undetected in Operation Orchard on September 6, 2007. The evasion of air defence radar was otherwi unlikely becau the F-15s and F-16s ud by the IAF were not equipped with stealth technology.[2][4]
怎么这么倒霉舒特系统的概念是开始于90年代末,他作为全球作战计划的一部分,提供了全球化的电子进攻能力。该系统的建立是为了适应新的空军赛博司令部的需求。他被设计用来限制对手在网络空间的行动自由。
目前,舒特系统已经是第五代了,他在电子频谱和网络域中进行电子攻击,如侵入和黑客手段,一系列的攻击,否认、迷惑和拒绝攻击。美国空军赛博司令部在全球和局部战场中实现和使用这些网络攻击,并为战区司令部雇用赛博战专家团队。每个包括攻击黑客、系统安全性分析师和情报收集者。团队同时帮助和完成防御以保护信息空间,同时寻找漏洞和拒绝敌人使用该领域。
舒特系统在战术层面提供一致和实时的赛博空间景象。他集中管理和控制对入侵网络的分析和进攻,为赛博武器寻找对方的漏洞。通过对特定网络或网络组件的监视和标示,舒特系统能评估和确认在关键组件上的活跃或非活跃攻击,如模拟或评估某个特定节点的摧毁对整个网络影响,或者为渗透打开
漏洞。攻击小组使用一系列建模技术来刻画目标网络的动态状态和模型,以期在攻击开始前获得明确攻击的后果。
感动舒特系统能控制电子和网络攻击装备开展追踪移动和实时网络攻击,同时开展活动攻击、情报、监视和侦查作战。黄焖鸡腿
From its inception sometime in the late 1990s, Project Suter provides centralized facility to integrate Global Electronic Attack Effects as part of a global operations plan. The project became the first initiative delivered to meet the specific mission requirements of the new Air Force Cyber Command. Suter is designed to deny the adversary's freedom of action within their own networks.
Currently under development, Suter V integrates electronic attacks via electromagnetic spectrum and the network domain (penetration or hacking, and various types of offensive, denial, confusion or deception attacks). USAF Cyberspace command is implementing tho network attack capabilities within a global and theater effects scope of capabilities, employing cyber warfare specialist teams in "cyber-cells' attached to theater commands. Each team includes offensive 'hackers', defensive network systems curity analysts and intelligence collection planners. Th运动员宣誓词简短
e team also consults and conducts defensive activities protecting space asts, while eking vulner
abilities and denying enemy u of this 'high ground'.
Suter provides a coherent and timely view of cyberspace at the tactical level. The rvice centrally manages and controls the analysis and attack of threat networks, to identify exploitable vulnerabilities susceptible to available network warfare techniques. Targeting complete networks or identifying and monitoring specific network components, the rvice can evaluate and confirm the effects of kinetic and non-kinetic attacks on critical elements, for example, simulate or asss how the destruction of a specific node can affect the whole network, or open vulnerabilities for further penetration. The team employs various modeling techniques to characterize the mode and status of target networks dynamically and validate the desired effect before such measures are taken.
Suter also controls electronic and network attack asts when pursuing mobile, time critical networked threats, as part of synchronized kinetic, non-kinetic attack and intelligence, surveillance and recce (ISR) operations