The US continues to hit targets in Iran, but the Islamic republic keeps another weapon practically intact: its cyber attacks

In recent days, tension between the United States and Iran has escalated with direct military actions. Washington has resorted to Tomahawk cruise missiles launched from warships and fighters F-35 to attack Iranian strategic infrastructure. At the moment, there is no evidence that Tehran has managed to respond with military attacks on US territory. Its response, however, has been felt on another front: the attacks against energy facilities in the Gulf, like those of Ras Laffan, in Qatar. In parallel, the conflict is also being fought in a less visible terrain, cyberspace. The information war. The photograph of the conflict begins to be completed when we look beyond the military level. Analysts cited by The Register They argue that Iran is turning more intensively to cyberspace to pressure the United States, an area in which it can operate with less direct exposure. In this context, the attack against Stryker is not interpreted as an isolated episode, but as an indication of a trend. “This is just the beginning,” said retired Gen. Ross Coffman. A case already visible. The most recent example of this dynamic is offered by Stryker, a medical device manufacturer with a global presence. According to Reutersa cyberattack last week altered its internal operations and made it difficult to manage personalized inventory. The company confirmed that it had contained the incident, although the episode shows how this type of action can impact especially sensitive sectors, beyond the strictly technological field. Beyond a specific interruption. Bloomberg notes that the impact on Stryker’s operations had an indirect impact on hospitals and patients, with surgeries that had to be rescheduled due to problems in the supply of specific material. This is a clear example of how the border between digital and physical can quickly blur. The American Stryker specializes in surgical equipment, orthopedic implants and neurotechnology solutions Civilian targets. Along the same lines as the analysts pointed out, the focus is not limited to public organizations. The aforementioned media reports that several voices agree that companies may be more exposed than government agencies, in part due to their unequal defenses. Targeting this type of offensive seeks to generate economic pressure and disruption without the need for a direct confrontation, they explain. A historical case. A clear example is Stuxneta malware discovered in 2010 that managed to infiltrate the Natanz nuclear plant and manipulate its systems until it caused failures in about a thousand centrifuges. The code was designed specifically for that environment, acting stealthily for weeks while altering processes without being detected. Its authorship has never been officially confirmed, although it has been widely attributed to the United States and Israel. When the damage is physical. The Stuxnet case helps to understand a key idea in this type of conflict. As we tell in a video from Xataka Presentahe malware He did not limit himself to infiltrating computer systems, but took control of the industrial controllers that regulated the centrifuges and altered their operation. First accelerating them and then slowing them down, he caused progressive wear until they became unusable. A front that already leaves its mark. The scenario that is drawn is clear. While there is no evidence of a direct Iranian military attack inside the United States, the conflict is already having effects inside the United States through other means. The Stryker case shows how an intrusion can translate into real disruptions in sensitive sectors, with an impact on companies and patients. Images | DC Studio | Stryker In Xataka | Russia is not sending troops or weapons to Iran: it is sending something much more important to take down the US

China studied the secret of falcons to hunt their prey. Now your drones only need 5 seconds against their targets

Throughout history, armies have always observed nature to learn to hunt, defend themselves and coordinate better, from way to attack in group to the selection of the weakest enemy. Today, that old military tradition makes sense again in a radically different context, one marked by algorithmsautonomous machines and a new technological race that is reminiscent of other great military leaps of the past. AI as the axis of combat. In this scenario it appears China, which is systematically promoting the use of artificial intelligence in the military sphere, especially in swarms of drones and autonomous systems capable of operating with little or almost no no human intervention. counted the wall street journal this week that they are in possession of patents, academic papers and procurement documents showing that the People’s Liberation Army sees future warfare as an environment dominated by algorithms, where swarms replace individual platforms and the mass of cheap systems can overwhelm defenses, attack targets and resist electronic warfare. The Ukrainian experience reinforces this vision by demonstrating that drones are already decisive and that autonomy becomes increasingly valuable when human control degrades. Learn about animals. To solve how to coordinate swarms in real time, Chinese researchers are modeling algorithms inspired in animal behavior. For example, in an experiment developed at Beihang University, defensive drones trained as “hawks” They learned to identify and destroy the most vulnerable targets, while attacking drones imitated “pigeons” to avoid threats. In a five-on-five simulation, the defenders They eliminated all the attackers in just 5.3 seconds. Beyond the success of the results, the interest was in the method: adapt hunting, escape and animal cooperation rules to realistic combat scenarios, where drones fly, maneuver and make decisions under pressure. Mass production. The Chinese bet combines these algorithmic advances with a clear industrial advantage: factories capable of producing hundreds of thousands or millions of cheap drones per year. This allows us to think of swarms as a main weapon and not as a complement, something much more difficult for, for example, the United States, which produce fewer drones and at a much higher cost. Systems such as mobile launchers of dozens of drones, mother models capable of releasing swarms in flight or even “robot wolves” Armed forces show a doctrine oriented towards coordinated quantity, not individual technological excellence. Centralized control. The appeal of autonomy also reflects a structural distrust in the capabilities of Chinese middle managers, a recognized problem for years by the political and military leadership itself. The swarms controlled by algorithms They fit better with a centralized command culture, where decisions are designed from the top and executed without improvisation. For Beijing, AI offers a way to compensate for the lack of real combat experience and reduce reliance on human commanders in chaotic situations. One soldier, 200 drones. Added to this line of development is the massive deployment capacity that the People’s Liberation Army has begun to publicly display, with tests in which a single operator is capable of supervising swarms of more than 200 drones released in a very short time. In images and data released According to Chinese state television, the drones, trained through simulations and real flights, are capable of flying in precise formations, dividing reconnaissance, distraction and attack tasks, and changing functions on the fly thanks to autonomous algorithms that allow them “negotiate” among themselves without constant human orders. The implicit message is clear: China is not only investigating how to make swarms more intelligent, but how to put them in the air on a large scale with very few personnel, a force multiplier that reinforces its commitment to coordinated quantity as a central feature of its future doctrine. In the background, Taiwan. Of course, the approach is not without risks: Systems can fail under real conditions, be neutralized by countermeasures or, at the opposite extreme, make lethal decisions that are difficult to explain or control. Even so, the WSJ reported that the documents and analysis suggest that one of the most likely scenarios for the use of those chinese swarms It would be a conflict around Taiwan, where they could be used to saturate air defenses, locate targets and facilitate subsequent attacks. The result is a dangerous race, in which China seems to advance rapidly despite the uncertainties, bringing closer a type of war that until recently seemed pure science fiction. Image | USFWS Mountain-Prairie日本防衛省・統合幕僚監部 In Xataka | China’s new futuristic drone is already flying alongside the J-20 fighters. And Beijing has shown it without saying a word In Xataka | China has just crossed the same red line as Russia: for the first time, a military drone has invaded Taiwan’s airspace

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.