The Cyber War Conspiracy by Thomas Biehlig (best way to read e books .TXT) π
Cyber War Conspiracy sketches a frightening conspiracy in the framework of a worldwide cyber war. A scenario that could become reality. In brutal detail the author describes how the superpowers try to control and rule the world. Murder and intrigue in the world of chip technology!
About me, the project and stuff behind
Curiously? You want to read more? You find a short description here or you can read the excerpt which will give you a good first impression of my book. If you want to read the whole book, you must wait until I have raised enough money for the translation from German into English. If you want to support the project please follow the link indicated in the e-book (only preview!).
I have published this book as Indie Author and the original title is "Die Nanolithografie". You can buy it as print and E-Book everywhere, worldwide -until now only in German!
The Story
Marc Jansen works or the firm Technology News Research as a specialist on semiconductor technology. While preparing a market analysis on network chips for Victor Navarroβs office that specializes in the international law on patents, he learns that Orlando Lopez, famous for his work in the area of quantum computer science and semiconductor physics, has been found dead in a canal in Bangkok. It is alleged that he took to his watery grave a scientific sensation.
When Marc Jansen unexpectedly gets an offer of first-hand collaboration with Navarroβs office, he suddenly sees the possibility of immediately changing his life, which till then had been rather boring. The first assignment he is to work on is, of all things, research for an international consortium into the alleged discovery Lopez was working on up to his death.
With no hesitation Marc resigns from his job and agrees to take it on. For the task the mysterious South American woman Lana de Vries is assigned as his partner. A bizarre contest to find Lopezβs alleged discovery starts. The maelstrom Marc and Lana are caught up in is one of murder, corruption, and intrigue that goes right up to the highest nerve centres of international powers.
Opinions from reviews
An exciting, up-to-date scientific thriller that could well occupy a sure spot in the genre βthrillerβ. With his book the author sets up a frightening scenario of spying in the world of science. (Amazon)
In the battle for power a human life counts for nothing β an explosive theme well presented (Lovelybooks)
This first novel contains all the classical elements of a thriller. It is concerned just as much with research, quantum computer science and semiconductor technology as with plots, corruption, and murder! (Magazine for Computer Technology cΒ΄t 1/15)
Please read the extract and support!
Read free book Β«The Cyber War Conspiracy by Thomas Biehlig (best way to read e books .TXT) πΒ» - read online or download for free at americanlibrarybooks.com
- Author: Thomas Biehlig
Read book online Β«The Cyber War Conspiracy by Thomas Biehlig (best way to read e books .TXT) πΒ». Author - Thomas Biehlig
But Jansen quickly called out, βA moment, Iβm coming,β while he hastily put on his trousers and T-shirt.
With his foot he kicked Juliaβs things under the bed, adjusted his hairdo with a look at the hall mirror and finally thought he was ready enough to open the door and accept the meal.
Scarcely had Jansen closed the door again than Julia came out of the bathroom still naked and asked cheekily: βShould I help with setting the table; I have an idea how we could enjoy the dessert.β
With those words she weaved her way past Jansen, hopped onto the bed sprawled seductively between the sheets. A romantic candlelight dinner was now out of the question. Marc could not get rid of his clothing fast enough, so great had his excitement become. When at last he succeeded in taking off his trousers again he slid into the bed and pulled Julia close to himself. Before five minutes had passed the two of them were united, and Marc in desperation had to try to relax and think of something else. He was about to have an orgasm and definitely wanted to draw it out. Unfortunately Julia too did not need long, and he felt the coming explosion. Then they came to a climax at almost the same time. Exhausted and contented they sank onto the silky sheet.
Next morning they returned to Hamburg. Jansen said goodbye to Julia. His penis was sore and he did not want to arrive late on his first work day for his new employer. Arrived back in his flat, Jansen changed his clothes and packed things for a week and set off at 10 a.m. in the direction of Berlin.
