Indian Special Forces

I thought that 150 troops coy thing will just turn the whole thread upside down but I guess Sabko Aadat Hi Hogayi Aisi Bakwaas Ki Leadership se 😅
We already knew about it when news came that all airborne battalions will be converted to sf
It was all over the forum
Ig that's why there is less reaction
 
Dekko AFSOD is deployed here, they have their own AO. I am only aware of army component's presence and their citations don't mention AFSOD but the original unit they belong to.
I am asking you on behalf of the ex airborne, now SF convertee units:

"Kya AFSOD meh jane ne extra allowance milta hai saar?"

Better PPE + mandate ki asha toh hai nhi paisa hi sahi 🤣
 
Tum log bohot hopeful ho by god.

15 years since Amphibious brigade formed…their equipment??…Joke!!

SG seen in kashmir…their equipment??..standard para type nothing cutting edge!

Now you guys think Afsod will be equippped or do ops like Delta?

Cmon man…where are their trainers from..which para did they go from coz all para units have lousy training standards.

All the skill if it is there in afsod has to show somewhere

Or if its not exceptional and another unit in kashmir then whats the reason to jump?
 



Vortex Eleanor





View: https://youtu.be/Ee8LvSwDSEY?si=8LPIje8eZ440LRmG
 
Last edited:
Our SFs need to be very very careful about what they procure.



View: https://x.com/aadilbrar/status/1886585557247283385?s=46



Hmmm, I am extremely sceptical about this news. I have an technical background and I have worked with drones.

This seems like an hitjob news on our desi drones, inserting relevant keywords (chinese, hacking) to spread panic and fear. I think some dumbo journalist is intentionally / unintentionally spreading misinformation and panic by classifying jamming with hacking.

If you envision that hacking a drone with Chinese tx/rx compoments will be as easy as starting up a laptop and typing some really scary commands really fast on a back-green screen, that's not how hacking works.
 
Hmmm, I am extremely sceptical about this news. I have an technical background and I have worked with drones.

This seems like an hitjob news on our desi drones, inserting relevant keywords (chinese, hacking) to spread panic and fear. I think some dumbo journalist is intentionally / unintentionally spreading misinformation and panic by classifying jamming with hacking.

If you envision that hacking a drone with Chinese tx/rx compoments will be as easy as starting up a laptop and typing some really scary commands really fast on a back-green screen, that's not how hacking works.
Hijacking has been done previously of much more complex drones

If your tx/rx are compromised anything can happen. Remember bsnl huawei routers more than half decade back? Even secure corp laptops used to get injected with malware. Hijacking in military is not some nerd typing commands away on shell to glory - there are professional build solutions. And chinese have developed aplenty for drones spiked with their tx/rx components. Remember all those reserved space you read about in the tcp/ip etc packets in your Networking classes - that's where magic happens for some of the scenarios employed by US.
 
Hijacking has been done previously of much more complex drones

If your tx/rx are compromised anything can happen. Remember bsnl huawei routers more than half decade back? Even secure corp laptops used to get injected with malware. Hijacking in military is not some nerd typing commands away on shell to glory - there are professional build solutions.

Read the article yourself.

What they did -
  1. First they cut off communications links (Basically jammed the comm. using high-powered jammers).

  2. Then reconfigured the drone’s GPS coordinates to make it land at what the drone thought was its actual home base – but instead was in Iran. (Basically GPS jamming + spoofing the GPS signals to seem like the home base was Iran).
Something similar must have happened here as well. Again, I will maintain this is NOT hacking but jamming, and leveraging drone's RTB behaviour for its advantage.

From IdeaForge SWITCH's brouchure -

Screenshot 2025-02-06 at 3.48.22 PM.webp

So basically if comm. failure happens it will automatically try to return to base. But how it will figure out where is the base ? Using GPS coordinates, which, again can be spoofed just as mentioned above.

Nothing to do with Chinese components.

And chinese have developed aplenty for drones spiked with their tx/rx components. Remember all those reserved space you read about in the tcp/ip etc packets in your Networking classes - that's where magic happens for some of the scenarios employed by US.

Drone Tx/Rx comm. don't use TCP/IP protocol just an FYI. Also this -

Screenshot 2025-02-06 at 3.51.09 PM.webp

What the para and the underlined red means, is that regardless of whatever Tx/Rx backdoors Chinese can create, the original comm. & commands are securely encrypted and cannot be intercepted or spoofed.

Its like, lets say you are sending a postcard to your friend, and your mailman is Chinese. So you write the postcard in your own secret code which only you and your friend know. So no matter how hard the postman tries to read or decipher it, he can't.
 

Latest Replies

Featured Content

Trending Threads

Back
Top