In some discussions, researchers thought of the possibility of creating a radio telescope in a remote area using technology where the radio receivers are installed in the solar panels. The radio telescope looks like a solar panel field. The operators could control that device using radio telemetry.
The Chinese solar panels involved rogue radio transmitters. That can mean that some Chinese devices include an intelligence option or an option that can damage electric networks. Those systems can be the electronic surveillance measurement ESM tools. The solar panels can transmit data from communication cables to the operators.
Those systems can collect data from electromagnetic radiation.
And then. That system resends data to the Chinese command center through satellites. It's possible to equip solar inverters with radars and other types of devices. That means that solar panels can offer electricity to surveillance equipment. The radar station can look like a solar panel farm.
The radar station that uses radars- solar panel combinations can be remote-controlled. Operators can put those remote-controlled radar stations on another state's territory without asking permission. That kind of remote-operating system can be located near air bases and runways. Those systems can collect information about flying vehicles and communication.
There is the possibility that some electric systems include components whose mission is to damage the electric systems. In the simplest versions, those systems load electricity into capacitors. And then the system delivers that electricity into the electric network. The idea is that the system causes the voltage spike or overvoltage in the electric network. That thing can destroy computers and other electronics.
There is the possibility that they collect information that other intelligence systems collect. It's possible that some drones or tablets can start to live their own lives at night time. Those tablets or mobile devices can involve microchips that collect data. Then some drone searches those devices' places and downloads the data that they collected.
Then operators search if something is interesting in stored data. If there are no interesting things those spy chips can be formatted. That releases resources to more interesting targets. If one of the hundreds of those mobile devices is in places like NORAD the entire operation can be successful. In some models. The entire drone fleet can hide in the solar panels. Those systems can make intelligence operations or collect data that some fixed systems collect.
https://interestingengineering.com/energy/rogue-hardware-in-chinese-inverters-could-trigger-blackout-threat
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.