Want to create interactive content? It’s easy in Genially!
Presentación infográfica
Alex sf
Created on November 3, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Smart Presentation
View
Practical Presentation
View
Essential Presentation
View
Akihabara Presentation
View
Pastel Color Presentation
View
Visual Presentation
View
Relaxing Presentation
Transcript
presentation in group
the uses of technology in the army
Alejandro Serrano, andrei ioan balasoiu, pablo fernández, Alejandro Sánchez, raul Precup
25
INDEX
12. U.S. NAVy in ancient times.....................................15
1. The first UCAV.............................................4
13. U.S. NAVy in now a days...........................................16
2. The drones nowaday.................................5
3. what software combat drones use......6
14. technological advances over time....................17
4. What it's like in action..............................7
15. Military Cybersecurity..........................................18
16. Cyber Threats to the U.S. Military......................19
5. United states army.....................................8
17. main defense strategies.......................................20
6. fundation and leader...............................9
7. THE EVOLUTION OF THE ARMY......................10
18. Key Regulations and Policies..............................21
8. EXOSKELETONS..............................................11
19. Role of Cybersecurity in Modern Conflicts..22
9. APS..................................................................12
20. MILITARY COMUNIcAtION..........................................23
10. ROBOTS........................................................13
21. EVOLUTION OF COMUNICATION DEVICES..................24
11. ype of technology used in the army..14
22. protection of comunication..............................25
aplications in each camp
United States Army
United States Air Force
United States Navy
The first UCAV
That first experience with new weapons maybe is not wath the people of those years excepted but the men like all in the history never stops to upgrade and update weapons and he refined this system to be one of the most letal and destructive system that the men ever created.
All start in 1849 with the First Italian War of Independence. During this war the Austrian lieutenant field marshal Franz von Uchatius, desing an create the first UCAV in the history.
Republic of San Marco -1849-
The drones nowaday
mq-9 reaper
What you see right now is the culminate of the years of develoment and refined about the drone systems.
But how its possible that the drones evolve from ballons with boxes strapped with explosives to planes no tripuled with the capacity to operate in each part of the world obviusly thanks to the informatic.
what software combat drones use
1. Flight Control System (FCS)
2. GPS Navigation and Positioning
3. Communication and Data Link Systems
4. Mission Management System (MMS)
5. Artificial Intelligence (AI) and Machine Learning
6. Weapons Systems Software
7. Cybersecurity and Electronic Warfare Defense
What it's like in action
Warning content
In this video you can see the culmination of all systems that i talk before
UNITED STATES ARMY
when was it and who was it?
fundation and leader
FOUNDING:
The USA Army was established on June 14, 1775, before the declaration of independece. Originally, was founded as a militia to fight British troops in the Revolutionary War.
LEADERS:
One of the first leaders was General George Washington, who became the comander in chief. He faced a challenge of organazing and training troops due to the limited resources.
Timeline
THE EVOLUTION OF THE ARMY
MAINLY GUN
The gun USA Army used on those years.
1775
2024
1990
MAINLY GUN
MAINLY GUN
The gun USA Army is using this years.
The gun USA Army used on those years.
EXOSKELETONS
what´s about?
OBJECTIVE
TESTING
RESULTS
INFO
NEW?
APS
Short demostration on how the APS works on battlefield.
+ info
ROBOTS
lETS SEE THE IMPACT OF ROBOTS IN THE ARMY
For Russia and China, we know they like to show what they've got, so we've got the following videos
For the U.S. we don't have much to show as we know they like to keep things secret.
Virtual Reality training
DOK ING MV3
TECHNOLOgY
XM204 Top attack munition
Type of technology used in the army.
Infrared ID
ARQUUS MAV RX
U.S. NAVy in ancient times
USS Monitor
USS George Washington (SSBN 598)
Polaris missile
U.S. NAVy in now a days
technological advances over time
2024
2018
2017
USS Zumwalt (DDG-1000)
USS Gerald R. Ford (CVN-78)
USS IDAHO (SSN 799)
Military Cybersecurity
1. Cyber Threats to the U.S. Military
2. Defense Strategies and Technologies
3. Key Regulations and Policies
4. Role of Cybersecurity in Modern Conflicts
Cyber Threats to the U.S. Military
-Nation-State Attacks: Threats from other countries aiming to infiltrate or disrupt U.S. military systems.-Cyber Espionage: Attempts to steal classified military information. -Malware and Ransomware: Harmful programs that can disrupt operations or capture sensitive data.
