Saturday, December 18, 2010
The Perfect Virus: All 22 principles summarized
On November 23rd, I began enumerating the 22 Principles for Creating The Perfect Virus. I completed that project yesterday, and herein include a chronological summary. They are listed in order and hyperlinked to the original post. Based on Jeffrey L. Walker's original monograph on the 22 principles of the perfect application, this project helped me create the technological background for my sequel novel. It may serve another important purpose also, and that is to motivate the United States to take the concept of full-blown cyber war much more seriously. Worst case, though? While cyber war is a throw-away plot element for my novel, because fiction is driven by characters and not by clever plot elements, some pretty great technology has emerged from some of my favorite military science fiction authors and specifically from Piers Anthony's Macroscope. It is to Mr. Anthony that I owe the inspiration for principle #7 below: Black Box Portability. So here they are, my 22 principles of The Perfect Virus.
Given a choice between making headline news for articulating the principles for The Perfect Virus or being one of the "guest authors" on the television show Castle who sit around the poker table discussing ways they'd solve a mystery in their novels, hands down I'd wish to be on Castle. Of course I wouldn't mind managing a little payback to the Chinese and Russians who've been attacking my Linux box, but I'd want to do it legally and above board. And I suppose those exploits might make headlines, but I truly prefer to deal in fiction. I'll leave reality up the folks who have the stomach for receiving body parts of friends and relatives from criminals and rogue governments that are retaliating for having been well and truly hammered by cyber privateering activities.
Posted by Destroying Angel at 12/18/2010 01:25:00 PM