It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Briggs
i doubt if any military computers with sensitve info are Connected to the
internet or any system that would allow hackers even getting close to hacking them .
Hoax .
Fake.
Originally posted by mrjenka
The hackers name is Gary McKinnon, he was mentored by Kevin Mitnick, Gary is the real deal, I would know, I work for the DIA. He however did not access highly secure mainframes, but did access (S) and (TS) servers, with connections with Los Alamos and Nellis Bombing range, used by employess and certain military personell for study and possibable declassification.Since his attacks a digital encryption of 264bytes has been implamented and a thorough "finger print" has been run on the entire system that was comprimised. He did NOT work alone, as he had a source "inside" which has been since addressed. Hope I could shed light for you guys.
Originally posted by Azathoth
Now thats funny... I seriously doubt he could hack classified systems as the whole military would of had this massive change in their infrastructure. So tell me again how he was able to magically decode double encoded data? Especially with proprietary encryption keys that get changed once or more a week. I raise the BS flag on this guy. And technically if there was an inside source..he didn't hack the system, the inside source transferred raw data to an unclassified system. I don't call that hacking classified data. I call that a security incident because they would of had to change the whole military network infrastructure if one person figured out how hack classified systems.Oh sorry I put a * instead of 8. 8 yrs in the navy as a spook. if you were navy then you know what i mean.
-Aza
-Aza
Originally posted by Briggs
i doubt if any military computers with sensitve info are Connected to the
internet or any system that would allow hackers even getting close to hacking them .
Hoax .
Fake.
Originally posted by mrjenka