Showing posts with label computer viruses. Show all posts
Showing posts with label computer viruses. Show all posts

Saturday, June 30, 2018

The writing about cyberweapons



Illustration picture

http://kimmontaidearvioita.blogspot.com/p/the-writing-about-cyberweapons.html

Kimmo Huosionmaa

Cyberwarfare is complicating thing because it would not replace traditional weapons, but it's in the vital role for supporting the most advanced weapons. If the computer virus would infect the missile fire control or flight control computers, that would make those weapons useless. And the most terrible scene would be that the assembly line of the missiles or smart bombs would be infected with the virus, what would make every weapon unable to accomplish their mission.


If the computer virus would deliver to the computers, what is controlling NORAD, and that destroys the operating system in critical time, would that cause the situation, that USA is at least partially open for airstrikes what are made by using the nuclear weapon. And if many missiles would get bugs in their computers, those missiles cannot be used in their mission.


Advanced computer viruses, what are disturbing communication outposts and satellites are made for increasing the power of the traditional weapons. The cyberweapons can also be used by criminals, who would terminate the databases after, they have made money transfers to their own bank accounts. That's why those criminals must use the logical bomb, and destroy the target accounts from the banks, where the money have been sent. That makes tracking of that money difficult.


Cyberweapons can also shut down the surveillance systems, and that opens the road into the house for some burglars. Those people can steal assault rifles from army warehouse. The computer virus is the cheap weapon, what can be done by using a couple of hundred Euro computers, and because they are immaterial weapons, the criminals can copy masses of them. And the organization, what has lost those weapons would not even notice, that the code has been stolen.


The computer virus weapons can be very devastating if they change the circling speed of the centrifuges, what is enriching the Plutonium. That would cause the nuclear explosion in the laboratory, what is used in the nuclear bomb-making. The NSA has simulated computer virus in "Operation Merlin", where the NSA send the computer virus to Iranian nuclear facilities. Those viruses mission was decalibrated the nuclear facility's computers, that those laboratories were produced too rich Plutonium, what would cause the nuclear fission.

Saturday, June 9, 2018

Have you been in this situation, where all choices would be wrong?



Picture I
http://kimmontaidearvioita.blogspot.com/p/have-you-been-in-this-situation-where.html

Kimmo Huosionmaa

Have you ever been in the situation, that your boss would give you the offer, that something, what has been done would be let be, and if you would be silent, you would keep your job? Probably that would seem like the wise choice, but your situation is very bad because your boss would probably kick you off anyway, and the secrecy contract would only protect that person.


The reason for making the bad contracts is that the boss or other offenders would offer something, what is not out of question in that situation. But how can we recognize the form, what makes bad contracts with the workers? The first alarm that the culture in the firm is very bad is that the interviewer asks, what are your family relationships. Those things have nothing to do with the working, and sometimes that question is actually for collecting the information, what can be guessed from the spouses.


That thing might seem very interesting, but sometimes those companies want to ask about the mental situation about those workers. And that information would be used to taking the property from that person. The information is actually the property and in sometimes the persons, who are fishing the information uses the mental disorders to get the passwords to that targeted person's personal files like diaries, and the excuse for that might be, that this person would write too much.


And there is the risk about suicide. When we are thinking about that kind of reasons and chances for getting the information about bank accounts and other confidential things, the information would be meant for the honeypot. The term means the information, what seems like very intelligent and qualified, but the files are pure grab.


When we are looking at the Internet, we might notice, that there are been many writings about Chinese hackers, who would be got the information about top secret files of the United States military forces. Those files could be also hoaxed, what has the purpose to uncover the officers or other personnel, who leaks those informative files to the net.


The same methodology would be used in the other organizations. There is always data, what can help to locate the leaker in the seconds. And some of those files consisted the data, what is also faked. If somebody steals the drawings of the warship from the server of the military forces, that would mean that those vessels are totally unsuitable in the military usage, or they can be dangerous for the users.


