Update of "Project Risks"
Not logged in
Overview

Artifact ID: 0d620a06ecfb78d485d2affb1cc702a23e0235a8
Page Name:Project Risks
Date: 2016-06-13 13:10:32
Original User: martin_vahi
Parent: 4c4e09286c56fe1e5f93d3d266504741e0a2a36c (diff)
Next 43b1c531200d5dade2664e70cabf310377b42b5b
Content


Computers of developers are compromised, so that the project deliverables contain malware or the project deliverables lack proper security measures. 

Countermeasures: have backup copies at different machines, diff the different backups and try to use the classical intrusion countermeasures.


Developers get killed or tortured by the CIA or other agencies of various supermafias. (It does not even matter, if they do it secretly or  totally publicly, because the mobs just could not care less.)

Countermeasures are missing. Usually the super-mafiosi, the professional politicians, do not care about civil liberties or human rights, as long as their salary is good and job secure and their job will always be secure, because in Democracy the one with the greatest campaign budget wins. However, there is a limit that the number of people working in the various supermafia security agencies is a minority, which sets a limit, how much other people they are able to kidnap and torture. Slaughterhouses for successfully killing hens, chickens, have been developed by private sector, but an automated torturing line, where people are tortured by robots like cars are manufactured in car factories assumes an IT project and it takes a bit of preparation to get it done and tested, so may be there could be some cooperation with private security firms, who would mount a sabotage attack on the torture line and plain physically blow up the equipment at the torturing plant. Most likely countermeasures that can be retroactively applied is to mount an assassination attack against the torturers/kidnappers and the political chain of command that, if not ordered, then at least allowed it to happen out of neglect. (The purpose of the assassination attack is not retaliation, but temporary disruption of enemy operations, like with bacteria, where the infection causing bacteria are never removed totally from the blood stream, but their amount is kept at a managable level. Preparations include good overview of the potential adversaries, id est intelligence gathering must be done in advance, during piece time.) If You think that this text here is a stretch, then please, please do try to remember, what other cases from the 2. World War and later history sounded like a stretch at first glance, but ended up being perfectly true.


Developers of censorship free communication tools are hunted down like weapons manufacturers and drug dealers. (Think of China, Soviet Union, etc.) 

Countermeasures: legislation is always slower than technology development, so the infrastructure must be completed and distributed before its distribution and development becomes illegal. If possible, make the super-mafiosi themselves depend on those developers so that if they want to compete with other super-mafiosi, they have to give the brightest of the censorship free communication tools developers the freedom to operate, id est the academic freedom topic, where the only reason, why universities have any freedom at all is to avoid being out-competed by other super-mafiosi.