Bits and Bytes

Bits and Bytes

By Paul Rosenzweig
Thursday, February 19, 2015, 12:41 PM

Are Submarines Becoming Obsolete?  Perhaps, in light of enhanced data processing capabilities.  "[T]he ability of submarines to hide through quieting alone will decrease as each successive decibel of noise reduction becomes more expensive and as new detection methods mature that rely on phenomena other than sounds emanating from a submarine. These techniques include lower frequency active sonar and non-acoustic methods that detect submarine wakes or (at short ranges) bounce laser or light-emitting diode (LED) light off a submarine hull. The physics behind most of these alternative techniques has been known for decades, but was not exploited because computer processors were too slow to run the detailed models needed to see small changes in the envir  onment caused by a quiet submarine. Today, “big data” processing enables advanced navies to run sophisticated oceanographic models in real time to exploit these detection techniques."

Bridging the Air Gap.  Disconnecting from the network isn't a complete defense.  "Consider yourself warned: other militaries appear to be developing an unsettling attack capability with game-changing consequences for America’s ability to project military might abroad. This platform does not take the form of a precision-guided munition or a next-generation fighter aircraft. It is also not a cyber-attack in the traditional sense, over Internet connections and terrestrial wires. This type of weapon goes by many names, none of them particularly sexy: Radio Frequency (RF) transmission of malware, electronic warfare-delivered computer network attack, or computer network and electronic operations (CNEO), among others. These weapons transmit a devastating cyber-attack not by Internet networks, but by wireless radio, attacking our critical flows of information, rather than physical assets, and threaten to undermine U.S. advantages in intelligence."

Finally, welcome to The Middle East Ticker, another great addition to the Lawfare ecosystem.

Topics: