CONTENTS :
Intro
The comparison between the Smart IoT infrastruture and Network-Centric Warfare (NCW) reveals distinctive parallels in technological application and strategic intent, raising questions about privacy, security, and ethical implications in our increasingly interconnected world. Both employs similar technologies for enhanced situational awareness, automation, interconnectivity, resource management, and data security, showcasing how civilian technologies can mirror or be adapted for military strategies and vice versa.
This revelation is pivotal to the Targeted Individual operation which is widely regarded a sham, yet the "netcentric-warfare" features that include reconnaissance, espionage, psychological operations, electronic warfare, directed-energy weapons (DEW), and target and kill, though intentional in its field, can covertly be applied to the civilian smart city framework which already possesses the technical capabalities to do so.
DODIN formerly ( The Global Information Grid G.I.G )
Global Information Grid
https://en.wikipedia.org/wiki/Global_Information_Grid DoDIN Official https://www.jfhq-dodin.mil/ |
The DoDIN (Department of Defense Information Network), formerly known as the Global Information Grid (GIG), is essentially a vast, interconnected network that supports the U.S. Department of Defense's operations. It's a comprehensive system that includes all the military's communication and information capabilities, from computers to satellites, designed to share information across different branches and levels of command. Netcentric warfare relates to this by leveraging this network to enhance military operations through real-time information sharing, enabling forces to be more coordinated, responsive, and effective in combat situations. The principles of having a central communications system to facilitate command, control, intelligence, surveillance and reconnaissance (C4ISR) are implemented by Militaries worldwide to enhance operational effectiveness.
|
What is Netcentric-Warfare
Netcentric warfare is a strategy where sharing information across a network is key to gaining an operational edge. It connects sensors, decision-makers, and engagement units ( infantry, armoured units, air combat units, naval units, "Special operations forces" etc ) providing a real-time, comprehensive view of the battlefield. This integration speeds up decision-making and enhances coordination, allowing for better situational awareness, quicker adaptation to changes, and more precise military actions. By linking all elements of the military through technology, netcentric warfare shifts from traditional command hierarchies to a dynamic, information-driven approach, where the rapid dissemination of knowledge directly impacts combat outcomes.
Special Operations Forces (SOF) are elite military units trained to conduct high-stakes, specialized missions that require precision, stealth, and strategic impact, often in environments where conventional forces are less effective. Their roles are diverse, encompassing direct action, intelligence operations, and support for allied forces, all aimed at achieving national security objectives with minimal footprint. Some of the Roles of Special Operations Forces:
Direct Action: Conducting raids, ambushes, and targeted strikes.
Special Reconnaissance: Gathering critical intelligence in hostile areas.
Unconventional Warfare: Supporting insurgencies or resistance movements against hostile governments.
Foreign Internal Defense: Training and advising foreign militaries.
Psychological Operations (PSYOP): Influencing enemy behavior or local populations.
Information Operations: Managing and exploiting information for strategic advantage.
Cyber Operations: Engaging in digital warfare.
Espionage: Gathering intelligence through covert means.
Counterintelligence: Protecting against enemy espionage and deception operations.
Direct Action: Conducting raids, ambushes, and targeted strikes.
Special Reconnaissance: Gathering critical intelligence in hostile areas.
Unconventional Warfare: Supporting insurgencies or resistance movements against hostile governments.
Foreign Internal Defense: Training and advising foreign militaries.
Psychological Operations (PSYOP): Influencing enemy behavior or local populations.
Information Operations: Managing and exploiting information for strategic advantage.
Cyber Operations: Engaging in digital warfare.
Espionage: Gathering intelligence through covert means.
Counterintelligence: Protecting against enemy espionage and deception operations.
