It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Zaphod58
a reply to: luthier
My buddy that I was talking to earlier, could have copied almost anything he wanted to from a secure network. He even could have sat there reading about programs he wasn't supposed to have access to.
originally posted by: cavtrooper7
a reply to: luthier
We ended 60 miles east of BASRA ourselves,we were going to kill the Republican Guard(WHERE the HELL did that nut come up with THAT name?)before ceasefire
THEN got a nice DOSE from this..en.wikipedia.org...
originally posted by: Zaphod58
a reply to: luthier
My buddy that I was talking to earlier, could have copied almost anything he wanted to from a secure network. He even could have sat there reading about programs he wasn't supposed to have access to.
North Korea's hacking capabilities are "beyond imagination," one former computer expert for the North told ABC News in the wake of Tuesday's report that the nation had stolen secret intelligence documents, including the U.S.-South Korean war strategy.
Secret intelligence documents and photos unilaterally collected by the U.S. military were among the stolen cache of South Korea’s classified documents by North Korean hackers, but the totality of what was stolen remains unknown, according to South Korea’s ruling Democratic Party lawmaker Lee Cheol-hee.
ARPANET adopted TCP/IP on January 1, 1983, and from there researchers began to assemble the “network of networks” that became the modern Internet. The online world then took on a more recognizable form in 1990, when computer scientist Tim Berners-Lee invented the World Wide Web.