About this ebook
In the modern era, the battlefield has evolved beyond the physical realm into a domain defined by data, circuits, and the unseen power of digital warfare. The chapters that follow explore a future in which the tools of destruction are no longer merely tanks, missiles, or infantry but algorithms, microchips, and covert sabotage. This book provides a thorough and sobering analysis of the challenges we face as we enter an age where wars are fought with lines of code, and the most valuable asset a nation holds is its technology.
A book about the effects of EMP, CME, sabotage, malicious code, etc in computer chips and integrated circuits as a means of hybrid warfare.
John Shenton
John Shenton was raised in the grey dawn of postwar England, where history's echoes lingered, he set his sights on distant horizons, first answering the sea's call as a Radio Officer upon ships bound for the Persian Gulf, the Indian Ocean, and the South China seas. Yet fate's currents shift, and with hard-won degrees in hand, he turned to the workings of wire and code, traversing England, Germany, Switzerland, and Canada, each land a chapter in his ledger of experience. But beyond circuits and machines, his true craft became the study of governance, history's repeating hand, and the forces that shape nations. Now, he takes his ease, golfing, sailing, and writing, letting the winds of thought and memory guide his pen, for the journey never truly ends, it merely finds another course.
Read more from John Shenton
The Bahamas - More Islands and Recipes Than You Expect! Rating: 0 out of 5 stars0 ratingsThe Dragon’s Gambit: China's Bid for Global Dominance and the Western Response Rating: 0 out of 5 stars0 ratingsBusiness Plan Basics Rating: 0 out of 5 stars0 ratingsBusiness Basics: Money Sources Rating: 0 out of 5 stars0 ratingsInflux Rating: 0 out of 5 stars0 ratingsSilent Weapon Rating: 0 out of 5 stars0 ratingsThe Wandering Bard: Poems of Honour, Exile, and Remembrance Rating: 0 out of 5 stars0 ratingsSilent Slaves: The Dark Trade of Human Trafficking Rating: 0 out of 5 stars0 ratingsShadows of Empires: Articles on the Forces Shaping Today’s World Rating: 0 out of 5 stars0 ratingsEchos of Orwell Rating: 0 out of 5 stars0 ratingsControl and Chaos Rating: 0 out of 5 stars0 ratingsCollected Musings from Bricks and Mortar to E-commerce Rating: 0 out of 5 stars0 ratingsDisarmed: The Consequences of Gun Control in the West Rating: 0 out of 5 stars0 ratingsPoems and Ballads of a Fading Crown Rating: 0 out of 5 stars0 ratingsThe Smart City Odyssey: Unveiling the Secrets to Traveller-Centric Software Rating: 0 out of 5 stars0 ratingsMandates, Motors, and Misinformation Rating: 0 out of 5 stars0 ratingsThe Empire’s Warning: What Rome’s Fall Tells Us About the West Today Rating: 0 out of 5 stars0 ratings
Related to Fried Chips
Related ebooks
The Mind at War Rating: 0 out of 5 stars0 ratingsWarfare Rewired: The New Frontlines of AI, Finance, and Global Conflict Rating: 0 out of 5 stars0 ratingsCybersecurity in Culture and Organizations Rating: 0 out of 5 stars0 ratingsThe Future of Warfare: Technology, Tactics, and Tomorrow's Battlefields Rating: 5 out of 5 stars5/5Strategy: Context and Adaptation from Archidamus to Airpower Rating: 0 out of 5 stars0 ratingsThe New Face of War: How War Will Be Fought in the 21st Century Rating: 0 out of 5 stars0 ratingsHybrid warfare The essence, structure and course of the conflict Rating: 0 out of 5 stars0 ratingsBeam Weapons: Roots of Reagan's Star Wars Rating: 0 out of 5 stars0 ratingsStrongpoint Cyber Deterrence: Lessons from Cold War Deterrence Theory & Ballistic Missile Defense Applied to Cyberspace Rating: 0 out of 5 stars0 ratingsUnveiling The Evolution Of Military Technology Rating: 4 out of 5 stars4/5The Spider's Web: How Ukraine Rewrote the Rules of War Rating: 0 out of 5 stars0 ratingsWar Transformed: The Future of Twenty-First-Century Great Power Competition and Conflict