It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

GhostNet: Reconnaissance For Internet Doomsday

page: 3
120
<< 1  2    4 >>

log in

join
share:

posted on Mar, 31 2009 @ 11:48 AM
link   

Originally posted by DraconianKing
Our military brass have no clue just how powerful a weapon the computer can be.


That's ridiculous...information has been well understood to be the currency of Kings for centuries.

Which leads me to think that upon the onset of a global communications network for the masses there was much attention being paid to the various intricacies of social manifestations that could occur.

The fact that the internet has made communication instantaneous, for all intents and purposes, does not negate the fact that people must communicate efficiently...unfortunately, an efficient communication for the public is many times "suggestive"...enough to provoke the inadequate pattern recognition skills of said public (with varying degrees of trust in many sources as sociology and 'virtual posturings' become a factor in a 'viral' campaign (viral in this case does not denote intention...
).

As said earlier...that which is written can be read. But accurate comprehension of that which is not necessitated by the act of reading.



posted on Mar, 31 2009 @ 12:02 PM
link   
reply to post by mister.old.school
 


OMG ! This is exactly how they are going to control the internet now. With talks lately of the internet being dangerous and trying to sensor the internet , this will be the excuse to use.

To scare all of us Americans into thinking that unless we give the gov more control over the internet, then we will all be cyber attacked by the chinese.

Just another piece of the puzzle that is starting to being the bigger picture into view.

to OP. Thanks for the post though. GReat job



posted on Mar, 31 2009 @ 12:09 PM
link   
You all seem to be focused on the router issue here.

But who remembers those 1998 faked Pentiums from China ?

news.cnet.com...
news.cnet.com...

Red alert for the military, because a lot of networking functions depend on specific Integrated Circuits, not just microprocessors.
If some "undocumented" hardware functions were to wake-up suddenly on the field, they would be pwned.

This 10 years-old IC story just fills the gap between the virus and the router in term of unwanted control chain.

Paranoïa or reality ?

That's not all.
Who remembers the TPM, the Trusted Platform Module ?

en.wikipedia.org...

The same way Viruses, Faked ICs and Routers try to escape from owner's control, this circuit was officially intended to gain control on your computer beyond your worst nightmare.

All your bases are belong to us.

My dear friends, we live in the best days of the computer-era : it's still fun, and full of possibilities.
Tomorrow will be hard for John Doe if he wants to stay in control of his machine.



posted on Mar, 31 2009 @ 12:13 PM
link   
I think all of these posts can be right.

1) of course they're recording everything we type out for them. It's too easy to keep track.

2) so what, there is no one to go through all of it. I know government offices and they're not like the set of 24. It's all old mix matched pc's from back when there was funding and stacks of files and forgotten proposals and inquiries. It's not staffed by Bauer, but by tired, grumpy 9-5ers who watch American Idol, and are only aware of their particular department and not the big picture. Those who do work on the big picture quickly move to the private sector because it's more lucrative and easier. And when someone energetic does come along there is a wall of bureaucracy and frustration to soon squash him into place or drive him to the private sector as well.

3) So I'd be more worried about the private sector - and their hiring of prison labor and data processing banks in India to mine our key strokes and camera images. Except that all of those people have lives and don't really care about this and make human mistakes.

4) So really all that matters is if there is an auto mining and your name pops up like in the movie Brazil and you're targeted by a machine and have no recourse to break free. But that seems unlikely. Unless we all concentrate on it so much that we manifest it. But people have been worrying about the Man for generations and it seems to me that Big Brother is losing control instead of gaining it. Rich people are losing a lot of money right now too, they're all on prosac and viagra and I don't think their plan is working for them any where in the world.

I think it's because 6.5 billion people are uncontrollable. There will always be something like radio or tv or internet or cell phones or God knows what next - yeah they're trying - but so what. Let them, it will just inspire us to move on to what's next




posted on Mar, 31 2009 @ 01:58 PM
link   


reply to post by azzllin
 


The spread of the counterfeit routers is vast, and went largely unchecked for quite a while. Many companies and Governmental Agencies would have to be "in on it' to spread dis-information. Its unrealistic to believe the government new about it from the get go and went with it anyways. Opening a hole into your protected network, through the hardware, is a stupid move, even if you are trying to feed dis-information.


