@Background Pony #1D40
Hardly on topic for this, or any other thread on the site. But your claims about how the military works internally, and how the Pentagon interfaces with the POTUS, suggest your info is mostly coming from TV shows.
For example,
what TSP said, and for decades the “Launch Codes” you’re so fond of was “00000000”.
I’m not shitting you when I say I worked on network infrastructure in that world for 5 years at a fairly high level (GS-11), and the password on every single machine I ever used - in multiple countries - was one word: the name of a popular beer. And the admin password on every single router was “flip the DIP switch to PRIVILEGED” so all you had to remember was your seven-level screwdriver, the name of a beer, and you could get your job done.
So, if you had clearance, and the one and only tool you were expected to carry on your person to the grave - you could go anywhere you wanted on the planet where those installations existed, and the passwords, access methods, and codes were identical.
2LDR, you don’t need passwords if the building’s response to an unauthorized someone approaching the wrong door or machine is two 12-stone assholes who’s only concern is “how long until I can give someone a beating”. And just getting to the building means passing through the kinds of shit that would make Indiana Jones second guess his day.
Maybe read a Tom Clancy novel. He mostly got things right-ish.
In fact, in some ways his books are darned right.
Or, if you want to really second guess your ideas about how “safe” all the nukes are, read up on “dull-sword incidents”. Protip: they weren’t all accidents, and there’s been over 200 of them since 2000.
Honest to God, I almost typed the name of the beer. Because it’s impossible they’re still using the same password, right?
Right?
Yeah … they wouldn’t do that, would they?