The risk of the highly sophisticated algorithms
Gary McKinnon (1) and his hacking to the Pentagon, NASA and other secretive systems are one of the most interesting things in the history of hacking. And there are many data sources about that case, but the problem is that how McKinnon found the passwords to those systems? Did he get them by using social hacking? By just calling the telephone call to somebody, who has access to those systems, and then asked that person to make the password to that system to him?
Or otherwise is possible that the servers, where McKinnon was intercepted were infected by a very interesting and unusual parasite- or malware solution. The idea is that this kind of theoretical malware would infect the database of the passwords, and then give access to the user, by showing the passwords and user addresses of that system in the screen, if the hacker would activate the system.
So the thing might go that the malware could install the code in the system, which blinks the access-code to the server on the screen. And that kind of subliminal blinking can be adjusted into the same frequency with the alpha-waves of the brains. This kind of system can be used for giving full access to the targeted system if the person uses the right and authorized computer, but otherwise, the same system can deny the unauthorized use of that malware.
The algorithms can activate the subliminal ordering system in the server, which is under the attack. So the data, what is collected can involve blinking, what has the same frequency with the alpha-curve of the EEG, and the loudspeakers can start the infrasound commanding.
Also, the loudspeakers of the computer can be programmed to use the sound, which makes it impossible to continue the operation, because that kind of thing causes epileptic diseases. So if this kind of malware is used as the tool, what gives the hacker access to the system, it can be written by the GRU or some other military intelligence organization. The motive of those organizations would be to collect the information from the opposite side systems, but they would not want that the collected data is in the hands of everybody.
So if those people would deny that the people, who are working with that kind of code would not tell other people that the intelligence service can read secret files from the servers, that thing can be made impossible by using the blinking screens and sounds. The mission of those effects is denying the people to tell the unauthorized persons the master passwords of the system.
That's why the memory of the operators must also clean, and the stolen data would be meant for the use of highest-ranking intelligence officers. So the risk of those algorithms is that they can use subliminal ordering against people, who are entering the system. And if the reactions, what those programs will agitate are violent, that thing can cause an extremely terrible situation.
(1) https://en.wikipedia.org/wiki/Gary_McKinnon
Image: https://media.springernature.com/relative-r300-703_m1050/springer-static/image/art%3A10.1038%2Fs41587-019-0231-y/MediaObjects/41587_2019_231_Figa_HTML.jpg
Comments
Post a Comment