I'm trying to feed disinformation? if that is what you mean, then you are way way off the mark, and need to see how disinfo works, I have always without hesitation prided myself on being totally honest in all walks of my life, even on the internet, I have zero to hide from anyone, easily findable on the internet with little effort, am I afraid someone will try and cause me harm because I am so open?, naaa anyone who wishes me harm well that's their problem, I am a spiritual man with closets wide open, any regrets in life well that's all they are, no shame, I have a saying, never apologise for something you meant to do.

If that isn't what you meant then my bad, I'm not upset or anything not even phased really, my wife calls me a lot worse.

The point I was trying to make in my first post is, ok perhaps this all went unnoticed at first to everyone involved, but I cant believe they where that blind to allow it for to long without someone saying that something was odd, I am not going to sit here and expect all kinds of crap to happen because someone supposedly didn't notice active spying, I understand that this is a lot different to the usual virus and hacking, but who am I to grab their attention? sure I call them, (Governments and Agencies ) I rip them, even had a choice word or two with several to their faces (MP's) but if something is going down, it's with their blessings, if the laptop goes down, then I just switch, been messing and building these things for some time now, it's no loss to me, I have no information they could want or need, if I did they only need to ask, just like anyone else on Planet Earth, if I got two of something WANT ONE?

I also remember YK2 and all the people running around paying vast amounts of money, to people who kept telling them it was a problem, what happened? nothing, nothing but a huge amount of computer techs got rich quick, maybe something will happen, but it isn't going to hurt my life or that of my Family,
I'm also not telling anyone there isn't anything to worry about, because I don't know that much to say anything near that, what does concern me a lot however, is the amount of scare scaremongering that happens here, I know of one person at least who had to take a very long break from here, because they became convinced the World was going to end, ended up seeing Doctors for stress, one persons laugh is anothers nervous breakdown.

This is a great thread very informative, will I be awake all night worrying? nope, I will be awake all night watching video footage, this has now turned into a long winded useless post by me, as usual, but disinfo from me? maybe tomorrow morning for an hour or two, apart from that the wrong tree is being barked at.

Anyhow, everyone be safe, and careful, but most of all, keep it real, no matter what happens, the sun shall still rise, and the World shall still have it's woes, as long as everyone is alright Physically and mentally, then I'm happy.
Best of luck to you all.



posted on Mar, 31 2009 @ 02:02 PM
link   
reply to post by InSpiteOf
 


I understand now what you meant, I apologise I misunderstood, amazing how clear things become when you clean your glasses lol, I'm not going to edit the post wouldn't be right.

Thank you for helping try clear up my ramblings.

Azz



posted on Mar, 31 2009 @ 02:29 PM
link   
reply to post by Asset1911
 


Are you willing to wait till it's too late for proof? Are you willing to risk your life and the life of those you love because your waiting for proof? The Chinese government has been at it long before this post. Stealing US Tech, Espionage etc. Why should we give them the benefit of the doubt when we are their target? You want proof? Fine wait for proof, and in the meantime I'm gunning up.


Edit because I have something to add that didn't occur to me before.

This new worm that is being introduced on april 1st. You know the one that would cripple tons of machines no matter what OS you use. I think there are a few threads about it now but one stands out to me being a tech guy.

www.abovetopsecret.com...
[edit on 31-3-2009 by DaMod]

[edit on 31-3-2009 by DaMod]

[edit on 31-3-2009 by DaMod]

[edit on 31-3-2009 by DaMod]



posted on Mar, 31 2009 @ 03:20 PM
link   

Originally posted by DaMod
reply to post by Asset1911
 


Are you willing to wait till it's too late for proof? Are you willing to risk your life and the life of those you love because your waiting for proof? The Chinese government has been at it long before this post. Stealing US Tech, Espionage etc. Why should we give them the benefit of the doubt when we are their target? You want proof? Fine wait for proof, and in the meantime I'm gunning up.


[edit on 31-3-2009 by DaMod]


Dude, I think you are seriously paranoid.
And what is "gunning up" going to do to avert a science fiction cyber attack?

