Showing posts with label data. Show all posts
Showing posts with label data. Show all posts

Sunday, September 17, 2023

DNA-based computing is a promising tool for high-power data systems.

 DNA-based computing is a promising tool for high-power data systems. 


DNA and biochemistry with molecular biology are emerging and promising tools for high-power computing. The DNA-based computers can use the biochemical core along with DNA. And then, that system can communicate with regular microelectronics. The system can run over 100 billion programs, and that makes the system an interesting multi-tasker.

The DNA molecules can act as the programs for next-generation AI-based microchip-kernel applications. Chemical DNA computing uses nanotechnical systems to make the DNA that acts as the perforated tape in that system. In those models, the DNA transfers information between processors. In that model, DNA replaces electric wires in components as data transporter. But it requires fast-operating nanotechnology. 

The most futuristic visions of DNA-based computers are computers that use fast-operating nanotechnology. In that model, the system creates the synthetic DNA molecules by using nanotechnology. And those DNA molecules act like perforated tape of the old-fashioned computers. However, the system can use the DNA as a tool that can run complex AI-based software. And maybe the AI-based kernel architecture uses the DNA molecules as programs. 




There are three types of electric DNA computers. Or, the number of DNA-based computers depends on how we determine the use of the DNA in those systems. 



1) The computers that use DNA molecules as the microprocessors. Those DNA bites can act as part of regular-looking microchips. 


1a) The DNA can act as an information handler itself. 

1b) The DNA can act as a program for the ROM circuits. 


2) The computers that use DNA as the components like springs that control switches. 


3) Living cells that are used to process information. 


3a) Dummy systems, or systems that use dummy cells. Those systems can be bacteria which fibers can act as connectors. Those bacteria can be microchip controlled. 


3b) The systems that use intelligent cells like living neurons as data handlers.


In DNA-based computing, DNA is the tool that replaced regular microchips. If each base pair is one state of the DNA-based microprocessor. Data travels from the first vertical strand through horizontal base pairs to another main strand. That thing gives the DNA the ability to run billions of programs at the same time. The system can work like this. The microchip or some optical system transports data from regular microchips to DNA. 

The system can use miniature lasers that shoot photons to silicon bites. Those silicone bites are at the point of every base pair. Their mission is to transfer photons into electric impulses. Then data travels through those base pairs into the DNA's other side. DNA-based computing is a new and promising tool. The DNA computer's multi-tasking ability can used in quantum computing. That means every base pair acts as one qubit's state. This thing makes those systems even more powerful than nobody expected. 


https://www.britannica.com/technology/DNA-computing

https://futurism.com/worlds-first-reprogrammable-dna-computer

https://www.msn.com/en-us/news/technology/dna-based-computer-can-run-100-billion-different-programs/ar-AA1gF86Y

https://www.wired.com/story/finally-a-dna-computer-that-can-actually-be-reprogrammed/

https://en.wikipedia.org/wiki/DNA_computing


Sunday, November 21, 2021

Machine learning brings social skills to robots.

 Machine learning brings social skills to robots. 


Things like social skills are important for robots that are working with humans. The skills like saying "pardon me, I'm hurrying" are interactive methods to tell that robot has some kind of mission. If we are thinking the case that robot works in warehouses and collect the stuff from the shelves. 

There is needed to tell people if they are closing the road. As an example the case that the robot collects food. That requires cold storage robot should tell people that it is in a hurry or its load is warming. So the people should step away from it, or the food is going bad. 

That thing means the robot has not had the entire day. To wait for those people will step away from its route. This is one example where the robot should communicate with people. In some other examples, the people are standing in the working area of the welding robots without protective masks. And that means robots should tell that they should use dark glasses because of the welding radiation. 

But when we are thinking possibility that artificial intelligence supports the people in the cases like studies. There is the possibility that it would help the student to remember things like how to mark sources. And what kind of standard the student must use in the work. But the artificial intelligence can also follow what kind of sources the student will use for the thesis. 

That thing means that the AI recognizes the type of the sources and that they will fit to work. Then the AI can discuss with the student what are students' opinions of the sources are. The AI can also search how long the source has been open, and if there is something that should not be, the AI can tell that thing to a student. 