Netcentric warfare https://en.wikipedia.org/wiki/Network-centric_warfare
Network-Centric Warfare: A New War Theory Emerging in the Information Age
https://www.unrevealedfiles.com/network-centric-warfare-a-new-war-theory-emerging-in-the-information-age/
INTRODUCTION TO SPECIAL OPERATIONS
https://irp.fas.org/agency/dod/socom/sof-ref-2-1/SOFREF_Ch1.htm
Special Operations https://en.wikipedia.org/wiki/Special_operations
Network-Centric Warfare: A New War Theory Emerging in the Information Age
https://www.unrevealedfiles.com/network-centric-warfare-a-new-war-theory-emerging-in-the-information-age/
INTRODUCTION TO SPECIAL OPERATIONS
https://irp.fas.org/agency/dod/socom/sof-ref-2-1/SOFREF_Ch1.htm
Special Operations https://en.wikipedia.org/wiki/Special_operations
STANDARDS
In today's globally interconnected world, standardization plays a vital role in ensuring compatibility, safety, efficiency, and innovation across various industries. Numerous international organizations are dedicated to creating, maintaining, and promoting standards that transcend national boundaries. These bodies work collaboratively to address the complex needs of technology, health safety, and environmental concerns. Here's an overview of some of the most influential global standardization organizations that work collaboratively to ensure standards meet global needs. Each has unique contributions to the standardization landscape:
ISO (International Organization for Standardization): ISO is perhaps the most widely recognized body for international standards, developing and publishing standards in nearly every industry from technology to food safety.
IEC (International Electrotechnical Commission): specializes in electrotechnology and electrical engineering standards, often in collaboration with ISO (forming ISO/IEC for joint standards).
ITU (International Telecommunication Union): A United Nations specialized agency for information and communication technologies, covering aspects like radio spectrum management, satellite orbits, and telecom standards.
IEEE (Institute of Electrical and Electronics Engineers): A United Nations specialized agency for information and communication technologies, covering aspects like radio spectrum management, satellite orbits, and telecom standards.
IETF (Internet Engineering Task Force): An open standards organization that develops technical standards for the Internet, particularly focusing on protocols and architecture.
3GPP (3rd Generation Partnership Project): Develops standards for mobile telecommunications, including GSM, UMTS, LTE, and now 5G
ISO (International Organization for Standardization): ISO is perhaps the most widely recognized body for international standards, developing and publishing standards in nearly every industry from technology to food safety.
IEC (International Electrotechnical Commission): specializes in electrotechnology and electrical engineering standards, often in collaboration with ISO (forming ISO/IEC for joint standards).
ITU (International Telecommunication Union): A United Nations specialized agency for information and communication technologies, covering aspects like radio spectrum management, satellite orbits, and telecom standards.
IEEE (Institute of Electrical and Electronics Engineers): A United Nations specialized agency for information and communication technologies, covering aspects like radio spectrum management, satellite orbits, and telecom standards.
IETF (Internet Engineering Task Force): An open standards organization that develops technical standards for the Internet, particularly focusing on protocols and architecture.
3GPP (3rd Generation Partnership Project): Develops standards for mobile telecommunications, including GSM, UMTS, LTE, and now 5G
Who is behind this agenda
https://www.biodigcon.com/who-s-behind-this-agenda
10 Standards Organizations That Affect You (Whether You Know It Or Not)
https://www.electronicdesign.com/technologies/communications/article/21796419/10-standards-organizations-that-affect-you-whether-you-know-it-or-not
Standards Organizations
https://www.informit.com/articles/article.aspx?p=24687&seqNum=7
https://www.biodigcon.com/who-s-behind-this-agenda
10 Standards Organizations That Affect You (Whether You Know It Or Not)
https://www.electronicdesign.com/technologies/communications/article/21796419/10-standards-organizations-that-affect-you-whether-you-know-it-or-not
Standards Organizations
https://www.informit.com/articles/article.aspx?p=24687&seqNum=7
Introduction to IEEE Internet of Things (IOT) and Smart Cities
https://standards.ieee.org/wp-content/uploads/import/documents/other/geps_07-iot_smart_cities.pd
https://standards.ieee.org/wp-content/uploads/import/documents/other/geps_07-iot_smart_cities.pd
Wireless Sensor Networks (WSNs) are ubiquitous in modern technology, seamlessly integrating into a vast array of applications. They consist of spatially distributed autonomous sensors that monitor physical or environmental conditions like temperature, sound, pollution levels, or motion.
In agriculture, WSNs optimize irrigation and crop health by collecting data on soil moisture and weather conditions. In smart homes, they manage lighting, temperature, and security systems.
Urban areas employ WSNs for traffic management, air quality monitoring, and disaster response.
