
- This event has passed.
Analysis of Wireless Communications Risks
May 6 @ 8:00 pm - 8:02 pm
This presentation explores and analyzes the interesting wireless postings recently made to the ACM, “THE RISKS DIGEST”, Volume 34, Issues 50-59. We will explore these issues in detail: Unencrypted and insecure communications with Chinese servers, Multiple unencrypted protocols of Aircraft digital communications, and spoofing of GNSS navigation systems. Drone and Counter Drone technology is a hot topic today, and we continue to see postings about it in the RISKS Digest. At the present time, technically advanced UAV/UAS systems are being delivered to the Ukraine battleground (to both Russian and Ukrainian forces) by China, Turkey, and other countries. War is a test bed for technology: Countries which manufacture and supply intelligence-based or kinetic drones want to test weapons in a live battle setting, and many predict WWIII will be a drone war. Electromagnetic detection signatures will be shown, and we will review some specific detection and counter-drone immobilization equipment. Some of these systems were delivered by the Pentagon to the NJ Picatinny arsenal and Earle military bases in New Jersey. Other risks, such as an IED aerial delivery system, have been posted on RISKS. We will show how such a delivery system can be easily purchased by the Chinese supplier, TEMU. Speaker(s): Joe Jesson, Room: CS 105, Bldg: Princeton University Computer Science Building, 35 Olden Street, Princeton, New Jersey, United States, 08544, Virtual: https://events.vtools.ieee.org/m/482438