• Latest
  • Trending
  • All
Could Our Computers Bring us Down?

Could Our Computers Bring us Down?

Green Bay-area sailor describes life on board USS Gerald Ford

Green Bay-area sailor describes life on board USS Gerald Ford

Four more Oath Keepers convicted of seditious conspiracy in Trump’s failed coup

Four more Oath Keepers convicted of seditious conspiracy in Trump’s failed coup

‘1923’ Star Says ‘It Doesn’t Get Easier for Anybody’ When the ‘Yellowstone’ Spin-off Returns

‘1923’ Star Says ‘It Doesn’t Get Easier for Anybody’ When the ‘Yellowstone’ Spin-off Returns

Experts share tips for driving in the snow

Experts share tips for driving in the snow

Small Details We Love From The Life Is Strange Series

Small Details We Love From The Life Is Strange Series

Forspoken Starter Guide – 5 Tips to Hit the Ground Running

Forspoken Starter Guide – 5 Tips to Hit the Ground Running

Pick the Right Peep Sight Size for Bow Hunting

Pick the Right Peep Sight Size for Bow Hunting

I raced in -20° weather for nearly 5 hours and it was an experience not to be missed

I raced in -20° weather for nearly 5 hours and it was an experience not to be missed

24 causes of death—and how likely they are to happen |

24 causes of death—and how likely they are to happen |

Best Locations To Hot Drop

Best Locations To Hot Drop

How Russia is leveraging its Arctic region for global influence

10 Video Game Characters You Didn’t Know Are Based On Real People

10 Video Game Characters You Didn’t Know Are Based On Real People

Friday, January 27, 2023
SURVIVAL UPDATES
  • Home
  • Survival
    How to Make a Clay Pot Heater to Stay Warm When the Heat Goes Out!

    How to Make a Clay Pot Heater to Stay Warm When the Heat Goes Out!

    13 of the Best Self Defense Weapons (That are Legal!) of 2022

    13 of the Best Self Defense Weapons (That are Legal!) of 2022

    Gun Hunting vs Bow Hunting

    Gun Hunting vs Bow Hunting

    How to Hunt Squirrels – 7 Great Tips for Spotting and Stalking Squirrels

    How to Hunt Squirrels – 7 Great Tips for Spotting and Stalking Squirrels

    Convict reportedly rearrested at his own birthday party nearly 2 months after he escaped: ‘We won’t stop until you’re caught’

    Convict reportedly rearrested at his own birthday party nearly 2 months after he escaped: ‘We won’t stop until you’re caught’

    Wife fatally shoots intoxicated man who was fighting her husband outside couple’s front door and trying to force his way into home. She got gun the day before.

    Wife fatally shoots intoxicated man who was fighting her husband outside couple’s front door and trying to force his way into home. She got gun the day before.

    15 Of The Best Toilet Paper (TP) Plant Substitutes

    Quick and Easy DIY Homemade Cleaning Products

    Can You Call 911 Without a Signal?

    Can You Call 911 Without a Signal?

    BREAKING: Lee Zeldin attack suspect David Jakubonis arrested on federal charge

    BREAKING: Lee Zeldin attack suspect David Jakubonis arrested on federal charge

  • Survival Food
    Prepper Food List –

    Prepper Food List –

    The 3 Rules of Frugal Prepping

    The 3 Rules of Frugal Prepping

    Prepper Pantry – 12 Styles with Photos and Tips

    Prepper Pantry – 12 Styles with Photos and Tips

    Can You Eat Dandelions? | What Health Buffs Should Know

    Can You Eat Dandelions? | What Health Buffs Should Know

    How to Make Mead | DIY Mead In 6 Easy Steps

    How to Make Mead | DIY Mead In 6 Easy Steps

    Everything You Need To Know About Eating Dead Crab

    Everything You Need To Know About Eating Dead Crab

    How Long Do Ramen Noodles Last?

    How Long Do Ramen Noodles Last?

