It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Gen. Alexander agreed to talk to us because he believes, the NSA has not told its story well.
Gen. Keith Alexander: We're defending this country from future terrorist attacks and we're defending our civil liberties and privacy.
VictorVonDoom
A virus designed to attack the BIOS would have very limited effect. The firmware for every BIOS would be different, it's not like attacking a specific operating system.
If the Chinese wanted to introduce malware into the BIOS, the easiest way would be to do it at the manufacturing plant. They produce the motherboards, install the virus there.
If the NSA really wants to foil a plot to destroy the US economy, start with the Federal Reserve.
source
In September 1998, Yamaha shipped a firmware update to their CD-R400 drives that was infected with the virus. In October 1998, a demo version of the Activision game SiN was infected by one of its mirror sites.[4] In March 1999, several thousand IBM Aptivas shipped with the CIH virus,[5] just one month before the virus would trigger.
Rick Ledgett: So, all the machines that he had access to we removed from our classified network. All the machines in the unclassified network and including the actual cables that connect those machines, we removed as well.
Wrabbit2000
I'm stunned.. Flummoxed. I read the whole 60 minutes piece, top to bottom and I'm just....stunned. Oh, geeze.. where to even start?
First, I agree with the OP on all points. Nothing measurable TO disagree with. This "plot" by a nation-state of any kind, but most of all China, is absurd to the point of laughable. Now..could they set up an attack meant to target a small group of machines in a small area like this? I think so... Stuxnet with a twist. That's the problem tho..Even if they solved all the technical issues for how to distribute it, not have it blow back on them too, and achieve what this is said to have been capable of? They'd have to figure out a way to have a measurable % of machines in our nation all run it, pretty much at the same time.
If it wasn't near simultaneous? Well, the first tech at any level to confirm what did this ...after he recovered from the shock...would sound the alarm so loud, I'd literally expect Breaking News interupts for warnings. It wouldn't succeed and they'd know that. China is far from stupid....even if some in Government take them that way.
---
I do want to thank the NSA for something though. Like a crook with the cops in a dark interrogation room? They just don't know when to shut up. Our gain, their loss. For instance...
Rick Ledgett: So, all the machines that he had access to we removed from our classified network. All the machines in the unclassified network and including the actual cables that connect those machines, we removed as well.
Where is Rick's address? I ought to drop him a thank you note. I never would have believed cables themselves could be compromised so totally, the people who trained the man who would have done it...can't be sure of security afterward. After all, he went out of his way, special, to note the cabling itself had to be removed and trashed. Why, thanks... I had no idea of that hardware capability of the NSA.
The NSA gives unprecedented access to the agency's HQ and, for the first time, explains what it does and what it says it doesn't do: spy on Americans
"The fact is, we're not collecting everybody's email, we're not collecting everybody's phone things..."
COSTELLO: You're not talking about voicemail, right? What are you talking about exactly?
CLEMENTE (former FBI counter terrorism): I'm talking about all digital communications are -- there's a way to look at digital communications in the past. I can't go into detail of how that's done or what's done. But I can tell you that no digital communication is secure. So these communications will be found out. The conversation will be known.