Rating: 4 out of 5 stars4/5Intelligent Warfare Studies: The Space Warfare Trilogy, #2 Rating: 0 out of 5 stars0 ratingsThe Cyber Eye: Inside the Network Wars and Secrets of the Five Eyes Alliance Rating: 0 out of 5 stars0 ratingsShadow War 2025: Israel's Secret Army Inside Iran Rating: 0 out of 5 stars0 ratingsGeopolitical Chess: The West’s Desperation And Russia’s Strategic Response: Geopolitics Rating: 0 out of 5 stars0 ratingsWar's Changed Landscape: A Primer on Conflict's Forms and Norms Rating: 0 out of 5 stars0 ratingsEvolution of Warfare: Second and Third Generations Rating: 0 out of 5 stars0 ratingsDominant Battlespace Knowledge: The Winning Edge Rating: 0 out of 5 stars0 ratingsUnit X: How the Pentagon and Silicon Valley Are Transforming the Future of War Rating: 5 out of 5 stars5/5Information Warfare: The Strategic Use of Data in Military Operations Rating: 0 out of 5 stars0 ratingsArms and Allies: Echoes of War: The Russia-Ukraine Conflict and Its Global Ripples, #4 Rating: 0 out of 5 stars0 ratingsWarfare Reimagined: Embracing AI in the Military: CyberResilience, #1.1 Rating: 0 out of 5 stars0 ratingsPowerful Military Technology Rating: 0 out of 5 stars0 ratingsThe Three Kingdoms: A Historical Treatise of World War 3 Rating: 0 out of 5 stars0 ratingsInformation Operations: Facts Fakes Conspiracists Rating: 0 out of 5 stars0 ratingsDefining Critical Technologies For Special Operations Rating: 0 out of 5 stars0 ratingsCyber Threats and Nuclear Weapons Rating: 0 out of 5 stars0 ratingsCrashback: The Power Clash Between the U.S. and China in the Pacific Rating: 4 out of 5 stars4/5
Computers For You
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 5 out of 5 stars5/5The Sierra Adventure: The Story of Sierra On-Line Rating: 0 out of 5 stars0 ratingsThe ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 4 out of 5 stars4/5Becoming a Data Head: How to Think, Speak, and Understand Data Science, Statistics, and Machine Learning Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Learning the Chess Openings Rating: 5 out of 5 stars5/52022 Adobe® Premiere Pro Guide For Filmmakers and YouTubers Rating: 5 out of 5 stars5/5All New Electronics Self-Teaching Guide Rating: 2 out of 5 stars2/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Microsoft Office 365 for Business Rating: 4 out of 5 stars4/5Learn C++ Rating: 4 out of 5 stars4/5Why Machines Learn: The Elegant Math Behind Modern AI Rating: 4 out of 5 stars4/5GPT Chat in Action: How to Solve Everyday Problems with Artificial Intelligence Rating: 3 out of 5 stars3/5Narrative Design for Indies: Getting Started Rating: 4 out of 5 stars4/5Quantum Supremacy: How the Quantum Computer Revolution Will Change Everything Rating: 3 out of 5 stars3/5Technical Writing For Dummies Rating: 0 out of 5 stars0 ratingsQuantum Computing For Dummies Rating: 3 out of 5 stars3/5COMPUTER SCIENCE FOR ROOKIES Rating: 0 out of 5 stars0 ratingsThe Insider's Guide to Technical Writing Rating: 0 out of 5 stars0 ratingsData Analytics & Visualization All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5UX/UI Design Playbook Rating: 4 out of 5 stars4/5"Unlocking the Power of AI Prompts: A Beginner's Guide" Rating: 0 out of 5 stars0 ratingsWhat Tech Calls Thinking: An Inquiry into the Intellectual Bedrock of Silicon Valley Rating: 0 out of 5 stars0 ratings
Reviews for Fried Chips
0 ratings0 reviews
Book preview
Fried Chips - John Shenton
Foreword
In the modern era, the battlefield has evolved beyond the physical realm into a domain defined by data, circuits, and the unseen power of digital warfare. The following chapters explore a future in which the tools of destruction are no longer merely tanks, missiles, or infantry but algorithms, microchips, and covert sabotage. This book provides a thorough and sobering analysis of the challenges we face as we enter an age where wars are fought with lines of code, and the most valuable asset a nation holds is its technology.
