Skip to main content

The crimes are transferring to the Internet


The crimes are transferring to the Internet

Modern bank robberies would not rob banks by treating people with assault rifles. They use electronic data routes, and that thing would make possible to earn even billions of euros in a couple of minutes, and then leave the area by leaving no trace.

The idea of this kind of attack is that every each bank account would be taken only a couple of euros, and that money would transfer to the certain bank accounts. The sum, what those people would take will be so little, that the individual people would not recognize that there would be the robbery.

The bank robbery can happen remotely. 

They would not follow a couple of euros, and that means that the bad guys can steal even billions because they steal little money, but the number of accounts is very large. If the person would steal a couple of euros from million of bank accounts that would mean a couple of million euros transfer of money to the account of that person.

But those persons can be very dangerous. If those hackers would get passwords without violence, that means that they could get very little punishment about their crimes. In the real world in that kind of crimes would involve things like hostage situations and blackmail.

Even if the hackers would not violent themselves, the persons who are behind that kind of operations might be really dangerous. They can threaten the family of the key persons, that they would give the passwords to the criminals, who would transform the money into their accounts.

Terrorists can also benefit the Internet in their operations

Terrorists can benefit the Internet as a communication channel. But the Internet allows very potential operation area for some kind of data viruses, which can format the databases of the computers. That thing might seem very harmless action. But if the databases of the computers of the ships or the airfield would be deleted, could the result be devastating. If the computers would not have a database, they would not able to control the systems.

And that means that the automatized landing procedures are not able to control devices how they should. If the database of the autopilot would not know, how to drive some route, and that would cause the crashes. The thing is that some hackers would program the logic bomb what is the computer virus, which will be activated in the certain day. That thing is that if the person would not pay the prize, the virus will be activated.

In the worst situation, that kind of strike would be targeted to nuclear power plants. Or otherwise, those terrorists would destroy the databases, what involve the information of the blood types of people. And in that case, the results can be devastating. Of course, some hackers can also mess the entire traffic system by turning all lights green at the same time, and that thing can cause accidents, what will cost lives.

The traffic chaos caused by the multiple cars smashes can also slow things like ambulances in the critical moments. if the attack is targeted to electric support, that can cause very bad situations in places like hospitals and prisons. In fact, that kind of things can be very dramatic, if the entire electric network would shut down, many of the vital functions in western society will be facing collapse. And use your own imagination, if the power system would shut down, telephones and the Internet don't work, and every single vehicle, what uses the electricity would not operate a long time, because they cannot load from the loading stations.

Computer viruses can terminate the entire command system

The computer viruses can slip in the data network, and that thing would cause terrible damages if it activates at the same time when the enemy is attacking. That kind of viruses can destroy temporary the data systems of the communication satellites, and rebooting those computers and switching to a backup system would cost a couple of important minutes, and that is a very long time during the missile attack.

But if the system's databases would be destroyed that IFF (Identification Friend or Foe) cannot separate own aircraft and ground troops from the enemy. This means that the fire support will target their own troops. That can be very devastating for own troops because the aircraft cannot give fire support and their own anti-aircraft missiles and cannons would shoot own aircraft.

Computers are in a vital role in military communication

Military communication systems including satellites are in the extremely important role in controlling the military operations. The drones and need for ammunition are transmitting by using a global communication system, which allows the headquarters to communicate straight with the field troops. The system what is basically similar to the normal Internet shares text, images, films, maps and other important data for the field operatives, and without computers that communication is impossible. And also coding the speak, and transforming the speak to text, where the operators can see, what has been talked needs computers. And without computers, those systems would be unable to operate.

Around the Earth is orbiting multiple communication satellites. Those satellites connect the information, what the intelligence collects by using spies, reconnaissance aircraft and sensors, what would be the position, where radio signals are coming. If the command system would not get that data, it cannot target the airstrikes and other use of fire in the right position.

That system is extremely important when the tactical information is shared between the field troops and headquarters, which will target the airstrikes in the right positions at the right time. But that satellite system is communicating with the nuclear submarines and other particles of the nuclear strike capacity, and that means that in the critical moment the nuclear missiles would not get the launching codes if those satellites will not able to communicate with the nuclear missile launching systems.

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...