What is that?
It is the exhaust of a test launch of a Russian ICBM missile in acceleration to it's destiny.
Where did it happen?
In close enough proximity of the International Space Station to be noticed.
It was no mistake.
Evidently, Russia will seek to destroy the ISS if the USA engages in significant warfare that can be facilitated by bouncing signals off the station. I am quite confident the Russian strategy in warfare includes knocking every satellite out of the sky to disable any Star Wars capacity the USA has accumulated.
Now, what are we doing parking missiles on Russia borders that will be disabled nearly immediately and quite possibly without a guiding vector will fall to Earth and destroy the very site it was launched from?
It is the exhaust of a test launch of a Russian ICBM missile in acceleration to it's destiny.
Where did it happen?
In close enough proximity of the International Space Station to be noticed.
It was no mistake.
Evidently, Russia will seek to destroy the ISS if the USA engages in significant warfare that can be facilitated by bouncing signals off the station. I am quite confident the Russian strategy in warfare includes knocking every satellite out of the sky to disable any Star Wars capacity the USA has accumulated.
Now, what are we doing parking missiles on Russia borders that will be disabled nearly immediately and quite possibly without a guiding vector will fall to Earth and destroy the very site it was launched from?
.."A missile launch seen from space: (click here) an unexpected surprise!" Parmitano wrote in a post on Oct. 11. One of the Italian astronaut's photos shows a curving contrail left in the missile's wake and another features a wispy cloud formed in space after the missile disintegrated.
Russia's Strategic Rocket Forces launched the missile, according to a blog post on RussianForces.org. The Topol/SS-25 missile launched from Kapustin Yar to the Sary Shagan test site in Kazakhstan.
"According to a representative of the Rocket Forces, the test was used to confirm characteristics of the Topol missile, to test the systems of the Sary Shagan test site, and 'to test new combat payload for intercontinental ballistic missiles,'" RussianForces.org wrote on Oct. 10.
Russia also conducted a similar test from Kapustin Yar to Sary Shagan in June 2012, RussiaForces.org said....
The USA Star Wars' capacity is basically mute. Billions and trillions of USA dollars spent on more military hardware and software has been proven to be antiquated and worthless.
The picture above right is the missile moving away from the ISS in the Thermosphere, about 220 miles above Earth, toward it's target. The awkward pattern is simply the telemetry straightening the trajectory (hence the increased acceleration and unique puff of smoke) and the diffusion of the vapor into the larger air mass of Earth.
And where was the nation's media? Playing with ratings and readership, that's where.
And in related news...think USA Navy capacity. What was that message about launching the submarine nukes? THERE will never be enough cybersecurity that is trustworthy.
October 16, 2013
By Edward Kovacs
...For instance, (click here) the position, course, cargo, country of origin, speed name and Mobile Maritime Service Identity (MMSI) status of a ship can be changed. An attacker can also create fake vessels – for instance place an Iranian vessel packed with nuclear cargo on the US coastline.
Cybercriminals can leverage the vulnerabilities to create and modify buoys and lighthouses. They can also create and modify search and rescue aircraft.
In addition to the vulnerabilities in the systems of the service providers, the researchers have also uncovered security holes in the AIS protocol itself.
These flaws can be exploited to disable AIS on a vessel. In a plausible real-life scenario described by the experts, Somalian pirates can make a ship that enters their sea space disappear from AIS, but they can still be able to track it.
The AIS protocol vulnerabilities can also be leveraged to fake a “man in the water” distress signal, fake a “closest point of approach” alert and trigger a collision alert, send false weather information to a ship, and launch a flood attack by sending AIS traffic much more frequently than is normal....
Russia also conducted a similar test from Kapustin Yar to Sary Shagan in June 2012, RussiaForces.org said....
The USA Star Wars' capacity is basically mute. Billions and trillions of USA dollars spent on more military hardware and software has been proven to be antiquated and worthless.
The picture above right is the missile moving away from the ISS in the Thermosphere, about 220 miles above Earth, toward it's target. The awkward pattern is simply the telemetry straightening the trajectory (hence the increased acceleration and unique puff of smoke) and the diffusion of the vapor into the larger air mass of Earth.
And where was the nation's media? Playing with ratings and readership, that's where.
And in related news...think USA Navy capacity. What was that message about launching the submarine nukes? THERE will never be enough cybersecurity that is trustworthy.
October 16, 2013
By Edward Kovacs
...For instance, (click here) the position, course, cargo, country of origin, speed name and Mobile Maritime Service Identity (MMSI) status of a ship can be changed. An attacker can also create fake vessels – for instance place an Iranian vessel packed with nuclear cargo on the US coastline.
Cybercriminals can leverage the vulnerabilities to create and modify buoys and lighthouses. They can also create and modify search and rescue aircraft.
In addition to the vulnerabilities in the systems of the service providers, the researchers have also uncovered security holes in the AIS protocol itself.
These flaws can be exploited to disable AIS on a vessel. In a plausible real-life scenario described by the experts, Somalian pirates can make a ship that enters their sea space disappear from AIS, but they can still be able to track it.
The AIS protocol vulnerabilities can also be leveraged to fake a “man in the water” distress signal, fake a “closest point of approach” alert and trigger a collision alert, send false weather information to a ship, and launch a flood attack by sending AIS traffic much more frequently than is normal....