Time filter

Source Type

İstanbul, Turkey

Bayraktar G.,Turkish Air War College
9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014

The structure and operational domain of intelligence concept has been evolving continuously in parallel to the change in threat perceptions since it became a discipline more than half a century back. The difficulties encountered in defining the Intelligence concept and its operational domain is a significant barrier to the construct of intelligence theory despite the steady transformation. It is observed that effective utilization of outer space and intelligence surveillance reconnaissance (ISR) functions, such as electronic-war capabilities and remote detection, are as important as command control systems and warfare weapons in present day military expeditions, with respect to comparing military operational excellence and power. Moreover, it is also noticed that nations make use of invisible attacks and cyber space as a defense system during pre-war, crisis and low intensity collisions period without employing conventional arms in addition to countries efforts to obtain new capabilities. All these developments brought a new approach to the war area. Indeed, specific intelligence started to dominate the field in comparison to conventional intelligence due to the quick progress in cyber space. Cyber-attacks, which can be classified as an asymmetric warfare, are not only used as a support tool to conventional wars but also considered as an independent war type on its own so that it brings a new dimension to the military operations. It is predicted that attacks in cyber space will be more dangerous than conventional assaults because the usage of information technology spreads out quickly as well. Cyber-attacks that usually target the information systems of the governments' critical departments, are a great threat, especially for the nations that are heavily dependent on the cyber space domain. The importance of cyber-attacks rise daily because the challenge to detect the source of the attack might be initiated through a wide spectrum of profiles ranging from simple individuals to complex organizations. Moreover, these attacks make a great impact despite their low cost. Furthermore, they are initiated through invisible methods where conventional weapons are not even utilized. Hence, the concept of cyber intelligence looms large against this threat. This paper strives to explain that cyber-attacks can be classified as a new type of warfare, because it threatens national securities and happens in cyber space, a domain that does not have any defined borders in international relations. In addition to the above, this study defines cyber intelligence concept and its operational domain as well as puts forth the methodology for consideration in order to gain the advantage in cyber-attacks and to make analysis on the threat. © Copyright The Authors, 2014. All Rights Reserved. Source

Yilmaz B.,Turkish Air War College
Proceedings of SPIE - The International Society for Optical Engineering

Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion. © 2013 SPIE. Source

Gedikli M.,Turkish Air War College
Proceedings of SPIE - The International Society for Optical Engineering

Wars previously being executed at land and sea have also become applicable in air and space due to the advancements of aircraft and satellite systems. Rapid improvements in information technologies have triggered the concept of cyberspace which is considered as the fifth dimension of war. While transferring information quickly from physical area to electronic/digital area, cyberspace has caused to emerge a lot of threats and methods like cyber-attack, cyber-crime, cyber war which are spreading too rapidly. Individuals, institutions and establishments have begun to take their own cyber security precautions to cope with these threats. This study gives information about the concepts and advances on cyberspace in order to raise comprehensive awareness. The study also focuses on the effects of these improvements in the battlefield, and analyzes them. © 2014 SPIE. Source

Ozdemir M.C.,Turkish Air War College
AIAA/IEEE Digital Avionics Systems Conference - Proceedings

There are different opinions about the boundary of the space, the concept of near space as a new term enters into literature. Advances on the near space platforms, to overcome limitations in existing data systems, have the potential to obtain cost-effective systems. As a result of the developments in space technology, because satellite systems have continuous data transfer failure to target regions and the high costs of satellite systems, there are cost-effective near space platforms designed to transmit data continuously to battle field. Unmanned platforms positioned at the near space by means of more operational space systems have been developed on a continuous data transfer, providing more cost-effective information. These systems can stay in the air more than best-known Unmanned Aircraft Systems. Because there is a trend that conventional wars leaving their place to irregular warfare, close to real-time data transfer is crucial in terms of intelligence, reconnaissance and surveillance operations. The effect of near space systems on the concept of operational space usage as literature research; a comparison between near space platforms satellite and UAVs has been done in this paper. © 2013 IEEE. Source

Caliskan G.,Turkish Air War College | Karatas Y.,Turkish Air War College | Newman B.,Old Dominion University
RAST 2013 - Proceedings of 6th International Conference on Recent Advances in Space Technologies

In this study, methodologies and capabilities for mission trajectory design to asteroid 2000 SG344 are investigated. Design of orbital trajectories for interplanetary space flight requires application of principles from orbital mechanics including three dimensional orbital element description, orbit propagation, asteroid ephemerides, targeting logic, relative motion dynamics, and numerical algorithm implementation. The study research attempted to assemble and integrate these various topics to achieve a general capability to conduct asteroid mission trajectory design. Further, appropriate methodology including selection of assumptions and models, computation process and flow, and design metrics and trades to achieve a practical and effective trajectory design process are considered in the study. A specific case study is considered where a family of near Earth asteroids is reviewed, several candidate asteroids are noted for potential exploration, and a final selection of a single asteroid is made, followed by a specific mission trajectory design search and selection to this asteroid, accounting for mission requirements and constraints. The case study focuses on asteroid 2000 SG344. © 2013 IEEE. Source

Discover hidden collaborations