Comments by "Screen Apple" (@screenapple1660) on "Special report: Major computer outages occur worldwide" video.
-
1
-
1
-
Back in the day, many airlines and large organizations, including the Pentagon, used very old computers running a programming language called COBOL (Common Business-Oriented Language). COBOL was designed specifically for business applications and was widely adopted due to its efficiency and reliability. It uses less power and does not require a graphical user interface, making it suitable for batch processing tasks typical in business environments.
Despite its advantages, COBOL had significant problems, most notably the Y2K bug. This bug arose because COBOL programs often used two-digit year formats, which led to widespread concerns that systems would fail at the turn of the millennium.
Before the 9/11 attacks, the Pentagon relied heavily on COBOL for managing various crucial databases, including war funds, GI bills, disability payments, and reserves from World War II. These databases were so old and unique that when engineers attempted to transfer the COBOL data to modern systems like Mac, Linux, and Windows, they encountered insurmountable challenges. The old COBOL systems could not be cloned or accurately replicated on newer platforms.
The COBOL databases were stored on servers at the Pentagon and were considered secure due to their antiquated and unique nature, making them resistant to hacking by foreign governments or dangerous organizations. The hardware used to run these systems included vacuum tube computers and massive tape drives. The sheer size and antiquity of these machines made them rare and irreplaceable.
Tragically, during the 9/11 attacks, the Pentagon was hit by a hijacked plane, resulting in the loss of these invaluable systems. The old Xerox computers, COBOL databases, and other rare machinery housed in the Pentagon were destroyed, erasing critical financial and historical records.
This loss had significant implications. For example, the destruction of these systems effectively erased the budget records related to covert operations and programs, such as the controversial Contra budget. This event highlighted the vulnerability and the irreplaceability of outdated but crucial technologies in critical infrastructure.
1
-
1