What's new

Pentagon Developing Pre-Launch Cyber Attacks on Missiles

F-22Raptor

ELITE MEMBER
Joined
Jun 19, 2014
Messages
16,980
Reaction score
3
Country
United States
Location
United States
The Pentagon is developing cyber and other electronic weapons to attack enemy missile systems prior to launch as part of a new high-technology defense initiative, senior Pentagon officials disclosed to Congress on Wednesday.

The use of non-kinetic attacks against missile system computers, their sensors, and other networks, along with other high-technology means to knock out missiles on the ground, is called “left-of-launch” defense, a reference to the location on a timeline of the process of shooting down missiles.

Few details were provided on the plans for non-kinetic missile defenses that Brian McKeon, the principal defense undersecretary for policy, said were “underway” as a result of a new security environment that includes plans to use large-salvo missile attacks and other means to defeat current missile defense.

Left-of-launch missile defense was raised in a 2014 memorandum from then-Chief of Naval Operations Jonathan Greenert and then-Army Chief of Staff Ray Odierno to the secretary of defense warning that missile defense spending was “unsustainable” because of sharp defense cuts. They called for the more cost-effective “left-of-launch” strategy.

Defense officials familiar with the research said the new, non-kinetic missile defenses include the planned use of cyber attacks and other electronic warfare means, such as electromagnetic pulse attacks, against foreign command and control systems.

An electromagnetic pulse is the force emitted from a nuclear blast that can disrupt all electronics over wide areas. The weaponization of electromagnetic pulses has been under research for years.

The weapons would be used after intelligence indicators revealed a foreign adversary was planning a missile attack.

The cyber and electronic attacks would aim to prevent missiles from being launched by disrupting or disabling launch controls, or sending malicious commands that would cause them to blow up on their launchers.

Northern Command commander Adm. William Gortney said in prepared testimony that current missile defense were designed to intercept missiles after launch. They include ground-based interceptors, mobile regional defenses, and ship-based anti-missile systems.

“We need to augment our defensive posture with one that is designed to defeat ballistic missile threats in the boost phase as well as before they are launched, known as ‘left of launch,’” Gortney told a hearing of the Senate Armed Services subcommittee on strategic forces.

High-powered lasers are being developed that will be deployed on drones or aircraft to hit missiles in the so-called boost phase, just after launch.

“The development of non-kinetic technologies, such as directed energy, and new concepts of operation, such as boost-phase intercept and left-of-launch missile defense, are game-changing and would have a dramatic effect on the need to rely exclusively on expensive interceptors,” said Vice Adm. James D. Syring, director of the Pentagon’s Missile Defense Agency.

Both defense contractors and government weapons designers are using “emerging technology” for “non-kinetic methods to defeat ballistic missile threats when we receive indications that a launch is imminent,” Gortney said in the prepared statement.

“I believe this technology will reduce the overall cost of engagement-based missile defense and provide us options to defeat ballistic missiles that continue to proliferate around the world,” Gortney said.

Asked if current missile defense strategies are unsustainable, Gortney testified at the hearing that he agreed with the two service chiefs in 2014.'

“Because of our current strategy we are wearing our Patriots, soon-to-be THAAD, and our Aegis-capable platforms [that are] in high demand; the threat is increasing and we’re on an unaffordable path,” Gortney said, noting that missile defenses use “very expensive rockets to shoot down maybe not-so-expensive rockets.”

As a result, there are plans to shift to more cost-effective countermeasures such as airborne lasers and other means to attack missiles before launch or early in the launch phase of flight, he said.

The use of advanced technology and innovative uses of current weapons is part of a new Pentagon strategy called the “third offset” that seeks to leverage asymmetric warfare techniques.

The first two offsets were the use of nuclear deterrence against conventional forces in the Cold War and later the development of precision-guided conventional weapons and radar-evading stealth technology in the 1980s and 1990s.

The hearing was held to discuss the $7.5 billion budget request for missile defenses for fiscal 2017.

http://freebeacon.com/national-security/pentagon-developing-pre-launch-cyber-attacks-missiles/
 
.
Sounds like China should change the name of DF-21 to DF*ckourmissileexplodedonthelaunchpad-21

635501809320599482-nasa-rocket-explosion-viewervideo-image6.JPG


Hard-kill countermeasures for anything that gets launched, electronic warfare to ensure they never do.
 
