Zero-day Hacked Bugs

Every once in awhile I read a non-fiction book that challenges my intellect. The most recent is called “This Is How They tell Me The World Ends,” by Nicole Perlroth. This account on cyber security scared me to death about the internet and computers in general. It is my conclusion that the only way one is safe from being hacked on the internet is to shut off the computer and pull the plug, and never plug it back in. If you are using a laptop the only way I can think of is to disconnect from the web, and pull the battery.

Cyber security is something that bugs the crap out of me. I have written just recently about my hatred for using passwords. Companies like Google, and Apple are password paranoid. I always tell people that the only one being protected from getting into my programs and sites is me. I don’t remember passwords at all, and these companies are forcing users to input passwords for every segment of their business. Take Google for instance, I am now familiar with Google, but I wasn’t really interested in Google Drive, Google Photos, or Google anything. They now require user names and passwords for each individual segment of their business. Apple has iPhone, Icloud, and Ipie all demanding user names and passwords. I confess that I don’t get into these segments very often so I don’t remember those details. I keep a 3 x 5 card file with the information as my password manager. The trouble with my system is that it is antiquated and cannot keep up with the digital world. In the case of Apple, I have a stack of 3×5’s stapled together that are 1/4 inch thick with information. Usually, by the time I need to use one of these passwords Apple has deemed it too old and requires a new one. That blows the hell out of my system to make all passwords the same. Recently, by the recommendation of my friends, I am searching for a digital password manager that will replace my card file. I am convinced that it might be easier to give in and use the suggested long complicated passwords generated for me and to forget about keeping track of anything. Except, now that I have read this book I cannot knowingly give in to the hacking world by allowing easy access into my world. It is bad enough that every professional program that I use is froth with hacker entry points that would easily circumvent my passwords.

Let me digress for a moment from the general theme of this post. I like to read news, that is genuine news, and not all the political clap-trap being put before us as news. Over the last few years there have been some notable stories I have followed and forgotten. One of them was a story about a mysterious bug that took over Iran’s computers and disabled (destroyed) several thousand computers they used to control their centrifuges to enrich Uranium. At the time, there was no proof, but the speculation was that the United States and Israel were responsible. Another story, more recent, involved a complete power blackout in Ukraine that crippled the country for days that was attributed to Russia.

As it turns out, both of these stories are accurate and both hacks caused extensive and expensive damage to the countries they were perpetrated on. STUXNET was the invention of the U.S. Our government genii invented this mechanism by sewing several known software-bugs together and also invented a way to sneak it onto an Iranian computer. It took a while for this new bug to work it’s way through the Iranian network, but eventually, it infected a lot of machines, which in turn infected the devices controlling the centrifuges. I give our government an “A” plus, plus, plus for committing an act of war upon Iran without hurting people.

According to author Perlroth, the United States unleashed a weapon that other countries either never thought of, or were afraid to undertake. The end result was a string of cyber attacks by Iran on the U.S. and also from other countries all using “zero-day” openings in software that allowed hacks to occur(a zero-day opening is a hole in software that allows another hacker to enter and infect the program). For years Hackers have been finding these openings in programs and a market for them has developed. At first they were being sold for a few dollars each. As brokers began to understand the value of the bugs the prices shot up. The hope was always that the company whose software the bug was found in would buy it and fix it. Instead, the bugs were sold to the highest bidders which were often countries that could benefit by using these bugs in cyber warfare. The STUXNET was developed using several zero-day bugs. The prices on the market shot up to $250,000 and higher. The U.S. with its deep pockets bought many at millions of dollars a bug. They didn’t use them but rather stored them for future use. After STUXNET, the cyber world got the idea to do the same and wage war the same way.

On the Ukrainian front a special task force of Russian hackers was assigned the task of developing cyber war. They began by developing small discreet components which caused trouble in the Ukraine but because of the size of each they were not considered dangerous. What the world cyber experts did not figure out was that Russia was testing the Ukrainian systems with their hacking bugs. Eventually, the world found out that Russia’s goal was to shut off the lights of a country, and this was probably a test to determine how to shut off the lights in America.

