LightNovesOnl.com

Terminal Compromise Part 81

Terminal Compromise - LightNovelsOnl.com

You're reading novel online at LightNovelsOnl.com. Please use the follow button to get notifications about your favorite novels and its latest chapters so you can come back anytime and won't miss anything.

A BBS COMPUTER IS DEDICATED TO ONE FUNCTION, BBS'ING. SO I POKED AROUND AND FOUND ANOTHER COMPLETE BBS SYSTEM, NOT PART OF FREE- DOM. TOO MUCH WAS ENCRYPTED, THOUGH, TO LEARN MUCH. BUT WE WILL.

Don't get yourself into hot water again . . .

NOT TO WORRY. I'LL BECOME ONE OF THEM. PLAY THEIR GAMES. IT'S EASY TO BE ANYONE YOU WANT. I WANT TO SEE WHAT'S GOING ON BEHIND THE SCENES. SHOULDN'T TAKE LONG.

Friday, December 18 New York

U.S. Army on Virus Vigil!

by Scott Mason

In July of 1990, the United States Army joined the inner sanctum of the Computer Hacker.

The Pentagon had finally realized that the computer is as essen- tial to battlefield operations and communications as is the gun and the radio.

Therefore, as the logic goes, why shouldn't the computers be directly attacked as are other military targets. In keeping with that line of thinking, the Army said, use computer viruses.

Viruses are those little gremlins which roam throughout a comput- er system, hiding themselves in silicon gulches, waiting to ambush mountains of megabytes and erase deserts of data. Perfect for modern warfare.

The Army issued an RFP, (Request For Proposal) asking the private sector to study and design computer viruses and other methods to be used offensively against enemy computers. The half million dollar contract was awarded to a Beltway Bandit, a small govern- ment sub-contractor so named for their proximity to Interstate 495, which loops around Was.h.i.+ngton, D.C.

So, the Army is going into the hacking business, but this brings up quite a few questions.

Question I. How long has the Government known that computer viruses and other maladies could be used in a strategic militari- ly offensive fas.h.i.+on? RFP's are always preceded by much internal research and consultation with private industry. The Government typically will have issued RFI's, (Requests For Information) and RFQ's (Request For Quotes) and already have a darn good idea of what's available and from whom.

Question II. Has the Government already sponsored such research?

The existence of the EMP-T Bomb has created quite a furor.

Question III. What if the Army created experimental computer viruses and they get loose? Who is responsible for silicon based biological warfare on desktop computers?

Question IV. Have any computer viral outbreaks actually been Government projects gone out of control?

Question V. If the Government knew that civilian and military computers could be systematically attacked and destroyed, why haven't we done anything to defend ourselves against a similar a.s.sault?

Last month's attack on the Stock Exchange by secret EMP-T bombs prompted an investigation into such military capabilities, and some surprising answers were uncovered.

In an attempt to get specific answers from various Government agencies, I located a secretive group called OCTAG/0N. (Offensive Computer Technology Applications Group/Zero-November). OCTAG/0N is a highly cla.s.sified interagency project whose sole function is to develop methods to destroy or disable computers from great distances.

According to a highly placed source at the Pentagon, OCTAG/0N allegedly developed computer viruses that will destroy the ene- my's hard disks. Successful deployment, to use Pentagon-ese, is the hard part. "If we can get at their computers," an engineer with OCTAG/0N said requesting anonymity, "we can stop them in- stantly. Getting them there has been the problem. But now we know how to get at their computers from great distances."

In the battlefield, for example, advanced tactical communications groups explode small Magnetic Bombs (EMP-T) which emit very strong electromagnetic pulses at certain frequencies. The EM pulses destroy nearby computers, (RAM, ROM, EPROM, Magnetic storage). Some computer systems are 'hardened' with extra s.h.i.+elding as in the Tempest program. Other computers, such as those in Air Force One, inside missile silos, or in the Pentagon War Room are additionally protected by the secret C3I programs which 'super-hardens' the computers against the intense magnetic pulses a.s.sociated with above ground nuclear explosions.

