Computer Cyber virus attack from hackers

Recently the CIA staged a practice simulation of a cyber attack used to take down the Internet. The simulated attack was called "Silent Horizons" and they learned quite a bit about what could happen if we fail to protect the flow of information. Now before you say no one could bring down the entire Internet. You are sadly mistaken, as we created it and mankind has those amongst us with the tools and brains to bring it all crashing down. I recommend you read up on the CIA report after it comes out on the Silent Horizon project and while you are at it; I recommend this book as well:

Tom Clancy's "Net Force-CyberNation"

I would have to say this is a very provocative book and extremely interesting, story line and characters were interesting as well. Very high-tech thoughts on the future and things to come; I enjoyed it very much. It was interesting how the good guys, took shifts trying to catch the bad guys. Almost like zone defense in time. Since the techno geeks do not sleep and the enforcement officers do not work weekends, they trade off befriending these individuals by way of email, even though the bad guys who are really the good guys know it. The people in the story the new generation did not understand international property rights of information, similar to the Asian way of thinking in their culture. Surely this will be the cause of future wars and mist trust between government and people. The technology already is running away from the government now today as they attempt to stifle free enterprise, but as it has been said in the past you can lock up some ones body, but you cannot lock up their mind. In other words not everyone is motivated by money and the real thinkers and tinkerers will not stop simply because there is no money.

The Net Force is inept and cannot outsmart the outsmarters. The hackers were causing economic disruption and collecting more customers for their system and therefore be a member of their nation within the nation. This is an interesting idea. The difference between the RW "Real World" and VR "Virtual Reality World". Where do you want to take your vacation? If it is in the RW, who pays for the roads if you are a member of the cyber nation and if you are a member of the RW, whose VR, which system are you on, and who can choose the rules? This is a great book, not the story line, not the characters, not the cover, but the thought provoking ideas and foresight. Best book I've read this year.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

best cleaning company Highland Park ..
In The News:

Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.

Illegal Aliens and Homeland Security; Rants from Lance 2003

Is it just me or are you concerned that illegal... Read More

Preparing to Invade Japan

This is the fourth and final article in a series... Read More

The U.S. Department of Justice vs. the Realty Industry, and Its Effect on Consumers

From the National Association of Realtors' Virtual Office Website policy,... Read More

Is This All There Is?

In today's Rants from Lance session I address the question... Read More

Proven Risk Youth Vs At-Risk & High-Risk Youth

In the fields of juvenile justice policy and programming, there... Read More

Al-Qaida has Nukes

Many believe Al-Qaida already has nukes in the United States... Read More

UAV Decoy Stategies, Theories and The Modern Art of War

Well having studying the need for decreasing America's dependence on... Read More

Public Sector Economies in Transition

In the previous article, we described the various methods developed... Read More

Questioning Both Sides of the GM Crop Debate

One question not addressed in GM Crops and Monsanto Terminator... Read More

Arbitrageous Outrageous and Immoral

Back-Dooring the CSIS:The US and Israel have admitted they back-doored... Read More

Fuel Prices at the Pump: That is not the problem, Natural Gas Prices are high too

The price at the gas pump is certainly on everyone's... Read More

The Will To Fight for Islam

The more I study the dynamics of WWII the more... Read More

Quality of Life and Freedom, Unilateral Discussion

City Governments is their quest for; "quality of life" often... Read More

Federal Trade Commission Will Not Monitor MLM Companies

Having been to every city in the country over the... Read More

911 Could Have Been Prevented, Was It Bush?s Fault?

September 11, 2001 could have been prevented. We could have... Read More

The Second Coming in Albania

Blessed with Chinese GDP growth rates (7-8% annually in each... Read More

Silicon Valley Brain Drain; Bad Trade Policies, Why?

We have brain drain issues in Silicon Valley, we have... Read More

Prison Abuses on Good Muslims

Well we have certainly been reading a lot about prison... Read More

Medicade Scam; Worse than You Think

You are not going to believe what is going on... Read More

Tax Attorney in Oregon or Washington; Does Your Small Business Have One?

Tax Evasion has been used to criminalize many, Nixon did... Read More

An ROI on National Security

Do you find it interesting that people complain about the... Read More

Hawala, or The Bank That Never Was

I. OVERVIEWIn the wake of the September 11 terrorist attacks... Read More

Government Credit Card Abuse

Veterans Affairs Employees using government credit cards on personal items?... Read More

How Can We Prevent Black Outs and Protect the Grid?

The idea is to have all the important items with... Read More

Quick Thought on The Flow of Fuel and Costs

Without the flow of fuel our very mobile society comes... Read More

high-end home cleaning Winnetka ..