The use of machine learning is free. There are no limits in areas where that kind of system can use. The things like networked systems are also offering those systems to share their experiences. Things like choosing the route for driving would be the thing where the AI can give a piece of advice. The GPS and non-stop updating real-time data from the traffic control would make driving more comfortable. And if the system knows where is planned to stop. 

And other kinds of things that thing can also make driving safer and more economical than they are today. The accuracy and mass of data in the computer are determining the accuracy and how effective artificial intelligence can be. 

This kind of system bases the idea that the computers of the vehicles can exchange information about the times, what they are using for some trip. That thing means that the cars can change information and the traffic control computers can help to select the routes that are the most economic and fastest. The thing is that if the system knows the destiny of every vehicle and the driving speed on roads. 

The system can turn part of the traffic to other roads avoiding the rush. There are, of course, people who need to use a certain road but if the computer can route traffic with different routes that thing can make the driving more economic. Artificial intelligence can also give warnings if the tank or battery of the vehicle is empty. 

The system can search the next recharge point but if the destiny is near the system can also tell how long it would take to load the vehicle at the destiny. For making this kind of process the most comfortable as possible. The system requires so much data as possible. Things like stops and fast visits. Should load to the computer. And also the possibility to reload the battery in those places. Must be stored in the computer's memory. 


https://scitechdaily.com/new-machine-learning-system-gives-robots-social-skills/

Friday, November 5, 2021

"Open source" and artificial intelligence are problematic tools.

Image: Artist's impression of
the programmer during his work


The "open source" AI-development project means that the developers use free software for their development process. The database connections and programming codes can get from the internet. And that means there is nobody who controls that development process. The world is full of artificial intelligence programs. 

Some of them are "simple" discussion programs. And the other programs can control robots. But the fact is that there can be millions of developers in the world. They have their own private "free time" application development in progress. The thing is that every programmer in the world uses their personally-owned computers in that kind of project. 

This means their own companies or workplaces wound not have a chance to make anything for the things. What those persons do in their part-time. Programming tools like editors are free and there is lots of literature about programming and development. 

Artificial intelligence is a problematic tool. Its missions are hard to predict. And that means especially when artificial intelligence can collect data from the internet straight from the homepages that mean that system might have unpredictable abilities. 

But when we are thinking about artificial intelligence from the point of view of the military. The unpredictable actions are increasing the power of that system. The unpredictable actions guarantee the success of the operations. But when we are thinking about the classic questions like can AI make crimes? 

We must say that AI doesn't make crimes for money like human criminals. There are always some people behind the criminal AI. The AI is an effective tool in the cases like hacking. The hacking algorithm is quite easy to make. And the hacker who wants to create the automatic, AI-based hacking algorithm must only record the commands that this person uses in hacking operations. 

So the problem with the predictions of the abilities of the AI. Is that they are made for the cases where the algorithm is running on the binary computer. Quantum computers are a million times more powerful than the fastest possible binary computers. And the number and capacity of those computers are increasing all the time. 

When we are thinking about the possibility to make a digital copy of human brains by creating 200 billion databases. The only thing that denies us from making that thing is time. There is needed a lot of time for making that number of databases. In the time of binary computers, that kind of system seemed science fiction. 

But in the time of quantum computers, the quantum system can run that kind of complex database structure. And the ability to make new databases and establish connections between those databases automatically makes it possible that the system can learn spontaneously. And that kind of system is almost like humans. 

The key element in artificial intelligence is the internet. That allows making the systems in many positions at the same time. The net makes it possible to control large project teams which are working for a common purpose. 

Artificial intelligence requires complicated programming code. And the internet is the best possible platform for that kind of R&D operation. In that case, there is the possibility that somebody steals the code. When we are thinking about programming code anybody can learn to program. The code itself is free. 

Computer programming languages are standards, and programming instructions are free to read from the net. And that means there is the possibility that somebody has the undercover "open source" artificial intelligence project. 


https://www.sciencealert.com/calculations-suggest-it-ll-be-impossible-to-control-a-super-intelligent-ai


Friday, August 10, 2018

Strange things about WikiLeaks

https://metsantarinoita.blogspot.com/

Kimmo Huosionmaa

WikiLeaks has brought to the people know the things, what the government would want to hide, but there is one big mystery in this website: why it is not banned by DDOS-attacks? When the governments and private security corporations Emails were delivered to WikiLeaks, it was targeted the short period DDOS-attack, and in some claiming, some of the files were removed or changed during the attack, and in those files were some very interesting knowledge of the co-operation between governmental and private security corporations, what are actually intelligence agencies.


