How will the 5 low-lethal strategic threats upset the global military balance?

The concept of strategic strike emerged during the Second World War, first through the German Blitz against British cities which took place between the end of the Battle of Britain itself, in September 1940, and May 1941 when the Luftwaffe was redirected to the East in anticipation of Plan Barbarossa. It was a question, for the German strategists and in particular for Herman Goehring commander of the Luftwaffe, of destroying the will of resistance of the British themselves, by striking not only military targets like bases and factories, but also the big cities of the countries, such as London, but also Coventry, Plymouth, Birmingham and Liverpool.…

Read the article

Russian forces much more exposed to electronic and cyber warfare than anticipated

Since the start of the fighting in Ukraine on February 24, the Russian armies have shown a face that surprised even the most circumspect analysts as to the reality of its military power: weak morale, poor coordination of forces, very questionable strategy, faulty logistics. , malfunction of precision weapons, revelations followed one another to explain the repeated failures of the Russian offensive in the face of a much more modest Ukrainian resistance, with an annual defense budget 10 times lower than that of Moscow. The most surprising of these revelations concern the vulnerability of Russian forces to cyber attacks, as well as their poor mastery of…

Read the article

The 5 critical failings of Russian forces in Ukraine

To say that on the 7th day of the Russian-Ukrainian war, the operations did not go as expected by the Russian General Staff, is obviously an understatement, to the point that now Moscow is restructuring its offensives to respect a strategy much more classic based on the extraordinary firepower of Russian artillery and bombing aviation. However, these first days of combat made it possible, through numerous observations widely analyzed by the OSINT community, to identify several critical failures affecting the Russian forces engaged in this operation. Surprisingly, some of these failures precisely affect reputed areas of excellence of the Russian army, and in fact raise questions about…

Read the article

When cyber warfare encroaches on biological warfare

One of the most striking lessons from the Covid crisis, which has been hitting the world for more than two years, is probably not the vulnerability of human societies to the appearance of a new pathogen, a subject that has been documented for many years. years. On the other hand, this crisis highlighted the immense dependence of Western societies on their health system, and on the adherence of citizens to this system. Thus, it was never the incidence rate, yet the alpha and omega of epidemiology, any more than the number of deaths, which were at the heart of political decisions in Europe and the United States to stem the effects of…

Read the article

The European Union deploys a cyber rapid reaction team to protect Ukraine

About ten days ago, several ministerial sites and the 3 most important Ukrainian banks were targeted by a massive cyber attack of the denial of access type, or DDOS. For nearly 24 hours, the communication capacities and services of these structures were thus paralyzed by this attack, the origin of which was attributed to groups of Russian hackers. In the current context of extreme tensions, the capacity for the Ukrainian authorities to maintain functional communication channels with the population and to maintain active banking services for the population, is as decisive as the operational military responses of its…

Read the article

Congress wants new tactical electronic warfare aircraft for the US Air Force

It was in 1998 that the last electronic warfare EF-111A Raven was withdrawn from service with the US Air Force, without any replacement having been provided for this purpose. However, the aircraft fulfills many crucial missions, in particular to neutralize the detection and engagement capabilities of Iraqi anti-aircraft defenses during the first Gulf War, and to allow tactical aircraft, and in particular the F117 stealth aircraft, to operate safely. Convinced of the omnipotence of the passive stealth of its F-22s and the future F-35A, the US Air Force did not consider it necessary to replace this capability, it is really expensive...

Read the article

United States, China and Russia strengthen their Information Warfare capabilities

In just a few years, Information Warfare, which can be incorrectly translated as Information Battlefields, has established itself as one of the major subjects within the world's major military powers, which devote to it every year more resources. Three countries in particular, the United States on the one hand, and China and Russia on the other, have integrated this new battlefield into the very heart of their new military doctrines, to the point of integrating at different levels combat units specialists in this field, and thus to give their forces new operational capabilities which, potentially, can prove to be as or even more effective than a regiment...

Read the article

Electronic Warfare-Cyber ​​Convergence at the Heart of the New US Navy E / A18G Growler Pods

The next generation of jamming pods fitted to the US Navy's E/A 18G Growler, the only modern combat aircraft equipped for active jamming in the Western arsenal, will have capabilities beyond comparison with the already very capable ALQs. -99 that equip the device today. Beyond enhanced jamming capabilities, these pods will also be equipped with cyber warfare functions, according to a convergence between electronic and cyber warfare that is set to prevail in this area. In any case, this is the reading made of it by Rear Admiral John Meier, Commander of Naval Forces Atlantic for the US Navy, during a videoconference with a…

Read the article

DARPA is commissioning technologies to reassemble the US electricity grid, victim of cyber attacks

The great vulnerability of the electric grid allowing to distribute the electric current in the whole of the United States, is a major subject of concern for the leaders and the American soldiers. The gigantic blackout of 2003, linked to cascading phenomena originating in procedural errors within the company FirstEnergy, and which deprived nearly 50 million Americans and Canadians of power, confirmed what the authorities Americans had known since 1965, and the great New York blackout. Apart from accidents, mishandling or terrorist acts, one of the main threats to this inherently unstable network is…

Read the article

Victims of giant computer hacking, US agencies point to Russia

The case caused a stir across the Atlantic. Indeed, several of the most important American government agencies, including the Department of Homeland Security, were hacked for several months by a team of hackers who potentially had access to all the emails and documents exchanged by these agencies, creating one of the biggest security breaches the United States has seen in decades. In addition to the methods employed by the hackers and the potentially leaked data, the Department of National Security is now trying to determine the origin of the hack, and it seems that all roads lead to Moscow. It is through an Orion software platform…

Read the article
Meta-Defense

FREE OF CHARGE
ABOUT