Skip to main content

The risk of the highly sophisticated algorithms





The risk of the highly sophisticated algorithms 

Gary McKinnon (1) and his hacking to the Pentagon, NASA and other secretive systems are one of the most interesting things in the history of hacking. And there are many data sources about that case, but the problem is that how McKinnon found the passwords to those systems? Did he get them by using social hacking? By just calling the telephone call to somebody, who has access to those systems, and then asked that person to make the password to that system to him?

Or otherwise is possible that the servers, where McKinnon was intercepted were infected by a very interesting and unusual parasite- or malware solution. The idea is that this kind of theoretical malware would infect the database of the passwords, and then give access to the user, by showing the passwords and user addresses of that system in the screen, if the hacker would activate the system.

So the thing might go that the malware could install the code in the system, which blinks the access-code to the server on the screen. And that kind of subliminal blinking can be adjusted into the same frequency with the alpha-waves of the brains. This kind of system can be used for giving full access to the targeted system if the person uses the right and authorized computer, but otherwise, the same system can deny the unauthorized use of that malware.

The algorithms can activate the subliminal ordering system in the server, which is under the attack. So the data, what is collected can involve blinking, what has the same frequency with the alpha-curve of the EEG, and the loudspeakers can start the infrasound commanding. 

Also, the loudspeakers of the computer can be programmed to use the sound, which makes it impossible to continue the operation, because that kind of thing causes epileptic diseases. So if this kind of malware is used as the tool, what gives the hacker access to the system, it can be written by the GRU or some other military intelligence organization. The motive of those organizations would be to collect the information from the opposite side systems, but they would not want that the collected data is in the hands of everybody.

So if those people would deny that the people, who are working with that kind of code would not tell other people that the intelligence service can read secret files from the servers, that thing can be made impossible by using the blinking screens and sounds. The mission of those effects is denying the people to tell the unauthorized persons the master passwords of the system.

That's why the memory of the operators must also clean, and the stolen data would be meant for the use of highest-ranking intelligence officers. So the risk of those algorithms is that they can use subliminal ordering against people, who are entering the system. And if the reactions, what those programs will agitate are violent, that thing can cause an extremely terrible situation.

(1) https://en.wikipedia.org/wiki/Gary_McKinnon

Image: https://media.springernature.com/relative-r300-703_m1050/springer-static/image/art%3A10.1038%2Fs41587-019-0231-y/MediaObjects/41587_2019_231_Figa_HTML.jpg

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting armor has