This book is loaded with story after story of hacks that were publicized, but the public didn’t think much of them or was too dense to accept the fact that these wars were taking place on a regular basis. When we think of countries going to war against one another we think of planes bombing sites, tanks shooting buildings to pieces and soldiers shooting each other in the field. We don’t think of war being computers in banks and hospitals being crippled with millions of dollars of damage, or you and me having a bank account hacked and drained of our savings. Luckily, so far that is because the damage is restricted to the computers whose programs had the zero-day bug in them.

Another example is Russia’s attempt to influence the election in this country. I truly believed the crap that Hillary was the one trying to cause our problem, but she was accurate in blaming the Russians. Trump (my hero) on the other hand sided with the Russians to aid him in his quest for the presidency. All I can think of in his defense is the story about Senator Harry Reid from Nevada claiming that Mitt Romney didn’t pay his taxes. After Romney lost to Obama and everyone was asking Harry how he could tell such a blatant lie is “that Obama won the election didn’t he?” This has truly soured me on the election process and politics in general. All of the lies that were told about Russia trying to affect the election were not lies, they were true, but Trump took advantage to use the Russian influence against Biden.

I wrote several times advising not to trust any election in any state that uses computers in the process. there is only one thing worse than using a computer and that is using a computer that is connected to the internet. Author Perlroth used several more examples in her book like the Russian hacking of the DNC. She also explained that hacking into a state’s voter database invites the opportunity to change a voter’s party or to change his vote, and a number of other egregious offenses.

Finally, I am getting back to the point where I broke off above. What can be done about all this shit happening worldwide against us? First, we can regulate the entire software industry and require that they have controls in place to monitor their products. Except, regulation stifles corporations from creativity in favor of safety. Congress won’t buy it. Why don’t we require software companies to ask the public to find these zero-day bugs and pay for them, so they can fix their products? Again, it requires a Congress that is not in the pocket of lobbyists. Why don’t we offer tax incentives for companies who will comply with hack free software? Again, the answer is lobbyists.

There is no easy fix for this problem, but I would certainly be in favor of government regulation of the software industry to produce programs that would offer us some degree of protection from cyber warfare. Our Constitution dictates that the government protect the people. Just as banks are regulated to protect us why not software? Especially software that can be used to harm both the people and the country.

There is a lot more in this book that I have not tried to cover such as China’s role in the world. It is a huge subject, and Nicole Perlroth spent many years researching for her book. Once you read the story, the title will make perfect sense.

Passwords Rule the world

Lately my desire to write is waning. Why? Who knows? I just don’t get inspired anymore. For many years I was inspired by politics, but since the last election I have cooled to the political arena. I just don’t understand what all these new groups want, nor do I understand who they are. Just what is “woke”? Why is there a need for Black Lives Matter? Who is it that panders to all the weird minds that believe they are a new gender other than male or female? Open Borders? We have open borders between every state, but the way things are going I wouldn’t be surprised if some jack ass of a state will close its borders to anyone coming in. Spend money you don’t have, print some to make up the difference. I like that one for my own personal finances. If Uncle Sam can get away with it why can’t we? Think about that one, if you don’t have money to buy a house or a car, buy it anyway and print money to pay for them. Except, why would anyone work if they could push a button and print the cash they need? Without people working there would not be anything to buy, and then we would all get very hungry very quickly.

I often imagine what the world would be like if there was no gasoline to power our cars. Most times these thoughts come to me as I’m driving along on a crowded tollroad with thousands of cars burning gas like crazy, except the Tesla’s of course, they are burning electrons from their batteries. -Right now I’m a few pages into a book titled “This Is How They Tell Me the World Ends.” The topic is cyber weapons. I’m not sure I can complete the remaining 400 pages if the horror coming toward us via computers continues for that many words. The author describes how the Country of Ukraine mysteriously and suddenly went black. No one knows why it happened, but the Russians are very suspect. It happened because some hacker got into the electrical grid and shut all things electrical down. Think about that one too. No lights, no TV, no iPhones, no internet, no computers, no refrigerator, no water, no toilets, no stores, no gas to pump, the list goes on and on. Imagine your life without electrical power. Life will get interesting but sure. It would make the COVID-19 lockdown seem easy.

