It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by DraconianKing
Our military brass have no clue just how powerful a weapon the computer can be.
reply to post by azzllin
The spread of the counterfeit routers is vast, and went largely unchecked for quite a while. Many companies and Governmental Agencies would have to be "in on it' to spread dis-information. Its unrealistic to believe the government new about it from the get go and went with it anyways. Opening a hole into your protected network, through the hardware, is a stupid move, even if you are trying to feed dis-information.
Originally posted by DaMod
reply to post by Asset1911
Are you willing to wait till it's too late for proof? Are you willing to risk your life and the life of those you love because your waiting for proof? The Chinese government has been at it long before this post. Stealing US Tech, Espionage etc. Why should we give them the benefit of the doubt when we are their target? You want proof? Fine wait for proof, and in the meantime I'm gunning up.
[edit on 31-3-2009 by DaMod]
So I started calling and inquiring information in the biz, called a few douzen people I know, worked with or found names from in relation to PROMIS and also commercialy available software like it.
I also asked around on the net about PROMIS, asking people that already did some research but hit a dead end, if they could share all their data on it.
Then, out of the blue, I got a visit from the police. They said it was a standard survey, but they asked me all sorts of questions that I couldn't imagine a normal "police" survey to include, some of the questions were about what I do on my computers at home, what interests I have in relation to technology, hardware, software and networks.
What they also asked me was "do you have a job, car, own a house, stock or other things".
Originally posted by Blaine91555
We, meaning business and government have got to learn that no information that is sensitive should ever be on a computer that is connected to a network in the first place. In cases where it is it is out of pure laziness and not wanting to use other methods to transfer information. It may be a pain to have to burn and deliver a disk or a document, but it is the only safe method.
Our best protection is to assume this is always a factor and act accordingly by making sure vital systems and information are never exposed on a network of any kind.
Edited to say: I did not see your other response until I posted but I'll let the post stand as is.