It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by LadySkadi
reply to post by rigel4
Ya, this is the one I had in mind when I posted, too. There is also one called Gnacktrack and there's a really cool distro that was developed for the purpose of teaching how to identify security threats. Forgot the name, but it is a distro that purposefully comes full of holes...
reply to post by spoonbender
Not even Firefox is safe anymore... version 12 of Mint replaced 'em with DuckDuckGo as it's installed search.edit on 14-3-2012 by LadySkadi because: (no reason given)
Originally posted by stonebutterfly
Im a little afraid to venture on to a hackers OS myself.
Originally posted by petrus4
Originally posted by stonebutterfly
Im a little afraid to venture on to a hackers OS myself.
If you knew anything about Linux or UNIX, you'd know why I'm giving you that image macro. Ubuntu is not a "hacker's OS." It is nowhere remotely close. Ubuntu is an attempt to force Linux to imitate Windows as closely as possible. It is also the most opaque, obfuscated, broken mess masquerading as a Linux distribution that has ever existed.
Whoever put this out is not worthy of the name Anonymous, and they should be deeply ashamed of themselves.
If you want something that is more genuinely deserving of the label, "hacker's OS," then I would direct you to OpenBSD.
Unlike Ubuntu, yes, that is probably something which you (and these pathetic script kiddies referring to themselves as Anonymous) genuinely would find intimidating.
But things have changed a lot at Sony, with Brett Wahlin, former counter-intelligence official in the US military during the Cold War and Chief Security Officer at McAfee, now taking over as the CSO at the company.
The company will put the usual apps used by the staff under surveillance and analysis of the web browsing habits and other abnormalities will help them discover a hiding Trojan or similar threats in company’s systems.
To prevent social engineering attacks on the staff, the system will keep an eye on company’s IP phones and will create a profile of who they are calling and for how long and similar things to find out anything suspicious.
The investigation's other findings include:
* Some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States.
* An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances.
* In Washington and the surrounding area, 33 building complexes for top-secret intelligence work are under construction or have been built since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings - about 17 million square feet of space.
* Many security and intelligence agencies do the same work, creating redundancy and waste. For example, 51 federal organizations and military commands, operating in 15 U.S. cities, track the flow of money to and from terrorist networks.
* Analysts who make sense of documents and conversations obtained by foreign and domestic spying share their judgment by publishing 50,000 intelligence reports each year - a volume so large that many are routinely ignored.
The problem with many intelligence reports, say officers who read them, is that they simply re-slice the same facts already in circulation. "It's the soccer ball syndrome. Something happens, and they want to rush to cover it," said Richard H. Immerman, who was the ODNI's assistant deputy director of national intelligence for analytic integrity and standards until early 2009. "I saw tremendous overlap."
Even the analysts at the National Counterterrorism Center (NCTC), which is supposed to be where the most sensitive, most difficult-to-obtain nuggets of information are fused together, get low marks from intelligence officials for not producing reports that are original, or at least better than the reports already written by the CIA, FBI, National Security Agency or Defense Intelligence Agency.
When Maj. Gen. John M. Custer was the director of intelligence at U.S. Central Command, he grew angry at how little helpful information came out of the NCTC. In 2007, he visited its director at the time, retired Vice Adm. John Scott Redd, to tell him so. "I told him that after 41/2 years, this organization had never produced one shred of information that helped me prosecute three wars!" he said loudly, leaning over the table during an interview.
Two years later, Custer, now head of the Army's intelligence school at Fort Huachuca, Ariz., still gets red-faced recalling that day, which reminds him of his frustration with Washington's bureaucracy. "Who has the mission of reducing redundancy and ensuring everybody doesn't gravitate to the lowest-hanging fruit?" he said. "Who orchestrates what is produced so that everybody doesn't produce the same thing?"
The White House
Office of the Press Secretary
For Immediate Release December 29, 2009
Executive Order 13526- Classified National Security Information
This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information relating to defense against transnational terrorism. Our democratic principles require that the American people be informed of the activities of their Government. Also, our Nation's progress depends on the free flow of information both within the Government and to the American people. Nevertheless, throughout our history, the national defense has required that certain information be maintained in confidence in order to protect our citizens, our democratic institutions, our homeland security, and our interactions with foreign nations. Protecting information critical to our Nation's security and demonstrating our commitment to open Government through accurate and accountable application of classification standards and routine, secure, and effective declassification are equally important priorities.
Originally posted by amongus
This is the stupidest creation since their crappy computerized voice in their videos. I still can't make out half of what they are saying.
Who would download an OS developed by hackers?