Please read your own sig and live by the example.
no, not the sniper kitty thing, the other one.....



posted on Mar, 31 2009 @ 03:30 PM
link   
It won't avert anything but it would definitely help in the aftermath where your "science fiction" (read my edit to post above) attack where to take place. Its not being paranoid, it's being prepared. Sure this preparedness is madness but it is put to good use.



posted on Mar, 31 2009 @ 03:52 PM
link   
Very interesting stuff mr.old.school. This is the first I've heard of this. I just tried to U2U you but unfortunately I don't have 20 posts. I really want to pick your brain man! I'm a first year IT student with a need for answers to many questions. ... Anyone know how I can contact mr.old.school?
-wrath



posted on Mar, 31 2009 @ 04:04 PM
link   
@ Damod Wow hey dude calm down I'm not even American , I didn't mean to provoke such a reaction from your part , I was just asking a few questions and I was telling my opinion to the O.P I don't doubt his post is true . But chill man , chill , I did not say this was false . Wow I couldn't imagine such a reaction man you look scared by this stuff


But if you don't accept any incoming file to your pc , you run no risk right ?

[edit on 31-3-2009 by Asset1911]



posted on Mar, 31 2009 @ 05:20 PM
link   
reply to post by Asset1911
 


Most of us are aware of this topic and its having gone mainstream from earlier threads. You are guilty of not doing research yourself I'd think. Mister Old School does not need to justify this to this board.

On topic-

We, meaning business and government have got to learn that no information that is sensitive should ever be on a computer that is connected to a network in the first place. In cases where it is it is out of pure laziness and not wanting to use other methods to transfer information. It may be a pain to have to burn and deliver a disk or a document, but it is the only safe method.

Our best protection is to assume this is always a factor and act accordingly by making sure vital systems and information are never exposed on a network of any kind.

Edited to say: I did not see your other response until I posted but I'll let the post stand as is.

[edit on 3/31/2009 by Blaine91555]



posted on Mar, 31 2009 @ 05:57 PM
link   
Ok, guys. Whether you like it or not, the only thing the Chinese can't kill without moving is the nukes your submarines are carrying. And that scares the crap out of the "Politburo" leaders, fearing for the landscape they see from their window.
If the Chinese knew a way to infiltrate the submarines, i bet the West is doomed. Crazy theory i know , but a dozen well trained, well equipped guys can take down a ground based nuke site for a half hour, more than enough. Harder to kill a stealth submarine.

Anyway, read Sun-Tzu and you'll know the Chinese will defeat us without even firing a single shot.



posted on Mar, 31 2009 @ 05:58 PM
link   
When this news broke in the UK in the media they did not mention the problem about hardware that you pointed out.

AS soon as i heard about this on the news i thought about how i had been privy to this information and more thanks to the OP of the original thread and that gave me a sense of pride that we have such a great team in place here to keep these things in the public view.

i think this information as you say was truly broken by you and for that a star and a flag for you sir.

great read and a well researched and valid important thread in my eyes keep up the great work.



posted on Mar, 31 2009 @ 06:53 PM
link   
Talking of weaknesses in software made me think of PROMIS, which some members may be too new to know about. It's supposedly software that allows a back door to be opened into a huge range of computers.

So that we don't have to reinvent the wheel at ATS, I'm posting this search result which should get people started.

I'm not a techy myself but it's interesting to note that the first post in the first link contains this:


So I started calling and inquiring information in the biz, called a few douzen people I know, worked with or found names from in relation to PROMIS and also commercialy available software like it.
I also asked around on the net about PROMIS, asking people that already did some research but hit a dead end, if they could share all their data on it.

Then, out of the blue, I got a visit from the police. They said it was a standard survey, but they asked me all sorts of questions that I couldn't imagine a normal "police" survey to include, some of the questions were about what I do on my computers at home, what interests I have in relation to technology, hardware, software and networks.
What they also asked me was "do you have a job, car, own a house, stock or other things".


From this thread



posted on Mar, 31 2009 @ 07:10 PM
link   
reply to post by mister.old.school
 


Very interesting....today on FOX, they reported that a terrorist group was planning a massive hit on the White House. Within the same news program, they also covered the issue of this April Fool's internet virus, designed to probe for passwords, bank account numbers, and such....

Norton

I got the feeling the two were related.



posted on Mar, 31 2009 @ 07:37 PM
link   
You are quite incorrect that the infrastructure is safe if the attackers are criminals.

