Saturday, May 21, 2022

EP-3E signals intel aircraft

 
 
 PRC island province of Hainan,
 The island also houses a large signals intelligence facility that tracks civil and military activity in the area and monitors traffic from commercial communications satellites.[7] The United States has long kept the island under surveillance; on May 22, 1951, for example, RAF Spitfire PR Mk 19s out of Hong Kong's Kai Tak Airport flew photo-reconnaissance missions at the behest of U.S. naval intelligence.[8]

Following the collision, China's monitoring of reconnaissance flights became less aggressive for a period of time.[41] As of 2011, flights of U.S. surveillance aircraft near the Chinese coastline continued as before the incident.[42][43]
 
   ____________________________________
 
 
The U.S. flew about two hundred reconnaissance missions a year in the region, and this wasn’t the first time PLA pilots, including Wei, had dogged U.S. spy planes. They usually just approached the American aircraft, reported what they saw to their ground crew, and returned to base. But recently they had become more aggressive. On several occasions, PLA pilots had buzzed the spy planes, overtaking them at high speed and sometimes passed beneath them before abruptly pulling up in front at close range.  
   ____________________________________
 

Whitfield Diffie
“If the operating system was controlling what you’d expect on an intelligence aircraft, it would have a bunch of drivers to capture radar and telemetry,” Whitfield Diffie, a pioneer in the field of encryption, said. “The plane was configured for what it wants to snoop, and the Chinese would want to know what we wanted to know about them—what we could intercept and they could not.” And over the next few years the U.S. intelligence community began to “read the tells” that China had access to sensitive traffic.

A few weeks after Barack Obama’s election, the Chinese began flooding a group of communications links known to be monitored by the N.S.A. with a barrage of intercepts, two Bush Administration national-security officials and the former senior intelligence official told me. The intercepts included details of planned American naval movements. The Chinese were apparently showing the U.S. their hand.

Why would the Chinese reveal that they had access to American communications?

If China had reverse-engineered the EP-3E’s operating system, all such systems in the Navy would have to be replaced, at a cost of hundreds of millions of dollars. After much discussion, several current and former officials said, this was done. (The Navy did not respond to a request for comment on the incident.)

Admiral McVadon said that the loss prompted some black humor, with one Navy program officer quoted as saying, “This is one hell of a way to go about getting a new operating system.”

Bushehr nuclear-energy plant, in Iran,
 Cracking Stuxnet, a 21st-century cyber weapon
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target. In a fascinating look inside cyber-forensics, he explains how -- and makes a bold (and, it turns out, correct) guess at its shocking origins.
 
The N.S.A. has its own hackers. Many of them are based at a secret annex near Thurgood Marshall International Airport, outside Baltimore. (The airport used to be called Friendship Airport, and the annex is known to insiders as the FANX, for “Friendship annex.”) There teams of attackers seek to penetrate the communications of both friendly and unfriendly governments, and teams of defenders monitor penetrations and attempted penetrations of U.S. systems. The former N.S.A. operative, who served as a senior watch officer at a major covert installation, told me that the N.S.A. obtained invaluable on-the-job training in cyber espionage during the attack on Iraq in 1991. Its techniques were perfected during the struggle in Kosovo in 1999 and, later, against Al Qaeda in Iraq. “Whatever the Chinese can do to us, we can do better,” the technician said. “Our offensive cyber capabilities are far more advanced.”

wants to know who you are talking to.

The admiral said that the U.S. Navy, worried about budget cuts, “needs an enemy, and it’s settled on China,” and that “using what your enemy is building to justify your budget is not a new game.”

“It’s not in their interest to hurt the country that is feeding them money,”

The predictable result was an increase in provocative behavior by Chinese fighter pilots who were assigned to monitor and shadow the reconnaissance flights. This evolved into a pattern of harassment in which a Chinese jet would maneuver a few dozen yards in front of the slow, plodding EP-3E, and suddenly blast on its afterburners, soaring away and leaving behind a shock wave that severely rocked the American aircraft.
   ____________________________________
 
   ____________________________________













No comments:

Post a Comment

Libya, Ukraine, North Korea, and Iran situation

  https://copilot.microsoft.com/chats/4G4N26B9TUqUDSnMhqMVG Great approach! Comparing North Korea to Libya and Ukraine shows how different g...