Somebody has even claimed, that the  CIA has been behind the WikiLeaks and the reason, why almost all the files, what are published in those sites are American origin, but the thing is made for confessing the audience, that the USA would be the primary target for those uncovered secrets. This means that the purpose of publishing those papers is meant for countenancing the persons, who want to steal the papers from the Pentagon or NSA send them to WikiLeaks, where counterintelligence has very easy to find those documents, and then I must say that those files can be used to track the information thief.


This means that in every single file may have the unique code, what is unseen for normal computers. But if the person has the right program, would the number of the handler be seen on the screen. And that number allows tracking the person, who has been downloaded that file, and also foreign partners have their own numbers, that the NSA can track the persons, who deliver the secret material to the Internet. That's why those papers must no be delivered to the Internet.


Those PDF-files seems like the normal, but the NSA:s main computer makes there the covered digital signature in those files. That's why everybody must know, that there are many secrets, what is very interesting, but those papers are meant for confidential. And in the real world, we must ask, is it better to track people by using electronic equipment, or is it more comfortable to make a very large police force, what comes to the people's home for searching the missing persons. This is one argument for supporting the surveillance of the people. But sometimes is clearly seen, that the terrorist attacks are supporting the growing security business.


Those corporations collect very much data, and that can be used for many things. If the information, that is collecting by using Trapwire, would contain business secrets, and somebody would sell those secrets,  some corporations will get very much benefits in their work. And this is one of the most concerning things in the world. If some private intelligence would sell those pictures and data, that would give the very good position for that corporation, that buys those pictures and data from the security corporations.


If some corporations would get too close cooperation with the government, that company would allow accessing the data, what is only reserved for governmental purposes. This means that the surveillance cameras can also collect data from the screens, and in those cases, there would be no sign of the security leak. So those servers data security, what operates surveillance cameras must be extremely highly secured. If the information would leak from secured areas, the benefits, what some company would get are extremely high.

Saturday, February 24, 2018

What is the difference between bio- and genetic manipulation?


(Picture 1)

Kimmo Huosionmaa

There are some differences of bio- and genetic manipulation. Biomanipulation actually means to make artificial cell-lines, and actually, there would be no touch for genomes. One version of biomanipulation is to make artificial retina and surgically implant that retina in the eye, and the retina can be made by cell base, what is filled only with cone cells. Also, two type of vegetables can be connected mechanically, and those combinations make the saplings, what are from an upper vegetable.


Biomanipulation is effective, but it takes time. The modification of the organisms will not transfer to next generations. And mass production of those organisms is very difficult. Genetic manipulation is the more effective way to compile species and give them new features. The needed thing is an artificial virus, what has wanted genome, and that little DNA-bite would be transferred to the nucleus of the cell. The problem is that those manipulated organisms are that those features would transfer to next generations of that organism.


One of the possibility of genetic manipulation for improving some species like a human is to connect genomes to the cells, what makes possible to create chlorophyll in the cells of mammals, and in some visions, those manipulated humans may have roots or threads in the skin, what can take food and water from the air. Those threads might also have harpoon cells, what protects this creature. When we are thinking about the combination of the human and other species, we might face the situation, where we are creating an alien, the species with superpowers. That creature might have a similar nervous system like bugs. It can use only electricity, what means that neurons could connect together and close the synopses.


That would make the brains more effective. Also, those manipulated organisms blood might be poisonous. And the chlorophylls in the skin makes possible to produce sugars in the creatures own body. This might be the route of controlled evolution, and maybe tomorrow we can order the features, what we will have in our next life. In this futuristic scenario the human would record their life by using WLAN-implants, and of course, the body will be cloned. This might make the person live forever. The cloning of the creature will happen by changing the DNA inside the nucleus of just when fertilized ovum. And that would allow making modifications even to human body and mind.

Sources:



Picture 1

https://www.biology-questions-and-answers.com/images/Genetic-Engineering.jpg


Thursday, February 15, 2018

How the Internet-observations officer chooses the individual, who is put under surveillance?


