World War II is going on. Japan attacked the US naval base at Pearl Harbor. In response, Japan dropped two atomic bombs on the cities of Hiroshima and Nagasaki. But even with such a strong response, the American mind was not satisfied. They started looking for the mastermind behind the attack on Pearl Harbor. But how to find him? For that, you have to listen to the Japanese. This meant deciphering the secret language Japan used to communicate with its allies. The Americans undertake a cryptanalysis project to crack Japanese secret signals. The code name for this project was 'Magic'. Two years later, the US Navy captured the mastermind behind the attack on Pearl Harbor. His name is Isoroku Yamamoto. The US tracked down this mastermind and killed him.
Nowadays, when one hears about secret code recovery, the first word that comes to mind is 'hacking'. Hacking is a process of extracting secret signals. However, hacking basically refers to illegally accessing a computer or the Internet. Besides, ATM, bank, wireless network, WiFi network, mobile phone, land phone and even any electronic device can be hacked. Hackers are particularly skilled at finding weak points in computer or Internet security systems. You need to know a little more about the internet to understand what the weak side of the internet is.
Simply put, the Internet is a network of many computers around the world. The term 'computer network' means computers connected to each other. These computers are called web servers. All the files, texts, images, videos etc. that we see on the website using the browser are stored in the hard disk of these computers. When our computer or smart phone is connected to that network, we can see the information on all the web servers in the world. But can see all the information? For example, if someone wants to see your Facebook account messages? Answer, no. No one can see them except you. Web servers have specific ports or doors for viewing or exchanging information. One such door is the door to enter the Facebook account. Account password is required to view your messages on Facebook. A web server has many ports for viewing different files or data. These ports are created using computer programming languages. Hackers use programming languages to enter these networks by entering a variety of commands into the computer's security system. Once logged in, they can view various confidential information stored on that server. The money in the bank can be withdrawn at will or the security of the network can be broken.
![]() |
Even if a hacker crosses all the levels and transacts money from the bank, he is not safe, because all the transaction information is stored in the bank's computer database. |
A few days ago, by hacking the account of Bangladesh Bank, the hackers looted about 808 crore rupees in the Federal Reserve of the United States. According to the news published in Dainik Prothom Alo, cyber experts believe that the hackers entered Bangladesh Bank's own network system by using one of the ports first. It then advises the Federal Reserve's computer system through SWIFT to transfer money to the funds of its choice using Bangladesh Bank's network (when a bank transacts with another bank, it transacts with the help of a special system called the SWIFT system).
A bank's security system generally has three levels. If someone wants to withdraw money from the bank illegally, he has to overcome these three levels of hurdles. The first level checks the IP address of the entrant. How money is transacted from any IP is stored in the bank's database. If the IP does not match with the database, the bank's computer will automatically block access. Hackers usually want to use a fake IP address to hide their identity. As soon as a fake IP is detected, the bank's security system blocks him from entering.
But if one somehow penetrates beyond the first layer, he will face obstacles even in the second layer. In this layer, the computer checks whether the data length of the request or application received for withdrawing money is correct or not. If a customer sends a withdrawal request by logging into his own bank account, there will be a specific data length for him. But if someone sends a request using any other port, that datalength will not match the datalength of the client. As a result, the bank's computer will understand that this is not my customer. The computer will then automatically discard the request. But skilled hackers know the data length using different techniques. As a result they can cross this level as well.
After passing the second level, the third level must also be passed. Here basically the work of breaking cryptography or secret signals has to be done. Crossing this level is relatively difficult. However, skilled hackers can overcome this level as well. Even if a hacker crosses all the levels and transfers money from the bank, he is not safe. Because all transaction information is stored in the bank's computer database. Exactly how much money has been withdrawn from any IP at any given time is stored in a log file. The bank administrator can see all the information to identify the illegal transaction at any time. But there are some hackers who are very skilled in these tasks. They log into the bank's administrative account and find the log file. Then it is deleted from the bank's server.
With time we have also become dependent on technology. Almost everything from bank transactions to NASA spacecraft is now controlled by computers and servers. And whenever a computer or electronic device is connected to a network, there is a risk of being hacked. As a result, the threat of cyber attacks in the future world is high. The military alliance "NATO" thinks that in the coming days, the trend of cyber war as well as general war between the two countries may increase drastically. Several such incidents have already occurred.
The first incident occurred on April 27, 2007. Russia is embroiled in a dispute with Estonia over the removal of a mausoleum during the Soviet Union. Based on that incident, Russia started cyber attack in 2007. Estonia's banks, government websites, media, police, and even the national emergency telephone were shut down. Ian West, the head of NATO's cyber defense system, told the BBC that millions of hackers try to break into NATO's computer systems every day.
Apart from the improvement of computer security system, it is possible to avoid these attacks if we are careful in the use of technology.