Is Your Computer Hacked?

Are We Hacked and Do Not Know?

Are We Hacked? Are They Waiting to Exploit? New Book Available - Buy Direct from Author and Save $$$   www eyeswideshutanenigma dot com or simple enter name of book into Goggle Search Engine: "Eyes Wide Shut: An Enigma"
Are We Hacked? Are They Waiting to Exploit? New Book Available - Buy Direct from Author and Save $$$ www eyeswideshutanenigma dot com or simple enter name of book into Goggle Search Engine: "Eyes Wide Shut: An Enigma" | Source

What's Going On? Cyber Attacks...

The Challenge – The Executive Branch Knows something Weird is Going on…

The President noted, "cybersecurity is a challenge that we . . . are not prepared to counter." This is the tip-of-the-iceberg. A top Department of Homeland Security official has admitted to Congress that imported software and hardware components are being purposely spiked with security comprising attack tools by unknown foreign parties.

Rep. Darrell Issa (R-CA) during a White House Cyberspace Policy Review hearing stated, “Software infrastructure, hardware, [and] other things are built overseas that come to the United States with items that are embedded already in them by the time they get here to the United States.”

According to White House documents, the executive branch is actively studying the risk of nation-states purposely installing sleeper, one-use attack tools in software and hardware components marketed in the U.S. hardware manufactured abroad has been embedded with malicious code, a problem described last year in Scientific American by John Villasenor, a professor of electrical engineering at the University of California, Los Angeles. The design of modern integrated circuits has become so complex, says Villasenor, that malicious agents could insert unwanted instructions into the circuits at some point in the process.

Malicious Firmware

The existing danger from the supply chain that comes from global sources, for electronic components could be infiltrated by hostile agents. These hostile agents – not limited to foreign governments – could alter the circuitry of the integrated components. Logic “bombs” can be created that would cause terrible harm and economic disruptions on a global scale. The damage and disruption is only limited by the needs and skills of the hostile agents.

What Does This Mean?

Examples of the danger already embedded in our electronic devices, cell phones, hardware and computers is where our cell phones may be preprogrammed to shut down at a certain predetermined time. It gets worse. Anything that uses a microprocessor – anything electronic – is a target. Integrated circuits are the brains of our digital world. They lie at the heart of our communication systems and the world’s utility systems. They fly our planes, operate our cars, and operate our banking systems and vaults. Our society is fully integrated into the digital age. Our armed forces use digital devices in almost every critical system.

A well designed planned attack could bring commerce to a halt and immobilize critical parts of our military system and government.

What to do?

To prevent malicious firmware getting into our digital world is almost impossible. The supply chain from the manufacturer process, distribution, and use must be controlled. At any point, a counterfeit component could be substituted, or existing electronic components altered.

A “real-world” possible control would be to require counter-measures that include the design, fabrication, assembly, and distribution of the electronic components destined for government or critical use systems to be carried our domestically in an controlled environment. The entire process must be supervised by screened personnel with verification procedures.

There must be an on-going process of probing, searching for malicious devices by varied means and devices.

Related Article:

http://hubpages.com/hub/Computer-Worm-Stuxnet-Hits-Nuclear-Plant-in-Iran

http://hubpages.com/hub/Siemens-Halts-Computer-Virus-For-Key-Infrastructures-Utilities-Nuclear-Power-Plants

New Book Available - Buy Direct from Author and Save $$$

www eyeswideshutanenigma dot com or simple enter name of book into Goggle Search Engine: "Eyes Wide Shut: An Enigma"


More by this Author


Comments 14 comments

travel_man1971 profile image

travel_man1971 5 years ago from Bicol, Philippines

There are instances that upgrading your software will interpret old programs as virus. My computer had been hacked last year. I immediately shutdown it, then reprogram it again. I never recovered old files, although my fear is about its vulnerabilities.


dallas93444 profile image

dallas93444 5 years ago from Bakersfield, CA Author

travel_man1971,

My concern is our nation as we know it may be at risk. Our electricity is an open source to hack. Our water systems are at risk and etc...

Thanks for your comments.


travel_man1971 profile image

travel_man1971 5 years ago from Bicol, Philippines

Yes, I understand. The software of basic public services can really be hacked. Take for instance the government of Estonia (former part of Soviet Union). The government site (all its departments) have been hacked by just some group of teenagers. It paralyzed the system and transactions outside their country.

It can happen in all countries, especially USA.


dallas93444 profile image

dallas93444 5 years ago from Bakersfield, CA Author

travel_man1971,

Great example! Thanks!


travel_man1971 profile image

travel_man1971 5 years ago from Bicol, Philippines

You're welcome, Sir. This is a very timely issue that should be tackled by every government in the world. I remember watching the movie Die Hard 4.0 (starring Bruce Willis).

The perpetrator or chief hacker was also an insider from the FBI. It can happen, can't it?

People with personal motives can inflict destruction to a country or even the world.


dallas93444 profile image

dallas93444 5 years ago from Bakersfield, CA Author

travel_man1971,

We are very vulnerable....

Again thanks for great comments!


dahoglund profile image

dahoglund 5 years ago from Wisconsin Rapids

Considering Wikileaks it would appear that the government is behind the times on these things.


dallas93444 profile image

dallas93444 5 years ago from Bakersfield, CA Author

dahoglund,

Unfortunately, it appears the government is "reactive," rather than proactive in the process of updating their cyber warefare and defense tactics, methods, and defenses... Can you imagine we are at the mercy of a planned coordinated "attack" via cyber "bombs" that will enable malicious activities that are unlimited and we are "helpless to defend. What good are guns, bombs and etc, if our command and control systems do not work. What happens when our transportation network does not work and commerce is brought to a halt... all of this at the same time?

I know and understand the government is aware and is "working on this problem." However, the danger exist NOW! The challenge is the process is dynamic. As ECM (Electronic Counter Measures) have proved in the past, it is a "cat and mouse game." One makes advances and the opposing side advances past the newest process or procedures...

Awareness is related to the scientific process of solving problems. One must first identify and define the "problem."


susanlang profile image

susanlang 5 years ago

Dallas~ just another reason why we need to be looking over our shoulder. One never knows what to expect or when to expect it. You're right.


dallas93444 profile image

dallas93444 5 years ago from Bakersfield, CA Author

susanlang,

Trust, but confirm...

thanks for your comments!


susanlang profile image

susanlang 5 years ago

Oh, I don't know about the "trust" in the last two months I found out I couldn't even trust my in-laws!


dallas93444 profile image

dallas93444 5 years ago from Bakersfield, CA Author

susanlang

Trust, but bmfirm...


Mcham Law profile image

Mcham Law 5 years ago from Round Rock, Texas

I think you're right about the security issue. Cyber terrorism is the new frontier. Voting you up and following to see more in the future!


dallas93444 profile image

dallas93444 5 years ago from Bakersfield, CA Author

Mcham Law,

Thanks!

    Sign in or sign up and post using a HubPages Network account.

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working