Back
Defense Strategies and Technologies
main defense strategies
-Zero Trust Architecture: A framework where each user or device is verified and not automatically trusted. -Cyber Command (CYBERCOM): The U.S. Cyber Command, which coordinates defense and response operations. -Encryption and Firewalls: Data protection and network security technologies.
Back
Key Regulations and Policies
-National Defense Authorization Act (NDAA): Law that defines defense policies and budgets.
Info
-Federal Information Security Management Act (FISMA): Sets cybersecurity standards for federal agencies.
Info
-Executive Orders (EOs): Recent executive actions on cybersecurity.
Info
Back
Role of Cybersecurity in Modern Conflicts
-Information Warfare: Manipulation of information as a strategic weapon in conflicts.
Info
-Cyber Warfare: The use of cyberspace as a battlefield for attacks on networks and data.
Info
- Cybersecurity as a Defensive and Offensive Tool: concentrates on protecting networks, systems, and data from possible attacks.
Info
Back
MILITARY COMUNIcAtION
Communication in the military is essential for the organisation of the military. Over the years, communication methods have evolved as new technologies have been implemented, ensuring the security of information and its rapid dissemination.
Principles of communication
Security
Reliability
Speed
Interoperability
Timeline
EVOLUTION OF COMUNICATION DEVICES
Digital Systems and Computers
1904
2000
TELEGRAPH
2020s
Radios and Morse code
War messenger
Mobile Communication and VoIP
GPS
1970
protection of comunication
When we talk about communication, we take into account the information that is to be transmitted or dealt with, and it is therefore very important to anticipate possible enemy movement, which is why anti-detection technologies or systems are used to detect possible attacks.
SR-71 Blackbird
B-2 Spirit
Radar Duga
Radome
thank you for watching
any questions ?
BIBLIOGRAPHY
U.S Army
U.S Air Force
U.S Navy
Cibersecurity
Comunications
Cibersecurity
- ChatGPT
- https://mit-kmi.com/military-cybersecurity-preparedness/
- https://securityintelligence.com/articles/the-pentagons-2023-cyber-strategy-what-you-need-to-know/
- https://www.defense.gov/News/News-Stories/Article/Article/3738186/dod-employs-proactive-measures-to-counter-cyber-threats/
USAF BIBLIOGRAPHY
- https://greydynamics.com/unmanned-combat-aerial-vehicles-ucavs-the-future-of-aerial-warfare
- https://www.iwm.org.uk
- https://www.uavnavigation.com
- https://consortiq.com/uas-resources/short-history-unmanned-aerial-vehicles-uavs
6. Weapons Systems Software
A weapons system is a combination of one or more weapons with all related equipment, materials, services, personnel, and means of delivery and deployment (if applicable) required for self- sufficiency.
XM204
It is a type of superior attack ammunition used to combat enemy armored vehicles. It is launched from a distance and attacking vehicles from above, where they usually have less protection. This type of attack exploits the vulnerability of tanks and armored vehicles at the top, allowing the projectile to penetrate more effectively. It is equipped with sensors that allow it to identify specific targets and differentiate between friendly and enemy vehicles. Its launch is generally deployed from ground systems.
War messenger
Early military communications involved the use of messengers or the sending and receiving of simple signals (some coded so that it was not possible to recognise the content). The first distinctive tactics of military communications were called ‘signals’.
Trailer of a movie about a war messenger
George Washington
- Born: Westmoreland, Virginia, British America, February 22, 1732
- Died: Mount Vernon, Virginia, United States of America, December 14, 1799.
- 1st president of the United States of America
Transformed a group of militias into an organized force capable of defeating the British Empire. His legacy laid the foundations of discipline and strategy that propelled the United States to develop one of the most powerful armies in the world.
