“It is late fall 2025; Al Qaeda sleeper cells target the disruption of airline traffic into multiple East coast airports during the busy travel season from Thanksgiving through Christmas. ADS-B IN/OUT has been fully implemented by the FAA; all commercial airlines have invested heavily to comply with the mandate. Oil prices are at an all time high and flights are carrying minimal fuel loads to save money and offset the cost of avionics.
The goal: force multiple airplanes to divert; pilots, FAA controllers and passengers to lose faith in the system; and possibly cause enough chaos to the NAS system that a few lives are lost.
The plan: exploit the U.S. dependency on ADS-B IN/OUT and GPS for arrivals into busy airports, especially during low visibility conditions.
The teams: five two man teams have been put into play for the mission. They are provided with all the commercially available technology they will need, along with a few modified laptop computers, antennas and transmitters.
The targets: Regan National, Dulles, La Guardia, JFK and Philadelphia International airports. The terrorists have been tasked to park minivans with computers containing modified software that are coupled to ADS-B OUT transmitters. The software is designed to be remotely activated and controlled over an Internet connection. Each computer is programmed specifically for the targeted airport, and transmits 978MHz and 1090MHz signals out a boosted transmitter.
As a result, airlines on final approach will receive false targets on their displays. The terrorists ghost target injects also propagate to the FAA controller’s screens. The terrorists intended these spoofed targets, programmed at conflicting arrival and departure corridors as well as in runway incursion situations, to cause multiple airports to become temporarily unusable. The resulting domino effect causes aircraft diversions and delays that will lead to chaos.”
Network Warfare Squadrons of the United States Air Force, 91st Network Warfare Squadron, 33d Network Warfare Squadron, 315th Network Warfare Squadron, 426th Network Warfare Squadron, 68th Network Warfare Squadron. Excerpt: The 91st Network Warfare Squadron is an active United States Air Force unit, currently assigned to the 67th Network Warfare Wing at Kelly Annex, part of Lackland Air Force Base, Texas. The DUI is a white Knight on horseback chasing a red Devil within a Blue circle, formerly a diamond. Redesignated: 91st Squadron on 14 March 1921Redesignated: 91st Observation Squadron on 25 January 1923Redesignated: 91st Observation Squadron (Medium) on 13 January 1942Redesignated: 91st Observation Squadron on 4 July 1942Redesignated: 91st Reconnaissance Squadron (Bomber) on 2 April 1943Redesignated: 91st Tactical Reconnaissance Squadron on ii August 1943Redesignated: 91st Photographic Mapping Squadron on 9 October 1943Redesignated: 91st Photo¬graphic Charting Squadron on 17 October 1944Redesignated: 91st Reconnaissance Squadron (Long Range, Photographic) on 15 June 1945Redesignated: 91st Strategic Reconnaissance Squadron (Photographic) on 25 March 1949Redesignated: 91st Strategic Reconnaissance Squadron (Medium, Photographic) on 6 July 1950Redesignated: 91st Strategic Reconnaissance Squadron (Fighter) on 20 December 1954Inactivated on 1 July 1957 Redesignated: 91st Intelligence Squadron on 1 October 1993Inactivated on 5 May 2005 Attached to Ninth Corps Area, 1 October 1930 Flight attached to Joint Brazil-US Military Commission to 30 June 1947 Attached to Antilles Air Division Attached to 91st Strategic Reconnaissance Wing Attached to Far East Air Forces Attached to 407th Strategic Fighter Wing to 15 July 1955
Amazon Price:$16.99 $16.99 (as of May 19, 2018 16:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
The purpose of this monograph is to examine whether the Principles of War, as defined within the U.S. military’s Joint Publication 3-0, Joint Operations, can be applied to cyber war. Since 2005, the U.S. military recognized cyber conflict as a new domain for conducting military operations. Consequently, in order to ensure future success on the battlefield, commanders need to understand cyberspace operations and how these operations fit within the Principles of War. The methodology of this paper is to first examine, and subsequently show the history of the Principles of War in order to provide a context from which military personnel can then categorize cyberspace within the historic model. Such an examination is relevant because not only is U.S. cyber policy and strategy currently being developed, but the United States is also standing up a United States Cyber Command for the first time in history. Having discussed the Principles of War and woven them across an understanding of cyber operations, one can then see that the current Principles of War do in fact apply to cyber war. There is no need to create new Principles of War that apply exclusively to the cyber domain.
Amazon Price:$41.99 $41.99 (as of May 20, 2018 09:17 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
In today’s fast-paced world of overseas contingency and domestic operations, commanders rely on the advice of JAG Corps personnel to make critical decisions, sometimes involving life and death. Demand for this advice is high and will likely increase. The complexity of the operational environment is also growing. We can be sure that technological advances on the 21st Century battlefield will take us into uncharted legal territory, where we will be expected to analyze the complexities and provide accurate advice faster than ever before. Our ability to do so will have a direct impact on America’s capacity to effectively project power across the spectrum of conflict. Commanders count on legal teams knowledgeable in subjects ranging from weapon selection and target engagement to nation building and counterinsurgency activities. That’s why the second edition of the Air Force Operations & the Law: a Guide for Air & Space Forces is so important.
This is a AIR FORCE INST OF TECH WRIGHT-PATTERSONAFB OH report procured by the Pentagon and made available for public release. It has been reproduced in the best form available to the Pentagon. It is not spiral-bound, but rather assembled with Velobinding in a soft, white linen cover. The Storming Media report number is A017014. The abstract provided by the Pentagon follows: Information Warfare involves the attack and defense of information and information systems, both in time of armed conflict and in operations short of war. While information technology provides the promise of a new class of less lethal military instruments, it also presents vulnerabilities occasioned by widespread dependence on an increasingly complex and interconnected global information infrastructure. These vulnerabilities, when exploited by those who would target civilians in order to inspire widespread fear in hopes of accomplishing a political agenda, can be understood as cyberterrorism. As information warfare techniques evolve, those employing them should look to several relevant sources for normative guidance. Relevant, internationally shared values can be found in international custom, the U.N. Charter, treaties dealing with the subject of “cybercrime,” those governing the communication media likely to be utilized by information warriors, UNGA Resolutions and those treaties and customary norms that make up the Law of Armed Conflict.