Wire-less Communications (Maybe)???
his month, I would like to offer something quite different from what I usually present in this column. I am sure many of you are aware that in the previous months or even perhaps years, there has been a wide range of hacks, ransom demands, scams, and even control over critical infrastructure, the perpetrators of which, in many cases, remain anonymous. Much of this is, of course, due to the use of the “wonderful”. It seems that vast numbers of managers in very high positions of major corporations and organizations love the idea of a wireless link to control and monitor all kinds of functions. I wonder, however, how many of the multitude of these users realize that they are actually conveying “wireless” signals between their computer or cell phone transceiver and some other remote transceiver. Since most of these devices are truly wireless exchanges of data, there is always a transmitter and, of course, a receiver. As a result, regardless of what frequencies are used or what clever complex encoding methods are employed, the signals are potentially “out there” for anyone to intercept, block, or actually vary.
You’re reading a preview, subscribe to read more.
Start your free 30 days