Skip to main content

Importance of cyber warfare.

https://avoimenkoodinmaailma.blogspot.com/

Kimmo Huosionmaa

Cyber warfare and the importance of it are now understood in the western military.  The best way to make lethal damage to the computer system is to use the logical bomb. In this case, the computer virus would be activated in the middle of the combat situation, what would decrease the ability to use the weapons. Another version of this operation is to change some codes inside the fire control system and delete the electronic codes of the master keys. And in this case, the computer would not recognize those keys. That means that the key would not activate the fire control computers, and that will be the very bad thing for the warship, what is under attack.


The question about cyber security is vital for military forces around the world, and in the worst scenario some person would paralyze a multi-million dollar warship by using a mobile telephone, and in the real world, that kind of threats would cause problems even for the security of the nuclear weapons.  The safety systems of those weapons are very good, and that means that hackers would not launch the missiles. But damages about this kind of attack might be very big, and in the critical time, that would cause the bad situation.


In this scenario, the person, who wants to sabotage the nuclear weapons of some state, would cause terrible damages for missile systems and decrease the strike capacity in the critical time. In this case, that person would use the nuclear weapons security systems against itself. That means that that operator would try to launch missiles without permission and orders, what means that those rockets would probably start. The safety system would deny those launches, but the rockets are unable to use. And if that would happen in critical time, would this cause threat to national security.


This would happen by using hacker techniques, where the hacker would just change the codes inside the nuclear weapon control computers. If the hacker could slip into the system, that person would able to change the launching code, or delete some code keys, and that would cause the situation, where the system would detect the launching as the unauthorized operation, and then the safety system would destroy those rockets. The warheads would not explode, and the missiles would not fly anywhere, but when this happens in the critical situation, would it cause the terrible situation in military forces.

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....