|
#1
|
||||
|
||||
Battlefield Management Systems
I was musing on BMSs when I was doing French Wheeled APCs last night, and I thought, "This could be a real security risk if a vehicle is captured or not damaged enough to knock out the system, but kill the crew." I haven't been able to find out if a BMS can be erased remotely like a SINGCARS radio can, but even if it can, there could still be an opening there between the discovery that a unit has been knocked out but the BMS is still operating and the erasure of the BMS. Any opinions?
For an example BMS: http://www.baesystems.com/ProductsSe...nsyte_bms.html More and more vehicles are being equipped with this type of system these days.
__________________
I'm guided by the beauty of our weapons...First We Take Manhattan, Jennifer Warnes Entirely too much T2K stuff here: www.pmulcahy.com |
#2
|
|||
|
|||
I'm afraid i predate the widespread issue of BMS, but i was around for some of the early development and there was both a "zero" button to wipe critical info as well as a means to remote zero. The remote zero was the source of a lot of problems but the risk of a working BMS being accessed by the enemy would, no doubt, have led to the problems being fixed.
|
#3
|
||||
|
||||
When I was going through training on some the more specialized radio equipment, I was told not to remove the purple key as it emergency zero device and made radio useless
__________________
I will not hide. I will not be deterred nor will I be intimidated from my performing my duty, I am a Canadian Soldier. |
#4
|
||||
|
||||
That's what I figured, it would be something like remotely disabling a SINCGARS radio; I just wasn't sure.
__________________
I'm guided by the beauty of our weapons...First We Take Manhattan, Jennifer Warnes Entirely too much T2K stuff here: www.pmulcahy.com |
#5
|
|||
|
|||
Quote:
Good thing 2.......
__________________
"There is only one tactical principal which is not subject to change. It is to use the means at hand to inflict the maximum amount of wounds, death and destruction on the enemy in the minimum amount of time." --General George S. Patton, Jr. |
#6
|
|||
|
|||
It's a risk, but could potentially be an opportunity as well. What if you could identify a compromised system/computer and start feeding it bad information? The new owner would be torn between wanting to use the intel provided and the risk that it was setting him up for ambushes, artillery/CAS kill zones, etc.
|
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
Thread Tools | Search this Thread |
Display Modes | |
|
|