Showing posts with label complex. Show all posts
Showing posts with label complex. Show all posts

Thursday, February 15, 2018

How the Internet-observations officer chooses the individual, who is put under surveillance?


(Picture 1)


Kimmo Huosionmaa

Many people are thinking, that it is safe to avoid the hotel's WiFi networks because the operators can catch the data from the WiFi, but they are entirely wrong in this case. The reason why those persons are wrong is that if they don't use the free Internet, there might be something to hide with those people because they don't use that WLAN even with big laptops, and this makes the observers curious. They are looking for people, who use sophisticated and robust network security when that will compile in the things what they do on the Internet.


The situation, when the safety makes person suspected data criminal is like using the enterprise-level security solutions in-home network, and of course, if those solutions are expensive, could that cause that the interest of put this person under surveillance will grow extremely high. Those surveillance operators will not use only one method to break the privacy of the targeted person, and those operators use normally also telescopes, binoculars and small remote control helicopters in their missions. But the massive number of data will go thru the Internet Sockets all the time.


But somebody will know, that exception to the normal behavior will be noticed by the surveillance team. If some person normally uses credit-cards for paying, but suddenly will that same person starts to use cash, will that cause the reaction in the surveillance screens. And the reason for the change of behavior must be found. Another way to make the surveillance team very interested in avoiding some services.


One of the misunderstandings is just avoiding the franchise hotels, what belong to some ring. In the small independent hotels have the smaller number of information in those databases and the operators must just check the data.  If there were many more users, the data storage will be so large, that the systematical check of that information would be very long action. But in the big and small systems is small differences. Then somebody wants to keep the name as the secret, will this person choose small size system, where the "surface data" flow only in the hands of the small group.


But in the small system, the deep scanning of data will be possible and give more effective information for surveillance operators who work in this kind of system. In big systems, many operators will see "surface data" of the users, but deeper analyze of information will be difficult because there is the larger number of bytes and there are many same-ranked officers who are watching the system. In small system might have only one high-school trained operator or maybe that service is produced by some other actor. This allows those men to work alone without afraid that somebody even sees what is going on.

Picture 1

http://www.sifytechnologies.com/wp-content/uploads/2017/03/datacenterhosting_managedservice_taxialways_fod.jpg

Tuesday, November 28, 2017

Huge North Korean tunnels and underground installations are the problems for the national security of South Korea


(Source CNN)

Kimmo Huosionmaa

When the North Korea launches their missiles, there is always the risk of the war That’s why those nation leaders trust their tunnels what are more complex and harder than Vietnamese tunnels. Those tunnels are made for the long-term residency if the country will be occupied. They are equipped with vegetable farms and another kind of support, what gives those people the capacity for the long-term resistance and sudden attacks against the enemy troops.


The tunnels of the North Korea are the very complicated threat for the national security of South Korea because the North Korea might be made this kind of structures in the side of South Korea, and those tunnels can be used as the barracks or other military installations. The tunnels of the North Korea are actually very well known for the western intelligence. Even the deep tunnels are quite easy to locate with the VLF (Very Low Frequency) radars, what radio waves will penetrate deep inside the landscape.


Those systems are helpful also when the archeological structures are searching from the orbital trajectory. But the problem of the searching with that equipment in this particular case is that the tunnels are so complex, that anti-bunker nuclear warheads will not destroy entire complex. Those tunnels are probably in many levels, and that makes the strike very complicated thing. If the nuclear strike will be done against those tunnels, that will decrease the nuclear arsenal very much. And another problem is that the highest leaders of that nation will be on the special train, what will move all the time.


There are rumors about that train is special designed machine what is made to stand for the pressure waves what strikes against it, in the case of the detonation. And the train would be also designed as the submarine, what stands the water, what might lead into the tunnel if there will be detonated the nuclear weapon. Those communist leaders are well known for their 007 stuff, and their personal protection weapons are the legendary example, what the power makes to the human.


Those are the rumors about that train, but almost everybody is sure that, in this train is hidden nuclear weapon, for the case that the leader of the North Korea will be surrounded by the hostile troops. And the train is armed with chemical weapons, what can be released by the leader's remote control. The system works that the leader of that country will take the atropine injection from the special box, what is in his pocket, and then the nerve agent will be released in the train or outside it. And even if this would be only the rumor, there are not many men in the North Korea, who will test if they are true.

Friday, November 24, 2017

Why are computer programs so complicated?



Kimmo Huosionmaa

The complication about computer programs is a huge problem, when we are creating the software, what easy to use. If the program is easy for end user, the programmers must make very complicated code, and those systems must be bases the far taken artificial intelligence, what will allow the end user to control those systems with easy interfaces, what have only one button, if we are talking about ideal interface for full automatized systems. The interface is very easy, only one button what will start and stop the operation. But if that interface will be real, must that system be very independent, for complete the operation successfully.


That is the primary problem with integrated computing systems, where computers control some robots or other physical systems like ABS brakes of the automobiles. If that system fails the result might be devastating if the other side wheels will lock and another side continues rolling. That is the worst case scenario, what could happen on the road. But when automobile motor electronic circuits will fail, the result might be even more terrible, what we ever thought. If the hackers infect some automobile electronic control systems with the computer virus, they might cause the situation, where the car will not obey gas or brake pedals.


Also “steam hackers” can cause horrible situations, if they put the winch in the car. That remote-controlled system might cause the even bigger danger that hackers ever can imagine. That winch would work the same way as the remote-controlled bomb, and it will just pull the gas pedal down, and you might guess, what will happen if this will happen in the wrong place. The problem with security of the automobiles or other integrated systems is, that they are too focused on data security. Those very complicated systems are also under threat of physical damages and attacks.


But the most influential threat comes from those systems own security equipment. If somebody reprograms the chip of the automobiles electronic key, the hacker can infect the computer system of that vehicle. Some hackers have spoken the opportunity and the threat, where somebody reprograms the chip of the bankcard and infects the all banking system of the Europe. But if some hacker will infect the transponder of some aircraft with computer virus program, will be able to cause very many damages to the airfield security.


The most modern military aircraft like F-36 can transmit the computer viruses to the target systems, what can cause the situation, where enemies command systems will be the collapse in the critical time. Also, the warships radars have that capacity. The computer viruses are only the integrated ECM-systems, what will transmit the computer viruses inside their jamming signals. And of course, those military machines have their physical weapons like missiles and bombs for attack missions. So the computer viruses are only the part of the support systems, what makes those machines attack harder to their targets, what is not protected with proper firewalls and antivirus software.

New autonomous task units are entering service.

"The deal will create much-needed competition for the Department of War acquisition process. (Representational image)" (Interestin...