Skip to main content

Importance of cyber warfare.

https://avoimenkoodinmaailma.blogspot.com/

Kimmo Huosionmaa

Cyber warfare and the importance of it are now understood in the western military.  The best way to make lethal damage to the computer system is to use the logical bomb. In this case, the computer virus would be activated in the middle of the combat situation, what would decrease the ability to use the weapons. Another version of this operation is to change some codes inside the fire control system and delete the electronic codes of the master keys. And in this case, the computer would not recognize those keys. That means that the key would not activate the fire control computers, and that will be the very bad thing for the warship, what is under attack.


The question about cyber security is vital for military forces around the world, and in the worst scenario some person would paralyze a multi-million dollar warship by using a mobile telephone, and in the real world, that kind of threats would cause problems even for the security of the nuclear weapons.  The safety systems of those weapons are very good, and that means that hackers would not launch the missiles. But damages about this kind of attack might be very big, and in the critical time, that would cause the bad situation.


In this scenario, the person, who wants to sabotage the nuclear weapons of some state, would cause terrible damages for missile systems and decrease the strike capacity in the critical time. In this case, that person would use the nuclear weapons security systems against itself. That means that that operator would try to launch missiles without permission and orders, what means that those rockets would probably start. The safety system would deny those launches, but the rockets are unable to use. And if that would happen in critical time, would this cause threat to national security.


This would happen by using hacker techniques, where the hacker would just change the codes inside the nuclear weapon control computers. If the hacker could slip into the system, that person would able to change the launching code, or delete some code keys, and that would cause the situation, where the system would detect the launching as the unauthorized operation, and then the safety system would destroy those rockets. The warheads would not explode, and the missiles would not fly anywhere, but when this happens in the critical situation, would it cause the terrible situation in military forces.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that