It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
You asked about the North Polar ice pack. I never said the environment wasn't a problem. Doesn't water expand when it freezes? If the polar ice cap melted, wouldn't sea level go down? I don't know if there's enough ice for this to make a difference and I'm not an expert on global warming.
I believe the explanation for the "great flood" stories originate with the changes that occurred near the Mediterranean at the end of the last ice age. Even on this worldline, there is a great deal of evidence to support the fact that sea levels did change radically in isolated areas worldwide. I also heard someplace that if the ice mass on Antarctica melted today, sea level worldwide would rise about 100 feet. I'm not exactly sure that's true but still. Mt. Everest might be a bit of a stretch.
originally posted by: drevill
a reply to: Korg Trinity
And this is from a guy that asked if an android app was the cause for recent air disasters.
And that some MPs are related to those in the past, ooh spooky that family members have the same interests.
Critical thinking of ats base eh?
This presentation will be a practical demonstration on how to remotely attack and take full control of an aircraft, exposing some of the results of my three years research on the aviation security field.
The attack performed will follow the classical methodology, divided in discovery, information gathering, exploitation and post-exploitation phases. The complete attack will be accomplished remotely, without needing physical access to the target aircraft at any time, and a testing laboratory will be used to attack virtual airplanes systems.
ADS-B and ACARS protocols will be used during the discovery and information gather phases, but none of those protocols are the objective of this research, I will just use them to plot and analyze the potential targets. Very basic information on such protocols will be displayed as well as additional references for further reading. The real target of the attacks will be some on-board systems, complex enough to be vulnerable to (almost) common vulnerability research and exploitation techniques. Different post-exploitation vectors will finally be considered in order to gain better aircraft control.
The site Help Net Security describes the process in bland, chilling detail:
“The attacker can click on any active airplane and it receives its identification, current location and final destination. In case a nearby airplane system is exploitable (a number of vulnerability vectors mentioned, not much details provided), the application alerts the user via an in-application alert or a push message. The payload can be uploaded with a tap of a button and from that point on, the flight management system is remotely controlled by an attacker.”
originally posted by: biggilo
If a nuclear strike was launched on all american cities and the EU and Russia there would be no world left. End of!. Are there really idiots out there who think there would be survivors?