(Picture 1)


Kimmo Huosionmaa

Many people are thinking, that it is safe to avoid the hotel's WiFi networks because the operators can catch the data from the WiFi, but they are entirely wrong in this case. The reason why those persons are wrong is that if they don't use the free Internet, there might be something to hide with those people because they don't use that WLAN even with big laptops, and this makes the observers curious. They are looking for people, who use sophisticated and robust network security when that will compile in the things what they do on the Internet.


The situation, when the safety makes person suspected data criminal is like using the enterprise-level security solutions in-home network, and of course, if those solutions are expensive, could that cause that the interest of put this person under surveillance will grow extremely high. Those surveillance operators will not use only one method to break the privacy of the targeted person, and those operators use normally also telescopes, binoculars and small remote control helicopters in their missions. But the massive number of data will go thru the Internet Sockets all the time.


But somebody will know, that exception to the normal behavior will be noticed by the surveillance team. If some person normally uses credit-cards for paying, but suddenly will that same person starts to use cash, will that cause the reaction in the surveillance screens. And the reason for the change of behavior must be found. Another way to make the surveillance team very interested in avoiding some services.


One of the misunderstandings is just avoiding the franchise hotels, what belong to some ring. In the small independent hotels have the smaller number of information in those databases and the operators must just check the data.  If there were many more users, the data storage will be so large, that the systematical check of that information would be very long action. But in the big and small systems is small differences. Then somebody wants to keep the name as the secret, will this person choose small size system, where the "surface data" flow only in the hands of the small group.


But in the small system, the deep scanning of data will be possible and give more effective information for surveillance operators who work in this kind of system. In big systems, many operators will see "surface data" of the users, but deeper analyze of information will be difficult because there is the larger number of bytes and there are many same-ranked officers who are watching the system. In small system might have only one high-school trained operator or maybe that service is produced by some other actor. This allows those men to work alone without afraid that somebody even sees what is going on.

Picture 1

http://www.sifytechnologies.com/wp-content/uploads/2017/03/datacenterhosting_managedservice_taxialways_fod.jpg

Friday, February 9, 2018

Data is the new oil for markets




Kimmo Huosionmaa

https://sites.google.com/view/dataisnewoilformarkets/etusivu

Data is a new oil for economies around the world, and the ”big data” or the data, what is loaded from the internet would be the basis of all reports, what data scientists make. The computers and data, what can be collected from the internet are replaced oil, and the data handling process is for making the report of the certain thing. Reports are involving the things like changing the value of stakes or they can tell to engineers, how some machines are working. Those persons can collect this kind of information by using wireless systems, and they can get the top speed of the automobile, from the digital data storage. Data handling specialists can connect the information from different sources, and they can get information, about who actually drives some car, by using credit-card, surveillance camera and if they have access, the GPS-information of the family members, who owns some car.


The connection of information tells very much about how the vehicle is used. And if there will be none of the family that owns the vehicle place, when their car is filled, will that tell something about that vehicle. Are they renting that car, or why they won't drive it themselves. Something tells about the situation, that the owner of the car lefts always the mobile telephone to the table at home.  The report is the result of analyzing data, what is allowed from the internet. The ”Big data” means the data, what is not processed in some systems before it would be landed in the hands of data scientists.


This term means newspapers, web pages or other data storage, what are free to get. The type of processed data will qualify the value of the processed information. The value can be meter by money or other like historical or cultural things or the growing health or happiness in some company or state. But those things can raise the productivity and save in the health bills in the healthcare, and the absences of the people will decrease if they will enjoy their working.


The product of data processing is normally reported if the data is not used by controlling robots or something like that. This means that value of the product can be also immaterial, because those reports can be put on the internet, and almost everybody can make copies of them. In the real life, there would be limits on accesses to reports, what are made by some companies or governmental offices. This means that those reports might be locked behind passwords.


But many reports, what is made by public authorities are free to read. But the data and especially the processed data is the product, what has its value in money. If some satellite firm sells the information about the natural resources, that data might be limited only the customers about this company.


Those satellites are equipped with magnetometers, what are very small and they are working in groups, what acts like the compound eye, and they are connected with the normal cameras, what are in the side of that instrument, and the data of those sensors can be connected together. So the iron site will be found the effective way.