    Short-Term vs. Long-Term Food Supply

    Short-Term vs. Long-Term Food Supply

    How To Pressure Can Chicken Stock (Recipe)

    How To Pressure Can Chicken Stock (Recipe)

  • Survival Gear
    Green Bay-area sailor describes life on board USS Gerald Ford

    Green Bay-area sailor describes life on board USS Gerald Ford

    Four more Oath Keepers convicted of seditious conspiracy in Trump’s failed coup

    Four more Oath Keepers convicted of seditious conspiracy in Trump’s failed coup

    ‘1923’ Star Says ‘It Doesn’t Get Easier for Anybody’ When the ‘Yellowstone’ Spin-off Returns

    ‘1923’ Star Says ‘It Doesn’t Get Easier for Anybody’ When the ‘Yellowstone’ Spin-off Returns

    Experts share tips for driving in the snow

    Experts share tips for driving in the snow

    Small Details We Love From The Life Is Strange Series

    Small Details We Love From The Life Is Strange Series

    Forspoken Starter Guide – 5 Tips to Hit the Ground Running

    Forspoken Starter Guide – 5 Tips to Hit the Ground Running

    Pick the Right Peep Sight Size for Bow Hunting

    Pick the Right Peep Sight Size for Bow Hunting

    I raced in -20° weather for nearly 5 hours and it was an experience not to be missed

    I raced in -20° weather for nearly 5 hours and it was an experience not to be missed

    24 causes of death—and how likely they are to happen |

    24 causes of death—and how likely they are to happen |

  • Survival Skills
    Heart Attack Survival Rate | 4 Major Things You Need to Know about Heart Attack

    Heart Attack Survival Rate | 4 Major Things You Need to Know about Heart Attack

    How to Survive Waterboarding | 4 Good Strategies

    How to Survive Waterboarding | 4 Good Strategies

    9 Ways How to Survive the Purge

    9 Ways How to Survive the Purge

    10 Ways to Stay Alive

    10 Ways to Stay Alive

    How to Survive North Korea in 7 Foolproof Ways

    How to Survive North Korea in 7 Foolproof Ways

    How to Survive a Monkey Attack

    How to Survive a Monkey Attack

    Drought Survival Tips: How to Survive Drought

    Drought Survival Tips: How to Survive Drought

    End of the World Preparation

    End of the World Preparation

    How To Survive A Komodo Dragon Attack In 9 Ways

    How To Survive A Komodo Dragon Attack In 9 Ways

  • Self Defense
    Step-by-Step Guide on How to Make DIY Perimeter Alarm

    Step-by-Step Guide on How to Make DIY Perimeter Alarm

    DIY Bow and Arrow | Follow These Simple Steps

    DIY Bow and Arrow | Follow These Simple Steps

    How To Make A War Hammer

    How To Make A War Hammer

    How to Choose Most Efficient Tactical Battle Belts

    How to Choose Most Efficient Tactical Battle Belts

    3 Back to School Preparation | Prepping for a Safe School Year

    3 Back to School Preparation | Prepping for a Safe School Year

    15 Steps on How to Build a Bomb Shelter

    15 Steps on How to Build a Bomb Shelter

    7 Great Valentine’s Day Gifts for Her

    7 Great Valentine’s Day Gifts for Her

    Best Magazines For The AR-15

    Best Magazines For The AR-15

    How to Use a Kubotan in 3 Easy Steps

    How to Use a Kubotan in 3 Easy Steps

  • Weapons
    Why Every Prepper Needs a Recurve Bow

    Why Every Prepper Needs a Recurve Bow

    9 Best EDC Watches For Survival: A Buyers Guide

    9 Best EDC Watches For Survival: A Buyers Guide

    9 Best Backpacks For Survival

    9 Best Backpacks For Survival

    How To Freeze Dry Food

    How To Freeze Dry Food

    How To Store Water Long-Term And What To Avoid

    How To Store Water Long-Term And What To Avoid

    How to Build One And What To Put In It

    How to Build One And What To Put In It

    9 Best HAM Radios For Preppers

    9 Best HAM Radios For Preppers

    What To Do First In a Survival Situation

    What To Do First In a Survival Situation

    Which one to choose and why?

    Which one to choose and why?

No Result
View All Result
SURVIVAL UPDATES
No Result
View All Result
Home Weapons

Could Our Computers Bring us Down?

by haseeb
in Weapons
0
Could Our Computers Bring us Down?
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter


A favourite theme amongst science fiction writers has at all times been computer systems taking on the world and killing individuals.

