Skip to main content

About identity thieves


Kimmo Huosionmaa

Identity thieves are very dangerous for the reputation of the corporation. One faked email address can destroy the reputation of the company for a very long time. This is the big thing, what the leaders must know, and they must follow the use and creation of the email addresses. If the wrong person would get the identity as the worker of some company,  that person will make very big damages for the reputation and business for the targeted corporation. This is the reason, why we must understand the threat, what the new kind of business culture creates. If the competitor can slip the agent inside some other corporation, that person can destroy the reputation of the company in seconds.

And this is a big problem. If the company's customer service officer would use bad language and gives answers, what is not correct in business life, that will cause trouble.  Or what do you think about the case, where the merchandise, what is ordered were not send to the customer or the officer would send wrong stuff from the warehouse?

That would be the end of the relationship. There are rumors about the cases, that some corporations have even hired professional internet cheaters or trolls for making a bad reputation for some company. In fact, the motive for destroying the reputation of some company could be revenge, because some person is divorced from the service of the corporation.

And sometimes somebody has stolen the identity of the worker of the company. In some cases the stolen mobile telephone, what is not locked have been given gate to take other persons Facebook or Linkedin account in control. If the person has been used those solutions by using the browser,  the hacker would change the password, if it is in some file in the telephone's memo.  Sometimes the workers of some company have so-called "duty accounts" what are operated by the "social media supervisors".

That kind of accounts are dangerous because the worker would probably don't even care, what the company is doing with that thing, and they have their private accounts for personal use. The problem is that if the passwords and usernames are put with the telephone by using some sellotape. If the worker feels disappointment or that person is cheated in the workplace, would happen that this person doesn't even care, if that telephone is lost. In this case, also the cleaner can take the telephone and looks at the log-in information from those sellotapes. In fact, CIA and GRU are using cleaner corporations for covert operations.

Those workers would get the keys to the office very easily, and then agents can come in, by playing cleaners. During the night time, they can photograph every document and look for every telephone, what is forgotten on the table. Also sometimes the cleaners are mistreated, and this kind of things make them good targets for intelligence recruiters. Those agents just ask them to borrow keys, and why some summer worker would care, who will take those keys, especially if the feedback has been bad? Hate makes people act against normal nature. And the intelligence officials have a good eye to locate the persons, who are so-called "willing targets" to recruitment.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that