It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: hounddoghowlie
you know i'm no super it tech, but it seems to me that they could take clean computers, set them up and have the required software to run the systems ready to go, just not on line. take the old ones off and place the new ones online. i'm sure the systems have backup and emergency measures in case of a computer failure. so a few seconds to a few minutes shouldn't cause any problems.
it's time like these that i bet they wish they had the hack proof computers that are in some of our missile silos. not even connected to the internet
originally posted by: hounddoghowlie
you know i'm no super it tech, but it seems to me that they could take clean computers, set them up and have the required software to run the systems ready to go, just not on line. take the old ones off and place the new ones online. i'm sure the systems have backup and emergency measures in case of a computer failure. so a few seconds to a few minutes shouldn't cause any problems.
it's time like these that i bet they wish they had the hack proof computers that are in some of our missile silos. not even connected to the internet
Oh, to add to what I said about cyber weapons in my previous post. These things if used will collapse a government/military almost overnight. They are more powerful than nuclear weapons and they equalize everyone. It doesn't take long for a nation that has no electricity, no access to financial markets, no money (due to the previous two), and no mechanism to deliver fresh food/water to collapse. All without needing to fire a single shot, commit boots on the ground, or even kill a bunch of people.
originally posted by: blacktie
a reply to: signalfire
maybe not 'logged-in' but connected
Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent. by Dan Goodin - Oct 31, 2013 2:07 pm UTC Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused. He also found that the machine could delete data and undo configuration changes with no prompting. He didn't know it then, but that odd firmware update would become a high-stakes malware mystery that would consume most of his waking hours.
In the following months, Ruiu observed more odd phenomena that seemed straight out of a science-fiction thriller. A computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting. His network transmitted data specific to the Internet's next-generation IPv6 networking protocol, even from computers that were supposed to have IPv6 completely disabled. Strangest of all was the ability of infected machines to transmit small amounts of network data with other infected machines even when their power cords and Ethernet cables were unplugged and their Wi-Fi and Bluetooth cards were removed. Further investigation soon showed that the list of affected operating systems also included multiple variants of Windows and Linux.
"We were like, 'Okay, we're totally owned,'" Ruiu told Ars. "'We have to erase all our systems and start from scratch,' which we did. It was a very painful exercise. I've been suspicious of stuff around here ever since." In the intervening three years, Ruiu said, the infections have persisted, almost like a strain of bacteria that's able to survive extreme antibiotic therapies. Within hours or weeks of wiping an infected computer clean, the odd behavior would return. The most visible sign of contamination is a machine's inability to boot off a CD, but other, more subtle behaviors can be observed when using tools such as Process Monitor, which is designed for troubleshooting and forensic investigations.
Another intriguing characteristic: in addition to jumping "airgaps" designed to isolate infected or sensitive machines from all other networked computers, the malware seems to have self-healing capabilities. "We had an air-gapped computer that just had its [firmware] BIOS reflashed, a fresh disk drive installed, and zero data on it, installed from a Windows system CD," Ruiu said. "At one point, we were editing some of the components and our registry editor got disabled. It was like: wait a minute, how can that happen? How can the machine react and attack the software that we're using to attack it? This is an air-gapped machine and all of a sudden the search function in the registry editor stopped working when we were using it to search for their keys."
originally posted by: blacktie
a reply to: ThirdEyeofHorus
well there were those merchant accounts that got broken into, lots of people were worried their personal info was stolen