.
Sounds like China should change the name of DF-21 to DF*ckourmissileexplodedonthelaunchpad-21

635501809320599482-nasa-rocket-explosion-viewervideo-image6.JPG


Hard-kill countermeasures for anything that gets launched, electronic warfare to ensure they never do.
the chinese are not stupid. a closed system would be enough to prevent such an attack. as for emp's... well it takes two to tango.
 
.
Defense officials familiar with the research said the new, non-kinetic missile defenses include the planned use of cyber attacks and other electronic warfare means, such as electromagnetic pulse attacks, against foreign command and control systems.

An electromagnetic pulse is the force emitted from a nuclear blast that can disrupt all electronics over wide areas. The weaponization of electromagnetic pulses has been under research for years.


Same can be used against their own nukes as well
 
.
the chinese are not stupid. a closed system would be enough to prevent such an attack. as for emp's... well it takes two to tango.

Individual launchers.

df21c-and-d.jpg


Need to talk with each other, and their IRS platforms and commanders - see those antenna? They're talking to someone. That leaves them open to electronic attack.

You can't balkanize a network of military items. S-400 can't be Balkanized, it has to talk with the network or else the entire missile shield fails. It only works when the radars talk to launchers, and launchers to support like Pantsir-S1, and each to long-range ISR platforms. It doesn't work when no one's talking. And if they are, they are vulnerable to cyber warfare.

DF-21 has to talk with ISR platforms since the launcher can't target on its own, it has to talk with other launchers so they don't attack the same target repeatedly and waste assets.

If it's talking, it's not closed.

@SvenSvensonov - I know you know more about this stuff then anyone else here. Say words or I'll be mad at you:pissed:!
 
.
Individual launchers.

df21c-and-d.jpg


Need to talk with each other, and their IRS platforms and commanders - see those antenna? They're talking to someone. That leaves them open to electronic attack.

You can't balkanize a network of military items. S-400 can't be Balkanized, it has to talk with the network or else the entire missile shield fails. It only works when the radars talk to launchers, and launchers to support like Pantsir-S1, and each to long-range ISR platforms. It doesn't work when no one's talking. And if they are, they are vulnerable to cyber warfare.

DF-21 has to talk with ISR platforms since the launcher can't target on its own, it has to talk with other launchers so they don't attack the same target repeatedly and waste assets.

If it's talking, it's not closed.

@SvenSvensonov - I know you know more about this stuff then anyone else here. Say words or I'll be mad at you:pissed:!

Agreed, it's not possible to have a closed system, because they have to be able to command and control. Weapons like the DF-21 have to be able to talk to sensors to successfully complete its mission. There's a reason why the US is pursuing this route of attack. They are more informed on adversarial capabilities than any of us here.
 
.
Individual launchers.

df21c-and-d.jpg


Need to talk with each other, and their IRS platforms and commanders - see those antenna? They're talking to someone. That leaves them open to electronic attack.

You can't balkanize a network of military items. S-400 can't be Balkanized, it has to talk with the network or else the entire missile shield fails. DF-21 has to talk with ISR platforms since the launcher can't target on its own, it has to talk with other launchers so they don't attack the same target repeatedly and waste assets.

If it's talking, it's not closed.

@SvenSvensonov - I know you know more about this stuff then anyone else here. Say words or I'll be mad at you:pissed:!
well yes but how can you launch an attackon a closed network. also if your implying wireless communications between said missile and isr then there is the possibility of jamming. but how can something jam it when the jamming equipment needs to be close enough to jam said missile. also missiles are smart enough that they dont need to be told where to strike upuntill its in the flight phase where it needs to know. or you can have closed systems such as image recognition seekers, which is somthing they already have on their asm's. networking is one of the keystones of the future, there will always be redundancies.
 
.
well yes but how can you launch an attackon a closed network.

It's not a closed network the moment outside assets start talking to one another. When an AWACS aircraft talks to OTH radars and relays their info to satellites and then launchers, the system isn't closed anymore.

. also if your implying wireless communications between said missile and isr then there is the possibility of jamming.

Who said anything about jamming? Cyber warfare - script injections, worms and Trojans, code bombs - each can be injected if signals are leaking from electronics. I don't need to get in between your computer and router to attack you, just target the signal leakage from either the router or your computer, or any peripheral either is connected to like a smart TV or printer, from outside your house and inject something nasty into the code steam.

