Kimmo Huosionmaa
In theory, the state or part, that wants to use illegal things against the opposite side would want to use minimum force. The computer viruses are one of the newest and theoretically very easy to program. The tools, what are needed to create effective computer virus are easy to download from the Internet. And the only thing, what is needed is the programmer, who has the necessary skills to create the code, what is needed in the strike.
One of the targets would be the banking system, where the central computers and databases would be erased in the case, that the robberies or hackers would transfer money illegally to other bank accounts. And then the marks of the transfer would be destroyed by the computer viruses, what would hide the identity of those operators.
At the same way, computer viruses would destroy the entire telephone centers by erasing the computer programs from the servers, and one very interesting target would be the root servers of the Internet. If the central nexus computers would be infected by the data virus, the entire net will shut down until the server can return to the operational space by using backup servers, and those servers can swap in seconds.
In the theories and scenarios, the enemy would try to infect the enemy command systems computers with viruses, which will erase the hard disks of the command centers and communication systems. That would cause very much troubles in the case, that the missiles are on the way and the central computers of the fire control systems would be erased.
The new kind of computer viruses would be very complicated and they might have very sophisticated missions. And worst of them can kill people by taking the driving equipment like fuel injection under the control, and maybe in some city area, the virus would turn the injection in the fully open. And especially the system can make an effect that the driver is some kind of maniac, and this kind of things would be used to destroy the reputation of the political candidates.
First data viruses were harmless. They can destroy the entire computer network and robots, what are on the infected network would lose their ability to work. They can take control of the cars ABS brakes and fuel injection systems. This might cause the death of the targeted persons.
In hospitals, computer viruses can destroy vital databases. That would cause a very serious threat to the security of the people. In some scenarios, computer viruses are destroying the database of allergic people, and in theory, allergy can be used for disturbing the concentration of the people. But in the worst scenarios computer viruses can reprogram even the human brains.
That would happen that the hacker would set the own code in the MEG-scanner, that it would begin the oscillation of the magnet field, or by using infrasound in the radio transmitters, and that would cause the terrible situation if the cockpit of the aircraft. In some scenarios, some special forces agents would install this kind of brainwash-program for computers, what would send infrasound messages to the headphones or flash pictures in some military or civil aircraft computers, what are controlling cockpit screens, the similar weapons can be installed in the systems of automobiles, they might use to seem the driver like lunatic.
So-called "psychological computer viruses" are actually possible to install in the movies and if they are installed to the media what is used in controlling the screens of the aircraft or movie theater. That kind of psychological weapons can cause shocking reactions in the persons, who will be targeted by those computer programs.
That kind of computer programs can be used to make opposite forces pilots attack against own targets, and also they can force people to commit suicide. And computer viruses are so-called perfect tools in the hands of assassins. They would install those program in any computer in the world, and when the things, what this attacker wants have been done, the virus can just erase itself from the computer, and then there will be no trace about this thing.
Comments
Post a Comment