Home

Terminal Compromise Part 81

Terminal Compromise - novelonlinefull.com

You’re read light novel Terminal Compromise Part 81 online at NovelOnlineFull.com. Please use the follow button to get notification about the latest chapter next time when you visit NovelOnlineFull.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy

A BBS COMPUTER IS DEDICATED TO ONE FUNCTION, BBS'ING. SO I POKED AROUND AND FOUND ANOTHER COMPLETE BBS SYSTEM, NOT PART OF FREE- DOM. TOO MUCH WAS ENCRYPTED, THOUGH, TO LEARN MUCH. BUT WE WILL.

Don't get yourself into hot water again . . .

NOT TO WORRY. I'LL BECOME ONE OF THEM. PLAY THEIR GAMES. IT'S EASY TO BE ANYONE YOU WANT. I WANT TO SEE WHAT'S GOING ON BEHIND THE SCENES. SHOULDN'T TAKE LONG.

Friday, December 18 New York

U.S. Army on Virus Vigil!

by Scott Mason

In July of 1990, the United States Army joined the inner sanctum of the Computer Hacker.

The Pentagon had finally realized that the computer is as essen- tial to battlefield operations and communications as is the gun and the radio.

Therefore, as the logic goes, why shouldn't the computers be directly attacked as are other military targets. In keeping with that line of thinking, the Army said, use computer viruses.

Viruses are those little gremlins which roam throughout a comput- er system, hiding themselves in silicon gulches, waiting to ambush mountains of megabytes and erase deserts of data. Perfect for modern warfare.

The Army issued an RFP, (Request For Proposal) asking the private sector to study and design computer viruses and other methods to be used offensively against enemy computers. The half million dollar contract was awarded to a Beltway Bandit, a small govern- ment sub-contractor so named for their proximity to Interstate 495, which loops around Washington, D.C.

So, the Army is going into the hacking business, but this brings up quite a few questions.

Question I. How long has the Government known that computer viruses and other maladies could be used in a strategic militari- ly offensive fashion? RFP's are always preceded by much internal research and consultation with private industry. The Government typically will have issued RFI's, (Requests For Information) and RFQ's (Request For Quotes) and already have a darn good idea of what's available and from whom.

Question II. Has the Government already sponsored such research?

The existence of the EMP-T Bomb has created quite a furor.

Question III. What if the Army created experimental computer viruses and they get loose? Who is responsible for silicon based biological warfare on desktop computers?

Question IV. Have any computer viral outbreaks actually been Government projects gone out of control?

Question V. If the Government knew that civilian and military computers could be systematically attacked and destroyed, why haven't we done anything to defend ourselves against a similar a.s.sault?

Last month's attack on the Stock Exchange by secret EMP-T bombs prompted an investigation into such military capabilities, and some surprising answers were uncovered.

In an attempt to get specific answers from various Government agencies, I located a secretive group called OCTAG/0N. (Offensive Computer Technology Applications Group/Zero-November). OCTAG/0N is a highly cla.s.sified interagency project whose sole function is to develop methods to destroy or disable computers from great distances.

According to a highly placed source at the Pentagon, OCTAG/0N allegedly developed computer viruses that will destroy the ene- my's hard disks. Successful deployment, to use Pentagon-ese, is the hard part. "If we can get at their computers," an engineer with OCTAG/0N said requesting anonymity, "we can stop them in- stantly. Getting them there has been the problem. But now we know how to get at their computers from great distances."

In the battlefield, for example, advanced tactical communications groups explode small Magnetic Bombs (EMP-T) which emit very strong electromagnetic pulses at certain frequencies. The EM pulses destroy nearby computers, (RAM, ROM, EPROM, Magnetic storage). Some computer systems are 'hardened' with extra shielding as in the Tempest program. Other computers, such as those in Air Force One, inside missile silos, or in the Pentagon War Room are additionally protected by the secret C3I programs which 'super-hardens' the computers against the intense magnetic pulses a.s.sociated with above ground nuclear explosions.

Intensely focussed energy beams of low power can totally disrupt an unshielded computer as far away as three miles. Synchronized Interference Techniques provide double duty to both listen in on and jam air borne computer traffic. One of OCTAG/0N's pet tricks is to broadcast a computer virus from a small antenna so that it is caught by a computers communicating on the same frequency. So simple, yet so devious.