Military electronics leak signals too, we pick up this leakage with SIGINT and ELINT assets like EP-3E.

1211413.jpg


We can inject nasty surprises with the same.

EMSEC, the reason Sven should chime in here, deals with reducing the leakage, but it never eliminates it.

DF-21 has to talk with too many different things - submarines, aircraft, satellites, other launchers, OTH radars, commanders, the missile - the chain is too large to ensure secure system.
 
.
It's not a closed network the moment outside assets start talking to one another. When an AWACS aircraft talks to OTH radars and relays their info to satellites and then launchers, the system isn't closed anymore.



Who said anything about jamming? Cyber warfare - script injections, worms and Trojans, code bombs - each can be injected if signals are leaking from electronics. I don't need to get in between your computer and router to attack you, just target the signal leakage from either the router or your computer, or any peripheral either is connected to like a smart TV or printer, from outside your house and inject something nasty into the code steam.

Military electronics leak signals too, we pick up this leakage with SIGINT and ELINT assets like EP-3E.

1211413.jpg


We can inject nasty surprises with the same.

EMSEC, the reason Sven should chime in here, deals with reducing the leakage, but it never eliminates it.

DF-21 has to talk with too many different things - submarines, aircraft, satellites, other launchers, OTH radars, commanders, the missile - the chain is too large to ensure secure system.
but you still need to get close enough to do such damage and 400+km is not enough considering the range of the missiles they can be fired away far from the coast.

ok so lets ignore the to far away bit and say the states can detect signals coming from chinese hq-9's dont you think the commincations between the differant systems would be end to end encrypted. so what you know the make up of the signal? what your gonna do ? you cant inject malicious code as it would be ignored by a verification of authenticty bit. if i open a box of cookies and put dog biscuits in it and then glue it shut you will still notice the box has been tampered with.
also the make up of the system its self. so lets say you manage to get in the adversaries system now what? you think the chinese are stupid enough to not use ordinar languages and have compilers that wont execute code in known languages. i was speaking to a friend of mine in china last year whilst on my visit there he said they use a language made in china specifically for china only. i forgot its name bu its kinda based of ada. and im guessyou know how strict ada is when it comes to coding. a freind of mine at bae systesm is coding in c#! he did not tell me what he was doing which is obivous.
 
.
... There's a reason why the US is pursuing this route of attack. They are more informed on adversarial capabilities than any of us here.

I just wish we'd keep our mouths shut about stuff like this although I'm a firm believer in theory that if you hear about it, we have badder shit .:usflag:
 
.
but you still need to get close enough to do such damage and 400+km is not enough considering the range of the missiles they can be fired away far from the coast.

ok so lets ignore the to far away bit and say the states can detect signals coming from chinese hq-9's dont you think the commincations between the differant systems would be end to end encrypted. so what you know the make up of the signal? what your gonna do ? you cant inject malicious code as it would be ignored by a verification of authenticty bit. if i open a box of cookies and put dog biscuits in it and then glue it shut you will still notice the box has been tampered with.
also the make up of the system its self. so lets say you manage to get in the adversaries system now what? you think the chinese are stupid enough to not use ordinar languages and have compilers that wont execute code in known languages. i was speaking to a friend of mine in china last year whilst on my visit there he said they use a language made in china specifically for china only. i forgot its name bu its kinda based of ada. and im guessyou know how strict ada is when it comes to coding. a freind of mine at bae systesm is coding in c#! he did not tell me what he was doing which is obivous.

If the missiles are pushed back inland, reducing their effective range, then the countermeasures are already showing success.
 
. .
but what if they were inland to begin with. then what ?

It's have a lot more than just Command and Control of individual missile. You also need to look at the bigger picture.

The Cyber Warfare is targeting the C4ISTAR structure of any potential enemy (Say China in this case) the attack is going to be a full spectrum, and not just a jamming and EW package on launch platform.

They may launch a DDOS attack on Chinese command structure, a direct hacking or spoofing of the Chinese communication network, digital penetration or even Human intervention of Communication network. Of course it can also launch a direct digital attack on the launch platform itself.

Problem with today weapon platform is they are too rely on C4ISR, you don't need to attack the structure itself to make an effective defence, you can also attack their Command Structure remotely or by attacking their Communication infrastructure and it will have the same effect as in attacking the platform itself.
 
.

Pakistan Affairs Latest Posts

Country Latest Posts

Back
Top Bottom