And also uranium sites are looking at using the compound eye style Geiger-sensors and normal cameras. Google web search is a base of many operations, what are done on the internet. This system allows us to limit the information, what is getting from the internet. The limiting the information is the key element for making databases effective.


The large mass of information will make those databases ineffective because the user needs to search that information. And if somebody would be injured or the situation needs the fast reaction, the crew must get only the information, what they really need to accomplish the mission. It is the base element in bio-metrical recognition and other things, what are used on the internet. Compiling the Google search and base power of the nations main electricity, we must say that there is much same about those things. Because without google web-search technology is almost impossible to handle the data mass of Internet.


But as we probably know, the results of those searches can be manipulated. And this makes the finding of small local entrepreneurs telephone number from the internet sometimes quite difficult, because there are many bigger contractors above it. This case might be real when we are taking some machine for repairing in some company, and then we will call there to ask if they are ready, and we are lost the telephone number of that company. This case might cause the grey hear for everybody when the person uses the mobile telephone in freezing weather, and the person must find the certain firm from the results of Google search.


And without electricity is almost very difficult to use computers. Using isotope batteries (RTG:s), we can make the laptop, what is independently used, and this kind of thing doesn’t need the electric network. This solution is very expensive, but it can be suitable for the space flights. In this scenario the normal battery will be replaced with nuclear battery, what will use the radioactive isotopes like Chromium-85 for creating the electricity for mobile solutions like mobile telephones, laptops, and tablet computers. The idea of the computer, what can use as long as human lives are fascinated, but also very expensive. Or can you imagine the internet without searches? Without google-search we must use web addresses, and do you think that thing will give the effective way to use the internet.



The data is not collected for fun, and the data must have some purpose. There are the systems, what will send the data how the motors are working, and if the sound of the motor is changing, the information of that will send to the computers, what might fix the tunes of the machine, or the automatized system will start to repair that diesel- or turbine. And maybe in the future, the equipment of the power systems is the man-shaped robot, what can fix the problems by using same tools as the humans.



The science of statistics can help to find criminals



Kimmo Huosionmaa

https://sites.google.com/view/statisticsandcrimes/etusivu

The use of statistics makes possible to control risks in the normal life. The collected data can be used to locate the risk drivers, dangerous crossroads, and many more things. Statistics will not necessary mean numerical information. If somebody is too hard on driving test, that would be seen by statistics. And if somebody is too allowed in that driving test, that would be seen in statistics, because this person’s driver candidates makes many accidents in compiling with other drivers. This separation is seen clearly after a couple of years driving. If somebody, who really drives the car, would not make any errors in the driving, it will cause the suspicion about the driving test. That data is collected from insurance companies databases, and also the governmental databases like speeding ticket databases are used.


Was it failed for fun or some other personal reasons? Also if the person would not drive the car after driving test, will deleting the car tell, the thing that this person affairs of driving. Same way acts the data if some person has always broken the car. That means this person might be targeted by systematical harassment.


Same way uncovers the harassment in the working site. The thing what uncovers that is the person, who will very often change the workplace. That tells that everything is not like it should be. They also can mean the location information. That information would be effective when officials are tracking drug sellers. In this case the places, where the narcotics user’s equipment are founded, that place must be marked on the map carefully, because that information can be important when dealers are tracked.


The statistics are the very effective thing when criminals are tracked. Those systems will compile the information if somebody has got the tickets to the happenings, where something bad would happen.And if some person is simultaneous in the concerts where the places have been broken, or somebody was injured, that will see in those systems  When we are talking about the vandalism and public transportation, we must know that specific collection of the data is not effective way to look for the persons, who might break the bus stops. The database would be very large, and that would make it ineffective.


But the data about the ticket types can be collected, and of course, the number of passengers can also be stored in that system. And maybe there was only one person, who used the single prepaid ticket, and if this person has used credit or bank card, and other users were mature people, this might help to track the person, who has crashed the bus stop. This was not the best example of the use of statistics in the tracking criminals.


Also, military intelligence uses statistics for tracking suspicious persons. The time and number of using fire against single operational unit can be tell something about those men. Or what do you think about the situation, that the operational area of the unit is restless, and when the change-group comes, all area turned as hell? And suddenly when they were leaving, the situation turns back to restless? Seems very interesting thing. Also, the type of used weapons is telling something about both sides of the conflict.


