Fast Domain

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 16 May 2006

EMP Attacks - Electronic Domination in Reverse

Posted on 05:21 by Unknown
Yesterday, I came across to an updated(April 14, 2006) CRS report - High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments, a topic I covered in a previous post related to asymmetric warfare.Basically, it outlines critical issues such as, what is the U.S(or pretty much any other country thinking asymmetric warfare) doing to ensure critical civil
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Still worry about your search history and BigBrother?
    The Patriot Search, recently started "helping" any government by making your search activity "public". Its search syntax...

Blog Archive

  • ▼  2006 (205)
    • ►  August (22)
    • ►  July (28)
    • ►  June (28)
    • ▼  May (33)
      • Healthy Paranoia
      • The Global Security Challenge - Bring Your Know-How
      • Covert Competitive Intelligence
      • Microsoft in the Information Security Market
      • No Anti Virus Software, No E-banking For You
      • Who's Who in Cyber Warfare?
      • Delaying Yesterday's "0day" Security Vulnerability
      • Forgotten Security
      • Aha, a Backdoor!
      • Travel Without Moving - Korean Demilitarized Zone
      • Bedtime Reading - The Baby Business
      • The Current, Emerging, and Future State of Hacktivism
      • Arabic Extremist Group Forum Messages' Characteris...
      • Espionage Ghosts Busters
      • Nation Wide Google Hacking Initiative
      • Travel Without Moving - Cheyenne Mountain Operatio...
      • Techno Imperialism and the Effect of Cyberterrorism
      • Insider Competition in the Defense Industry
      • EMP Attacks - Electronic Domination in Reverse
      • Valuing Security and Prioritizing Your Expenditures
      • Terrorist Social Network Analysis
      • Travel Without Moving - Scratching the Floor
      • Pocket Anonymity
      • Is Bin Laden Lacking a Point?
      • Pass the Scissors
      • Snooping on Historical Click Streams
      • Wiretapping VoIP Order Questioned
      • The Cell-phone Industry and Privacy Advocates VS C...
      • Shaping the Market for Security Vulnerabilities Th...
      • The Current State of Web Application Worms
      • Travel Without Moving - Typhoon Class Submarines
      • Biased Privacy Violation
      • April's Security Streams
    • ►  April (20)
    • ►  March (19)
    • ►  February (23)
    • ►  January (32)
  • ►  2005 (4)
    • ►  December (4)
Powered by Blogger.

About Me

Unknown
View my complete profile