It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by SplitInfinity
reply to post by HermitShip
The Chinese Hackers are responsible for many incursions into the U.S. GRID...but only because we allow them to. It works like this...we let them hack our systems to an extent to see just how far or capable they are. We might even allow access for a time...but it is all for the purpose of gauging an adversary.
The U.S. Military Cyber Division has a MASSIVE BUDGET. Some estimate that over 70% of that budget is Covert thus it is much larger than the Huge Public Budget disclosed.
If you think for a SECOND the U.S. Military would not have the capability to BURN any Hack or Tag the Hack and insert a TOMBSTONE VIRUS on any Hacking Adversary...then you are delusional. The INTERNET WAS CREATED BY THE U.S. MILITARY! It has ways and lanes and Back Doors that NO ONE KNOWS ABOUT!
According to KrebsOnSecurity.com, the company does not think that the intruders got any information that would enable them to gain access to a customer system or that any of the compromised computers have been connected to a customer system
Joe Stewart, director of malware research at Dell SecureWorks said the Web site and malware names cited in the Telvent report map back to a Chinese hacking team known as the “Comment Group.” Comment Group has been involved in sophisticated attacks to harvest intellectual property and trade secrets from energy companies, patent law firms and investment banks.
Doesn't sound like 'having control' of the US grid.
Fear to drum up business for security, the business of the future.
Originally posted by OccamAssassin
reply to post by adjensen
Why critical computers that control things like air traffic control or the power grid are on networks that are connected to the Internet boggles the mind.
The systems are (generally) not connected to the internet. Usually the hackers connect directly to the systems via their internal networks. In the old days....a dialer would be set up to systematically call a range of phone numbers until a computer was found.....then the type of system and potential entry points can be identified.
The military works the same. Critical systems only run on dedicated networks.
Can you imagine the ramifications if a hacker were able to take control of a drone?
Originally posted by AfterInfinity
reply to post by adjensen
Your thread has apparently been deleted. In response to that thread, but also in relation to this topic here, the United States is too reliant on external stimuli, of which technology is only one category. It is one branch of the Tree of External Stimuli.
To that end, it is beneficial to lose power. However, it must be noted that all of our means of survival have been plugged into the power grid as well - which means it's not just our pleasures, but our sustenance that suffers as well.
Originally posted by OccamAssassin
reply to post by adjensen
Why critical computers that control things like air traffic control or the power grid are on networks that are connected to the Internet boggles the mind.
The systems are (generally) not connected to the internet. Usually the hackers connect directly to the systems via their internal networks. In the old days....a dialer would be set up to systematically call a range of phone numbers until a computer was found.....then the type of system and potential entry points can be identified.
The military works the same. Critical systems only run on dedicated networks.
Can you imagine the ramifications if a hacker were able to take control of a drone?
In the old days....a dialer would be set up to systematically call a range of phone numbers until a computer was found.....then the type of system and potential entry points can be identified.
Can you imagine the ramifications if a hacker were able to take control of a drone?
Originally posted by _R4t_
To whom said "can u imagine the ramification of someonw hacking a drone" its already been done using stuff u can find at your lical walmart pretty much...
digitaljournal.com...
Originally posted by Laxpla
Originally posted by _R4t_
To whom said "can u imagine the ramification of someonw hacking a drone" its already been done using stuff u can find at your lical walmart pretty much...
digitaljournal.com...
No it hasn't.
www.secretprojects.co.uk...
Hell, even the CIA has been hacked....not just once but numerous times. I feel bad for that team.... I bet that made for a bitch of a morning.