It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


White House Computers Hacked, Viral Trojan Horse Bug

page: 4
<< 1  2  3   >>

log in


posted on Nov, 8 2014 @ 03:59 PM

originally posted by: rigel4
This is bull#.. I don't believe it.

Many of these examples given are off-line scada networks.

someone is hiding something behind this.

This is so when Obama gets impeached they can say all the Emails were lost lol. He is so predictable. All Americas problems can be taken care of for 120 dollars. One for each of them!

posted on Nov, 8 2014 @ 06:31 PM

originally posted by: Thorneblood
a reply to: Aazadan

You cannot be that obtuse.

Not with the power the NSA tools possess, and those are the ones we know about.

Technology isn't magic. The NSA has some advanced tools but they still can't do the impossible.

posted on Nov, 8 2014 @ 06:32 PM

originally posted by: ANNED
I have never understood why there is not a separate internet(internet 2.0) for the government and not connected to the internet where hackers from outside the US can not get to it.

This is called an intranet. They are used extensively by governments and corporations for internal networks. At some point however you need to communicate with a computer that is outside that network.

posted on Nov, 9 2014 @ 08:27 AM
a reply to: ThirdEyeofHorus

It was a little bit of fear-mongering, to continue to get us more involved in a cold or hot war, ultimately for monetary reasons.

For one thing, no one had to mention the access to our public utilities. The White House probably does not have any systems connected to our utilities. The same trojans have always been used to break into any systems, regardless of whether they are SCADA systems or office systems. There is no special link between the White House compromise and utility systems.

For another, the Russians, Chinese and Iranians have been trying to break into U.S. systems continually for years, just as the NSA and military spy agencies have been trying to break into theirs. It is no big deal. It just means that computer system administrators have to always be on the alert.

posted on Nov, 9 2014 @ 08:30 AM
a reply to: Shadoefax

Restoring from a backup is too late, once the machines are destroyed. But, anyway, there is no special connection with the White House and our public utilities. They just happen to use the same operating systems and are vulnerable to the same viruses.

posted on Nov, 9 2014 @ 08:31 AM
a reply to: PhoenixOD

Simple: Fear-mongering.

posted on Nov, 9 2014 @ 09:44 AM
Sounds like they want the hackers to update the program. Remember programs can control virtual or real devices. If the expected control device is virtualized the program doesn't care. Once you have it aimed away from the real world having the hackers try to control it should expose the hackers.
Either that or it's just BS trying to get more money for cyber warfare.

posted on Nov, 9 2014 @ 02:05 PM

originally posted by: Asynchrony
a reply to: signalfire
It's a smokescreen for another issue they don't want to admit to, I'm sure.

Yeah that Barry sucks at Golf! ( Well so do I, WE HAVE SOMETHING IN COMMON!!)

posted on Nov, 9 2014 @ 02:14 PM
Let me get this right.

Russia can hack the whitehouse and escape with a clean set of heels and yet when they edit the flight characteristics of a su-25 on Wikipedia then they are too stupid to even use a VPN ?


They just happen to use the same operating systems and are vulnerable to the same viruses.

Yes Bill Gates become the richest man in the world by doing a deal with the NSA and no one will touch you for running a pirate copy of windows and you will continue to get updates to ensure you keep running a remoter terminal for bill and his friends.

edit on 9-11-2014 by VirusGuard because: (no reason given)

posted on Nov, 9 2014 @ 05:28 PM
Really enjoying everyone who doesn't know anything about computers claiming this is fake, propaganda, or not a big deal.

posted on Nov, 9 2014 @ 11:42 PM
a reply to: datasdream

So basically you're saying they turn the infected system into a honeypot. Then they use social engineering, via the MSM, to sweeten the deal even more. How could anyone turn down the chance to control America and bring her to her knees? That's quite diabolical. :-)

I think the problem there is that most nation-state perpetrators are already aware of the fact that the US infrastructure is a big steaming pile of antiquated technology ready to collapse under it's own weight.

