It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Nspekta
So, is this it? Are the US and Israel at war with Iran officially? Certainly, if this s true, its an act of war, no?
Originally posted by JBA2848
They leave out the fact that Serco and Siemens were involved in STUXnet.
Serco UK
Siemens France
Sounds more like NATO or the UN to me.
Originally posted by kidtwist
Why did you write 'devastating virus' like people were getting ill or something?!
It's just a computer virus, no one is ill from it! Maybe the title should say computer virus instead so people aren't mislead by the title.
University of Limerick Computer Engineering, Computer Engineering
2001 – 2006
FInal Year Project:
Simulation of Security Protocols over Low Powered Wireless Sensor Networks using
TinyOS: Involved research into various methods of encryption that could be implemented
into low powered wireless sensor networks. This required the learning of a new
programming language NesC, and the use of many experimental Simulators including
Avrora, SHAWN and TOSSIM. I also had to gain an intimate knowledge of Linux. In the end
I showed the tradeoffs of using different forms of encryption in regards to power usage,
CPU latency and radio packet size.
To answer your question "is this an act of war?"
It depends hoss. How do you view all of the recent Chinese hacks into the US military's computers? Is THAT an act of war?
Computers are unchartered territory...no one has defined if its war but we will find out.
Dixon Doll
Last Updated: May 01, 2008
Dixon Doll’s equity firm, Doll Capital Management (DCM), partners with numerous Chinese technology ventures, as he moves through the shadow world of the CIA, invasive software control and Bush family initiatives.
He sold one of his companies to Sybase, founded by presidential brother Marvin Bush. Sybase was first to market the omnipotent software required by the Patriot Act for foreign financial firms doing business with the US.
He sold another one, Recourse Technologies, to Symantec, a corporate behemoth with major defense contracts and popularly known for its anti-viral software (Norton Anti-Virus).
Symantec also owns cutting edge and potentially intrusive software programs modified from a data-mining breakthrough in the ‘80s.
Originally known as PROMIS, it created a new dimension of information for US prosecutors by merging their files into a new system greater than the sum of its parts.
At Secure Elements, Doll sat on the board with Mark Frantz, a Carlyle veteran who also had worked at In-Q-Tel, an arm of the CIA that gives venture capital to companies developing technologies that could improve the intelligence capabilities. In-Q-Tel funded SRA International (SRX: NYSE) to apply its “NetOwl” text mining technology to the CIA’s daily world briefing reports, and has also funded SafeWeb, another company that was acquired by Symantec in 2003. In-Q-Tel’s for-profit affiliate, In-Q-Tel Employees Fund LLC, often bought stock in the same funds as In-Q-Tel, reaping profits as high as 1,400 percent on questionable penny-stock and pump-and-dump investments.
In 2005, Phillip Merrill, Chairman of the U.S. Export-Import Bank,refused to approve an $800 million loan guarantee for SMIC.
He was forced to resign within months, and President George W. attempted to install his former college sweetheart, April Foley, as head of the US Ex-Im Bank. Rising criticism ended the nomination process.
Phillip Merrill’s body was found in the Cheasepeake Bay, his legs weighted and a shotgun blast to his head..
Doll also sits on the board of Netwok Equipment Technologies, Coradiant, Goodmail Systems, Adspace Mall Network, and Zamba, Inc.
Originally posted by Nspekta
reply to post by princeofpeace
To answer your question "is this an act of war?"
It depends hoss. How do you view all of the recent Chinese hacks into the US military's computers? Is THAT an act of war?
Computers are unchartered territory...no one has defined if its war but we will find out.
Ok, well you can;t really answer a question with a question.. just sayin'.
Thats also why is asked about Chinese hacks into the US systems... Is it that same? Is it an act of war?
antivirus experts at Kaspersky Labs and Hungarian security researchers at the Laboratory of Cryptography and System Security (CrySyS), who had been independently working on analysing the same malware, published their own preliminary analyses.
The Kaspersky experts had been called in by the International Telecommunication Union, which wanted to crack the riddle of a mystery Trojan outbreak that was wiping data off compromised machines in the Middle East.
Flame, which comes with a complex variety of libraries and swappable modules, weighs in at a monster (arguably bloated) 20MB. That's about 40 times larger than Stuxnet, a heavyweight itself by malware standards.
Estimates from Kaspersky (here) suggest Flame has only infected 1,000 Windows-powered computers almost exclusively across the Middle East in countries including Iran, Israel and Syria, though it has been found as far down as Sudan in north Africa.
Compromised targets include governmental organisations, educational institutions and home users. Circumstantial evidence suggests that the data-stealing malware infected systems at Iran's main oil export terminal on Kharg Island in the Persian Gulf last month, prompting a decision to disconnect systems there. Flame may also have infected the computers of high-ranking officials, causing a "massive" data loss, unconfirmed reports suggest.
The malware infects computers running Microsoft's operating system, and stealthily installs itself before stealing information, logging keystrokes, sniffing network traffic and capturing screenshots. It can also surreptitiously turn on microphones to record audio conversations, and then uploads all of this data to remote command-and-control servers.
Flame is built with many interlinked modules and is capable of handling a complex mix of remote instructions. Dozens of pieces of malware or malware frameworks infecting millions of PCs bundle similar capabilities.
Originally posted by Maxmars
reply to post by SaturnFX
But Gary M. was not doing it on behalf of his nation (ostensibly) and his intent was not economic or industrial sabotage... no? So we can't really consider that 'government-sponsored.'
Contributed Papers
Pub ID Author Pub Date Publisher Contributor
1432 D. Sumorok, D. Starobinski, A. Trachtenberg 00/00/00 OPNETWORK 2004 Weiyao Xiao Download
Title: Simulation of TinyOS Wireless Sensor Networks using OPNET
Many of the sensors finding their way into sensor networks run a lightweight operating system developed at U.C. Berkeley called TinyOS. This open-source operating system, designed specifically for highly-constrained wireless devices, enables building a variety of applications using highly modular code. Over one hundred groups worldwide, and several company products, use TinyOS.
Our main contribution in this paper is a simulation interface for compiling TinyOS applications to OPNET model. Our approach harnesses the wealth of tools made available by OPNET, such as wireless channel modeling, scenario management, and collected data management. Using OPNET it is thus possible to simultaneously simulate multiple instantiations of different TinyOS applications, as well as the interaction of TinyOS sensors with other hardware devices (e.g., Ethernet and IP nodes).
As part of our preliminary results, we have incorporated the timer, LED, and radio interfaces of TinyOS sensors into an OPNET model. Within our implementation, TinyOS radio packets are converted to OPNET packets and sent and received using the OPNET API (although currently all communications links are modeled as full-duplex serial links). We present two simulation results as proofs of our concept: an LED-based counter, and a location-detection system. These promising results demonstrate the viability of our approach to bridging the TinyOS world with the available infrastructure in the OPNET world.
I am a college graduate student from University of Southern California (USC), Los Angeles and am doing my Masters in Electrical Engineering.
As a Student at USC, I have developed applications in multiple languages and on multiple platforms. I am proficient using Java, C, and C++ and am very well familiar with Network Protocols like HTTP, DNS, ARP, DHCP, TCP/IP,UDP, OSPF, RIP, BGP etc. Also I have the strong experience with software tools like MATLAB, Wireshark, OPNET, TinyOS, NetBeans, and Eclipse. I have the experience of working in a team as evident from my academic projects. My experience as a developer and trainee, has taught me to work both as a team player and as an individual. I assure you the best of my efforts, to achieve beyond the goals set towards me.
.