It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Seekerof
I would seriously speculate that a Gen 7 Fighter aircraft would be the embodiment of all type aircraft, being:
* a true all weather fighter
* capable of doing all combat missions (ie: bomber, ground attack, etc.)
* able to be flown, if necessary, by robotics or ground based-pilot.
* having 'jump' capability in that the aircraft can go into space on limited excursions.
My personal opinion is that the pilot will never truly be replaced.
seekerof
Originally posted by COWlan
when you people are talking about ground based pilots, they must send the signal to UCAV's, wouldn't the signal be vulnerable to interceptions and disruptions?
With Computers that can think for themselves in 50 years, wouldn't that make all equipments with CPU chips a possible threat?
Originally posted by Murcielago
A possible threat from what?
and there signals are encripted anti-jam.
Encrypted or not... if you can capture an encrypted command and re-send it at a later time you can jam a UCAV with proper commands that the controller didn't mean to send, unless of course they have the foresight to create an encryption which changes frequently on a schedule (and then of course you need to keep your UAVs from falling into enemy hands so that the incryption isn't broken.
RichardPrice
Encryption and jamming are two entirely seperate things.
Originally posted by RichardPrice
Hate to say it, but wrong on most acounts. All encryption currently employed by military hops keys at least once a second. This means that you would have to intercept hte command and resend it within the same timeframe the encryption key is valid, essentially resulting in the same action anyway, which will probably be dealt with the network stack as errors anyhow. Encryption between the UCAV and home base is not reliant on keys stored by the UCAV anyway, so if the enemy captures one UCAV it will not have command access to other UCAVs.
Originally posted by The Vagabond
Well, I suppose i ought to be glad that I was wrong, but I do have a question that you may or may not be allowed to answer.
If the key to interpereting the encrypted data is not on the UAV, how can the UAV respond correctly to encrypted commands?
Does the signal being sent to the UAV include the sollution to the next step in the encryption (this is the only way i can imagine it working), and if so, isn't it possible to create a program which can very rapidly put false commands into the next proper encryption, allowing you to counter-act commands immediately after they are executed?
I'm pretty sure your answer will be no, but I just can't get my head around the fact that the key to the encryption doesn't lie in the device that reads the encryption.