Gen. Robert H. Barrow, USMC, once said that “Amateurs talk about tactics, but professionals study logistics.” That’s true in many enterprises, but in warfare, the side that neglects logistics is likely to be the loser. Keeping soldiers fed, clothed, and armed is the very essence of effectively prosecuting a war, and the long logistical chain from rear supply depots to forward action is what makes that possible.
Armies have had millennia to optimize logistics, and they have always maximized use of new technologies to position supplies where they’re needed. Strong backs of men and beasts sufficed for centuries, supplemented by trains in the 19th century and supplanted by motor vehicles in the 20th. Later, aircraft made an incalculable impact on supply chains, allowing rapid mobilization of supplies and supporting the industrial scale death and destruction of the 20th-century’s wars.
Continue reading “Automate the Freight: Front Line Deliveries by Drone”
Just in case you’re one of the people out there who still doesn’t believe in “the cyber” — it appears that the Russian military served malicious cell-phone apps to the Ukrainian army that allowed them to track a particular artillery cannon.
The legitimate version of the Android app helped its operator use the 1960’s-era former Soviet howitzer. The trojanized version of this application did just the same, except it also phoned home to Russian military intelligence with its location. In addition to giving the Russian army valuable information about troop movements in general, it also led to the destruction of 80% of the cannons in question over two years.
The cited article goes into depth about how certain it is that a hacking group, referred to as FANCY BEAR, are nearly certainly responsible for the attack. The exploit has fingerprints that are not widely known outside of the security research community, and the use of the exploit against the Ukrainian army pretty much ties FANCY BEAR to the Russian military.
This is also the same exploit that was used against the Democratic National Committee in the United States. Attribution is one of the hardest parts of white-hat hacking — attackers don’t want to be found and will leave misleading clues when they can — but the use of the same proprietary malware in these two attacks is pretty convincing evidence that Russian military intelligence has also hacked into US political parties and NGOs.
(Banner image by Vitaly Kuzmin, CC-BY-SA 3.0.)
What does a hacker do when going into battle for the freedom of their country? He builds a tank from scratch, of course. It’s a little bit of a stretch calling it a tank as it lacks treads. But it’s got a high-caliber gun mounted on top and has been heavily armored.
There is room enough inside for two people. What may look low tech in this picture is a different story from the cockpit. A pair of LCD monitors display images from five different cameras. You can see the shrouds that protect three of them on the front of the vehicle with a fourth acting as the rear view. A fifth camera mounted on the gun gives the passenger a look at where he’s aiming. A PS1 controller can rotate it and we assume has a fire feature as well. Check out the demonstration video embedded after the break.
Continue reading “Homemade tank joins the battle in Syria”