Military Review

Sputnik: Pentagon's secret operations can be easily tracked on a smartphone

27
Even the most secret operations of the Pentagon can be traced using Internet services for monitoring airspace, reports Ридус with reference to the portal Sputnik.




antiterrorist operation. “25 August service Flightradar24 recorded in the region the flight of a tactical transport aircraft C-146A (tail number N385EF), owned by one of the special forces of the US Air Force. The path of the aircraft, which used the designation Magma 30, could be traced from Tunisia to the border with Algeria, ”the portal writes.

The next day, the service spotted the Beechcraft B300 Super King Air, which “took off from Pantelleria and headed for Tunisia, where he took part in an operation to search for the militants who had organized the terrorist attack at the National Bardo Museum in March 2015 of the year,” says Sputnik.

It is noted that “Beechcraft B300 Super King Air is, in fact, a civilian version of the MS-12W aircraft, designed for reconnaissance missions. Therefore, it was he who participated in the operation. ”

As a result, users of the service came to the conclusion: “the C-146A aircraft most likely landed a group of special forces in Tunisia, and the MC-12W provided the military with technological support the next day”.

According to Flightradar24, Super King has been hovering over Tunisia so far. But information about flights C-146A in the database is missing. "Probably, data on its routes were deleted at the request of the United States government, which is common practice in such situations," the newspaper notes.

Terrorists can track the airspace. Such services "allow any militant to monitor the movement of military aircraft from any" rat hole in the desert, "Sputnik writes. And this does not require high-tech equipment - just a regular smartphone for 25 dollars.

It is easy for pilots to avoid such surveillance: you just have to turn off the transponder, but they often neglect this opportunity.

Sputnik: Pentagon's secret operations can be easily tracked on a smartphone
Photos used:
Flickr / The US Army
27 comments
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. The comment was deleted.
  2. Mountain shooter
    Mountain shooter 7 September 2015 14: 00 New
    +17
    The Strugatsky have such a story, "Predatory Things of the Century." About how simple and familiar things and services can be turned into weapons and drugs. So a simple affordable internet chip turns into a powerful intelligence tool.
    1. Geisenberg
      Geisenberg 7 September 2015 16: 12 New
      +2
      Quote: Mountain Shooter
      The Strugatsky have such a story, "Predatory Things of the Century." About how simple and familiar things and services can be turned into weapons and drugs. So a simple affordable internet chip turns into a powerful intelligence tool.


      For which many human thanks to her.
      1. APASUS
        APASUS 7 September 2015 19: 04 New
        0
        Quote: Geisenberg
        For which many human thanks to her.

        So this is not thanks to her, but to super pilots neglecting their duties. It’s worth once again thinking how elementary things can be used for the good and against humanity. All these programs for hacking computers, cars, planes, it seems, will be fighting soon without getting up off the couch
    2. clidon
      clidon 7 September 2015 22: 34 New
      0
      Or an element of misinformation.
    3. Vorobey-1
      Vorobey-1 7 September 2015 22: 38 New
      0
      Quote: Mountain Shooter
      The Strugatsky have such a story, "Predatory Things of the Century." About how simple and familiar things and services can be turned into weapons and drugs. So a simple affordable internet chip turns into a powerful intelligence tool.


      Various maps (google, Yandex ...) also apply to this, I recently examined the base in Hawaii, everything is visible to the smallest detail.
      1. Freelancer7
        Freelancer7 7 September 2015 22: 47 New
        0
        This is a double-edged sword. The same Google services, Yandex, skype, face, and flytrad24 can track connections and find out exactly who is interested in the flights of these aircraft. And it is especially pale if this is a guy sitting supposedly in hell knows what hole in the desert and is watching flights from a mobile phone. Its location is easily traced and is easily superimposed on the map as a potential target. Those. scammed terrorists will give themselves away.
    4. Alexkorzun
      Alexkorzun 8 September 2015 05: 06 New
      +1
      An article is a hidden advertising application. The application itself is full g .... Similar ones work better and there are much more options in the free version.
      I regret that VO becomes an advertising agent.
  3. beer-youk
    beer-youk 7 September 2015 14: 01 New
    +11
    The reckless admiration of the Chtatites for electronics will ultimately lead to the Zugunder.
    1. sub307
      sub307 7 September 2015 15: 14 New
      +1
      "... will bring to the zugunderder", if it drives the "Chtatovites", then this is most likely good.
    2. The comment was deleted.
    3. KazaK Bo
      KazaK Bo 7 September 2015 16: 01 New
      +2
      beer-youk
      The reckless adoration of the Chtatovites before the electronics ....

