482

Over the past two weeks, there have been at least two cases of application of the Russians weapons for the allied forces.

And once suffered a missile attack on a target that was as much as 30 km from a given area, and the second time the blow fell exactly on the location of the command of the Kurdish groups that carried out the coverage of besieged Aleppo from the North, cutting it off from communication with Turkey. Moreover, in the second case, killed not just soldiers of the allies. and leadership the whole group. This suggests the reflection that the management of Russian arms was intercepted. We have suggested that it could be electronic warfare equipment of Turkish armed forces, in particular — the newest complex "coral".In the absence of precise description of a system, assumptions were quite cautious, but the result said that twice just and effective to impress their can't be a coincidence. Today, we got another candidate for intervention in this operation.

Today there was quite a lengthy statement by the Deputy head of the Pentagon Ashton Carter, where he confirmed the use by the U.S. army of cyber weapons in the Syrian war, in particular against ISIL. He noted that the command units for cyber war was given the task to make chaos in communication networks of the enemy. This is achieved in several ways known to the hackers, such as DDOS attacks or infecting the servers with a virus that instantly multiply, absorbing all machine and network resources. However, this simple means, against which there has been regular and the threats known.Much more advanced is the method to substitute data or replanting of false information.

Specialists from Fort Meade has developed, implemented and successfully use the latest, sophisticated methods of cyber warfare that now make a chaos or cut off communication around Raqqa and Mosul, which are the centers of the ISIS gangs. Moreover, some of the methods are so innovative that even after the goal, the opponent may never understand what happened and why happened unpleasant event. Judging by the fact that Carter openly confirms full control of mobile communications in the region, other methods are used, which should not be divulged.

One of the theorists who contributed cyberarmies researcher at Columbia University Jason Healey gently clarifies that the famous virus Stuxne is child's play compared to those designs that are now used. In addition, cyberforces conduct their transactions, synchronizing with other branches of the armed forces in real time. That is, in the interests of this or that operation, cyberforces computers cause the enemy to do what you need to perform surgery on the spot.

It is clear that were told exactly what to say. But in light of this, it becomes more clear how could missiles be aimed at, not the target, but for a completely different target and accurately hit it. There is a large probability that it was a Hello from the city of Laurel, Maryland, USA.

Source: http://defence-line.org/

465«СЛАВА УКРАЇНІ»МБФ 465«GLORY TO UKRAINE»ICF 465«GLOIRE À L'UKRAINE»FIB 465«СЛАВА УКРАИНЕ»МБФ465


banner flesh mob 5-4 ukr 2