For the reason that early days of science fiction, there was a fascination with machines that would assume like people and what these machines may do. In a lot of that writing, clever computer systems that have been self-aware grew to become the villain, typically going as far as to destroy mankind, in an effort to shield mankind from itself.

Now we have but to see that occur, however as an increasing number of analysis goes into growing synthetic intelligence (AI), the chances of computer systems going unhealthy have elevated. A current check of a easy AI, run by Fb, garnered numerous consideration on the web when the check was shut down, because of the computer systems supposedly growing their very own language, which the programmers couldn’t perceive.

Social media being what it’s, the story was blown out of proportion, garnering clicks from tales about the way it was a “shut name, with computer systems virtually taking on the world.”

However is that attainable? One would assume that programmers would write one thing like Asimov’s Three Legal guidelines of Robotics into the AI’s programming, making certain that the computer systems knew who they served. However then, even when they did, would applications highly effective sufficient to be taught from their very own historical past and rewrite their code grow to be capable of write these legal guidelines out of themselves?

Attempting to purpose this all out is greater than sufficient to offer anybody a headache. However simply because it’s science fiction proper now, doesn’t imply the chance doesn’t exist. Many issues which have began out as sci-fi exist on this planet right this moment. Computer systems and cell telephones began out on this planet of science fiction, and so they have grow to be mainstream right this moment.

Cyberwarfare

However the greater danger right this moment isn’t what the computer systems themselves may do, however what individuals utilizing these computer systems may do. We’re all aware of the world of id theft, viruses, and different crimes that hackers inflict upon society right this moment. What began out, a long time in the past, as a difficult sport for laptop geeks making an attempt to interrupt into corporations’ computer systems, has became a large felony community, costing society over 600 billion {dollars} per 12 months, virtually 1% of the world’s GDP.

The place that is going is anybody’s guess. The hackers have the initiative, whereas devoted IT consultants, specializing in cybersecurity are continuously racing to maintain up. But it surely has already taken the subsequent leap, with governments moving into the act and utilizing hacking as a device of espionage and probably as a weapon of warfare.

China was the primary nation to actually acknowledge the navy worth of cyberwarfare, beginning their PLA Unit 61398 and different secretive organizations again within the Nineties. These now exist each inside the navy and with out, to discover flip hacking into one thing that could possibly be used to the nation’s profit and develop the weapons to take action. That features utilizing it for espionage and as an offensive weapon with the potential of shutting down an enemy nation’s capabilities.

Contemplating how a lot we rely on computer systems lately, that’s a risk that may’t be taken evenly. It’s not whether or not China will use that in opposition to us, however when and to what impact. Whereas I’m positive that our authorities has been pumping sources into counterespionage and counter warfare, within the battle between armament and armor, armament at all times has the initiative. Our persons are solely working to catch and cease the issues which the Chinese language, and others, have already developed. They’ll’t actually develop a protection for an assault that doesn’t exist.

Whereas the Chinese language are recognized for his or her cyberwarfare prowess, they aren’t the one nation investing time and sources into growing methods of utilizing computer systems to assault their enemies. Different international locations have delved into the murky waters of cyberwarfare, most notably Iran and Russia.

With our excessive dependence on computer systems right this moment, entry to those computer systems by brokers of a overseas authorities is an excessive safety danger. Bear in mind the concern of Y2K? Folks have been readying themselves in case every thing shut down on the stroke of midnight, turning to the brand new century. Computer systems hadn’t been developed with that turnover in thoughts and so there was reputable concern that issues would simply cease working. It might be even worse right this moment.

It’s clear that we have now already entered into a brand new period of the Chilly Conflict, not less than with China and maybe Russia as properly. They’ve been “tickling” our cyber defenses for nearly twenty years, testing their hacking efforts in real-time. This has supposedly gone as far as to them hacking all the best way into certainly one of our nuclear energy vegetation and taking it over for a number of hours earlier than the breach could possibly be stopped.

Cyberwarfare and the Energy Grid

The lack of our energy grid is the nightmare state of affairs of right this moment. Many writers have introduced their view of what that might imply, most famously, “One Second After” and its sequels, written by William R. Forstchen. In his trilogy, the grid is misplaced to an EMP and the persons are compelled to determine survive.