Punctually at 2.30 he parked his car in front of the old town villa in Berlin Grunewald and rang the doorbell.
2
There was a buzzing and Jansen pressed the wooden main door open. It had on it many decorations and small glass windows. Curious, he walked up the creaking old stairway. The office was on the second floor.
When he had arrived Victorβs secretary opened the door for him. She gave him a friendly greeting and said, βWeβve prepared everything. Iβd like to introduce you straight away to Lana de Vries. Sheβs waiting for you in the conference room. Later Martin, Roman, and I will join you. Those two you already know from our previous collaboration.β
At the same moment the door of the conference room opened up and a woman walked out. When Jansen saw her he was speechless. In front of him stood one of those women in whose presence he always felt helpless. He could not help staring at her. She was about 1.70m tall, had long black hair, slightly curled, which she had with some effort bound at the back to make a plait. Her face had a faintly Asiatic cast and her deeply dark brown eyes beamed at him. A body-hugging short black fitted dress and tight leggings completed the picture. Then he pulled himself together and introduced himself: βMarc Jansen. I assume youβre Lana de Vries. Itβs a pleasure to meet you.β
GLOSSARY
Quantum computer
A quantum computer or quantum calculator is a computer whose function is based on the laws of quantum physics. In contrast to the digital calculator it does not work on the basis of the laws of classical physics or IT, but on the basis of quantum mechanical states, and that essentially goes beyond the rules of classical theories. Processing of those conditions occurs according to quantum mechanics principles, e.g., the so-called quantum entanglement.
Quantum entanglement
Quantum entanglement is the name given to an effect that apparently allows two or more particles to influence each other without passage of time over any special distance. Although that behaviour is widely understood in the framework of quantum physics, it goes contrary to our intuition. One possibility of creating complex states of entanglement is to make a great number of photons interact on each other. However, as soon as there are more than two or three photons involved it becomes enormously difficult. Here quantum technology faces a really big challenge.
Qubit (Qbit)
Qubits (or Qbits) form the basis of quantum computers in quantum IT. The Qubit plays a role analogous to that of the classical bit in traditional computers: it serves as the smallest possible memory unit.
Quantum points
A quantum point is a nanoscopic material structure mostly made of semiconductor material. Charge carriers (e.g., electrons) in a quantum point are so limited in their ability to move in all three special directions that their energy is not continuous but can take on only discreet (finite, countable) values. Hence quantum points behave in a way similar to atoms, but their form, size, or the number of electrons in them can be influenced. Hence electronic and optical properties of quantum points can be configured. One method of producing that is lithography. The quantum point is ascribed to a substrate by means of electronic rays, a scanning microscope or something similar, and subsequently released through a suitable etching technique.
Quantum teleportation or βbeamingβ
Quantum teleportation is the transfer of quantum conditions with the help of an instant alteration of state of quantum systems entangled with each other. For a complete transfer of a quantum state it is necessary to have also an interchange of information between sender and recipient in the classical manner (with maximum speed of light). A team under the Viennese physics professor Anton Zeilinger teleported the quantum state of a photon from La Palma on the Canary Islands to neighbouring Tenerife, over a distance of 143 kilometres. The interesting detail is that thereby satellite-based quantum communication is within reach. But for teleporting objects or even living things the technique is not suitable. True, researchers have already succeeded in sending not only the properties of particles of light, but also those of atoms. But βbeamingβ of human beings, as happens in Spaceship Enterprise, will probably remain for the time being within the realm of science fiction. As is well known, a human being consists of a huge number of atoms which, into the bargain, would have to arrive at the target in their original arrangement.
Nanolithography / informational nanolithography
Nanolithography is the description given to processes that are chiefly suitable for creation of structures with dimensions of a few nanometres. Among those are, for example, electron-ray and informational nanolithography. They are employed where a structuring by means of conventional photo lithography is not possible, and are meant in future to replace it in the production of integrated switching circuits. Informational nanolithography is a nanolithographical process for financially economical production of nanostructures by means of a nano-structured stamp. Informational nanolithography is applied in the production of electronic and opto-electronic components.