In healthcare, they remotely track patient vitals for remote health monitoring.
Industrial settings use them for predictive maintenance, ensuring machinery operates efficiently by detecting anomalies in real-time.
In the military context, WSNs are crucial for battlefield surveillance, target acquisition, reconnaissance, and monitoring troop movements, providing strategic advantages through real-time data collection and analysis. This widespread use underscores their role in enhancing efficiency, safety, and responsiveness across diverse sectors.
A review of wireless sensor networks and its applications
https://ieeexplore.ieee.org/document/6308240
Overview of Protocols and Standards for Wireless Sensor Networks in Critical Infrastructures
https://www.mdpi.com/1999-5903/16/1/33
Standards for Wireless Sensor Networks in Critical Infrastructures
https://encyclopedia.pub/entry/54228
In agriculture, WSNs optimize irrigation and crop health by collecting data on soil moisture and weather conditions. In smart homes, they manage lighting, temperature, and security systems.
Urban areas employ WSNs for traffic management, air quality monitoring, and disaster response.
In healthcare, they remotely track patient vitals for remote health monitoring.
Industrial settings use them for predictive maintenance, ensuring machinery operates efficiently by detecting anomalies in real-time.
In the military context, WSNs are crucial for battlefield surveillance, target acquisition, reconnaissance, and monitoring troop movements, providing strategic advantages through real-time data collection and analysis. This widespread use underscores their role in enhancing efficiency, safety, and responsiveness across diverse sectors.
A review of wireless sensor networks and its applications
https://ieeexplore.ieee.org/document/6308240
Overview of Protocols and Standards for Wireless Sensor Networks in Critical Infrastructures
https://www.mdpi.com/1999-5903/16/1/33
Standards for Wireless Sensor Networks in Critical Infrastructures
https://encyclopedia.pub/entry/54228
1. Military WSN , 2. Enviromental WSN, 3. Home WSN
https://microcontrollerslab.com/wireless-sensor-networks-wsn-applications/
https://microcontrollerslab.com/wireless-sensor-networks-wsn-applications/
Wireless Body Area Networks (WBANs) are significant in modern healthcare for remote monitoring and managing patient health, but they come with significant security concerns. The primary issue is the vulnerability to data interception; since WBANs transmit sensitive health data wirelessly, there's a risk of this information being captured by malicious entities. This could lead to privacy breaches where personal health information is exploited. Additionally, because these devices often operate close to the body, they are susceptible to physical tampering or signal jamming, which could disrupt medical care or alter sensor data. Another concern is the potential for unauthorized access, where hackers might control or manipulate medical devices, leading to incorrect treatment or even harm.
IEEE Wireless Body Area Networks and Their Applications – A Review
https://www.researchgate.net/publication/367372277_Wireless_Body_Area_Networks_and_Their_Applications_-_A_Review
IEEE Wireless body area network security issues — Survey
https://ieeexplore.ieee.org/document/7987943
IEEE Wireless Body Area Networks and Their Applications – A Review
https://www.researchgate.net/publication/367372277_Wireless_Body_Area_Networks_and_Their_Applications_-_A_Review
IEEE Wireless body area network security issues — Survey
https://ieeexplore.ieee.org/document/7987943
1. Implanted sensors 2. Wban Communication Tiers Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications https://www.sciencedirect.com/science/article/pii/S1110866516300482 |
|
The Wireless body area networks (WBAN) has been around since 1995 and developing eversince. One can only speculate what state the technology is at today 2025.
|
1. WIRELESS BODY AREA NETWORK STARTED AROUND 1995 https://en.wikipedia.org/wiki/Body_area_network
2. IEEE SPECTRUM ARTICLE Wireless monitoring devices will improve hospital care and make way for continuous home monitoring. https://spectrum.ieee.org/fcc-gives-medical-body-area-networks-clean-bill-of-health |
There will always be vulnerabilities with the WBAN. It will be exploited and weaponized one way or another alongside emerging tech. It is electronic warfare and surveillance in the body.