An EMP isn’t the one danger our power grid faces. The grid could possibly be introduced down by photo voltaic exercise or terrorist motion. The sniper assault on {the electrical} substation close to San Jose, California in 2014 is considered a terrorist act, a “gown rehearsal” for way more widespread motion.

However the actual danger to our energy grid is thru cyberterrorism or cyberwarfare. Lots of the assaults perpetrated in opposition to our international locations’ computes have been particularly aimed on the electrical grid, particularly energy vegetation. In keeping with some sources, our electrical grid receives three such assaults per day.

Whereas I’ve acknowledged the danger of cyberwarfare to our power grid, I’ve largely ignored it. The large selection in management techniques utilized in our energy vegetation, not less than partially because of the huge adjustments in expertise over the past century, when the grid was being constructed, has made the thought of hacking into our nation’s 22,731 energy vegetation a herculean job. I wasn’t involved, as a result of it didn’t seem to be a sensible endeavor for any authorities to attempt to disable that many alternative sources without delay. What number of totally different hacks can be wanted to try this?

Within the Twinkling of an Eye

However all that has modified, virtually in a single day. Within the short while, the Russians’ nefarious dealings within the shadows have come to gentle. In what is going to in all probability be thought-about to be the best act of espionage in historical past, Russia has managed to hack their approach into over 18,000 totally different laptop networks without delay; and it has been occurring for six to 9 months!

The knowledge has simply come to gentle that the community monitoring software program made by SolarWinds has been hacked by the Russians, giving them a again door into a lot of our nation’s prime authorities organizations and companies. What they’re doing with the data they’ve gathered is anybody’s guess, however that is clearly the most important laptop hack in historical past.

The true genius of this operation is that the Russians didn’t trouble making an attempt to hack into the person networks, they focused the safe monitoring software program that’s utilized by corporations and organizations to maintain observe of their networks. In utilizing that technique, they gained a back-door entrance into hundreds of huge laptop networks, in each the private and non-private sectors.

As of this writing, authorities businesses which can be recognized to have been hacked into embody the Division of the Treasury, the Protection Division, Division of Homeland Safety, the Federal Vitality Regulatory Fee, Los Alamos Nationwide Laboratory, Division of State, Commerce Division, and the Nationwide Nuclear Safety Administration, amongst others. As well as, just about each Fortune 500 firm makes use of SolarWinds software program and it’s clear that the Vitality Division and quite a few public utilities have been compromised. The Russians may shut us down, proper now, in the event that they wished.

It’s really unclear at the moment simply how far this breach of our nation’s safety reaches. It might be months earlier than we totally know and even longer earlier than the holes in our cybersecurity could be mounted.

In keeping with one knowledgeable in cybersecurity who I used to be capable of seek the advice of with, corporations can’t simply cease utilizing SolarWinds to unravel the issue. Not solely is there nothing comparable to exchange it, however likelihood is fairly good that the software program has put in alternate technique of communications in these laptop networks in order that even when the software program was eliminated, the Russians would nonetheless have entry to our techniques. It will possibly’t be shut down by blocking the avenues of communication both, until it’s acceptable to close down the web and telephone techniques nationwide, leaving them to close down for months.

One other laptop knowledgeable has opined that clearing up this mess may require shopping for all new computer systems and ranging from scratch. However that might take months and would require cautious examination of all the info being migrated, to make sure that it’s reputable knowledge, with out malware hidden in it. In any other case, the associated fee and energy of fixing over the system can be for naught.

If the Russians need to do us hurt by means of this hack, reasonably than simply spy on us, they’ve a really small window during which to take action. Now that it has occurred, IT personnel nationwide are working additional time to attempt to shield their corporations and organizations. Whereas they will’t simply pull the plug on the Russian again door into their techniques, they will create software program patches to shut these doorways. Besides, there’s a superb probability that the Russians may simply work their approach round these patches. Their hack has already advised them the place the computer systems are, what tools is getting used and what firewalls are in place. That’s all they should know, in an effort to discover a approach round them.

The place Does it Go from Right here?