At the heart of this work is the concept of hybrid warfare: a fusion of conventional military force, irregular tactics, and increasingly, cyber operations. The reliance on technology for nearly every facet of modern life national defence, energy grids, transportation networks, and even individual devices has created new vulnerabilities that hostile actors can exploit with devastating precision. The consequences of these vulnerabilities are stark and far-reaching: cyber espionage, sabotage, infrastructure collapse, and the potential for broader military conflict loom large in the chapters ahead.
Through a detailed exploration of known actors China, Russia, Iran, and North Korea the reader is introduced to the geopolitical landscape of cyber warfare. These nations, equipped with sophisticated capabilities, are reshaping the global balance of power. The theft of intellectual property, tampering with hardware at the production stage, and deliberate introduction of malware into critical systems are just some of the methods examined in this book. Perhaps most alarming is the potential for chip-level sabotage and electromagnetic pulse (EMP) strikes that could cripple entire societies. What emerges is a world where civilians, not just soldiers, are at the front lines of a digital arms race.
The stakes of failing to address these threats are dire. Left unmitigated, the next war may not be fought on land, sea, or in the air but in the very systems that sustain modern civilization. A targeted EMP strike or widespread digital sabotage could lead to economic collapse, societal disintegration, and even famine. Power grids could be knocked offline for months, emergency services rendered useless, and critical infrastructure crippled. The long-term effects of such a catastrophe would be felt for generations.
However, as the book stresses, the future of warfare in the digital domain is not predetermined. It can be shaped by the actions of strong leadership in the United States, Canada, the United Kingdom, and Western Europe. Yet the current climate of appeasement by political leaders who favour globalism and passive diplomacy over decisive action threatens the security of the West. Without firm resolve and a renewed commitment to technological innovation and defence, we risk ceding ground to those who would use these new forms of warfare to achieve their strategic aims.
At its core, this book is both a call to arms and a roadmap for resilience. It urges not only the strengthening of national defence strategies but also the fostering of international cooperation. This cooperation is essential, not just for deterrence but for developing the technological means to protect critical infrastructure and national security. The private sector, too, plays a pivotal role, as corporations are increasingly responsible for securing the technology upon which all modern economies depend.
In reading the following chapters, the reader will come to understand that the future of warfare is already upon us. The war for control of digital systems and the technology that underpins them is being fought daily by spies, hackers, and saboteurs working in the shadows. The question we must ask ourselves is whether we are prepared to meet this threat or if we will allow complacency to lead us to failure.
The consequences of inaction are stark, and this book provides both a warning and a strategy to ensure that the free world remains secure in the face of this evolving threat. We stand at a critical juncture; the choices we make today will determine whether our societies can withstand the coming storm or whether they will falter in the face of a new kind of warfare. The stakes could not be higher, and the time for action is now.
Chapter 1: Introduction to Hybrid Warfare in the Digital Age
Overview: Defining Hybrid Warfare in the 21st Century
Hybrid warfare is a strategic approach that blends conventional military operations with irregular tactics and advanced cyber capabilities, creating a multifaceted battlefield that spans physical, digital, and psychological domains. Unlike traditional warfare, which relies primarily on direct military engagement, hybrid warfare capitalises on a broad spectrum of tools, including cyberattacks, disinformation, and economic coercion. These tactics undermine an opponent's ability to defend itself, both militarily and socially.
The concept of hybrid warfare is not entirely new. Throughout history, militaries have employed non-conventional tactics to subvert their enemies, from guerrilla warfare to espionage. However, with the rise of modern technology, especially the internet and advanced computing, hybrid warfare has transformed into a far more sophisticated and dangerous form of conflict. The digital age has created an environment where cyberattacks and electronic warfare can be launched remotely, targeting critical infrastructure without direct military confrontation.
Hybrid warfare thrives in the blurred lines between peace and conflict. By leveraging digital tools, state and non-state actors can achieve strategic objectives without triggering full-scale war. This ambiguity complicates the response from the targeted state, which must navigate a mixture of physical attacks, cyber intrusions, and psychological operations in a landscape where the boundaries
