Over reliance on widgets = fail
One need only render the wireless communication system useless.
Wandering the information superhighway, he came upon the last refuge of civilization, PoFo, the only forum on the internet ...
Moderator: PoFo The Lounge Mods
You realize of course that Anonymous has some of the best hackers on the planet in their ranks, and they do this shit for teh lulz.
Yup and anything is possible. Yet if these asswipes can overcome our best active security measures then they all need to be hunted down and killed or hired, forcibly if needed.
Internet Activist group Anonymous have released information about their latest attack today, in which they posted 90,000 e-mail addresses and passwords of Military personnel.
It marks another leak under the #Antisec movement which seems to be quickly gaining a reputation for mass leaks of information. The question is whether these leaks are of benefit to Anonymous’s goal of protecting Internet freedoms and user privacy or if it is simply putting people at risk for no legitimate reason.
The large database of sensitive military data that was named ‘Military Meltdown Monday’ was quickly released to torrents and mirrors alike, making it extremely difficult for governments to remove the information from the web and public view. The 90,000 login details included personnel from SOCOM, Marine Corps, Homeland Security, State Department staff and US CENTCOM which is just a few of the leaks victims.
Anonymous said “Additionally we found some related datas on different servers we got access to after finding credentials in the Booz Allen System. We added anything which could be interesting. And last but not least we found maps and keys for various other treasure chests buried on the islands of government agencies, federal contractors and shady whitehat companies. This material surely will keep our blackhat friends busy for a while”
That is what these hackers do, but they do it to a closed system with set security, not active systems.
Wikipedia wrote:The effect of small e-bombs has proven to be sufficient for certain terrorist or military operations. Examples of such operations include the destruction of certain fragile electronic control systems of the type critical to the operation of many ground vehicles and aircraft.
Over reliance on widgets = fail
One need only render the wireless communication system useless.
Wikipedia wrote:Vacuum tubes are much less susceptible than corresponding solid-state components to the electromagnetic pulse effect of nuclear explosions.This property kept them in use for certain military applications long after more practical and less expensive solid state technology were available for the same applications.
E-Bombs. More specifically a Flux Compression Generator pumped by a conventional explosive. Such a devise would render a great deal of expensive battle field gizmos inoperativeThis system and many, if not the majority of battlefield tech is shielded.
Kflint wrote:This system and many, if not the majority of battlefield tech is shielded.
Carlo Kopp, a defense analyst from Australia wrote:The FCG is a device capable of producing electrical energies of tens of MegaJoules in tens to hundreds of microseconds of time, in a relatively compact package. With peak power levels of the order of TeraWatts to tens of TeraWatts,
Coupling Modes
In assessing how power is coupled into targets, two principal coupling modes are recognised in the literature:
Front Door Coupling occurs typically when power from a electromagnetic weapon is coupled into an antenna associated with radar or communications equipment. The antenna subsystem is designed to couple power in and out of the equipment, and thus provides an efficient path for the power flow from the electromagnetic weapon to enter the equipment and cause damage.
Back Door Coupling occurs when the electromagnetic field from a weapon produces large transient currents (termed spikes, when produced by a low frequency weapon ) or electrical standing waves (when produced by a HPM weapon) on fixed electrical wiring and cables interconnecting equipment, or providing connections to mains power or the telephone network. Equipment connected to exposed cables or wiring will experience either high voltage transient spikes or standing waves which can damage power supplies and communications interfaces if these are not hardened. Moreover, should the transient penetrate into the equipment, damage can be done to other devices inside. This discusses Conventional EMP weapons in particular
Moving on to the next misuse of language that sho[…]
@JohnRawls What if your assumption is wrong??? […]
There is no reason to have a state at all unless w[…]