It's probably easier to hack into one of the independent entities that service the grid. Unexpected behavior from any of the participants may disable substantial sections of the electrical infrastructure. For instance:

Northeast blackout of 2003

  • Estimated 10 million people in Ontario and 45 million people in eight U.S. states
  • More than 508 generating units at 265 power plants shut down during the outage
  • Some power was restored by 11 p.m. and many others got it back two days later.
  • Primary cause was a software bug in the alarm system at a control room

2011 Southwest blackout

  • Nearly seven million people without power
  • Surface streets became gridlocked due to the loss of traffic signals
  • The outage was the result of 23 distinct events that occurred on 5 separate power grids in a span of 11 minutes
  • Primary cause was due to a mistake by a technician, a 500 kilovolt line was disconnected

That's seems kind of brittle to me. In just those two events a software bug and a bumbling technician cut power to a total of 62 million people in 12 US states, and parts of Canada and Mexico. While I believe that these deficiencies have now been addressed and probably won't happen again, it seems likely that there are other hidden nasties that can be exploited for nefarious purposes.

So going after networked systems that probably have less sophisticated defenses is probably easier than trying to go after the White House.


posted on Nov, 9 2014 @ 11:48 PM
a reply to: cetaphobic

Really enjoying everyone who doesn't know anything about computers claiming this is fake, propaganda, or not a big deal.

Ok, I'm up for some doom porn. I'd love to be persuaded that this isn't propoganda.

Since, in your opinion, no one here knows what they're talking about, what's your theory?


posted on Nov, 17 2014 @ 03:00 AM
While the left hand plays the "hacker" card and everyone is distracted, the right hand simply types in the password.

The guys with the "password" are far more dangerous than hackers who did not engineer the system. The guys that engineer the system have password front door and system back door access 24/7/365.

This is merely a context setup of a pretext "false flag" in the tech arena of things to blame on the usual suspects already IDd for the next phase of global war.

90% of the American public are lobotomized cows, and those are the only cows they need to influence with these kinds of tricks and set-ups to progress in time according to the implication already laid out between the lines: a refreshed "bogey man" complex.

The real "threat" is already in the compiled code from the engineering source from incept. It can be accessed from the front, back and the wireless middle by technologies that can bypass the whole system infrastructure if needed.

Everything else is where they want you to look, to miss the more obvious location of the real intrigue and who it is that has engineered it to be just so. Now everyone is running some form of this prepared system, hardware and software platforms.

Most people will not figure out who is really activating this routine, it will not actually be the usual suspect, but that aids the final cycle progress.

Btw since 90% of monetary and investment system numbers, the "value", is all digital, literally virtual reality already, that entire realm is subject to CGI, "computer generated illusion" at global scale and "special FX" can be run when needed in the market systems as well. The global financial system has its own "Spielberg" and that ensures the final cycle "crash" can be a controlled implosion, it is already fictional and super computer controlled.

The ICE InterContinentalExchange exchange platform is an example of a centralizing system to run this core computing to run this final "special effect" on the global financial complex. Derivatives scale risk buffering and computer aided systems are part of the final production "insurance" system that can expand the profit margin. Fictional profits will be eclipsed by corporate consolidations which is the real monopolizing goal.

90% of that system is also virtual, the urban infrastructure is expendable and interchangeable for the virtual super-corporation definition that exists mostly, as well, as digital information mostly in the realm of the "cloud". The entire model of world government is digital first, merely applied to a very real global infrastructure going into sole super-corporate uni-polar control, the whole of the sum of these parts.

That will take 7-14 years to run the cycle present, Imo 10 years, Imo they are shooting for 2023 for initial world government unveiling and global presentation, imo. The digital model and system will facilitate the whole final cycle to that objective. Jot it down, it takes some time and turbulence to run that cycle globally, but that is the basic objective: world government.

edit on 17-11-2014 by 4444Winds because: (no reason given)

new topics

top topics

<< 1  2  3   >>

log in