Some of the stolen papers would involve the viruses, and those data viruses can sometimes collect themselves together for very complicated software, what can steal information from the network, and in the real war situation that software can destroy entire network from the information when the user of that virus would send the activation code. The idea of that STEALTH-virus is the same as T-1000 from the "Terminator movie".


Those small bits of code can form very large and complicated software when they are connecting together. In this case, the program bits is the control code, what helps them to find the right place in the structure.  And in the wildest dreams that computer virus, what bases the artificial intelligence can take the control of the strategic nuclear missiles, and shoot them to own cities.

Picture I

https://news-cdn.softpedia.com/images/news2/Important-Scottish-Newspaper-Leaks-Private-Data-2.jpg

Thursday, April 26, 2018

Electronic warfare is the complex thing


EC-130H "Compass Call"
Picture I
http://crisisofdemocracticstates.blogspot.fi/p/electronic-warfare-is-complex-thing.html

Kimmo Huosionmaa

A couple of days ago the communication between support groups and EC-130 ”Compass call” platform was cut down in Syria. It's good at the crew of that plane reported that communication cutting. This is, of course, remarkable thing, and proves that electronic warfare consists multi-layer environment, what would consist jamming impulses, malware software and Anti Radiation Missiles use against jammer platforms. Many people believe that jammer-systems are always installed in airplanes, but they can also use in mobile or fixed ground stations and warships. The fixed system's mission is to disturb incoming missiles and bombers radars and communication systems, what can make the coordinated operation of that task-force very difficult. The easiest way to block the communication is just send electronic noise, what has more power than data transmission, what this time consists also analogical communication.


If the radio-frequency of IFF (Identification Friend or Foe) systems can be disturbed, the ability to recognize own airplanes can decrease and own anti-aircraft flak can destroy own aircraft. Same way the GPS or GLONASS could be jammed, and this is the threat for modern military operations in every sector. Of course, electronic warfare consists also malware or computer virus, what can be delivered to air by using radar or other radio-transmitters. In this case, the computer virus can infect the computers by electronic sensors, what is used to take those signals. This kind of software can be installed to normal aircraft radars and when the pilot turns the attack mode on, the radar can deliver that malware.


This system might be ineffective if the targeted system is equipped with firewalls, but the software would not change the use of that radar. And there is no need for modification for physical components in that aircraft. One purpose of electronic warfare aircraft could be to keep other systems updated by loading to own troops coded systems new firewalls and antivirus software. If the electronic communication systems would infect by computer virus,  the situation could be that nuclear weapon communication transforms unusable, and those weapons cannot get their operational codes.


Also the computer viruses can in theory infect the guidance systems of the missiles and computers of the combat aircraft. That would make operating those systems very difficult. Of course, the radio-based location of airplanes and radio-communication are tried to replace by laser-communication systems, what have of course their own limits. Lasers can effectively use as the communication equipment in cases, where the airplane flies above the cloud level. Also, that laser system can be locating the airplanes or ships. In this case, the photo-recon satellite would notice the laser point, and then sends the picture of that place to the aircraft.


The laser point would see in the picture, and after that aircraft can turn inertial navigation system in use. Lasers can also use to mark the location of own troops, and this system is immune to radio-based tracking systems. But there are many weaknesses in lasers, and one is that the laser-rays would not go thru the walls. The problem with communication outposts and electronic jamming equipment is that they are good targets for Anti Radiation Missiles, what can shoot from an airplane or they can be modified Air-defense missiles. Electronic warfare is the area, what has many layers. And if some of those areas are getting old, would that cause harm to own troops.

Sources:

https://breakingdefense.com/2018/04/russia-widens-ew-war-disabling-ec-130s-in-syria/

Picture I

https://upload.wikimedia.org/wikipedia/commons/f/f6/73-1580_Lockheed_EC-130H_Compass_Call_%2834559173566%29.jpg

http://crisisofdemocracticstates.blogspot.fi/p/electronic-warfare-is-complex-thing.html

What was before the Big Bang (Part II)

 What was before the Big Bang. (Part II) "Our universe could be the mirror image of an antimatter universe extending backwards in time....