Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Large Hadron Collider hacked
Information Age ^ | 9-15-08

Posted on 09/16/2008 3:56:41 AM PDT by Renfield

A group of Greek hackers broke into the particle accelerator's systems just as scientists were turning it on in front of the world's media

Monday, 15th September 2008

Even as the scientists at CERN, the centre for nuclear research, were switching on the Large Hadron Collider (LHC) particle accelerator under Geneva last week, a group of Greek hackers were one step away from controlling a 12,500-ton electromagnet that serves as one of the machine’s four detectors.

The intruders posted a lengthy note in Greek on the machine’s network introducing themselves as ‘the Greek Security Team’, mocking the system’s poor security and calling the IT staff responsible for it “a bunch of schoolkids.”

The hackers said they had no intention of interfering with the operation of the LHC, but added, “We're pulling your pants down because we don't want to see you running around naked looking to hide yourselves when the panic comes.”

Scientists fighting off the attack on the ‘Compact Muon Solenoid Experiment’, which is competing with the Atlas detector to find evidence of the Higgs boson particle, reportedly described the intrusion as “a scary experience”.

"It is hard enough to make these things work if no one is messing with it,” an insider told The Daily Telegraph.

While only one existing file was damaged, half a dozen were reportedly uploaded and had to be carefully studied before deletion in order to avoid potential back-door threats.

"It was quickly detected and there seems to be no harm done,” said CERN spokesperson James Gillies. “From what we can tell, it was someone making the point that CMS was hackable."


TOPICS: Miscellaneous; News/Current Events
KEYWORDS: hacking; hadron
Navigation: use the links below to view more comments.
first 1-2021-31 next last

1 posted on 09/16/2008 3:56:41 AM PDT by Renfield
[ Post Reply | Private Reply | View Replies]

To: Renfield


2 posted on 09/16/2008 4:00:20 AM PDT by ari-freedom (We never hide from history. We make history!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ari-freedom

No big deal, they just found the back door.


3 posted on 09/16/2008 4:03:09 AM PDT by shadeaud
[ Post Reply | Private Reply | To 2 | View Replies]

To: shadeaud
Coffee...nose...over the keyboard....LOL thingy!

prisoner6

4 posted on 09/16/2008 4:04:09 AM PDT by prisoner6 (Right Wing Nuts hold the country together as the loose screws of the Left fall out.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Renfield
Find the hackers, execute, rinse, repeat. These hackers need to go down HARD! Security personnel should be fired and security systems should be updated.

LLS

5 posted on 09/16/2008 4:26:54 AM PDT by LibLieSlayer (GOD, Country, Family... except for dims!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibLieSlayer

Well, I want to know who made the decision to set this thing up so it is connected to the internet.

I find it hard to believe that it’s necessary for scientists to have remote access to these systems.

As an IT person, I know just how stupid management can be, even smart people in management, when it comes to system security.

You would not believe the arguments and outright disdain people have for even the simplest security measures.

More than likely, the IT team was well aware of the potential for something like this to happen and warned against setting the computer systems up the way they are.

Unfortunately, they’ll probably get in trouble or be fired for being right.


6 posted on 09/16/2008 4:39:03 AM PDT by stylin_geek (Liberalism: comparable to a chicken with its head cut off, but with more spastic motions)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Renfield
Someone hacked the Hadron?

Where's Lorena Bobbitt?

Oh. H-a-d-r-o-n.

Never mind.

7 posted on 09/16/2008 4:43:13 AM PDT by N. Theknow (Obama without a teleprompter speaks in tongues.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Renfield
Hacked?
8 posted on 09/16/2008 4:50:30 AM PDT by The Chid
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibLieSlayer
Find the hackers, execute, rinse, repeat. These hackers need to go down HARD!

Yeah, kill the messenger.
9 posted on 09/16/2008 4:52:30 AM PDT by aruanan
[ Post Reply | Private Reply | To 5 | View Replies]

To: stylin_geek

“More than likely, the IT team was well aware of the potential for something like this to happen and warned against setting the computer systems up the way they are.”

Your post is dead on. Most people, even senior management view proper security as “IT is throwing their weight around or just being paranoid.”


10 posted on 09/16/2008 4:59:51 AM PDT by ko_kyi
[ Post Reply | Private Reply | To 6 | View Replies]

To: stylin_geek

We analyze the data in Chicago.


11 posted on 09/16/2008 5:00:45 AM PDT by yevgenie
[ Post Reply | Private Reply | To 6 | View Replies]

To: Renfield

Can someone explain to me why such systems even have a bridge between outside access and operative control features? If its a manned system, shouldn’t all of the controls be on an isolated internal intranet?


12 posted on 09/16/2008 5:09:17 AM PDT by SampleMan (Community Organizer: What liberals do when they run out of college, before they run out of Marxism.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Renfield

Guess the “secrets of the universe” and “insights into the big bang” will have to wait until they change their passwords.


13 posted on 09/16/2008 5:14:54 AM PDT by BooksForTheRight.com (Fight liberal lies with knowledge. Read conservative books and articles.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Renfield

Why didn’t they just use a crypto device?


14 posted on 09/16/2008 5:25:37 AM PDT by stuartcr (Election year.....Who we gonna hate, in '08?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibLieSlayer

I don’t agree. They committed a crime, of course, but hackers are right about one thing—they indirectly do a great service by demonstrating the futility of most security systems and they help to make them better. If a couple kids can do this, imagine with a thousand dedicated hackers with unlimited resources (Russian, al-Qaeda, Chinese) can do. I say they should hire the hackers.

WW3 has already begun—it started several years ago when the Russians started massive attacks on US military websites and against sites of allies. al-Qaeda and China have also been doing enormous levels of attacks on security systems. I’m not suggesting these guys are on the same side—if anything, there’s a thousand sides in the war. But it is going on and we need all the help we can get.


15 posted on 09/16/2008 5:28:43 AM PDT by Ilya Mourometz
[ Post Reply | Private Reply | To 5 | View Replies]

To: Renfield

It’s all fun and games until someone hacks in and creates a black hole that can’t be contained.


16 posted on 09/16/2008 5:31:07 AM PDT by itsthejourney (Sarah-cuda IS the right reason)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SampleMan
Can someone explain to me why such systems even have a bridge between outside access and operative control features?

Have you ever heard of the term, "educated idiot"?

17 posted on 09/16/2008 5:32:45 AM PDT by Renfield (Turning apples into venison since 1999!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: stylin_geek

You make some salient points. Thanks.

LLS


18 posted on 09/16/2008 6:24:20 AM PDT by LibLieSlayer (GOD, Country, Family... except when it comes to dims!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: aruanan
What message were they sending? I read they wanted to shut it down because as we all know... ALL LIFE WILL CEASE when they throw the switch! (sarc)

LLS

19 posted on 09/16/2008 6:34:13 AM PDT by LibLieSlayer (GOD, Country, Family... except when it comes to dims!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: stylin_geek
Almost just as interesting, though, is the massive computer network CERN has set up to evaluate the prodigious quantities of data the LHC will produce. Called the LHC Grid, the network will encompass some 60,000 computers around the world in order to leverage enough computer power to go through the 15 petabytes of information LHC experiments will produce each year.

http://www.spiegel.de/international/europe/0,1518,577219,00.html

20 posted on 09/16/2008 6:37:32 AM PDT by Between the Lines (I am very cognizant of my fallibility, sinfulness, and other limitations.)
[ Post Reply | Private Reply | To 6 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-31 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson