posted on May, 15 2012 @ 07:59 AM
reply to post by tkwasny
I'm going to agree with you to an extent tkwasny. I'm a network engineer and I have some pretty extensive experience in forensics. While I think
Anonymous probably has stumbled onto a lot of honeynets and honeypots.. I can't believe that the data held on these "super secure" data servers
that you speak of is so remote that the information has never seen the light of day elsewhere. By that logic, every piece of data was developed and
stored on a single server with not one single connection to another machine. Hardly plausible. However, there is a very good possibility that these
machines are not connected to the internet, which is where Anonymous thrives. This makes the data a lot more confined and secure, but it still isn't
secure from a clever social engineering attack. For all we know the same people who maintain the data for the government could have ties to Anon. I'm
not inferring that Anonymous is CIA or a government - op but anything is possible.
I think Anonymous probably has some good data in their hands.. There is no way they can confidently say they have all of the classified data that our
government is keeping though. That statement in itself is very telling of the intelligence level this Doyon guy has. I support what Anonymous stands
for in terms of freedom and liberty, but I don't necessarily think they handle it elegantly. Of course, it has to be hard to do that when it is such
a loose collective.
So tkwasny, I think you're correct in assuming they don't have all of the classified data.. But I also think you're a little misled if you think
there is no way to access the data within the secure databases and that Anonymous is foolish enough to believe the government doesn't use honeypots.
Many seasoned "hackers" were once seasoned IT professionals, programmers and network engineers/administrators... They know what honeypots are and
can probably differentiate.
Another point to that is whats the point of having a honeypot if your data is so secure that it can only be accessed from the inside? So if you think
they have honeypots that would insinuate the real data is probably accessible from an external point. Otherwise a honeypot would be a total waste of