If some part of conflict uses normally assault rifles, but suddenly in one specific case, they will use the sniper rifle, that would that tell that something was wrong with that shooting. If only one person would shoot by the sniper rifle in all operational area like Afghanistan, that killing would be not made by the enemy. This might be a real murder, what will attempt to cover as a military action, and in this case, the investigations might focus on that killed person’s private life. In real life, the statistics tell us if there is something wrong with some family or person. If somebody is in the hospitals emergency every Friday, that means that this person lives very dangerous life. Also if in some family will happen many strange accidents or homicides, that will cause the investigations about those persons.


When some persons face the things, what are like straight from the book “The hound of the Baskerville” that will tell, that somebody is persecuting those people. If the dog simultaneously bites people, that might cause the suspicious that this dog is a fighting dog, what is used in illegal dog fightings. Those animals are extremely dangerous because they are trained to attack other animals and even humans.


The mission is to fight rough and tough, and some of those animals are feed with other dogs flesh. There are also difficulties to separate fighting dogs or killer-dogs from together. They are used to also for guarding the drug houses, and their owners might keep them in hunger because that would make them more aggressive. But if the dogs are attacking against other animals or people in some area, that would tell that there is illegal dog-farm for growing those animals for brutal and inhuman “hobby”, what is prohibited in the law.

Thursday, January 18, 2018

What means the analytical form of the "big data"?



Kimmo Huosionmaa

The price of the investment is ordering one thing, how long is this thing in use. And when we are talking about the price of the buildings, we must know actually how long the structure is in use. Then we must know how much service, electricity, and cleaning costs are per year. This will give the real price of the production. If some railroad is used only one hour during its lifetime, the costs would be very high.


And also the ratio of use, and the number of passengers and other transportation, what will come money for the accounts are making the economic balance and statistics about this thing. So if you want to calculate the profits and losses of the business, just minus the costs from the incoming money, and this is the way to make cost accounting. If the number is positive, the transportation would be economical and bring the profits.


 There is no rule about the shape of the big data or metadata, what means unprocessed data warehouse. When we are talking about the big data, it can compare of the massive sandpit. Sand is actually useless itself, but when we are starting to process that material, we will make it the useful material for many targets like houses and roads. The big data might be some TV-broadcast, the poster or the story in the newspaper. There might be things in that poster or story, what makes it very interested, and when we are going to make analyses about that article, we must ask one question.


Where that poster actually is, and if it will give negative picture or view of the service or company, what owns that room for advertisements? Nobody must be allowed to publish negative information about the service, what it offers in the area, what is under its own ownership. But when we are starting to check the information, what is in that poster, we must make the analyses about the text, and then we must understand, that there will be many things, what must be noticed in that poster.


I saw today the poster of one local newspaper, that the western subway line of the capital area of Finland has overcalculated the number of the users of this transportation. If those calculated numbers of the passengers were beaten, the line would be the disappointment. But then we should get more information about this news. What was the calculated number of the passengers? And what is the real quantity of passengers, who uses that railroad? And what is the range, where those calculations are made?


When we are seeing the other railways, we must notice, that every station of those railways has not the same number of the passengers. And when we are seeking the truth, we must see that almost every statistics can change to seem the disappointment. Only thing, what is needed is to show very big numbers of the passengers, and then the calculated ratio of use is of course under the limit of the calculations. This is the very good thing when the prices of those tunnels are shown to the ordinary people.


The price of the subway is very high, but we must remember that the limit of the calculations is not mentioned. Is this the price of the first year of use, or is there calculated the next years of use of this thing, and what costs have been set in those calculations? Those things are also the very important thing when we are talking about the price of some investment.

Wednesday, January 10, 2018

What if the antivirus program transforms as the spying tool?




Kimmo Huosionmaa

Is Kaspersky's antivirus software a spying tool for the Russian intelligence is the very good question. If some antivirus- or firewall software has been used as the spying tool, the results could harm the national security. When we are talking about the use of an antivirus or any other security program as the spying tool, that will give change to the attacker to monitor all data, that goes between the computer and the Internet. But how to modify those extremely safe programs as the spying tool?


