9/16/2023 0 Comments Inside air force one kitchen![]() But just as likely is that crews might be restricted from using laptops at all, or to using hardened laptops, Casey said. Or its cables could be changed or shielded. For starters, use of the laptop could be restricted to certain areas of the plane. What are the solutions? Every situation is different, but in the case of the laptop with the E on it, there are a number of possibilities. This is not information the military wants leaked. For example, a decision maker aboard a plane may be discussing how many troops are involved in a mission or where a mission is supposed to take place. The worry is that a bad actor could set up shop somewhere in proximity to an Air Force plane and pull in electronic signals, looking for some vulnerability to exploit, or information to steal. It works like this: Technicians from the 346th turn on a plane's systems, one by one, and using a special antenna measure what data can be collected from the aircraft and from how far away. Inside, technicians run tests of equipment on board the planes for any problems that need addressing. This robot can take the weight off soldiers' shouldersĬasey's team flies to air logistics centers throughout the Air Force's global operations, traveling with its own RV, a white, nondescript vehicle with US government plates known as a mobile assessment vehicle.When they say fly, wanna-be Navy pilots say 'how high?'.Chasing drug-laden 'bogeys' across the skies.And that's just what happened during my visit to Lackland: Driven to the flightline for a briefing on how the Air Force tackles unsecure emissions aboard a Lockheed C-5 Galaxy, I found myself staring up at a whale of a plane.Ĭheck out the latest from Daniel's trip to the best tech spots in Texas, Oklahoma, Kansas, and more. When someone tells you they're taking you out to see the biggest plane that the Air Force flies, you start to wonder how huge it will be when you're standing in front of it. "We look for vulnerabilities for cybersystems to be breached," Clothier said. Defending the cyber components of all Air Force infrastructure is the task of the 24th Air Force, and often that means trying to attack their own systems. Dean Clothier, the vice commander of the 688th Cyberspace Wing, the work of the 346th Test Squadron is just one element of his organization's broader work to ensure that vulnerabilities in the service's essential systems - from physical infrastructure to water and power systems to radios and other communications equipment aboard airplanes - are secure. ![]() Yet just knowing that their work includes such a crucial aircraft put what they do for the Air Force in a very clear perspective.Īccording to Col. "Talk about" is a relative term, as the technicians who were part of the Air Force One hardening team couldn't reveal much more than that they had evaluated the president's plane. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |