Skip to main content

We wish you a Merry Christmas and beware with the mobile equipment.



Kimmo Huosionmaa

In this Christmas, many people will get the new mobile telephone from the Santa Claus, and some of those telephones might be the fingerprint locking. In this case, the user of the computer can be recognized with the biometric systems, and this would be very dangerous if somebody will touch those telephones without permission. Those modern telephones will collect the information, what normal users don't even think, and one information is the movements of the telephone.


In some case, the telephone will send the alarm if some unauthorized person touches the telephone or the telephone will move. In the world of artificial intelligence, there is nothing, what is impossible, and in some cases, those fingerprints will send straight to the police, and then if the user is different than the owner, there will be reported about this kind of cases to the officials. I don't know, what happened if some criminal person, who was wanted by the police will touch those mobile telephones.


Some telephones have the artificial intelligence, what recognizes the worlds, and if the person claims that he or she is in the different places, that this person really is, will the official take the telephone in the surveillance. The fingerprint recognizers would be around the telephone, and they will give the information if the user is somebody else than the person, who owns the phone.


The use of the fingerprint recognizers will give extra safety for the user, and it is the way to the world, where the only thing, what the person needs is the mobile telephone. The use of biometrical systems to secure the identity of the user gives opportunities to make the mobile telephone the wallet, ID-card and many other things like the bank. The mobile telephones have one very nasty thing, what the people always forget. It is to use the telephone as the surveillance tool. The eavesdropped must only open the What's App and then close the screen.

And then the telephone will send all discussions to another telephone, and if the person has right programs, might this person use that telephone as an effective eavesdropping system. Another person will not notice that this application is open because the screen is locked. Also with the right software, the mobile telephone will transfer the effective "wardriving" platform, what collects the information from the networks, when some person will walk on the streets.


Modern mobile telephones have right components like GPS-system and WLAN for the wardriving, and that system will mark all the positions, what can be accessed to free and open network. But if some person has the remote control in the mobile telephone, can the hacker use that thing like the normal computer, and if the mobile telephone is equipped with the computers operating systems, another hacker can program the screen like that it will go black, and the telephone looks like that it is turned off.


In this scenario the hacker might use the telephone as the "man in the middle attack", and this person might collect very much important information of the target. And the mobile telephones can use as the infect other systems with viruses. Those computer viruses can be deadly if they will program the car to drive in the stone. In this hypothetical scenario, the control of the automobile will transfer to another place, and this system will work with the GPS-system and radios, what controls the safety of the car and denies the stealing of the vehicle.


The only part what must be put in the vehicle is actually the amplifier, what amplifies the signal of the electronic key. And by that way, the hackers can slip in the system. This tiny equipment can be masked as the surveillance transmitter, what can be put outside the vehicle. Or if the GPS system will transmit the data of the motor function to some surveillance officers, that channel can be used by putting the virus to vehicles.


The problem with computer viruses is that they might be very complicated, and it doesn't look anything more than some ordinary computer program. And in the worst scenario, the all operating system might be changed to the virus or trojan horse, what gives some operators capacity to take all the vehicle under their control.


The computer virus will change the car's fuel injection system, that it doesn't take commands from the hammer, and turns in the full throttle position. It can lock the people inside the vehicle,  like in some horror movies. And, of course, the brakes of the car will be brake and the control of the power steering might transfer to another place, and then some operator will drive the car to the wall. Some computer viruses can be infected the power platforms and if somebody puts them mistakenly to the systems, what controls the nuclear power plant, and the operator doesn't know that thing, could the result be an explosion. And this is the worst of the fears, what the man can get into the head.

travellingintimeandspace.wordpress.com/2017/12/24/we-wish-you-a-merry-christmas-and-beware-with-the-mobile-equipment/

Comments

Popular posts from this blog

Chinese innovations and space lasers are interesting combinations.

Above: "Tiangong is China's operational space station located in low Earth orbit. (Image credit: Alejomiranda via Getty Images)" (Scpace.com, China's space station, Tiangong: A complete guide) Chinese are close to making nuclear-powered spacecraft.  Almost every day, we can read about Chinese technical advances. So are, the Chinese more innovative than Western people? Or is there some kind of difference in culture and morale between Western and Chinese societies? The Chinese superiority in hypersonic technology is one of the things that tells something about the Chinese way of making things.  In China, the mission means. And the only thing that means is mission. That means that things like budgets and safety orders are far different from Western standards. If some project serves the Chinese communist party and PLA (People's Liberation Army) that guarantees unlimited resources for those projects. Chinese authorities must not care about the public opinion.  If we th

Iron Dome is one of the most effective air defense systems.

The Iron Dome is a missile defense system whose missiles operate with highly sophisticated and effective artificial intelligence. The power of this missile defense base is in selective fire. The system calculates the incoming missile's trajectory. And it shoots only missiles that will hit the inhabited area. The system saves missiles and focuses defense on areas that mean something. The system shares the incoming missiles in, maybe two groups. Another is harmless and another is harmful.  Things like killer drones are also problematic because their trajectories are harder to calculate than ballistic missiles. The thing that makes drones dangerous is that they can make masks for ballistic missiles. And even if those drones are slow, all of them must be shot down.  The thing is that the cooperation between drone swarms and ballistic missiles is the next danger in conflict areas. In the film, you can see how drones make light images of the skies. The killer drones can also carry LED li

The innovative shield that protects OSIRIS-APEX can also protect the new hypersonic aircraft.

"NASA’s OSIRIS-APEX spacecraft successfully completed its closest solar pass, protected by innovative engineering solutions and showing improvements in onboard instruments. Credit: NASA’s Goddard Space Flight Center/CI Lab" (ScitechDaily, Innovative Engineering Shields NASA’s OSIRIS-APEX During Close Encounter With the Sun) The OSIRIS-APEX probe travels close to the sun. The mission plan is to research the sun. And especially find things that can warn about solar storms. Solar storms are things that can danger satellites at the Earth orbiter. And the purpose of OSIRIS-APEX is to find the method of how to predict those solar storms. Another thing is that the OSIRIS-APEX tests the systems and materials that protect this probe against heat and plasma impacts.  The same technology. The researchers created for OSIRIS-APEX can used in the materials and structures. That protects satellites against nuclear explosions. That means this kind of system delivers information on how to prot