It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

What's up with American cybersecurity

page: 3
8
<< 1  2   >>

log in

join
share:

posted on Dec, 24 2020 @ 11:37 AM
link   
a reply to: Willtell




remember these are commercial products


This is precisely the key point. Critical systems, and in particular defense systems, should never have gone into acquiring commercial software. I do remember the days in which we coded everything in-house, from scratch, as it was a must to never rely on civilian software. Then came the days of evolutionary acquisition theorists, and those advocating for a pre-planned product improvement (P3I). We used to code in Coral and Jovial, and slowly moved to Ada, to finally loss the battle in favor of third party products when DoD decided to cut development costs down.

All of the systems that were bought, instead of having been developed in-house, turned to be extremely faulty, hackable, and unreliable. Fortunately, all SCCs, CCCs, COCs (we called them 'siouxie', and they refer to Strategic, Command & Control, and Combat Operations centers, respectively) were left intact, coded in Jovial and Coral, till today. The new ones are based on commercial products, except for the siouxies. All in all, the silos are safe, detached from the Internet, as if they were living in a parallel world.

In the old days people spent 80% of the time defining user requirements so deeply formulated that you only needed 10% of the time for coding, and 10% of the time for testing. Today the situation is crappy up to the point that nobody in the acquisition chain is knowledgeable of what the programs do, and nobody is ready to accept any significant responsibility for any stage of the acquisition cycle. Summing up: hackable systems are everywhere so that you can expect a global software catastrophe anytime soon.



posted on Dec, 24 2020 @ 11:46 AM
link   
a reply to: Direne

I agree totally.


And will only add this: Remember, a lot of politicians were willing to sacrifice security for their money masters who wanted to make a killing selling to the American defense industry.


As for that coming catastrophe, sure, and it will be like the terrible challenger crash. We'll have hearings to see the incompetence and greed which led up to the software catastrophe and then and only then will they make changes...MAYBE.



posted on Dec, 24 2020 @ 12:06 PM
link   
This was a diversion, plain & simple. Biden & Co and China collusion was starting to get too much publicity in the main stream. The hack was most likely an inside job...



posted on Dec, 24 2020 @ 12:13 PM
link   
a reply to: d3ftronix

It was we doing some penetration testing, don't worry. Now we know what to correct. Though on the other hand, this would allow us to launch some missiles and blame the hackers...



posted on Dec, 24 2020 @ 12:18 PM
link   
No doubt. Or shutdown a power grid or two.



posted on Dec, 24 2020 @ 12:20 PM
link   
And there's the fact that Trump fired the U.S. Head of Cybersecurity cause he wouldn't sign on to the election fraud B.S. m And though everyone in a position to know (including Pompeo) says it was the Russians Trump would have us believe it's China. Sure, Putin's got nothing on Trump.



edit on 24-12-2020 by jtma508 because: (no reason given)



posted on Dec, 24 2020 @ 01:29 PM
link   

originally posted by: Willtell
I've seen a top IT guy almost erase a server and the panic of the department was palpable, so it's sometimes mistakes by professionals who aren't perfect.

IT guys and programmers are users too.



posted on Dec, 24 2020 @ 03:08 PM
link   
a reply to: Willtell




ut just crying FAKE NEWS doesn't mean it's FAKE news. Have you researched this thoroughly to determine to your satisfaction that it is or isn't FAKE NEWS?


Its very evident to me that its fake news yes. I can tell by the masonic fingerprint of the story and the fact its being peddle by The MSM which has great tendency to push that narrative these days.

We are in an information war of epic proportions. No evidence has been released that its Russia. Just like the DNC hacks and the Russian narrative or Trump and the Russian collusion. You really going to keep falling for this fake news.?



posted on Dec, 24 2020 @ 05:38 PM
link   
Since Microsoft has put security updates into a cycle its like these hackers are the eagle that comes to eat Prometheus liver every day. And as for political elections the Prometheus allegory might work more like the trick at Mecone. Oh wait...

If you have need for real security the only solution seems to be not to connect it to anything hackers can access and certainly not software that is always in a state of flux and new development. Hackers today probably have read only access for any unshielded network which is why desert locations with on site power generation seem favored for secure data centers.



posted on Dec, 26 2020 @ 10:13 AM
link   

originally posted by: Slichter

Hackers today probably have read only access for any unshielded network which is why desert locations with on site power generation seem favored for secure data centers.


For remote locations its quite often cost and availability of resources which normally means power and water or deep enough to use the rock as a natural cooling solution and if its sunny for 12+ hours a day you have plenty of free/cheap power saving you a fortune.

Obviously building secure DC's is important for all uses of the site and is a good selling point in that its hard work to come and steal your servers physcially



posted on Dec, 26 2020 @ 10:24 AM
link   
Here are some tips for personal security below

Starting with a VPN. A good solution though it does slow one's browsing...

What is a VPN? ( Virtual Private Network) It basically encrypts your browsing data. And hides your browsing history and other things...read below

us.norton.com...#:~:text=VPNs%20use%20encryption%20to%20scramble,eavesdropping%20on%20your%20internet %20activity.
www.howtogeek.com...


A Cyber Expert on personal cybersecurity and the basic deal on the hack. Gives good advice on how to protect from hackers on your personal systems...



posted on Dec, 26 2020 @ 10:29 AM
link   
a reply to: purplemer




masonic fingerprint?



One might have to explain that.



new topics

top topics



 
8
<< 1  2   >>

log in

join