Skip to main content

Why are hackers so unusual criminals?


(Source Internet)

Kimmo Huosionmaa

People always talking about hackers and the threats what those people cause for the national security. Normally the talking is turning the thing, why those people are not able to locate using the standard police methodology? The problem with the hackers is normally that those people will not hang in the shopping centers or bubs like normal criminals. Normal police methodology is meant for tracking the drug dealers, who normally operate in the streets.


The tracking the hackers is difficult because the tracker must go inside hackers residency.  Many hackers actually work from home, and that makes the tracking of them very difficult because if the hackers don't want to be tracked, and they have right financial resources, they will be very difficult to track by the net.

The problem is that those people can make series of the computers, what they can remote use, and that makes the tracking those persons very difficult. If the hacker uses series of many computers remotely before this person attacks against the target, will the tracking very difficult. But for this action, the hacker needs comrades, who will take the remotely used computers in the right places. And then the hacker can jump to those computers, and then makes the strike against the interesting target.


But this action needs resources and the problem with the other method, what is infect some computers with the virus, what opens the computer for remote use, is that the person whose computer is infected can just shut the computer because the workstation is not working correctly, and remove the virus by just re-installing the operating system. The hacker needs the trusted platform for the work. And that kind of platform, where is series of the computer located all over the world needs very much financial and social relationship for this kind of action.


In the case the hackers have got the passwords of the target system by using the sodium pentothal or stealing the password by photographing the screens, they must hide their position, even they are sitting opposite the target. The hackers can use UAV:s to surveillance the offices and those vehicles can also equip with  laser microphones to record the competitions in the office. And they might able to get the passwords in their hands.  In that case, they must route their signal around the world, because that will hide their real location.


Even if the passwords are stolen, and the target organization gets the information about it, they might use the passwords as the "honeypots", what means that every user, who uses those passwords will be tracked by IP-addresses and the "trap server" also tries to get the mac-address of the WLAN-card. Because that information might use to track the model of the device, what is used by the hackers.


If the trackers will get the mark of the WLAN-card, they might get the model of the computer, and by using the payment information, they might track those hackers. Some computers are sold very small numbers, and if the hackers are used their credit cards or fill the guarantee card, they might track by using that information.

Comments

Popular posts from this blog

MIT's tractor beam can make the new types of SASER systems possible

   "This chip-based "tractor-beam," which uses an intensely focused beam of light to capture and manipulate biological particles without damaging the cells, could help biologists study the mechanisms of diseases."(Interesting Engineering, MIT’s Star Wars-inspired ‘tractor beam’ uses light to capture, manipulate cells) MIT's tractor beam can make the new types of SASER systems possible. The tractor beam just hovers the nanoparticle in air or medium, and then the laser or some other electromagnetic system transports oscillation into those particles. The ability to make cells and other particles hover in the system makes it possible to create particles whose energy level or resonance frequencies are accurately calculated things.  That thing makes it possible to create things that transmit wave movement accurately and cleanly. This is one version of the use of a tractor beam. Modern tractor beams are like acoustic tweezers where sound waves lock the object in its cr

The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible.

  "An illustration of NASA’s research plane ER-2 flying over thunderstorms. Credit: University of Bergen / Mount Visual (CC BY 4.0), edited" (ScitechDaily, Surprising Discovery: NASA’s Retrofitted U2 Spy Plane Reveals Tropical Lightning Storms Are Radioactive) The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible. The process has been observed by the NASA (Lockheed) ER-2 research plane, which is a modified U-2 spy plane. The gamma-ray formation in thunderstorms. Where lightning and electric fields release electrons that impact the air molecules and water droplets is an interesting thing. That thing opens the route to solving many mysteries.  "The general physics behind how thunderstorms create high-energy flashes of gamma radiation is not a mystery. As thunderstorms develop, swirling drafts drive water droplets, hail, and ice into a mixture that creates an electric charge much like rubbing a balloon on your shirt. Pos

Chinese innovations and space lasers are interesting combinations.

Above: "Tiangong is China's operational space station located in low Earth orbit. (Image credit: Alejomiranda via Getty Images)" (Scpace.com, China's space station, Tiangong: A complete guide) Chinese are close to making nuclear-powered spacecraft.  Almost every day, we can read about Chinese technical advances. So are, the Chinese more innovative than Western people? Or is there some kind of difference in culture and morale between Western and Chinese societies? The Chinese superiority in hypersonic technology is one of the things that tells something about the Chinese way of making things.  In China, the mission means. And the only thing that means is mission. That means that things like budgets and safety orders are far different from Western standards. If some project serves the Chinese communist party and PLA (People's Liberation Army) that guarantees unlimited resources for those projects. Chinese authorities must not care about the public opinion.  If we th