recommended reading

Video: Syrian rebels now have a tank powered by a Playstation controller

Naypong/Shutterstock.com

As Syria's rebels work to overthrow the tank-equipped Assad regime, they've learned that it helps to have tanks of their own. They deserve bonus points for integrating video game technology. This is no exaggeration. Have a look at the opposition forces' "100 percent made in Syria" armored vehicle, the Sham II.

Named for ancient Syria and assembled out of spare parts over the course of a month, the Sham II sort of rough around the edges, but it's got impressive guts. It rides on the chassis of an old diesel car and is fully encased in light steel that's rusted from the elements. Five cameras are mounted around the tanks outside, and there's a machine gun mounted on a turning turret. Inside, it kind of looks like a man cave. A couple of flat screen TVs are mounted on opposite walls. The driver sits in front of one, controlling the vehicle with a steering wheel, and the gunner sits at the other, aiming the machine gun with a Playstation controller.

Sham II is heading up to the devastated city of Aleppo to join the combat forces there. Meanwhile, rebel forces continue to close in on Damascus and Assad's shrinking regime. Diplomats have already begun to speculate about what the Syrian president's next move would be. We do know that Assad has been exploring the option of seeking political asylum in the Middle East or in Latin American. However, it looks more likely that Assad and his cronies will retreat to the Alawite-controlled mountains on Syria's Mediterranean coast. The only other alternative -- chemical weapons attack notwithstanding -- would be for Assad to stay in the palace and fight to the end. And can you imagine standing helpless as a fierce machine like Sham II roared up the palace steps? Run, Bashar. Run.



(Image via Naypong/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.