3. Communication and Data Link Systems
Combat drones use software to manage secure communication between the drone and ground control stations or remote operators. Communication systems include advanced encryption to protect command and data transmissions, and they may use data link protocols like TCDL
COMUNICATION BIBLIOGRAPHY
- https://en.wikipedia.org/wiki/High_frequency
- https://en.wikipedia.org/wiki/Military_Satellite_Communications_Directorate
- https://en.wikipedia.org/wiki/Voice_over_IP
- https://en.wikipedia.org/wiki/5G
- https://en.wikipedia.org/wiki/Morse_code
- https://en.wikipedia.org/wiki/Quantum_cryptography
- https://www.ironnet.com/topics/what-is-cyber-defense#:~:text=Cybersecurity%20is%20a%20set%20of,on%20actively%20resisting%20an%20attack.
- https://en.wikipedia.org/wiki/Radome
- https://www.artofmanliness.com/skills/manly-know-how/military-hand-signals/
- ChatGPT
- Coopilot (IA Images)
Virginia Class Submarine
- Advanced and silent propulsion
- Instead of traditional propellers, they use a jet pump propulsion system to reduce noise, improving stealth capability.
- AI for data analysis and navigation
- AI systems improve underwater route planning and execution, especially in extreme conditions or war zones.
- Machine learning algorithms analyze acoustic patterns in real time, distinguishing between natural echoes, allied vessels and hostile threats.
- Unmanned vehicles (UUVs)
- Virginia-class submarines are designed to operate with unmanned underwater vehicles (UUVs), essential for reconnaissance missions, mine mapping and operations in high-risk areas.
implement the following modern technologies
It is used to identify and track objects, people or equipment. This technology uses infrared signals, which are invisible to the human eye but detectable by specialized sensors, allowing its use in situations where discretion and precision are required. In military operations it is widely used to safely and discreetly identify friendly units. Soldiers, vehicles or equipment can be equipped with infrared emitters or tags that IR sensors can detect. This is particularly useful in night operations or in low visibility conditions, helping to avoid “friendly fire” incidents.
Infrared ID
- Executive orders are directives issued by the President that have the force of law. Several recent EOs have focused on cybersecurity.
- Example: EO 14028, issued in May 2021, aims to improve the nation’s cybersecurity by enhancing the security of federal networks, establishing a Cyber Safety Review Board, and promoting information-sharing between the government and the private sector.
ARMY BIBLIOGRAPHY
- ChatGPT
- Wikipedia - https://en.wikipedia.org/wiki/George_Washington
- Military Knowledge Base - https://militaryknowledgebase.com/the-evolution-of-military-technology/
- Military - https://www.military.com/join-armed-forces/us-army-overview.html#:~:text=The%20Second%20Continental%20Congress%20founded%20the%20Army%20in,militia%20force%20into%20the%20world%27s%20premier%20fighting%20force.
- Wikipedia - https://en.wikipedia.org/wiki/History_of_the_United_States_Army
- MilitaryFactory - https://www.militaryfactory.com/smallarms/detail.php?smallarms_id=230
- Army https://www.army.mil/article/259429/army_academia_collaborate_on_exoskeleton_to_reduce_soldier_injuries
- Robots - https://www.thomasnet.com/insights/6-ways-the-military-is-using-robotics/
M4A1
Derived from the M16, has a compact and lightweight design, with a 14.5-inch barrel ideal for operations in urban environments. Automatic and semi-automatic firing configuration, offering greater versatility in combat, incorporates a Picatinny rail for the installation of accessories such as sights, lights and grenade launchers.
M4A1 full auto - Gun test
- Actual gun in NATO
- Bullets 5.56x45mm
- 30 round magazine
7. Cybersecurity and Electronic Warfare Defense
Like all the informatic things the drones are not safe from the cibernetic attacks, its very important that this systems became ready from possible attacks cause if some one with the capacity to hack the drone became inside the software can use to kill innocent people
RANDOME
A radome is often used to prevent ice and freezing rain from accumulating on antennas. In the case of a spinning radar parabolic antenna, the radome also protects the antenna from debris and rotational irregularities due to wind. Its shape is easily identified by its hardshell, which has strong properties against being damaged.
More information about randomes
How is it made?
Structure & Materials
Light and strong materials, such as aluminum alloys and high-strength polymers, which keep the weight of the exoskeleton down the design is modular this allows them to be adapted to different users and needs, facilitating maintenance and component upgrades
Motion Mechanisms
They use electric or hydraulic motors that act as actuators to facilitate movement. They integrate sensors that detect the user's position and movement, allowing the exoskeleton to respond precisely to the soldier's actions.