1. IEEE SPECTRUM ARTICLE Turning the body into a wire. The Vulnerabilities in the WBAN. N.Z white hat hacker Barnaby Jack. https://spectrum.ieee.org/turning-the-body-into-a-wire 2. Infamous Hacker Barnaby Jack dies before blackhat convention https://www.nbcnews.com/technolog/infamous-hacker-barnaby-jack-dies-black-hat-convention-6c10760881 |
|
The Different types of Radiation and its effects on the human body.
1. What are the Different Types of Radiation? https://letstalkscience.ca/educational-resources/backgrounders/what-are-different-types-radiation 2. Biological Effects and Mechanisms of Electromagnetic Radiation https://encyclopedia.pub/entry/26671 |
|
Electronic Warfare
|
The Invisible Battlefield: Electronic Warfare, Explained https://www.youtube.com/watch?v=2L_2ITqvRQA |
The Department of Defense (DOD) relies heavily on the electromagnetic spectrum (EMS) for a wide range of military functions, making it a cornerstone of modern warfare. The EMS supports everything from basic communications to sophisticated electronic warfare, ensuring command, control, and intelligence operations across various domains. The DOD's use of the EMS involves managing spectrum allocation, employing it in current military strategies like navigation warfare, and embracing emerging technologies such as 5G for enhanced connectivity, AI for smarter spectrum management, and directed-energy systems for both communication and defense against threats like unmanned aerial systems.
Overview of Department of Defense Use of the Electromagnetic Spectrum PDF
https://crsreports.congress.gov/product/pdf/R/R46564
1. DOD the largest user of the electromagnetic spectrum 2. DOD use of the radio spectrum 3. Spectrum used for DOD laser technologies 4. Military Applications of the spectrum 5. 5th generation (5g) Communications https://crsreports.congress.gov/product/pdf/R/R46564
Electronic Warfare – The Forgotten Discipline https://www.japcc.org/articles/electronic-warfare-the-forgotten-discipline/ As with the civilian smart grid and city infrastructure, the military uses similar or the same applications to create an interconnected enviroment i.e Cyberpsace, Geospatial and Geolocation technology, the Internet of Things Iot, Wireless sensor networks and ubuiquitous sensors, mobile networks, adhoc networks, artificial intelligence, unmanned aerial vehicles (UAV). |
Electromagnetic Operations in the Electromagnetic Environment.
|
Application of IoT in military operations in a smart city
https://ieeexplore.ieee.org/document/8398690
Application of IoT in military operations in a smart city
file:///C:/Users/OEM/Downloads/08398690.pdf
The Internet Of Military Things (IoMT): How IoT Is Used In Warfare
https://indeema.com/blog/the-internet-of-military-things-iomt--how-iot-is-used-in-warfare
IoT, AI, and the future battlefield
https://militaryembedded.com/ai/deep-learning/iot-ai-and-the-future-battlefield
https://ieeexplore.ieee.org/document/8398690
Application of IoT in military operations in a smart city
file:///C:/Users/OEM/Downloads/08398690.pdf
The Internet Of Military Things (IoMT): How IoT Is Used In Warfare
https://indeema.com/blog/the-internet-of-military-things-iomt--how-iot-is-used-in-warfare
IoT, AI, and the future battlefield
https://militaryembedded.com/ai/deep-learning/iot-ai-and-the-future-battlefield
Cyber-Electro-Magnetic Activities (CEMA) represent the merging of cyber and electronic warfare into a cohesive strategy to gain military advantages:
1. Cyber Operations: These involve actions in cyberspace to either disrupt enemy systems or protect one's own. This includes hacking, deploying malware, or securing networks against cyber threats.
2. Electronic Warfare (EW): This encompasses using electromagnetic energy to:
- Attack: Jam or deceive enemy electronic systems.
- Protect: Safeguard friendly electronic systems.
- Support: Gather intelligence through the electromagnetic spectrum.
CEMA operates across all domains of warfare, making it a vital component of modern military strategy where both physical and digital battlefields are key. It's about using technology and tactics to dominate in both realms simultaneously.
Cyber and Electromagnetic Activities (CEMA) Integration
https://www.baesystems.com/en/digital/solutions/defence/cema-integration
Cyberwarfare
https://en.wikipedia.org/wiki/Cyberwarfare
CYBERWARFARE "7 Different types " 1. Espionage 2. Sabotage 3. (DOS) Denial of Service 4. Electrical Power Grid
5. Propaganda attacks 6. Economic disruption 7. Surprise attacks
https://www.imperva.com/learn/application-security/cyber-warfare/
1. Cyber Operations: These involve actions in cyberspace to either disrupt enemy systems or protect one's own. This includes hacking, deploying malware, or securing networks against cyber threats.
