Military computers - Wikipedia, the free encyclopedia. This article specifically addresses US armed forces military computers and their use. History[edit]Some of the earliest computers were military computers. Military requirements for portability and ruggedness led to some of the earliest transistorized computers, such as the 1. AN/MYK- 1 (MOBIDIC), the 1. M1. 8 FADAC, and the 1. D- 1. 7B; the earliest integrated- circuit based computer, the 1. D- 3. 7C; as well as one of the earliest laptop computers, the 1. Grid Compass. Military requirements for a computer small enough to fit through a submarine's hatch led to the AN/UYK- 1. Federal prosecutors have obtained a third guilty plea involving an international hacking ring that gained access to a U.S. Army computer network. Can a hacker -- a geek who disrupts computer systems. Military.com Certification: Certified Ethical Hacker. Not a member. ethical hacking has been around since. Gary McKinnon (born 10 February 1966) is a Scottish [1] systems administrator and hacker who was accused in 2002 of perpetrating the 'biggest military computer hack. Five Chinese military hackers have been indicted on charges of computer hacking, economic espionage, and other offenses directed at six American victims in the U.S. They describe China itself as a victim of computer hacking. the Chinese military of launching. Seen as Tied To Hacking Against. Some of the earliest computers were military computers. Military requirements for portability and. A military computer may not provide for plug-in cards and be. A British man arrested for allegedly carrying out the 'biggest military computer hack of all time' has been released on bail by magistrates. Gary McKinnon. British man charged with hacking US Army and Nasa computer systems A 28-year-old British man named Lauri Love has been charged with hacking into the. US charges Chinese executive with hacking military data. Man accused of working with hackers in China to steal information related to military projects. Construction[edit]. Rugged 9. 01. D Computer for Navy Shipboard Installation. Typically a military computer is much more robust than an industrial computer enclosure. There will be more structure inside to support the components, the plug- in cards will be individually supported and secured to assure they do not pop out of their sockets, the processor and heat sink will be secured, memory will be glued into their sockets, and so forth. This is to assure nothing moves during the shock events. There are several differentiators between military computers and typical office or consumer computers: Cost. Intended environment. Long term availability. Architecture. Feature set. Cost - Military computers are generally much more expensive than office/consumer computers. Consumer computers from manufacturers such as Dell are manufactured in very high quantities which leads to lower costs due to economy of scale. Military programs, on the other hand, can require small numbers of systems leading to higher costs. Military computers will typically also be constructed of more robust materials with more internal structure, more cooling fans, a more robust power supply, and so forth. Intended Environment - An office or consumer computer is intended for use in a very controlled shirt- sleeve environment with moderate temperatures and humidity and minimal dust. A military computer can be designed to operate in very adverse environments with extremes of temperature such as - 2. C to +6. 5C operating, 5% to 9. They may be required to operate in high salt environments such as on a ship or designed for high shock and vibration such as on a ship or submarine. Military computers may be intended for installation on aircraft in which case they need to be crash worthy and able to operate at high altitudes if in unpressurized aircraft. The same computer may be required to operate in Afghanistan as well as in Alaska with no change in the design. Long Term Availability - Military programs last years and identical replacement hardware may be required over the life of the program. Consumer computers are often driven by the latest and greatest to realize the highest possible performance, such as required to play games. The motherboard in a consumer grade computer may have an availability measured in months instead of years or decades. In a consumer level computer, over the lifetime of the product availability, it is not unheard of for all the components such as the motherboard, drives, BIOS, video board, etc., to be different from computer to computer. That is not acceptable in a military computer for which supporting documents have been created and systems tested and approved. Architecture - There are many types of computer architecture. The most common that people know of is the PC as created by IBM. Many military computer systems are built around alternative plug- in bus structures such as VMEbus or Compact PCI. A military computer may not provide for plug- in cards and be in a dedicated form factor for a specific application such as installation on a UAV such as the Global Hawk. Feature Set - A military computer may have features not found on a consumer grade computer such as Circular connectors, hot swap power supplies, hot swap fans, custom front panel features such as LCD displays, and so forth. MIL standards and specifications[edit]. Barge Explosion Test Preparation. Actual Barge Explosion Test. The Armed Forces have many numerical designations for computers or other equipment, to guide the military buyer's choice of appropriate technology for their application. For instance, MIL- S- 9. D[1] would indicate that the computer passed shock and vibration requirements of specific tests for Navy installation. Some of these tests are specific to application usage, such as barge explosion testing, which simulates a torpedo hit and subsequent high peak shock to a ship on which the computer is installed. The "gold standard" of testing for compliance with 9. D is the Barge Test. A Barge Test is performed four times, each time placing 6. HBX- 1 explosive 2. In addition, the tests are performed in a fore- and- aft orientation to simulate an explosion at the bow or stern of the ship and athwartship to simulate an explosion by the side of the ship. A video of a barge test can be viewed. Other more common requirements are MIL- STD- 8. Another common specification is MIL- STD- 4. There are specifications for workmanship, wiring, packaging, and so forth, that military computers are required to meet. More on MIL Standards and Specifications at Defense Standard. Security Standards & Specifications[edit]To meet the challenges of defending the U. S. cyber network, the U. S. military has taken steps to improve the security of devices connected to Department of Defense information networks. According to United States Cyber Command, "Cyber threats demand new approaches to managing information, securing information, and ensuring our ability to operate."[2]All military computers must conform to the latest FIPS 1. FIPS 1. 40- 2) which specify the latest requirements for cryptography modules on devices used throughout the U. S. government.[3]FIPS 1. To address the risks associated with the increasing prevalence of commercial mobile devices (CMDs), a Do. D Inspector General report from March 2. Army compliance standards. The report identifies existing gaps in tracking and sanitization for over 1. CMDs, recommending a "clear and comprehensive policy to include requirements for reporting and tracking all commercial mobile devices purchased under pilot and non- pilot programs."[4]Field risks[edit]The progress of small- scale computer technology in military applications was initially slow due to concerns about security and the ability to survive rugged environments and enemy weaponry. PC- based technology in the 2. Hazards in the field include water and corrosives, sand and wind, extreme temperatures, high shock and vibration, power interruptions, susceptibility to EMI/RFI radiation, etc. Also, operator interface was complex, and most operating systems were not fast in operation, or easy to learn and use in pressure situations. In the last decade, improvements in design and operator interface have resulted in new mandates for the use of small computer technology in the military. Some of the improvements have migrated over from home and business computing. Others have migrated over from industrial computing, where designs for environments such as Zone 1 hazardous areas in oil & gas exploration have been modified for army and navy environments. Sealed enclosures using materials such as cast aluminum with magnesium have improved environmental resistance to contaminants and hazards, including EMI- burst weaponry. Low- heat CPU designs have made sealed enclosures possible even for environments like the desert or naval bridge wing display under the open sun. Advances like flash memory have eliminated moving parts and reduced mechanical failures. Simpler, effective OS software has improved the operator interface and speed of execution, while reducing OS failures. Future computer use in the military[edit]In the last 2. Confidence has improved in the ability of equipment to withstand combat and extreme environment conditions. Most importantly, modern combat has become a duel of speed. Faster and more technologically advanced weaponry demonstrates first- strike capability in current combat situations, which is likely only to encourage further implementation of computer technology into systems used in the US Armed Forces in the future. Various branches of the military have mandated that future systems will be based on Zero Client or Thin Client technology.[5][6]See also[edit]References[edit].
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
September 2016
Categories |