Control & Software
Equipped with a control system that processes the information from the sensors and coordinates the movement of the actuators. This is done through algorithms that predict and respond to the user's movement. Some models include interfaces that allow soldiers to adjust settings and control the device according to their specific needs.
DOK ING MV3
It is an armored robotic vehicle primarily for demining and explosive ordnance disposal. It enables military and security forces to remotely and safely handle improvised explosive devices (IEDs) and mines in hazardous environments. It has a remote control system that allows it to be operated from a safe distance. Includes specialized mechanical arms that can dig, lift, and remove explosives, as well as other attachments to handle different types of threats. is designed with a level of ballistic protection capable of withstanding explosions and attacks, ensuring that it can operate in high-risk areas.
technological innovations
CVN-78 USS Gerald R. Ford
- A1B Nuclear Reactors
- Dual Band Radar (DBR)
- EMALS (Electromagnetic Aircraft Launching System)
Also there are guns like this one, the XM25, its a grenade launcher that works by proximity detection, the projectile is fired and explodes when it finds a person or a target nearby.
SR-71 Blackbird
he Lockheed SR-71 "Blackbird" is a retired long-range, high-altitude, Mach 3+ strategic reconnaissance aircraft developed and manufactured by the American aerospace company Lockheed Corporation.[N 1] The SR-71 has several nicknames, including "Blackbird" and "Habu".[1] The SR-71 was developed as a black project reconnaissance aircraft during the 1960s by Lockheed's Skunk Works division, initially as a bomber variant of the Lockheed A-12, requested by Curtis LeMay, before the program focused solely on reconnaissance.
More information about this plane
Arquus is a 4x4 armored vehicle, capable of transporting troops, performing medical evacuations, and providing direct and indirect fire support. It has a 400 hp engine, four-wheel drive and a 7-speed automatic transmission, can overcome significant obstacles and is capable of carrying up to ten people in its troop transport version. The MAV'Rx's advanced ballistic protection complies with STANAG 4569 standards, it allows the integration of an active protection system. The technology integrated in its digital cockpit, together with the BattleNet system, optimizes tactical awareness and reduces the crew's cognitive load, improving combat response times. The payload capacity ranging from 2.5 to 4 tons.
MAV'RX
First desing
As you can see this is the first map on a “Dron” in history, it is built on a hot air balloon and hooked to a box with explosive. saddenly for franz freiherr this first desing it didnt work like he want and the ballons fly to different ways causing damage inside her lines
The Submarine That Changed Naval Warfare
was equipped with passive and active sonar systems to detect and track other vessels and submarines. This allowed it to avoid detection and locate targets in case of threat. To ensure accuracy in missile launching, the George Washington had an inertial navigation system (INS), which allowed it to determine its position without relying on external signals. To ensure accuracy in missile launching, the George Washington was equipped with an inertial navigation system (INS), which allowed it to determine its position without relying on external signals.
USS George Washington (SSBN-598) model at the Museum of Science and Industry, Chicago
- The NDAA is an annual U.S. law that outlines the budget, expenditures, and policies for the Department of Defense (DoD). It includes provisions related to cybersecurity to ensure that funding and resources are dedicated to protecting military information and critical infrastructure.
- Recent NDAA updates have focused on modernizing cybersecurity defenses and increasing accountability by requiring more transparency in cybersecurity practices within the military and among defense contractors.
2. GPS Navigation and Positioning
The Global Positioning System (GPS) is a navigation system using satellites, a receiver and algorithms to synchronize location, velocity and time data for air, sea and land travel
Digital Systems and Computers
MILSATCOM Computers and Satellites: The emergence of digital networks for sending data revolutionised communications.Electronic Encryption Equipment: Electronic encryption methods were developed to secure radio and satellite transmissions.Military-Grade Laptop Computers: Although large, these early portable systems allowed coordination of communication strategies and record keeping.
Comunications MILSATCOM
4. Mission Management System (MMS)
AT Mission Management System (AT MMS), Situational Awareness System, is a state-of-the-art Map based mission management and planning system. It improves planning and execution of law enforcement, emergency, rescue and protection missions by enhancing the situational awareness for operators by providing a clear digital map of the mission scene.