It is quite common within the industry to silently pay off the extortion demands of cyber criminals. The alternative is to have the FBI move in, take your servers apart piece by piece, and put each piece into clearly labeled plastic boxes as evidence.

Nothing says we are to be taken seriously when we threaten you, than taking out anyone who does not comply.

War is war, whether the attack is by a nation, or a syndicate.

To all appearances, this threat genuine. It is also unlikely to be a "Test Shot". The deployment mechanisms are already easily counterable.

In this kind of endeavor, all major weapons are one time use. Then you need to go back to the drawing board. Someone put a lot of time, money and effort into this. Payday is coming.



[edit on 31-3-2009 by Cyberbian]



posted on Mar, 31 2009 @ 07:42 PM
link   

Originally posted by Blaine91555
We, meaning business and government have got to learn that no information that is sensitive should ever be on a computer that is connected to a network in the first place. In cases where it is it is out of pure laziness and not wanting to use other methods to transfer information. It may be a pain to have to burn and deliver a disk or a document, but it is the only safe method.

Our best protection is to assume this is always a factor and act accordingly by making sure vital systems and information are never exposed on a network of any kind.

Edited to say: I did not see your other response until I posted but I'll let the post stand as is.


I'm far from a business expert but given todays business climate and needs what your proposing seems counterintuitive. Isn't the exchange of real time information critical to conducting modern business transactions. Your intentions are sound but simply do not apply to the real world. I think information can be kept private "if" procedures and rules are followed. No it is isn't easy or simple but it can be done.

brill



posted on Mar, 31 2009 @ 08:31 PM
link   
FWIW I am a computer security expert. Most of the network attacks I see stem from either Korea, China, or Japan. Does this indicate these nations are mounting for a large-scale power grab? Unlikely. Why? It's better to control the flow of information, or at least feed off of it, than it is to reveal their hand.

Have no doubt, though, information warfare is very real.

I've long worried about foreign manufactured routing equipment sending out heartbeats to reveal network topology. There are preventative measures, but not all network technicians create sufficiently restrictive iptable / IOS rules to keep information internal to the intranet from leaking to the outside world.

Thankfully most large organizations are smart enough to have NOCs that are several layers deep to not only do automated filtering, but to manually monitor network traffic for bizarre behavior. For instance, if it's midnight, no one's in a building, and no one's RDP/SSH/VNC'ed in to any of the boxes, it's a bit odd when a TCP stream activates and IRC commands start talking to a machine in a foreign country. Then there's the question though, who watches the watchers? A large number of breaches are inside jobs.

It's a quagmire. Even the old adage, "'the only safe computer is locked in a room and unplugged from the Internet" proves false. Wireless mice and keyboard traffic can be logged. Not to mention van eck phreaking is more real than many people realize.

In truth the only safe computer is one that's been physically incinerated.

The best solution I've seen is to have two physically different networks. One network connects to the outside world. Then another network of completely separate machines exists on a private network that at no point intersects with the public network. There are even mechanisms to detect bridging of the networks. This is still imperfect, but it's much better than the alternative.

For those of you who want a better understanding of how this all works. This paper, by Michael T. Raggo, provides a good overview.

[edit on 1-4-2009 by Xtraeme]



posted on Apr, 1 2009 @ 12:19 AM
link   
reply to post by jasonjnelson
 

" If the world moves towards a one world gov't , China also benefits greatest. I mean, they then have a third of the total votes if we were in such a situation. My point? Even if neither of the two situations above were to take place, there is no doubt in my mind that China eyes our bread basket, and the power we have on this globe."

How Eurocentric of you [amusement]. . . do you really think that Chinese culture wants to have or be like the United States or the Western Nations? It is arrogant to assume that other cultures would aspire to live like one's own country does.
China will maintain it's honor and save face as it always has, as long as the other large nations are competing to damage each others' honor and make themselves look important.
As they have throughout history, China will probably be shrewd and cull the useful from the western Euro technologies and cultures, and ignore the rest of them. For an example, during the 1600's this policy kept China from being overrun by massive empire expansions by Islam, Byzantine, India/Persia.



new topics

top topics



 
120
<< 1  2    4 >>

log in

join