How to save your country from cyberterrorism? This is cyberterrorism that what how can be called the events taking place in the world today. In the last year alone, terrorist hacker groups have damaged or disabled critical social facilities in the United States. Energy, industrial, social, medical, police facilities. Transport - aircraft was attacked, in Germany there were recorded cases of death of hospital patients as a result of cyber terror. The goal of this wave of cyber violence is one - to kill as many people as possible. Why did all this become possible? So let's talk about it. Western societies have abandoned the cyber-technology model in favor of the marginal bubble of the Nasdaq IT cartels, created by con artist Bernard Lawrence Madoff. The technologies offered by Nasdaq are quick-fix consumer solutions. So that investors can speculate in stocks. But these technologies have never been suitable for critical infrastructure facilities. Because modern software products are shitcode created from external libraries and frameworks. And unlike classical programming languages, they are just a heap of scripts. Such solutions are good for building a "new socialism" because they allow data to be stolen and sold. In other words, speculating on the stupidity of idiots. And of course, the open architecture of networks and shit applications opens the way for cyber terrorists to the very heart of America, not to mention other countries. Previously, in the good old days, there was no single network. In the United States, there were many closed scientific, military, government networks. Sometimes not connected to each other. Lone hackers, often with internal access, have been able to hack into these networks, or at least know about them. No cyber terrorists in the 1980s would have been able to gain access to General Motors networks, oil pipelines, hospitals, police stations. Because each network had its own standard and its own communication technology. Until the early 1990s, critical infrastructure remained inaccessible to a cyber-terrorist invasion. Why? The first and most important element of security in those years was the lack of access to networks from outside. The second important criterion, such networks were controlled using computers of the 3rd generation. The most famous of computer today is the PDP-11. The third criterion is unique programs developed by scientists in laboratories, not speculators on the stock exchange. Unique technical solutions ones cannot be hacked by someone from the outside, because they are produced in single copies. The fourth criterion for network security in the 70s and 80s was the use of programmable calculators as industrial controllers. None of these hardware solutions can be invisibly infected with a virus. After all, many computers had hardware control over data changes. Today, for the purposes of national security, any country can restore the structure and scientific operation of third-generation computer networks. Classic magnetic tape can be replaced with modern holographic or nano film. Restore serial production of programmable calculators, PDP-11 and terminal clients, and old communication standards based on assembler, C, Fortran, Cobol and so on. It can be argued that nations that are not associated with IT cartels at the infrastructure level have a greater advantage today, since they are not vulnerable to cyber terrorism, virus outbreaks, and so on. That allows to save huge amounts of money on license fees. Experts are frankly tired of the tyranny of corporate managers who constantly deceive customers in terms of security. Therefore, against this background, even a minimally automated model of enterprise administration based on paper document flow (cards and forms) shows the possibilities of a real mechanism for saving money and protecting information. At the same time, a number of indisputable advantages are obvious. In addition to the fact that the data is stored in formats that are exotic for modern hackers, they are also difficult to access from outside. And this is not to mention the lack of opportunities for operators to be distracted by social networks and other irritants for salivation. The truth is, after the creation of the Nasdaq and the collapse of the dot.com bubble, we forgot that consumer needs and national security needs are not the same thing. It is necessary to clearly distinguish between military, political, social and consumption issues. Never before in the entire history of the post-World War II era has the West been so transparent, helpless and vulnerable to cyber terrorism as it is today.