Top Worst Passwords

There is a complete underground economy developing in the area of cyber security. All of it is secret, in order to keep it from causing us to panic. Remember the name Snowden. He was the young man who walked out of the NSA with a pocket full of thumb drives filled with our best kept cyber secrets. At the time Obama made it sound like it wasn’t a big deal, but all the talk lately about Russian hackers taking over our elections is leaking from the Snowden defection. I don’t think he will ever be allowed to return to the USA again. I hope he likes Russia, cold weather, and vodka.

At my age, I keep telling myself to become more involved, but at the same time my body says, slow down. My mind says enjoy life and forget about the terrible things that can happen to the USA. You won’t be around to see or experience it. Or will I? The cyber criminals can inflict big damage very suddenly over a huge area. Maybe the answer is to swallow a bullet when that happens.

I will finish reading this book and no doubt have nightmares along the way, but maybe, just maybe I’ll be able to help the world solve the problems caused by too many systems that are too lightly protected by easily hacked passwords.

Loose Lips

In times of war, military secrets leaked to the enemy are acts of TREASON. This week we learned of a massive leak of military information regarding the Afghan and Iraq wars. Did I say war? Yes, Congress declared both as wars. They are wars for everyone except for the Commander in Chief. He thinks they are criminal acts, and is handling them the same way as any murderer or thief. During World War II, any act of treason was punishable by death. Why is Obama handling the raid of information by a foreign organization like WikiLeaks so loosely?

I see a thread of continuity here that is scary. Obama definitely has a laissez-faire attitude about the security of our country. Let me count the ways:  1.) Establish an open border, and allow anyone in who wants to come, even terrorists. 2.) Throw your allies under the bus in favor of your enemies. 3.) Disband the nuclear arsenal. 4.) Allow strangers to crash White House State dinners. 5.) Allow your top general to fraternize with liberal magazine writers. 6.) Allow the Muslims to practice dhimmitude by building a Mosque next to the Twin Towers to show they conquered the USA. 7.) Bow to foreign powers. 8.) Take months to react to a request from your front line general. 9.) Allow known Russian spies to live in the country. 10.) Allow a second-rate computer hackers like WikiLeaks gain access to military information and then dismiss it with a “so what?”

The real question to answer is this: Did WikiLeaks hack into our computers, or, did someone inside our government give them access. If they hacked in, I call it an act of aggression the same as war. If one of our people gave it to them, I call it TREASON.

Tracey J Boothe Publishing Blog

Nature, books, exploring, publishing, photography, video, short films, lifestyle

Jim Campbell's

"Inside Every Progressive Is A Totalitarian Screaming To Get Out"

Wavy and Anchored

The waves may come crashing down, but they will not break me.

Journeyman's Journal

This is a journal of the art of woodworking by hand

KetoJENic Vibe

🥓🥑🍳 Health and Wellness based, Easy Recipes, and Keto Product Reviews

Quotes Database

Your Site Of Influential Quotes!

The Lockdown Chef

A cooking survival guide for those who don't know how

My Serene Words

Seeking Solace in the horizon of life & beyond

MRS. T’S CORNER

https://www.tangietwoods

ESL Ventures

Teach ESL and Travel the World

Heart Felt

This platform is for the people who likes to talk straight from the heart🤩

THOUGHTS OF PESHY

on personal experiences and things I'm passionate about

Suzette B's Blog

Inspiration and Spirituality **Award Free**

Bhutadarma

Nothing is impossible (at least that does not violate the laws of physics). When you can..violate the laws of physics!

I Know I Made You Smile

cartoons/humor/fiction/nonfiction

galesmind

Come take a journey through my mind

summershaffer

A topnotch WordPress.com site