The best way is to make the "trojan horse", what just looks like that security program. In this scenario, the hackers just make their own software, what has the same kind of icons than the real antivirus program has, and then they must just route the net traffic to their own server. And then they have full access to any data, what is on that computer. Another way is to put the computer virus or spying program to the router, but the problem of that is that device's operating system is normally Linux, what makes the slipping that tool in the system quite difficult. Making the programs for Linux is different than making them for Windows, but if the monitoring tool can be set in the router, the hackers can monitor all data, what goes thru this device.


The problem of those hackers is that if too many persons will download that program, they would get so much data, that it becomes useless, and in the nastiest scenarios they will send the "sale offers" to the targetted persons, and in this case those persons will pay for those programs, what will steal their personal pictures and other data, what they wanted to keep secrecy.


That most advanced malware software might be stolen from the NSA (National Security Agency) or some other information security authority. Those tools were the national secret, but somebody copied the editors in their USB-stick and then those persons just walked away from Fort Meade. That software has been used to create computer monitor tools, what became public in the case, where the Iranian nuclear program have been monitored. And that software has probably been sold to the Russian intelligence and probably the criminals also have their copies of that complicated software.


But if the person is the good coder, can the necessary programming tools downloaded from the Internet. And in this scenario, the hacker will make the package, what looks like the update package for the antivirus software. This action bases that the antivirus tools must be updated simultaneously, that they can be effectively detected the malware. And if the computer virus will strike in the antivirus software, that might open the back gate to the system, and then all data can be stolen. Then the hackers might cover their crime by destroying the data system by the virus what forces to reinstall the system again, and if the backups were not made, the databases and evidence of the data crime would be stolen forever.

Monday, December 4, 2017

Why are hackers so unusual criminals?


(Source Internet)

Kimmo Huosionmaa

People always talking about hackers and the threats what those people cause for the national security. Normally the talking is turning the thing, why those people are not able to locate using the standard police methodology? The problem with the hackers is normally that those people will not hang in the shopping centers or bubs like normal criminals. Normal police methodology is meant for tracking the drug dealers, who normally operate in the streets.


The tracking the hackers is difficult because the tracker must go inside hackers residency.  Many hackers actually work from home, and that makes the tracking of them very difficult because if the hackers don't want to be tracked, and they have right financial resources, they will be very difficult to track by the net.

The problem is that those people can make series of the computers, what they can remote use, and that makes the tracking those persons very difficult. If the hacker uses series of many computers remotely before this person attacks against the target, will the tracking very difficult. But for this action, the hacker needs comrades, who will take the remotely used computers in the right places. And then the hacker can jump to those computers, and then makes the strike against the interesting target.


But this action needs resources and the problem with the other method, what is infect some computers with the virus, what opens the computer for remote use, is that the person whose computer is infected can just shut the computer because the workstation is not working correctly, and remove the virus by just re-installing the operating system. The hacker needs the trusted platform for the work. And that kind of platform, where is series of the computer located all over the world needs very much financial and social relationship for this kind of action.


In the case the hackers have got the passwords of the target system by using the sodium pentothal or stealing the password by photographing the screens, they must hide their position, even they are sitting opposite the target. The hackers can use UAV:s to surveillance the offices and those vehicles can also equip with  laser microphones to record the competitions in the office. And they might able to get the passwords in their hands.  In that case, they must route their signal around the world, because that will hide their real location.


Even if the passwords are stolen, and the target organization gets the information about it, they might use the passwords as the "honeypots", what means that every user, who uses those passwords will be tracked by IP-addresses and the "trap server" also tries to get the mac-address of the WLAN-card. Because that information might use to track the model of the device, what is used by the hackers.


If the trackers will get the mark of the WLAN-card, they might get the model of the computer, and by using the payment information, they might track those hackers. Some computers are sold very small numbers, and if the hackers are used their credit cards or fill the guarantee card, they might track by using that information.

Tuesday, November 14, 2017

What GPS makes to our privacy?

Source Internet


Kimmo Huosionmaa

There is always threat in every system in the world that the system is dangerous for the people. That kind of system is Ipad and other mobile systems find my phone or tablet etc. If those systems are used in the military world and they are used for the wrong purpose. The first threat to security is that some member of the battle groups crew uses those tracking programs and leaks the site of the battlegroup to the social media. And also that kind of equipment can help criminals to locate some persons.