USS Zumwalt (DDG-1000)
technological innovations
TSCE Total Ship Computing Environment, allows automated control of all systems on board, reducing the crew required to only 158 people, significantly less than on conventional destroyers.Its “tumblehome” shape and composite structure reduce its radar signature, making it almost undetectable by conventional detection systems.
It includes state-of-the-art radars and integrated sonar systems for underwater threat detection, giving it high warfare capabilities.
Information Warfare
- Information warfare involves manipulating or distorting information to influence public perception, sow discord, and disrupt an adversary's decision-making. The military uses cybersecurity to counter disinformation campaigns aimed at destabilizing morale or misleading the public.
- Cybersecurity measures are vital to protect military communications and prevent adversaries from intercepting or altering sensitive information.
Inside of every boxes are soldier controlling a drone from thousands of miles away Each soldier can control, watch and if is necessary attack a target in concret whatever is her place
NAVY BIBLIOGRAPHY
- ChatGPT
- https://www.history.navy.mil/
- https://nationalinterest.org/blog/buzz/uss-george-washington-us-navys-first-ballistic-missile-submarine-209824
- https://nuclearcompanion.com/data/george-washington-class-ssbn-598-ballistic-missile-submarines/
- https://www.britannica.com/technology/Polaris-missile#ref11966
- https://www.wikipedia.org/
- https://news.usni.org/2024/11/13/naval-reactors-virginia-class-will-extend-to-block-viii-ssnx-start-in-2040s
- https://www.naval-technology.com/features/featurebattle-of-the-submarines-akula-versus-virginia/?utm_source=&utm_medium=15-14603&utm_campaign=
- https://www.globalsecurity.org/military/agency/navy/ssn-774.htm
- https://www.wearethemighty.com/mighty-tactical/inside-the-uss-zumwalt-the-navys-most-advanced-warship/
- https://www.electrichybridmarinetechnology.com/news/power-and-propulsion/us-destroyer-zumwalt-delivered-with-hybrid-power.html
- https://www.rtx.com/raytheon/what-we-do/sea/zumwalt-class-destroyer
- https://news.usni.org/2021/12/23/hii-delivers-final-advanced-weapons-elevator-aboard-uss-gerald-r-ford
It is a technology used to enhance users skills in a controlled and safe environment, allowing the recreation of complex and dangerous situations that would otherwise be costly or risky to perform in real life. It can collect detailed data on user performance. Instructors can review specific aspects and provide personalized feedback. Armies use VR to train soldiers in combat, strategic maneuvers, and terrain reconnaissance. The technology can simulate combat zones, urban environments, and rescue missions.
Virtual Reality
Soldiers using exoskeleton
Working with Soldiers in the 101st Airborne Division, researchers at Vanderbilt designed SABER as a wearable device that is soft, lightweight and form fitting. This unmotorized device can be selectively engaged by the Soldier to assist lifting capabilities.
“We didn’t try to create Iron Man — a complex, full-body, rigid, unrealistic suit. Instead, we started by deeply understanding Soldier needs to develop a lightweight, low-profile, non-powered wearable tool that helps provide much-needed assistance without slowing Soldiers down or interfering with other operational tasks.” - associate professor of mechanical engineering, Vanderbilt University
Cybersecurity as a Defensive and Offensive Tool
- The U.S. military not only defends against cyber threats but also uses offensive cyber operations to disrupt enemy activities. This might include targeting command-and-control systems, intercepting communications, or disabling weapons systems.
- Offensive cybersecurity requires strategic planning to minimize collateral damage, protect civilian systems, and adhere to international laws.
USS Monitor
Although it did not have any computer technology since it was built in 1861, long before the invention of computers and modern electronic systems, it pioneered the use of a 360 degree armored rotating turret, designed by engineer John Ericsson. This turret allowed her two Dahlgren guns to fire in any direction without the need to maneuver the ship.
Cyber Warfare
-In today’s conflicts, cyber warfare has become as crucial as physical combat. Nation-states use cyber attacks to disrupt enemy infrastructure—including military communications, power grids, and supply chains. -Cyber warfare tactics often involve denial-of-service attacks (DoS) to overwhelm and disable targeted networks or malware to infiltrate and corrupt military systems.
