Online:
Visits:
Stories:
Profile image
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

Insurgents in the Middle East Use Special Programs to Read Drone Feeds

Monday, January 11, 2016 18:39
% of readers think this story is Fact. Add your two cents.

(Before It's News)

 
The musket was the assault rifle of the 1770s. The reason why the 2nd amendment was put in the Constitution of the United States was because it was a last resort to protect the freedom of the country from tyranny.
 
The last time I checked, the world’s mightiest armies, including the US, still have not defeated the insurgency in the Middle East with all the hi-tech weapons that they are using. Look at NAZI Germany or the Soviet Union, and you will see there was gun control imposed which led to the impossibility of citizens to defeat a rouge government.
 
Today, insurgents have countermeasures against drones by hacking into the machine feeds and by wearing thermal camouflage ghillie suits to counter the multispectral ranges of surveillance. I have links which show a military drone can be hacked. It has happened in modern times, the insurgency using a laptop as a high-tech weapon to access the feed of a military drone.
 
NOTE: Since encryption will be the only counter to this insurgent countermeasure, the insurgent comes up with a counter to counter the new encryption, and this endless spiral of hacking into military computer systems to take encryption keys for drone feeds will never end.
 

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.