      I feel with all the fibers of my soul ... that at such a pace of development of electronics, we will soon move on to FLAG SEMAPHORS ... MAILING DOVES ... NARROW LETTER OF KAPU From about. EASTERS
  4. kil 31
    kil 31 7 September 2015 14: 03 New
    +8
    This has long been known. There is a proverb a two-edged sword. If there is a hole to peep into a female bath from a man’s, then from a female one can peek into a man’s bath from the same hole.
  5. RUSIVAN
    RUSIVAN 7 September 2015 14: 06 New
    +5
    Sputnik: Pentagon secret operations can be easily tracked on a smartphone.
    And all the latest and most secret Pentagon documents can be read on Google ... laughing
    1. your1970
      your1970 7 September 2015 23: 17 New
      0
      thanks to Snowden and Wikileaks
  6. atamankko
    atamankko 7 September 2015 14: 06 New
    0
    All secret becomes clear.
  7. roskot
    roskot 7 September 2015 14: 10 New
    0
    Such services "allow any militant to observe the movement of military aircraft from any" rat hole in the desert ",

    We train fighting gophers and send on a mission. They like to watch the world at their holes.
  8. 79807420129
    79807420129 7 September 2015 14: 10 New
    +12
    Well, it’s not without reason that at one time the Medvedev had an iPhone. I hope the FSB and the GRU are not asleep.
    1. KazaK Bo
      KazaK Bo 7 September 2015 15: 56 New
      +2
      79807420129
      Well, it’s not without reason that at one time the Medvedev had an iPhone. I hope the FSB and the GRU are not asleep.

      If the one that was presented to him in California, he immediately gave it to his son Ilya ... for free ... In all seriousness. The Americans then resented ...
      For reference (about modesty and decency) - all gifts over 50 dollars that are given to state officials ... must be handed over to the special fund of the state (you can redeem them to this government person, but at the market price) ... and that iPhone cost almost 500 bucks. ...
      1. vovanpain
        vovanpain 7 September 2015 16: 30 New
        +8
        But is it not in vain that the Americans were indignant?
  9. Tation
    Tation 7 September 2015 14: 11 New
    +1
    Yes, they do not hide, whom are they afraid of? On the contrary, it is more profitable for them when there is more boiling water!
  10. veksha50
    veksha50 7 September 2015 14: 12 New
    +1
    “It’s easy for pilots to avoid such surveillance: you just need to turn off the transponder, but often they neglect this opportunity” ...

    Well, who wants to be shot down for a dog’s scent ...
    1. rotmistr60
      rotmistr60 7 September 2015 14: 22 New
      +2
      No, it's just an inveterate American habit of impunity. By the way, do not confuse the transponder with a friend or foe.
      1. veksha50
        veksha50 7 September 2015 14: 33 New
        +2
        Quote: rotmistr60
        By the way, do not confuse the transponder with a friend or foe.



        “Friend or foe” - this is for its air defense and air force systems, on its territory ... And if it flies over someone else’s territory (with its secret mission), and without the transponder turned on, the consequences can be different, to the most negative ...
  11. Barakuda
    Barakuda 7 September 2015 14: 12 New
    +4
    Cords Serge from there, SATELLITE smile And a fan of the “Zenith”. Smile PEOPLE ..
    1. Oberon812
      Oberon812 7 September 2015 14: 18 New
      +1
      What a subtle metaphor is to compare this "artist" with the dirt on the razor blade that bears the name of the hero city. Bravo.

      PS "from there."
      PPS, already fixed
  12. Rostislav
    Rostislav 7 September 2015 15: 08 New
    0
    So a simple affordable internet chip turns into a powerful intelligence tool.

    An Internet chip turns stupidity into an intelligence tool. The same fool pilot who did not turn off the transponder.
    Now for the front line at night on an armored personnel carrier with the headlights on and the music from the radio walked up.
  13. Corsair0304
    Corsair0304 7 September 2015 16: 09 New
    0
    I think that truly dark operations are carried out with all care. And the fact that the Beechcraft B300 Super King Air and others like it are flying around somewhere and tracking someone is nothing secret. A routine, regular scheduled flight.
    And Flightradar24 is really a cool thing.
  14. Evilcat
    Evilcat 7 September 2015 19: 30 New
    0
    Quote: Mountain Shooter
    The Strugatsky have such a story, "Predatory Things of the Century." About how simple and familiar things and services can be turned into weapons and drugs. So a simple affordable internet chip turns into a powerful intelligence tool.
    A school chemistry course is enough to turn household chemicals into weapons. And if you also read the Great Soviet Encyclopedia, then in general you can become a superterrorist.