Linux II and III- "Orion" Operating System
Like most advanced forms of technology, the electronics of many sources use software and wireless communication to achieve their effects, which enhances their capabilities drastically, fundamentally beyond what one could do without them (such as long range communication via cellphones, or transmitting up to date images of the battlefield). This however leaves the system vulnerable; with wireless communication, the signals can be intercepted, and possibly decoded or disrupted. The best way to avoid this, in general, is simply to have an incompatible piece of hardware or software; a USB drive won't plug into a DVD drive, or vice versa, and thus having something that physically is not designed to work with another system, can generally render hacking or other forms of intrusion more or less physically impossible. One could otherwise break or damage the equipment, but this prevents information itself from being leaked. One would first need to get a hold of a physical copy, and then recreate the programming code, unbeknownst to themselves, to be able to hack it. This can work in two forms, by both hardware and software; one can have incompatible equipment, and incompatible software, such as linux and google (although, with some minor changes, these two can be changed out).
To avoid common or commercially available coding all together, one can essentially create their own programming code, however, this takes learning how to program an OS from scratch. Lacking open source development and the resources to fund it, most people could not individually create something practical, let alone that would be as good as commercially available software. However, a large organization, such as a military, could hire 30,000+ individuals to write such a system over many years, and essentially write programs from scratch. With the resources of a military using the highest quality programmers working 8+ hours a day, literally doing this for a job, creating and operating the systems, it can become much more practical to create your own, private system. While systems such as microsoft word could theoretically be copied over, more pertinent programs, such as those controlling guidance software, could be used, and isolated so they would be nigh impossible to hack. Compartmentalization could keep more than one set of files being stolen at a time, meaning that while copies of the code could be kept on sight, in case of errors, it wouldn't be much of an issue if some of it got stolen, as they would only take otherwise useless pieces.
The ideal base programming code to emulate, but not to imitate, would be Linux. Not only can linux fullfill a wide ranges of tasks, such as programming a fridge, microwave, robot, or computer, but it is as well inherently much more secure. The complexity and redundant coding makes it much easier to protect, and virus and hacking protection can be written into the programs themselves. Furthermore, unlike Lenix, the program is written in a new language, comprised of Navajo, Greek, NATO symbols, and a handful of created symbols (such as hazard symbols and radiation symbols), intended primarily to make the user have to learn an entirely new language, well, before they can realistically code the program; the language possesses a total of 31 characters. This programming code can be coined "Linux 2", as it is essentially a remake of a form of Linux with improvements in coding not implemented into Linux (which would make newer forms incompatible, which defeats the purposes of an OS). It also also designed to possess 16 variations of the typical bit (possessing 2), allowing for far more complex coding.
Furthermore, one can create multiple OS's and forms of code. For systems to be even more secure, it can be possible to create an entirely different form of coding for different equipment. So, if one were afraid for something particularly sensitive, such as nuclear launch codes, or satellites, to be hacked by coding used in a hand held GPS, which could be easily obtained by an enemy, they could create an entirely different programming system, to make it even more difficult to figure out a way to interact. Thus, "Linux 3" is born, or the concept of Linux 3, and Linux 4, and Linux 8, for varying fields. Further compartmentalization can prevent the total failure of all systems if hacking were to occur.
Obviously, hardware intrusion is still possible. Regulating some forms of code to hardware, as in needing a compatible piece of hardware, programmed at it's core, for the equipment to operate, is the best way to prevent people from entering in, unwanted. A hardware key, so to speak, that allows the OS to run, that could not be readily copied or guessed unless one were to painstakingly, manually figure out each aspect of it and write it out, could make creating a compatible system at all nearly impossible. One would be better off stealing a piece of equipment, and by the time it was realized it was stolen, it's access could be changed in it's entirety, meaning it could be cancelled. With no back doors and no work arounds, a piece of equipment that was shut down could potentially be shut down permanently, and become irretrievable. This would once again be very expensive, as it would destroy the equipment, but it would more or less be foolproof. These codes could also be very complex, using multiple matrices, giving trillions, if not quadrillions of potential combinations for the right code. Finally, simply regulating most hardware to LAN lines, wherever possible, that are not accessible wirelessly, can more or less prevent interception, and storing information in areas that is not accessible to the general world wide web or anything other than private systems, could make it nearly impossible to obtain by virtue of not even being accessible by someone not at the facility. Redundant pass keys, hardware restrictions, and hardware "keys", in addition to generally incompatible, yet mass produced equipment, used only for a single organization, or military, would make hacking of the most vital information nearly impossible. While this would be expensive and require incredible equipment (two stations contacting each other, needing the same hardware key, would be what filtered all communication between the two places, so a REALLY powerful processor would be needed), it is not out of the realms of a possibility of a large organization, especially one that spends several billion per year.
Rather than call the program "Linux 2", the operating system is simply known as "Orion". While it is based on Linux, it is fundamentally a different form of code. For obvious reasons, it's intent is for it to mostly be regulated to military purposes.