It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
)—Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.
The FBI, Secret Service and U.S. intelligence agencies are all involved in investigating the breach, which they consider among the most sophisticated attacks ever launched against U.S. government systems. The intrusion was routed through computers around the world, as hackers often do to hide their tracks, but investigators found tell-tale codes and other markers that they believe point to hackers working for the Russian government. A spokesman for the National Security Council declined to comment. Neither the U.S. State Department or the Russian immediately embassy responded to a request for comment.
www.cnn.com...
originally posted by: Mandroid7
Lol.. This is hilarious!
Which scenario Is more likely?
a. The WH has open ports with access to the internet on sensitive computer systems, that even a basic IT networking engineer can secure.
b. This is complete bs, manufactured by the WH in order to perpetuate the boogyman.
Anything to divert the people from talking about being robbed blind while increasing their power.
My money is on b.
originally posted by: johnwick
originally posted by: Mandroid7
Lol.. This is hilarious!
Which scenario Is more likely?
a. The WH has open ports with access to the internet on sensitive computer systems, that even a basic IT networking engineer can secure.
b. This is complete bs, manufactured by the WH in order to perpetuate the boogyman.
Anything to divert the people from talking about being robbed blind while increasing their power.
My money is on b.
Everyone knows you don't keep sensitive info on a server that is linked to a network that is linked to the internet.
There is no such thing as an unhackable computer network.
They should have kept it on a server connected only to a local network.
While the White House has said the breach only ever affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president's schedule. While such information is not classified, it is still highly sensitive and prized by foreign intelligence agencies, U.S. officials say.
The directive ordered the government to “identify potential targets of national importance” against which offensive cyberoperations “can offer a favorable balance of effectiveness and risk as compared with other instruments of national power.” That means, in essence, that the Pentagon’s Cyber Command and the intelligence agencies would maintain lists of targets around the world that could be damaged more effectively, and more covertly, by a computer attack than by a missile or bomber attack.
AFTER THE STUXNET digital weapon was discovered on machines in Iran in 2010, many security researchers warned that US adversaries would learn from this and other US attacks and develop similar techniques to target America and its allies.
A newly published document leaked by Edward Snowden indicates that the NSA feared the same thing and that Iran may already be doing exactly this. The NSA document from April 2013, published today by The Intercept, shows the US intelligence community is worried that Iran has learned from attacks like Stuxnet, Flame and Duqu—all of which were created by the same teams—in order to improve its own capabilities.
The document suggests that such attacks don’t just invite counterattacks but also school adversaries on new techniques and tools to use in their counterattacks, allowing them to increase the sophistication of these assaults. Iran, the document states, “has demonstrated a clear ability to learn from the capabilities and actions of others.”
The document, which was prepared for a meeting between the NSA director and the British spy agency Government Communications Headquarters, doesn’t mention the Stuxnet attack by name, but instead refers to “Western attacks against Iran’s nuclear sector.” Stuxnet targeted machines controlling centrifuges in Iran that were being used to enrich uranium for Iran’s program.
originally posted by: burdman30ott6