Hacker Attackers

Hacker Houndshacker

Did you ever hear of a dirty old egg sucking dog? Johnny Cash even wrote a song about one. If you ever lived on a farm with a egg sucking dog, you had no alternative but to get rid of it. Once they started they never stopped.

Hackers all over the world are like those egg sucking dogs, they will not quit hacking their way into every computer system they can get their dirty little digital paws into. Ever since the brain put the first computer together there has been another brain standing by, figuring out a way to hack his way in to it. They love the challenge and knowing it is wrong, they hold the power to get what is inside!

The news headlines today are about computer hacking all over the world.  Hackers glean names, addresses, Social Security numbers and credit card numbers. It is  big business all over the world selling those stolen identities .

Hackers also dig corporate secrets, or top-secret government information out of cyber space, maybe even black mail material. Future cultures might be undermined and harmed by computer hackers, cyber attacks and cyber warfare. The ability to retaliate against another nation who is doing cyber attacks will be paramount to survival.

We have come a long way since 1946 when the United States government first used ENIAC the Electronic Numerical Integrator and Computer. It was first used in the United States Army’s ballistic research laboratories.

The first time the word cyberspace was ever used was in 1982. As the first computers and the Internet system were in their infant stages. In this modern world everything is done through cyberspace. You have to wonder why we have so much depending upon cyberspace and the accuracy and security of the computer systems.

A determined enemy with the sole intent of destroying our culture, country, and people will find ways to inflict the most damage that they possibly can. They will have everything at their disposal that money can buy, it all goes to the highest bidder.

We have known full well, been warned years in advance what the hackers targets are going to be, “our infrastructure.” yet we don’t seem to show a lot of concern and we haven’t for the past 20 or 30 years. Critical infrastructure is a term used by governments to describe assets that are essential for the functioning of a society and economy, the infrastructure. Most commonly associated with the terms are facilities for electricity generation, transmission and distribution; gas production, transport and distribution; oil and oil production, telecommunications; heating, natural gas, fuel oil, public health, transportation systems (fuel supply, railway networks, airports, harbors, inland shipping. Financial services (banking clearing); security services (police and military). Why does our government depend almost totally on computers and cyberspace for the day to day operation of the infrastructure of this country?

Many of the people who built the computer systems are in a mad rush now to keep from having to destroy them. Not totally destroy them, just destroy the computer systems that belong to the enemy. Cyber war ideas are not new. It appears they have been in the military think tanks for many years already. Deploying the cyber bombs will take a certain talent I imagine. It doesn’t take a rocket scientist to figure out the person who can come up with the biggest cyber destroying bomb is going to surely have an upper hand in the cyber world that survives Melt Down Day. Similar to Pearl Harbor Day.

Why have we crammed all of our eggs into one new-style electronic basket? It now appears that basket could be carried off by any dirty old egg sucking dog. U.S. government security expert Richard A. Clarke, in his book Cyber War (May 2010), defines “cyberwarfare” as “actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption disruption.”

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s