Informational nanolithography is used for the production of two- and three-dimensional organic or semiconductor nanostructures in optics, electronics, photonics, and in biology. Applications in optics and photonics are optical filters, polarisators, or e.g., photonic circuits. Quantum wires and points are of interest for optic semiconductor elements such as lasers or diodes.
MRAM
Magneto resistive Random Access Memory is a non-volatile memory technique that has been developed since the 1990βs. In contrast to traditional memory techniques, such as DRAM or SRAM, the information is stored not by electric elements, but by magnetic charges, i.e., the properties of certain materials is exploited which alter their electrical resistance under the influence of magnetic fields.
The advantage of the MRAM technology is that it is non-volatile that means, the chips retain their stored data even after the switching off of the energy source. Hence electronic apparatuses such as computers can be made that are immediately ready to operate as soon as they are switched on, and do not have to be loaded into the working storage for the operation of necessary data by a permanent storage such as a hard drive. In contrast to established non-volatile memory techniques such as Flash, MRAMs, like traditional DRAM/SRAM, can be written on practically an infinite number of times. So MRAM should combine the advantages of the various established memory techniques and thereby point to the potential of the so-called universal memory which could replace DRAM, SRAM, and Flash.
At the moment the firm Everspin Technologies is the only commercial supplier of MRAM memory chips. Almost all other big memory producers, such as Samsung, Hynix, etc., have announced they will invest in development and production of MRAM.
Because of their high price MRAMs are utilised in the first place in industrial systems to protect against critical loss of data. Typical applications are control systems for storable programs (SPS), POS/electronic cash, GPS trackers, or as the cache in server systems. Because of their radiation stability MRAMs are more and more used in air transport and space travel.
Bootkit virus
A bootkit is a collection of software tools or boot loaders installed in the compromised system after hacking into a computer system to deactivate further security mechanisms of the operation system. So a bootkit is a mixture of boot sector virus and a rootkit. The assumption here is that whoever has the hardware under his control can also have the software under his control.
Rootkit
A rootkit is a collection of software tools installed after hacking in a software system of the compromised system to conceal future logins by the intruder and hide processes and files.
The purpose of a rootkit is to conceal malwares from antivirus programs and the owner through a disguise. Since a 100% recognition of rootkits is impossible, the best way to remove them is a complete reinstallation of the operating system. Since some rootkits are hidden in BIOS, even that method does not offer a 100% certainty of removal of the rootkit. The boundary between rootkits and Trojan horses fluctuates, though a Trojan horse has a different procedure in infecting a computer system.
Backdoor
Backdoor describes a part of a software (often installed by the author) that enables users, without the normal access safeguards, to have access to the computer or to another protected function of a computer program.
Examples are universal passwords for a BIOS or special software (usually secretly installed by a Trojan horse) which allow distant access to the computer. Backdoors make it easier for the hacker to have access to existing or already compromised systems, for example if a shell is started, or when a login question is asked for a certain network portal.
DDoS
Distributed Denial of Service (DDoS) is the description in IT of the non-availability of a whole number of systems which really should be available. Although there may be various reasons for the non-availability, DDoSs are usually described as a consequence of overloading of infrastructure systems. That can be caused by unintentional overloading or by a malicious attack on a server, a calculator, or other components of a data network.
DDoS attacks, such as SYN flooding or the smurf attack, overburden the access to the internet, the operating system, or the services of a host with a bigger number of questions than can be processed, and as a result regular questions cannot be answered or only very slowly. Examples are WinNuke, Land Attack, Teardrop Attack, or the Ping of Death.
Denial-of-Service attacks are nowadays being offered for sale by cyber criminals, for example to damage the competition. Malicious DDoS attacks are often carried out with the help of
Comments (0)