Posted on 10/31/2014 4:07:07 PM PDT by Beave Meister
The director of security at a government group I work at described how a critical nuclear component was manufactured by a Windows XP old 586 with no security updates or any way to add data to it. All USB and wireless ports were removed. No floppy, CD, or DVD disk drive. Nothing but a keyboard and mouse (and those had to be specially-requested on a one-time-use basis, and justified through several layers of security). The room it was in was a Faraday cage.
He said the thing was still churning along 12 years later with never an intrusion or hack. :)
Lets all remember to say a prayer for her safety.
Good Grief!! This is something out the pages of Hitler’s playbook. Total control over everything. Whoever did this should spend the rest of his or her time breaking rocks at Leavenworth.
Yes! Like family...
“David Rhoades, the current president of CBS News, is the brother of Ben Rhoades, a White House national security advisor...”
In government networks on which classified information passes, everything is connected by a cable. Nowadays, that means an optical cable because those are even more secure from external eavesdropping than are traditional copper connections.
There are additional physical and electrical barriers in place as well.
Typically, a bunch of computers within a secure facility will be connected into a network, but there is no connection between that network and any "outside" networks at all. At least that is my experience, others (such as Laz) may know different.
Anyone who effected such a connection would be in a lot of trouble, and all project(s) that "lived" on the computers in that network would be halted while an investigation was undertaken; this investigation might well involve outside agencies, and could take weeks or months to complete.
Could you provide some substantive evidence for that claim?
I don’t believe that to be true, it’d be very hard to conceal.
fyi...I work on embedded software, work with companies that develop circuit boards. You’d need to allocate some radio bandwidth that isn’t interfered with, have drivers in the OS running to drive the HW, with higher levels of software to interface with the OS....and do it all without somebody noticing? Not likely.
This incident sounds like they were able to infect her machine (maybe by remote hacking, maybe they had contact with her machine) with something that gave them the ability to instantiate a remote desktop session, take over the machine as an outside user as though being at the computer. This is done by IT departments every day to assist remote users.
Are people aware that there is a black box in every new car. A friends daughter got hit by a man who died in the crash and they told them that the accident is under investigation and that the black boxes in the cars are being studied and will reveal important details about the accident. I am shocked that cars all have black boxes, but she didn’t seem to care.
Does nothing against physical access/entry.
Issa, at the end of his term as chairman, going out with a whimper ...
The drivers do not have to be in the resident/legitimate OS. Nor does access to any data need to be obtained via the resident/legitimate OS. You are thinking far too conventionally.
Theoretically, she could be clicking to try and stop it, but as a natural skeptic, I am with you. Some of that could have just been a stuck keyboard key and she doesn’t realize it. I’ve had similar behavior with stuck keys.
Probably just sunspots.
That is exactly what it is. She has a stuck backspace key, it looks like, and she’s trying to pass it off as a government hack? Weak.
Bump
No I’m not, to do anything super useful the HW/SW would need to be in something more than device firmware. I’m well aware of security aspects of software, I deal with them everyday.
I’m an embedded expert and Chief Architect (no hack)...you would only be able to do something very minimal with what you suggest, the software would have to be in some implanted device but would need cooperation with the higher sw stacks to do anything more than some I/O monitoring/injection. It would still be very limited.
Please provide sources to the claim, I’m well aware of how devices work, what firmware does, along with kernel drivers, interrupt routines, user-space frameworks, applications, networks, etc...there’s isn’t a level of sw I’ve not worked with. The idea that an implanted chip on a board, with no higher level sw support, can “do anything from 2 miles away” is nonsense.
Given that they apparently installed a separate fiber-optic line to her computer, even that might not have been effective.
(i.e. they had some form of physical access.)
Thanks for the ping.
My pleasure!
tons of insider connections to the Democrat Corruption machine. Insider as in actual family ties.
The nepotism runs deep with these vipers.
Republicans are in line with this abuse, too. It’s sickening.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.