Skip to main content

The problematic relationship between western and Arab nations


Kimmo Huosionmaa

The relationship between western and Arab nations are of course a very interesting thing, what has been in the main role in many books. The bad relationship between western- and Islamic people are from 13th. century, when the pope ordered the Christian people to conquer back the Holy Land and after that, the conflict has been ideological, and this makes it a very complicated thing. The thing, why the western world would not cut the diplomatic relationships and support for Arab nations is, that somebody else would fill that empty thing.

And this "somebody else" is, of course, Russia, but also China is interesting about relationships and weapon selling to those nations, what have very rich oil refineries, and also they have an excellent position in the middle of the air routes in the World, what makes them very attractive place for nuclear weapons, what can used to strike against southern Russia. But the thing, what makes those nations very complicated thing is not actually the location as military bases. This is, of course, more reasons, what makes those nations very influential actors in the global political field.

The great natural resources have taken billions of dollars to the cash of those nations and their leaders. The families, what rules those wealthy states have also very much money, what they can invest in the west. This means that those people should not irritate forever, or they took their billions in some other country. The big money is the reason, why people don't talk about things like bombardments in Yemen, and because the leader of the bombarding countries is Saudi-Arabia, there would not find a western nation, what can be prosecuted by those things, what seems like war crimes.

But again and again, we must understand that even the worst crimes in the war can leave without punishment. The used weapons have been so-called "smart bombs", what are guided by satellite to the target. And the question in the hypothetical court-martial would be that did the pilot know, that the weapon was targeted to the civilian targets.

If the target information sent from some agents on the ground, would the reason for deadly strikes, that they would not know how to use their location devices. In the worst cases, they might have normal GSM-telephones in use, and they might use the telephones GPS, and then send this target data by using text messages, and then the operators would target the bombs by using those messages, the western devices works that they would automatically send that information for bomb operators.

But the thing, what makes this thing quite difficult is that if the GPS is jammed, that makes specifying the location difficult. And in those cases, the GPS-bomb is something else than a precision-guided weapon. The target locators, what is made by using military undercover operations are looking like mobile telephones. The system inside the locator would use the position identifier of the device to get the precise location of the target.

The system uses two pictures, what are taken in the different locations of the target. When the operator targets the system to the target it would take the line to the targeted place, and if the operator works alone must this person move to another point, and take another photo of the target. The system calculates the location of the target by using triangulation lines from those places and the weapon can target to it.

If the team has two devices the targeting happen in seconds by using two persons, that are in different locations. This thing works like old fashion triangular targeter for artillery, but the system is complicated. The locator can use in the normal mobile telephones, and it can have the stealth mode, what makes it thing, what can carry on the streets. The software-based version can use GPS signal also for communication.

But the thing is that they are normal mobile telephones, what can be used in normal communication, and when the secret code would be given, it would work as the military locator. The support team, what aims the bombs would also get images, that the targeting has been happening in the legal targets, but also the text messages can be used to send the target information.

The question is, "is the bomb targeted to its target in purpose or accidentally." And this is the thing, what brings convictions to the operators, and the pilot if this person knows that the target is civilian. But in the civil war, there could be persons with assault rifles and in Arabia, there are many assault rifles even in the neutral hands. And if the targeter would accidentally think that the targeted group is some fighters, they can explain the bombardment by using this argument. Or simply claim, that the person who targeted that weapon have died in combat and nobody can ask questions from the dead person.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that