Skip to comments.Video: Alarming Hack Attack
Posted on 04/22/2009 8:50:41 AM PDT by careyb
4 terabytes[!] of info about the F-35 Fighter Jet obtained by hackers.
I asked yesterday why any $300 billion secret project should be connected to the Internet. Still don’t understand why.
Yeah but you know managers thought they were getting a great price for network security.
Some scientists are now analyzing the data in Moscow and Beijing.
Well you know he just wants everyone to have a fair chance, so it will be of no concern to “the one”
Complete and utter incompetence.
Obumas staff has been busy...
We’re about 1/17th of this “presidency” done.
I’m not sure America can physically withstand 16 more 12-week periods like this.
“Complete and utter incompetence.”
That’s the point though. No way. No way are they that incompetant. And other reports say the traffic went TO CHINA?????
No way are they that incompetant.
A resounding “NO”.
The construction blueprints are minor. The real problem is the transfer of technical information that could aid an adversary in defeating the stealth, jamming and VSTOL technologies. It would, in essence, leave the US and its allies with a very expensive turkey.
Keep in mind, this is such an expensive aircraft that the contracting work is being sub-divided among the countries purchasing the JSF so each country can justify its purchase of the plane.
If it goes on for 37 days, it isn't a spike.
Not the point dude...
Here’s a 14-month-long spike or whatever-you-want-to-call-it:
I wouldn’t be surprised if all the traffic from systems hacked in Turkey, Europe and the US went to China. My friends in the military say the Chinese have attempted to hack into DoD systems over 10,000 times per year.
The key is not only to copy our advanced technology, thereby obviating their own R&D costs, but also to develop systems that defeat that technology and sell those systems to the highest bidder. This means we could spend billions on a military product that would essentially become ineffective.
In my opinion, this is all towards the goal of supplanting the US as the superpower. The PRC doesn’t want to destroy us yet because then they would inherit a burden. They want to do all they can to marginalize the USA so that they can start calling the shots, whether it’s the Spratley Islands, Law of the Seas, support for rogue regimes, etc.
Of course I could just be paranoid; my parents decided to become American citizens after they heard what happen to their families in China after 1949.
I think you’re absolutely right.
So if you’re ethnicly Chinese, what do you think, should we have the presumption that Chinese are more likely to be spies for PRC?
My parents and most of my extended family are ethnically China; unfortunately, most cases of what we would call treason do occur among fellow Chinese, some of whom are new citizens. Most of these are people whose sole purpose is to help the “motherland.” They are chauvinists to the nth degree. After surviving the Cultural Revolution, my cousin and her husband basically have it right: “We owe nothing to China, it’s that government who owes us for the deaths of family members.”
Earlier this year, the FBI hauled in a guy from the suburbs of Chicago, ready to get on a plane to Shanghai. He was caught on tape in a sting operation.
I think my mom, at age 79, would be a good judge of who is going to turn on this country but she wouldn’t get hired due to “racial profiling.”
This brings about the simple question - why is the computer holding this information connected to the internet? I don’t care how many firewalls you have - this stuff should be on a stand-alone computer or network with NO electrical connection to the outside world.
For the same reason that our $300+ billion electric grid is connected - so that people that have no idea what's going on can see things that they don't understand in order to show that they're 'in the know'.
Or somebody on the inside is helping...
Um, not to be snarky, but a simple download, particularly if slow and mixed in with other traffic, most likely would not show up as an anomaly. The key indicator would more likely be the length of the session that initiated it...and the fact that there was an open port that allowed the download in the first place. But what would I know. I'm just a cissp. Anyway, we both agree with the "WTF" nature of this mishap. Somebody at .gov needs a good slap.
“But what would I know. I’m just a cissp. Anyway, we both agree with the “WTF” nature of this mishap. Somebody at .gov needs a good slap.”
I’m very happy for you. No, I don’t accept it as a mishap. Someone must have left the gate open for this.
No, I meant she would be the one doing the profiling. LOL!
I see - that wouldn’t really be racial profiling then, but personality profiling. At least I would think.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.