(picture 1) |
Kimmo Huosionmaa
Trojan horse can also be secured computer solution because the system might transfer the information to the third part´s databases, and nobody else cannot see the information what this kind of computer program will send to the hackers. This kind of intelligence software can be used by the NSA for monitoring the targetted military bases.
That software can pass the vulnerability test, and they can be very secure things, but they will send the information to the NSA servers, without nobody ever notices anything. When I'm writing about NSA, it can mean any kind of military organization, what has in the interests to collect the information from some special secured databases, and then target the other military actions against those targets. The targets for those operations might be the personnel, who are in the key role in the national security.
This kind of thing might be the operating system size surveillance program, what might have also the capacities to destroy the weapon systems databases, or even terminate all operating systems in the missile control computers. So this kind of thing could be the logical bomb, what is very good support weapon for another military equipment. If the operating systems of the missiles and airplane computers can be erased, the enemy could not use their most effective weapon systems like smart bombs and sharp Stand-off missiles, because if the operating system of the computers of the missiles has been erased, there would be no change to aim those things.
Also if the GPS/GLONASS and communication satellites would be terminated by using the computer viruses for those satellites, and that kind of viruses can make the satellite unable to work for a couple of hours, until the computer programs were reloaded to satellites main computer. The time when the computer viruses are effective in those systems might be the only couple of minutes, but when the mission-critical system will be halted in a couple of minutes, would the result be devastating, if the nuclear submarines won't get the launching codes if enemy missile raid would already begin.
Then we are talking about this kind of military systems, what can shut down enemy communication systems or even the tactical fire control in the minutes. We must think that the NSA or whatever intelligence or military organization is behind this kind of operation, would that organization think, that it is only part, what will get that information and ability to use those programs and malware in their own purposes. That kind of programs can steal the information of the nuclear staff of the military forces, and then the special forces can be targeted the assassination operations against that personnel, what is in the main role of the launching process.
Source
Picture 1
http://static2.businessinsider.com/image/5571d503eab8ea0a56186f2b/us-official-on-china-hacking-government-database-this-is-deep.jpg
Comments
Post a Comment