What they use the robots for
Transportation to move military equipment, carry soldiers to battlefields and recover wounded soldiers, they can be autonomous or remote controlled. Surveillance, as they are equipped with high sensitivity cameras and infrared vision, essential for monitoring enemy territories, they can be used discreetly. Threat neutralization, they can neutralize explosives or even enemies.
Brown Bess
The U.S. Army had as its main weapon a Brown Bess musket, this musket had two models of manufacture, mainly had the British but there were also the local ones.
How to fire a Brown Bess
- Place a powder cartridge and a bullet (usually lead) in the barrel. Use a loading rod to push the bullet and powder into the bottom of the barrel.
- Align the firing pin so that it is in the firing position, making sure that the hammer is in the proper position to make contact with the firing pin capsule.
- Aim.
- Fire.
How does it work?
Unlike traditional armor, which passively absorbs or deflects the energy of an impact, APS takes a proactive approach. These systems use radar and infrared sensors to detect incoming projectiles, such as anti-tank rockets and missiles. Once the threat is detected, APS quickly calculates its trajectory and intercepts it by launching countermeasures These countermeasures can range from explosive projectiles that destroy the threat in midair to advanced electronic countermeasures that block or deflect the incoming weapon by intercepting threats before they reach the vehicle. APS provides an additional layer of protection that can dramatically increase a vehicle's survivability on the battlefield.
1. Flight Control System (FCS)
FCS stands for Flight Control System, which is an essential component in both manned and unmanned aerial vehicles (UAVs), including drones. The FCS consists of various hardware and software components designed to control and stabilize an aircraft during flight.
Polaris A-1 ballistic missil
first U.S. submarine-launched ballistic missil
was equipped with an inertial navigation system (INS), which allowed it to be guided to its target without relying on external signals. This inertial system, although primitive compared to today's systems, used gyroscopes and accelerometers to calculate the missile's position and correct its trajectory.
missile launch
B-2 Spirit
The Northrop B-2 Spirit, also known as the Stealth Bomber, is an American heavy strategic bomber, featuring low-observable stealth technology designed to penetrate dense anti-aircraft defenses. A subsonic flying wing with a crew of two, the plane was designed by Northrop (later Northrop Grumman) as the prime contractor, with Boeing, Hughes, and Vought as principal subcontractors, and was produced from 1987 to 2000.
More information about this plane
Mobile Communication and VoIP
Secure IP Networks and VoIP (Voice over IP): These began to be used for internal command and control communications in operations centres. Digital Messaging Systems and Real-Time Video Broadcasting: These allowed commanders to see operations unfolding in real time.
Protocol VoIP
M16A4
Part of the M16 family, developed in the 1990s, it has a gas recoil system and a 20-inch barrel, which allows for high accuracy and rate of fire. It is known for its versatility and is used in various configurations, including versions with optical sights.
M16A4 full auto - Gun test
- Used during Irak war.
- Bullets 5.56x45mm
- 30 round magazine
- FISMA is a law passed to regulate information security for federal agencies, including military branches. It establishes a framework for safeguarding government information systems against cyber threats.
- FISMA mandates agencies to develop, document, and implement an information security program, which includes continuous monitoring and regular security audits to ensure compliance with federal standards.
5. Artificial Intelligence (AI) and Machine Learning
Military applications of AI include identifying and neutralizing threats, guiding manned and unmanned aircraft and vehicles, gathering intelligence, and preparing for battle.
Radar Duga
Duga (Russian: Дуга́, lit. 'arc' or 'curve') was an over-the-horizon radar (OTH) system used in the Soviet Union as part of its early-warning radar network for missile defense. It operated from July 1976 to December 1989. Two operational duga radars were deployed, with one near Chernobyl and Liubech in the Ukrainian SSR (present-day Ukraine), and the other in eastern Siberia (present-day Russia).
It was a Soviet radar network designed to detect intercontinental ballistic missile (ICBM) launches from the United States and other distant locations. This system was a crucial part of the Soviet early warning network during the Cold War and was intended to provide the Soviet Union with immediate warning.
More information about this radar