keskiviikko 13. marraskuuta 2024

The name of the game is industrial espionage.



Chinese introduced their new stealth fighter.J-35A to the media. That plane is surprisingly similar to the F-35A and it's a good example of industrial espionage that dangers national security in the Pacific and entire world. 

Industrial espionage causes a very big problem in the modern world. Network-based solutions bring multiple tools to computer specialists. That they can make qualified solutions. The problem is that. The hackers can also be computer specialists. 

Another problem is that. Hackers use things like non-protected networks for attacking tools. Even if we bring the data to our own servers we would not remove the network itself. When we start administrating our servers, we just move the cloud to another place. And that is the problem. We must know people who have access to data. We must know that they have the skills and other things that they need. 

We remove one thing that costs money. But we use the same tools. That we used in cloud-based solutions. And here we can say that we just turn to administrate our own cloud. We just transport data from one server to another. 

And that creates a situation where my vacuum cleaner attacks banks or defense forces. The hacker can put a small computer program into that vacuum cleaner. And that thing opens a router or wireless router. Or the attacker. The problem with industrial espionage is this. When some data is stolen. Anybody who will use that data. And laws and law enforcement are helpless in situations where espionage happens under the control of the state. 

The laws in Western nations are not like the laws in the People's Republic of China. When we look at the People's Liberation Army, PLA's newest tools we see that they look like famous Western products.  That means that this type of thing can be stolen by using hacking. The thing in this kind of hacking is that the hacker can operate from China or some other country like North Korea and steal information without the need to come to another state. The assistant can carry the remote-operated computer to a western city like Helsinki. Then the hacker can do the job by using the VPN connection. 

Before the hacker and cyber attack boom some Western actors believed that the laws like copyright laws would protect their products. They believed that hackers would go to jail if they were tracked. And the large-scale hacking, supported by governments is a surprise. The thing is that the Chinese military doesn't cover or hide that espionage at all. Industrial spying is one of the prime elements to get access to production methods. And classified chemical compounds that are used in stealth material. 

The stealth materials are physical things. But the hackers can steal things like  AI source code. 

That is a very dangerous tool in the wrong hands. Government-supported operators can create things like the famous AI's evil twins. Those tools can boost the hacking to new levels. The problem is this. When hacking happens under government control those people must not be afraid of authorities. The thing is that when the government is really authoritarian it has many ways to motivate hackers. And one of them is that the secret police use force and fear to those people. 


Ei kommentteja:

Lähetä kommentti

The new components can boost the AI.

"A new discovery in atomic-scale magnetism may hold the key to the future of high-speed, compact, and energy-efficient technology. (Art...