If they want to go to the targets home, they can use the tracker to secure that person is another side of the world. But many people don’t understand the risks of GPS-system. Those tracking systems can meter our speed in every second, and if the tracker wants that attacker can see the changes of that speed, mark those positions where that person slows to the map, and after that go to see what kind of stuff was in those places. But those operators can also see where the person speeds up, and if the target doesn't go to bus or he or she has no need to run, and that person increases the speed that would tell that there is something, what makes that target uncomfortable.


Those systems are also very good protection for same people who face threat for misuse that system. If the person uses this track my phone action in the strange city, other people of the group will find him, but if some wrong person can get one telephone of the team, the all operation might get in danger. Also by using the tracking device, can the tracker make psychiatric profiles about their target. And break that person privacy forever.


When officials use tracking devices, they can also find out if the target is alone. The trick is very simple. Those operators must only track the people near the target, and after that, they will see if somebody is walking with this particular person. And also those operators can make the profile of that person's interests by following target’s speed, and if they want those people can see what kind of shops there is, and maybe they want to see those windows to see what there is.


If target avoids the certain places at the certain time, that might tell that there is something wrong. And if this person simultaneous avoids certain bus line, that might tell that there are some problems with the target and bus driver. In this part, I meant that it is quite interesting, that some person will run to the bus, but that leaves this person, and after that comes the next bus, what have the same line, but this person is not step in that vehicle but wants to go in the next one. That might mean very many things.

Tuesday, October 17, 2017

Miniaturization of technology gives new ways to mark documents

RFID-chip inside person's hand


Kimmo Huosionmaa 

Print media is problematic for data security. Those print files could be put just in the pocket and after that thief of that data could walk out the building. But modern technology gives very effective methods to deny that kind of work. This method basis itself in miniaturized RFID-chips, what can put in the ink tanks inside ink liquid.


Those nanosize chips are so small that they can inject to a paper same times, where text and pictures are, and those chips are so invincible that they can't be separated from other text and that equipment can put in the normal ink tank. So even printer operator doesn't know that those systems are in the ink. And in that RFID-chip can save information about who printed that paper, and if the thief walks throw security gate, what might be covered in the doorframes.


Of when security personnel is looking for those documents they must only use GSM-phones, what will take near persons and their pieces of luggage, and after that security personnel can take that thief in the hands of the law. That reading application might be similar, what is used by ticket checkers in public transportation. And that application might send the report of those papers to firms security. And if I really want to think nasty, those applications might send report same time to the security police. It also might work as a ghost software, what is secretly installed in all that workplaces workers telephone, and if they don't see or know that application that might cause them lots of trouble if they steal papers from the workplace.


That system could be also metal detector and that magnetic field will be inducted electricity to that tiny little microchip, what will send data about the person who printed that document, and even what kind of is in the document. The printer or copy machine can also take PDF-copy of that document, and mark it with register number what will put in the chip. And if some prints will attempt to take out the building, they will alert chief of security and he will see what documents are taken out of the building.


After that, if a thief can slip off those documents will deliver to hands of patent officials and police. And if somebody will sell those documents or try to capitalize them, will patent authorities notice that. This is very important if stolen material consists research and developing the technology for company's tomorrow products. Those kind of stuff are in marketing at least couple of years and they might be wonderful equipment in many things. 


Small size implanted microchips might be put surgically in some people bodies, and that thing might read by airport's security gates. That kind of RFID-chips are put in dogs, but they can also implant in bodies of some special forces operators like NAVY SEAL- or other persons who the government doesn't want to go somewhere. And also dangerous prisoners must be implanted that law enforcement could find them in the crowd of people.



That other persons are technical and scientific specialists whose skills are that kind of that government ever let them go to the country what is hostile. Somebody thinks that some key members of some nations government and scientific laboratories are implanted with GPS-chips, what looks like pills and contains very long life batteries, that government can follow them around o'clock in every day of the year.


Yläkuvan osoite:  http://www.michaeljournal.org/articles/world-government/item/global-control-through-the-rfid-chip

New autonomous task units are entering service.

"The deal will create much-needed competition for the Department of War acquisition process. (Representational image)" (Interestin...