Reality overtakes fiction: We are already at war Wes Martin Color Rush Jersey , albeit electronic, but war all the same Computers Articles | August 31, 2012
It is one of the plot tenets of the thriller ?Rain Fund? that foreign Intelligence services are actively preparing a future cyber-war through dormant hardware viruses and other means. Is it Fiction? Not anymore! It appears now that functional hardware viruses have been detected and that an active electronic war is already taking place under our very noses.
In previous articles, we have described hardware viruses as minor modifications of very complex circuit boards that make the basic components of every modern electronic chip. The great danger these new virus types pose is that they are, in fact, nearly undetectable because they are dormant until activated. A few thousand additional circuits among a few millions on a chip cannot be revealed by routine quality control. When this chip is one out of a few thousands getting into an electronic device Bryce Love Color Rush Jersey , what chance is there that it will be discovered? As the design and production of any modern device is a complex task being executed by hundreds of independent teams on several continents, nobody can truly be responsible for the integrity of a computer or a smart phone. A hardware virus can therefore be as dormant as a mole for years, until activated by a certain date, by an outside message, or by a sequence of internal events. Hardware viruses could be introduced into everyday electronics by a criminal organization or a foreign Intelligence Agency. Unlike a software-virus, which can be handled by antivirus software and reprogramming Terry McLaurin Color Rush Jersey , hardware viruses cannot be dealt with without replacing the whole physical component. A point being made in our previous articles was that it is common knowledge that most modern electronic chips are today manufactured in Asia. Would it really be an insurmountable task for a Chinese Intelligence Agency to have a subcontractor tweak a ubiquitous chip? Your answer is as good as mine.
The reality of hardware viruses cannot be swept aside: Not only are they theoretically obvious, they have been manufactured by several University laboratories and their potential nefarious activity documented. But we are now told that an actual hardware virus has been detected! The chip in which a ?backdoor? has been detected is a very common component of many applications?including communications and military equipment. The hardware misconstruction allows for an external input to modify programs and memory contents of the final device. This is a very serious revelation, which to date has only been explored in fiction. But, funnily, it happens that the manufacturer of the potentially malicious chip is? American. This does not weaken the fact, of course Montez Sweat Color Rush Jersey , that hardware viruses are already a reality, and a very serious reality at that.
There is no doubt in anyone?s mind that the next war will be fought in cyber-space as well as in the physical world. Civilian, financial, and military infrastructure will be the targets of severe disruptions in the case of conflict. And the race to be better prepared?both offensively and defensively?is being run right now. Clearly you cannot stop this progress, which, of late Dwayne Haskins Color Rush Jersey , we are told, has spawned a new generation of software viruses. These are called ?Frankenstein? viruses: they are based on snippets of innocuous code that exist in legitimate software and trusted programs, but which assemble into a virus by themselves under the designed circumstances. These viruses are nearly undetectable because they avoid the statistical patterns and the malicious architecture of common viruses. They take legitimate building blocks of accepted and universal software, to build, in your device, a malicious entity.
If you bundle together these new hardware and next generation software viruses Landon Collins Color Rush Jersey , and add it to what we already know about malfeasance by big companies and country-backed agencies, you have the recipe for potential havoc in our lives. But is it that real a threat? Is it not all conjecture? Would these cyber-weapons really be used by our enemies? The answer is short and clear: They already are!
Sources close to Intelligence agencies have admitted that the Suxnet virus, which successfully destroyed Uranium-enriching Iranian centrifuges, was an American-Israeli operation. It is not clear, however, whether the leading part in the Operation was American or Israeli Black Preston Smith Jersey , but that is not important. There have been more virus attac