ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Is Your Computer Hacked?

Updated on July 18, 2015

Are We Hacked and Do Not Know?

Are We Hacked? Are They Waiting to Exploit? New Book Available - Buy Direct from Author and Save $$$   www eyeswideshutanenigma dot com or simple enter name of book into Goggle Search Engine: "Eyes Wide Shut: An Enigma"
Are We Hacked? Are They Waiting to Exploit? New Book Available - Buy Direct from Author and Save $$$ www eyeswideshutanenigma dot com or simple enter name of book into Goggle Search Engine: "Eyes Wide Shut: An Enigma" | Source

What's Going On? Cyber Attacks...

The Challenge – The Executive Branch Knows something Weird is Going on…

The President noted, "cybersecurity is a challenge that we . . . are not prepared to counter." This is the tip-of-the-iceberg. A top Department of Homeland Security official has admitted to Congress that imported software and hardware components are being purposely spiked with security comprising attack tools by unknown foreign parties.

Rep. Darrell Issa (R-CA) during a White House Cyberspace Policy Review hearing stated, “Software infrastructure, hardware, [and] other things are built overseas that come to the United States with items that are embedded already in them by the time they get here to the United States.”

According to White House documents, the executive branch is actively studying the risk of nation-states purposely installing sleeper, one-use attack tools in software and hardware components marketed in the U.S. hardware manufactured abroad has been embedded with malicious code, a problem described last year in Scientific American by John Villasenor, a professor of electrical engineering at the University of California, Los Angeles. The design of modern integrated circuits has become so complex, says Villasenor, that malicious agents could insert unwanted instructions into the circuits at some point in the process.

Malicious Firmware

The existing danger from the supply chain that comes from global sources, for electronic components could be infiltrated by hostile agents. These hostile agents – not limited to foreign governments – could alter the circuitry of the integrated components. Logic “bombs” can be created that would cause terrible harm and economic disruptions on a global scale. The damage and disruption is only limited by the needs and skills of the hostile agents.

What Does This Mean?

Examples of the danger already embedded in our electronic devices, cell phones, hardware and computers is where our cell phones may be preprogrammed to shut down at a certain predetermined time. It gets worse. Anything that uses a microprocessor – anything electronic – is a target. Integrated circuits are the brains of our digital world. They lie at the heart of our communication systems and the world’s utility systems. They fly our planes, operate our cars, and operate our banking systems and vaults. Our society is fully integrated into the digital age. Our armed forces use digital devices in almost every critical system.

A well designed planned attack could bring commerce to a halt and immobilize critical parts of our military system and government.

What to do?

To prevent malicious firmware getting into our digital world is almost impossible. The supply chain from the manufacturer process, distribution, and use must be controlled. At any point, a counterfeit component could be substituted, or existing electronic components altered.

A “real-world” possible control would be to require counter-measures that include the design, fabrication, assembly, and distribution of the electronic components destined for government or critical use systems to be carried our domestically in an controlled environment. The entire process must be supervised by screened personnel with verification procedures.

There must be an on-going process of probing, searching for malicious devices by varied means and devices.

Related Article:

http://hubpages.com/hub/Computer-Worm-Stuxnet-Hits-Nuclear-Plant-in-Iran

http://hubpages.com/hub/Siemens-Halts-Computer-Virus-For-Key-Infrastructures-Utilities-Nuclear-Power-Plants

New Book Available - Buy Direct from Author and Save $$$

www eyeswideshutanenigma dot com or simple enter name of book into Goggle Search Engine: "Eyes Wide Shut: An Enigma"


working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)