All great programmers are paranoid.
~ Roedy (1948-02-04 age:70)
There is another way of interpreting this essay, as a terrorist manual.
If builders built buildings the way programmers write programs, then the first woodpecker that came along would destroy civilization.
~ Gerald Weinberg (1933-10-27 age:84) Weinberg’s Second Law
About the only thing you know for sure about how the next war will be fought is that it won’t be fought the same way as the last time.
I find it highly unlikely a rogue nation would attack the United States with an ICBM (Inter Continental Ballistic Missile). Why?
There are far cheaper, safer and more effective ways to break America’s power. What are the alternatives:
What is it that gives America the power to dominate the world? It is not a huge population. It is not astoundingly rich natural resources. She mostly imports them now. It is her computers which enable her to dominate world commerce.
Some years ago I wrote an essay about the EIDE controller flaw and its insidious ability to subtly corrupt data. Back then I explained that insidious corruption would cause more long term damage than outright destruction because eventually all archived backups would be corrupted too.
There are millions of ways to insidiously corrupt data and program source. America is a sitting duck for a patient terrorist with a small bank account and a copy of this essay.
The catch is, even if the terrorist is discovered, if he has been sufficiently clever, there will be no way to undo the damage or to retaliate. The damage will continue to slowly rot away the underpinning of American power.
America is willing to spend a trillion or two worrying about the much more minor effect of a less-likely ICBM attack. Oddly it is totally unwilling to spend even a few million to think about how to defend against this sort of attack.
We have already seen what havoc a few pimply faced Bulgarian school boys could do with an Internet prank. What do you think a team of patient pros could do? Where do you think some of them are working right now planting the necessary hooks for the attack? arguing against any need for concern for a defense? claiming defense is impossible? designing feeble security systems? Perhaps that turkey sitting next to you writing unmaintainable code is actually a highly-skilled terrorist spy.
You learn what sells.
~ Lucy Van Pelt (1952-03-03 age:66)
This page is posted
Optional Replicator mirror
Your face IP:[220.127.116.11]
You are visitor number|