Now that this breach has been found, laptop consultants can start to work on countering it. However the hackers have an enormous head begin. It’s already recognized that they’ve been working to create different backdoors into our nation’s laptop networks, utilizing the one by means of SolarWinds to offer them a strategy to get these hacks in place. They’ve additionally copied total techniques, together with passwords and different safety data. That breach is probably not repairable.

A part of the issue is that there are usually not sufficient educated IT safety consultants within the nation to cope with the breach that we face. Whereas there’s a glut of low-level individuals who can cope with minor issues, main safety breaches of this sort require essentially the most extremely educated consultants in cybersecurity. There aren’t all that a lot of these round; actually not sufficient for the 18,000 organizations who want them proper now.

However the different factor that has occurred, is that the Russians have confirmed it attainable. As with many different issues on this planet, now that it has been carried out, it’s simpler for others to do it too. Who is aware of after we’ll hear of the subsequent such assault.

Worse than that, the international locations who’re doing this kind of factor aren’t international locations that we are able to belief. Each Russia and China have imperial ambitions that are at present being thwarted by america. Might both of them be considering the identical kind of grand technique that the Japanese had in World Conflict II? Might they see taking down america, by means of the destruction of our infrastructure, as a approach of maintaining the USA from interfering with an invasion of their neighbors? Might we find yourself being nothing greater than a blip within the evening in future variations of world historical past?

We’re clearly in danger. How large that danger is, relies upon extra on our enemies’ intentions, than anything. We may climate this storm, with out hardly seeing a raindrop, or we may have our laptop networks shut down at any second, blocking our capacity to work. Ought to that occur, it is going to make even the worst predictions for Y2K seem to be youngster’s pl…

Sorry, we appear to have misplaced communications.



Source link

Tags: BringComputers
Share196Tweet123Share49
haseeb

haseeb

  • Trending
  • Comments
  • Latest
How to Make Caltrops | DIY Caltrops

How to Make Caltrops | DIY Caltrops

Does a Gas Mask Protect You Against Radiation: Nuclear Survival

Does a Gas Mask Protect You Against Radiation: Nuclear Survival

Three Types of Alcohol All Prepper’s Should Stockpile

Three Types of Alcohol All Prepper’s Should Stockpile

What To Prepare For In 2021: 4 Things To Prioritize

What To Prepare For In 2021: 4 Things To Prioritize

0
How To Find And Buy A Shipping Container – With 2 Secrets To Get Them Dirt Cheap

How To Find And Buy A Shipping Container – With 2 Secrets To Get Them Dirt Cheap

0
How To Grow Garlic: A Step by Step Guide

How To Grow Garlic: A Step by Step Guide

0
Green Bay-area sailor describes life on board USS Gerald Ford

Green Bay-area sailor describes life on board USS Gerald Ford

Four more Oath Keepers convicted of seditious conspiracy in Trump’s failed coup

Four more Oath Keepers convicted of seditious conspiracy in Trump’s failed coup

‘1923’ Star Says ‘It Doesn’t Get Easier for Anybody’ When the ‘Yellowstone’ Spin-off Returns

‘1923’ Star Says ‘It Doesn’t Get Easier for Anybody’ When the ‘Yellowstone’ Spin-off Returns

Recent News

Green Bay-area sailor describes life on board USS Gerald Ford

Green Bay-area sailor describes life on board USS Gerald Ford

Four more Oath Keepers convicted of seditious conspiracy in Trump’s failed coup

Four more Oath Keepers convicted of seditious conspiracy in Trump’s failed coup

‘1923’ Star Says ‘It Doesn’t Get Easier for Anybody’ When the ‘Yellowstone’ Spin-off Returns

‘1923’ Star Says ‘It Doesn’t Get Easier for Anybody’ When the ‘Yellowstone’ Spin-off Returns

Categories

  • Self Defense
  • Survival
  • Survival Food
  • Survival Gear
  • Survival Skills
  • Weapons

Follow Us

Contact Us

  • Privacy & Policy
  • About Us
  • Contact Us

© 2021 Survival Updates

No Result
View All Result
  • Home
  • Survival
  • Survival Food
  • Survival Gear
  • Survival Skills
  • Self Defense
  • Weapons

© 2021 Survival Updates