Back to Search Start Over

Phone for Help.

Authors :
Fulghum, David A.
Source :
Aviation Week & Space Technology. 10/24/2005, Vol. 163 Issue 16, p50-52. 3p. 2 Color Photographs.
Publication Year :
2005

Abstract

This article reports that small mobile phones which insurgents and terrorists use to trigger explosives and organize ambushes are computers; and if there are multiple phones, they have created a computer network. While these wireless network communications, which can use cellular, satellite, PDA and BlackBerry hand-held devices, are low power and offer several layers of encryption, with the right cyber-tools, they can be identified, tracked, infiltrated, mined for information and, if desired, attacked. U.S. Air Force (USAF) officials say that as the service has improved overall electronic attack capabilities, coverage was added in the electromagnetic spectrum that provides portals into wireless phone networks. But USAF officials also caution that large, slow electronic support aircraft are vulnerable targets that can't penetrate enemy air defenses.

Details

Language :
English
ISSN :
00052175
Volume :
163
Issue :
16
Database :
Academic Search Index
Journal :
Aviation Week & Space Technology
Publication Type :
Periodical
Accession number :
18753764