It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
(visit the link for the full news article)
The longstanding whistleblower website Cryptome.org has been hacked during the weekend and all of the 54,000 files hosted on it have been deleted.
Cryptome publishes sensitive leaked documents and is ran by a long-time civil liberties activist named John Young, who co-founded the site in 1996.
The attack began during the early hours of October 2nd with the hacking of an Earthlink email address associated with the domain name.
After October 1 thousands of US military hackers and spies will get down to their cyber war activities
The command - made up of 1,000 elite military hackers and spies under one four-star general - is the linchpin of the Pentagon's new strategy and is slated to become fully operational Oct. 1.- Washington Post reports (6). The Defense Department has “15,000 networks and 7 million computing devices in use in dozens of countries, with 90,000 people working to maintain them and it depends heavily on commercial industry for its network operations” (7). Attracting allies and private companies working in the sphere of IT and security the US plans to establish the new order in the global cyber space.
Originally posted by Hefficide
Meet the new and improved state sponsored hacker...
That's right. Now the military has its own bevy of Jolt Cola drinkers just for us!
Deep inside the computer worm that some specialists suspect is aimed at slowing Iran’s race for a nuclear weapon lies what could be a fleeting reference to the Book of Esther, the Old Testament tale in which the Jews pre-empt a Persian plot to destroy them.
Thousands are said to have signed up since then and have been incorporated into the defence forces Unit 8200. In the intelligence community it is regarded as a singularly Israeli act of bravura that has given the country an edge in a world that has been rapidly immersed in cross border technology attacks. Hackers, who invariably learn their skills engaging in illegal activity as teenagers, offer key advantages to countries seeking to defend against cyber warfare, or go on the offensive against an enemy. The Negev desert based Unit 8200 has evolved from the signal intelligence arm of the Israeli military into a respected leader in high technology warfare. One American consultancy rated Unit 8200 as the sixth biggest initiator of cyber attacks on the plants. It is a rapidly growing field. The Russians and Chinese have been implicated in thousands of attacks on foreign targets every year. The West is scrambling to bolster its capabilities.
Originally posted by Exuberant1
This is probably the work of government hackers.
They should be made to pay damages to John Young when they are identified and maybe even thrown in jail.
*Cyberterrorists are they not?
Originally posted by Pinke
I wouldn't put it above a government institution to hack something, I just don't think we should jump to conclusions either.
Originally posted by Exuberant1
Originally posted by Pinke
I wouldn't put it above a government institution to hack something, I just don't think we should jump to conclusions either.
Well don't jump to conclusions then.
While you investigate everyone on the planet with a computer (casting that net nice and wide), us more clever geniuses will start with the state-actors...
*And what government institutions would you not put above hacking? (just so we know which ones you are talking about here)
edit on 5-10-2010 by Exuberant1 because: (no reason given)