In conversations with computer experts and the underground hacker community, the existence of such high tech weaponry has been confirmed, although the Department of Defense is still issuing a predictable 'no comment'.

So, I have to ask again. Why hasn't our Government been helping us protect ourselves against an apparently formidable computer weapons complement? I hope "The Other Guys" aren't so well armed.

This is Scott Mason, adding a chast.i.ty belt to my modem.

Chapter 17

Monday, December 28

A/K/A Software by Scott Mason

The Christmas Virus is upon is. So is the antic.i.p.ated New Years Eve and New Year's Day Virus.

Seems like wherever I look, someone is making a virus to attack my computer or celebrate a holiday.

Rather than another rash of warnings about the impending doom and gloom faced by your computers, my editor asked me to find the lighter side of computer viruses. I strongly objected, stating that I found nothing amusing about them. They were a deadly and cowardly form of terrorism that should be rewarded with behead- ing.

However, there is one thing . . .

The geniuses who come up with the names for viral infections; about as believable and laughable as a Batman comic.

I wonder what most of us would think if our doctor told us we had the Ping Pong virus instead of strep throat. Or in spring time we contracted the April Fool's Virus.

It is entirely within the realm of reason that America's comput- ers go unprotected because of the sheer absurdity of the names we attach to each one. Comical names create a comical situation, so no one takes the issue seriously.

The Marijuana virus conjures up images of a stoned orgy, and why would a computer care about that. The Fu Manchu virus conjures up the Red Chinese Army crossing the Mississippi, which is clear- ly not the case, so it is ignored.

Viruses know no national boundary. The Pakistani virus, the Icelandic, the Israeli, Jerusalem A, Jerusalem B, Jerusalem C, Lehigh, Alameda, Vienna, Czech, Rumanian - I found over 900 current and active viruses that are identified by their reputed place of origin.

The Brain virus sounds more sinister than the Stoned Virus, and Friday the 13th viruses are as popular as the movie sequels. The Columbus Day Virus was actually dubbed by its authors as Data Crime, and might have generated more concern if not for the nick- nom-de-plume it inherited.

So to fulfill my editor's dream, I will list a few of the more creative virus names. Some were chosen by the programmers, others by the Virus Busters and others yet by the media. See what you think each virus would do to your computer, or when it will strike, merely from the name.

The Vatican Virus The Popeye Virus The Garlic Virus The Scrooge Virus Teenage Mutant Ninja Virus The Ides Virus The Quaalude Virus The Amphetamine Virus Super Virus The Tick Tock Virus The String Virus The Black Hole Virus The Stupid Virus Stealth

I have a few of my own suggestions for future virus builders.

The Jewish s.e.x Virus (Dials your mother-in-law during a romantic interlude.)

The Ronald Reagan Virus (Puts your computer to sleep only in important meetings.)

The Pee Wee Herman Virus (Garbage In Garbage Out)

The Donald Trump Virus (Makes all of your spread sheets go into the red.)

Tomorrow, Viruses from h.e.l.l on Geraldo.

Namely, this is Scott Mason.

Please click Like and leave more comments to support and keep us alive.

RECENTLY UPDATED MANGA

Big Life

Big Life

Big Life Chapter 253: Just Need You Gone (4) Author(s) : 우지호 View : 266,390
Nine Star Hegemon Body Arts

Nine Star Hegemon Body Arts

Nine Star Hegemon Body Arts Chapter 4805 Fighting the Heart-Devil Author(s) : 平凡魔术师, Ordinary Magician View : 7,154,555
Fey Evolution Merchant

Fey Evolution Merchant

Fey Evolution Merchant Chapter 2971: Tears of Mermaid! Author(s) : 琥珀纽扣, Amber Button View : 8,124,850

Terminal Compromise Part 81 summary

You're reading Terminal Compromise. This manga has been translated by Updating. Author(s): Winn Schwartau. Already has 592 views.

It's great if you read and follow any novel on our website. We promise you that we'll bring you the latest, hottest novel everyday and FREE.

NovelOnlineFull.com is a most smartest website for reading manga online, it can automatic resize images to fit your pc screen, even on your mobile. Experience now by using your smartphone and access to NovelOnlineFull.com