Intensely focussed energy beams of low power can totally disrupt an uns.h.i.+elded computer as far away as three miles. Synchronized Interference Techniques provide double duty to both listen in on and jam air borne computer traffic. One of OCTAG/0N's pet tricks is to broadcast a computer virus from a small antenna so that it is caught by a computers communicating on the same frequency. So simple, yet so devious.

In conversations with computer experts and the underground hacker community, the existence of such high tech weaponry has been confirmed, although the Department of Defense is still issuing a predictable 'no comment'.

So, I have to ask again. Why hasn't our Government been helping us protect ourselves against an apparently formidable computer weapons complement? I hope "The Other Guys" aren't so well armed.

This is Scott Mason, adding a chast.i.ty belt to my modem.

Chapter 17

Monday, December 28

A/K/A Software by Scott Mason

The Christmas Virus is upon is. So is the antic.i.p.ated New Years Eve and New Year's Day Virus.

Seems like wherever I look, someone is making a virus to attack my computer or celebrate a holiday.

Rather than another rash of warnings about the impending doom and gloom faced by your computers, my editor asked me to find the lighter side of computer viruses. I strongly objected, stating that I found nothing amusing about them. They were a deadly and cowardly form of terrorism that should be rewarded with behead- ing.

However, there is one thing . . .

The geniuses who come up with the names for viral infections; about as believable and laughable as a Batman comic.

I wonder what most of us would think if our doctor told us we had the Ping Pong virus instead of strep throat. Or in spring time we contracted the April Fool's Virus.

It is entirely within the realm of reason that America's comput- ers go unprotected because of the sheer absurdity of the names we attach to each one. Comical names create a comical situation, so no one takes the issue seriously.

The Marijuana virus conjures up images of a stoned orgy, and why would a computer care about that. The Fu Manchu virus conjures up the Red Chinese Army crossing the Mississippi, which is clear- ly not the case, so it is ignored.

Viruses know no national boundary. The Pakistani virus, the Icelandic, the Israeli, Jerusalem A, Jerusalem B, Jerusalem C, Lehigh, Alameda, Vienna, Czech, Rumanian - I found over 900 current and active viruses that are identified by their reputed place of origin.

The Brain virus sounds more sinister than the Stoned Virus, and Friday the 13th viruses are as popular as the movie sequels. The Columbus Day Virus was actually dubbed by its authors as Data Crime, and might have generated more concern if not for the nick- nom-de-plume it inherited.

So to fulfill my editor's dream, I will list a few of the more creative virus names. Some were chosen by the programmers, others by the Virus Busters and others yet by the media. See what you think each virus would do to your computer, or when it will strike, merely from the name.

The Vatican Virus The Popeye Virus The Garlic Virus The Scrooge Virus Teenage Mutant Ninja Virus The Ides Virus The Quaalude Virus The Amphetamine Virus Super Virus The Tick Tock Virus The String Virus The Black Hole Virus The Stupid Virus Stealth

I have a few of my own suggestions for future virus builders.

The Jewish s.e.x Virus (Dials your mother-in-law during a romantic interlude.)

The Ronald Reagan Virus (Puts your computer to sleep only in important meetings.)

The Pee Wee Herman Virus (Garbage In Garbage Out)

The Donald Trump Virus (Makes all of your spread sheets go into the red.)

Tomorrow, Viruses from h.e.l.l on Geraldo.

Namely, this is Scott Mason.

Click Like and comment to support us!

RECENTLY UPDATED NOVELS

About Terminal Compromise Part 81 novel

You're reading Terminal Compromise by Author(s): Winn Schwartau. This novel has been translated and updated at LightNovelsOnl.com and has already 689 views. And it would be great if you choose to read and follow your favorite novel on our website. We promise you that we'll bring you the latest novels, a novel list updates everyday and free. LightNovelsOnl.com is a very smart website for reading novels online, friendly on mobile. If you have any questions, please do not hesitate to contact us at [email protected] or just simply leave your comment so we'll know how to make you happy.