It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Hackers broke into Lockheed Martin networks: source

page: 4
25
<< 1  2  3   >>

log in

join
share:

posted on May, 28 2011 @ 05:58 AM
link   
reply to post by Version100
 



Agreed, and if they do/did, then seriously we don't need to worry too much about a spooky big brother, because they ain't all that.

I was just saying that the door is open to a great many options, we don't know and they really are never going to say anyway, they left the option open to deny anything was even taken in the article.

Of the options it is unlikely it was "THE" goods, but equally as unlikely that it was just e-mails, somewhere in the middle, sure it's possible they have Frank the Janitor's schedule just as well.

BUT... it would be pretty cool if the net was flooded with the real inner workings of a TR-3B and they just had to own up to it, you wouldn't be able to keep me away from the Airshow they did a public demo at with it.
edit on 28-5-2011 by Hijaqd because: (no reason given)



posted on May, 28 2011 @ 05:58 AM
link   
What it's going to come down to is total surveilance of employees of defence contractors and staff at the DoD, and in fact at D/MoD's around the world. I wouldn't be surprised if in the long run people employed by such corporations are forced to live "on base" with no contact to the outside world. And by no outside contact I also mean no form of communication with the outside world, including no Internet access. It's a mystery to me why these places like Lockheed still have sensitive servers and networks hooked up to the Internet.

At the end of the day these are the sorts of measures that will need to be taken, if the defence of the western world is to be taken seriously. China may not be a menacing threat today. But it is building it self to be a menacing threat. Not only a threat, but they see them selves as having to eventually go to war with the USA and eventually replacing the USA as the top dog. It's basically their political and military doctrine.

This isn't the China we could once call an ally long long ago.
This is a China hell bent on becoming the most powerful country on earth, because they believe it is their right and destiny to rule the entire planet. And that's pretty darn scary when you think about just how much of our manufacturing has been shipped over to them, and then you have country's like Australia which are fueling the Chinese economy with raw materials/natural resources. Unfortunately there is no other alternative. Well there is, we could stop mining our resources. But then the down side is the economy will suffer. The only thing that has kept the Australian economy afloat these past 5-10 years is the resources boom.



posted on May, 28 2011 @ 07:28 AM
link   
The same lockheed martin that did the UK census?

Suspicious eh?



posted on May, 28 2011 @ 09:13 AM
link   
North Korea?

China?

A bored hacker?


hmmm many questions but i bet US Govt agencies will put alot of time and resources into this as these companies are some of the biggest def contractors in the US.

My money is on China



posted on May, 28 2011 @ 11:22 AM
link   

Originally posted by edog11
reply to post by THE_PROFESSIONAL
 



I don't think China or even Russia can do much with that kind of tech (the top-classified ones). They simply lack the expertise and "unique" recourses that the USA possesses to really be able to achieve much, even if they have the blueprints and formulas.


IT--


And thats exactly the kind of arrogance that will bring down the american empire... and btw, those "unique" resources are technologies that the US stole from other countries starting with germany in ww2 (including the brains)...

Underestimating russia and china...

You're in for a big surprise mate...



posted on May, 28 2011 @ 11:41 AM
link   
reply to post by AQuestion
 


Everything you mentioned is just another type of fence that a hacker has to get past in order to get the prize.

To a determined hacker where there is a will there is a way.

No matter what type of fancy security there is.



posted on May, 28 2011 @ 12:58 PM
link   
just another excuse for internet ids

cyber control by the government

cyber false flags are less messy than real false flags



posted on May, 28 2011 @ 03:19 PM
link   

Originally posted by Truther9111776
just another excuse for internet ids

cyber control by the government

cyber false flags are less messy than real false flags


Don't you think that, if it were a false flag, they'd pick a domestic target that Americans actually cared about? I'd say at least half of all Americans (and every single one I know) would love to see these death peddlers fail and collapse under the scrutiny of leaked information.

If it were a "false flag" operation, they would pick a target like DMV or Digital Cable companies or something that would actually make people afraid. Afraid of losing their privacy or ability to watch America's Next Top Hooker or whatever that crap is. Then I might be inclined to think of something as a false flag.

And what's with all you guys here claiming everything to be false flags? Seriously. Not picking on the post I'm replying to; it's just that I keep hearing it about everything. It's getting as bad as every new rock in the sky is Nibiru.



posted on May, 28 2011 @ 03:34 PM
link   
its anonymous



posted on May, 28 2011 @ 03:34 PM
link   

edit on 28-5-2011 by thedeadwalkk because: double post



posted on May, 28 2011 @ 11:15 PM
link   
before it is locked here is my thread..

www.abovetopsecret.com...

yours was up first according to the time log......

OP I hope you do not mind If I continue my thoughts here...


they go along with some of yours...


it does smell of international sabotage... china is stealing a lot of tech in an attempt to catch up with the us....and russia still has spies here...


there are a lot of things at LMT of value.... but it means something else what where they after...


the odd part is that the employee database was jacked up...
names for something....



posted on May, 29 2011 @ 05:30 AM
link   
If I'm not mistaken the attack was THWARTED. What's all this talk about lost information? Seems to me LM's security protocols are spot-on.



posted on May, 29 2011 @ 06:09 AM
link   
reply to post by THE_PROFESSIONAL
 


The new frontier of warfare. So easy a 14 year old could do it. Seriously.

Microsoft recruits young hacker

Of course it's not easy, but if people this young can do this, it tells you something. Even the 'best' will have to look out. And, these internet attacks can come from anywhere by anyone with an internet connection.

Vigilante justice?



posted on May, 29 2011 @ 10:53 AM
link   

Originally posted by FraternitasSaturni
And thats exactly the kind of arrogance that will bring down the american empire... and btw, those "unique" resources are technologies that the US stole from other countries starting with germany in ww2 (including the brains)...

Underestimating russia and china...

You're in for a big surprise mate...


I thought this thread was about Lockheed Martin getting hacked?



posted on May, 29 2011 @ 11:00 AM
link   
Anything can be hacked and everything will be hackable in the future, if somebody can create a sophisticated security system there will allways be somebody smarter out there to break it, never will anyone have a security system that in impenetrable.




posted on May, 29 2011 @ 06:55 PM
link   
none of the reports, really spell anything out in any kind of detail. and I am sure, the really good stuff is pretty deep in. and it sounds like, LM had a decent setup so they attacked the authentication systems, which I am sure still will only get you so far and so much.


the big problem really is real hard nosed security is hard and expensive, things like endpoint inspection, 2 factor,
ipsec zones,etc all add complexity and costs,,,,



-GhostInShell



posted on Jun, 7 2011 @ 01:27 AM
link   



new topics

top topics



 
25
<< 1  2  3   >>

log in

join