2. Electronic Warfare (EW): This encompasses using electromagnetic energy to:
- Attack: Jam or deceive enemy electronic systems.
- Protect: Safeguard friendly electronic systems.
- Support: Gather intelligence through the electromagnetic spectrum.
CEMA operates across all domains of warfare, making it a vital component of modern military strategy where both physical and digital battlefields are key. It's about using technology and tactics to dominate in both realms simultaneously.
Cyber and Electromagnetic Activities (CEMA) Integration
https://www.baesystems.com/en/digital/solutions/defence/cema-integration
Cyberwarfare
https://en.wikipedia.org/wiki/Cyberwarfare
CYBERWARFARE "7 Different types " 1. Espionage 2. Sabotage 3. (DOS) Denial of Service 4. Electrical Power Grid
5. Propaganda attacks 6. Economic disruption 7. Surprise attacks
https://www.imperva.com/learn/application-security/cyber-warfare/
1. Electronic Warfare EW major subfields 2. Cyber EW payloads 3. CEMA is the combination of EW and Cyber warfare.
4. Similarities between Electronic Warfare and Cyber warfare
https://www.emsopedia.org/entries/electronic-warfare-aka-electromagnetic-warfare/
4. Similarities between Electronic Warfare and Cyber warfare
https://www.emsopedia.org/entries/electronic-warfare-aka-electromagnetic-warfare/
"Drone kill communications" net illustrated article below discusses how a UK network connection is part of a U.S. military system used for drone operations, which has resulted in civilian deaths.
The article illustrates how the UK network connects to the U.S. Defense Information Systems Network (DISN) and the Global Information Grid (GIG), crucial for communicating with drones. The DISN/GIG has evolved, becoming vital as the demand for drone imagery intelligence grew beyond what satellite and terrestrial networks could handle.
Civilian Impact : There's an acknowledgment of civilian deaths due to drone operations, underscoring the human rights concerns associated with the targeted killings facilitated by this network infrastructure.
Drone kill communications net illustrated
Dhttps://www.computerweekly.com/blog/Public-Sector-IT/Drone-kill-communications-net-illustrated
Defense Information System Network
https://en.wikipedia.org/wiki/Defense_Information_System_Network
DOD Unmanned systems Integrated Roadmap Pdf
https://dod.defense.gov/Portals/1/Documents/pubs/DOD-USRM-2013.pdf
The article illustrates how the UK network connects to the U.S. Defense Information Systems Network (DISN) and the Global Information Grid (GIG), crucial for communicating with drones. The DISN/GIG has evolved, becoming vital as the demand for drone imagery intelligence grew beyond what satellite and terrestrial networks could handle.
Civilian Impact : There's an acknowledgment of civilian deaths due to drone operations, underscoring the human rights concerns associated with the targeted killings facilitated by this network infrastructure.
Drone kill communications net illustrated
Dhttps://www.computerweekly.com/blog/Public-Sector-IT/Drone-kill-communications-net-illustrated
Defense Information System Network
https://en.wikipedia.org/wiki/Defense_Information_System_Network
DOD Unmanned systems Integrated Roadmap Pdf
https://dod.defense.gov/Portals/1/Documents/pubs/DOD-USRM-2013.pdf
1. The aim of GIG 2. The network was meant to make drone weapons 3. Network Targeting 4. They joined the DISN
5. Drone Net Dhttps://www.computerweekly.com/blog/Public-Sector-IT/Drone-kill-communications-net-illustrated
6. DISN transport of the future 5g, LTE, LIFI https://dod.defense.gov/Portals/1/Documents/pubs/DOD-USRM-2013.pdf
5. Drone Net Dhttps://www.computerweekly.com/blog/Public-Sector-IT/Drone-kill-communications-net-illustrated
6. DISN transport of the future 5g, LTE, LIFI https://dod.defense.gov/Portals/1/Documents/pubs/DOD-USRM-2013.pdf