Posted on 08/28/2005 10:56:31 AM PDT by FairOpinion
Carpenter had never seen hackers work so quickly, with such a sense of purpose. They would commandeer a hidden section of a hard drive, zip up as many files as possible and immediately transmit the data to way stations in South Korea, Hong Kong or Taiwan before sending them to mainland China. They always made a silent escape, wiping their electronic fingerprints clean and leaving behind an almost undetectable beacon allowing them to re-enter the machine at will. An entire attack took 10 to 30 minutes. "Most hackers, if they actually get into a government network, get excited and make mistakes," says Carpenter. "Not these guys. They never hit a wrong key."
Goaded by curiosity and a sense that he could help the U.S. defend itself against a new breed of enemy, Carpenter gave chase to the attackers. He hopped just as stealthily from computer to computer across the globe, chasing the spies as they hijacked a web of far-flung computers. Eventually he followed the trail to its apparent end, in the southern Chinese province of Guangdong. He found that the attacks emanated from just three Chinese routers that acted as the first connection point from a local network to the Internet.
(Excerpt) Read more at time.com ...
haha!!
I am back from the Golf Course :)
dunno.
Probably some.
Some of them could have been using friggin XBoxes for all we know.
This isn't a new thing either. The Chinese have been hitting our networks in a concerted effort for nearly 10 years now....
Who cares. The number of Windows servers being compromised pales next to the number of Linux servers being broken into. Go over to zone-h.org and view statistics for web server defacements. Linux, by far, is the reigning champion of intrusion.
China has long felt that they are senior, yes that is the word/attitude they would use, In world power !
They were able to steal our latest war head designs during Clintons watch and now are getting very aggressive towards America . Their military have made war like statements
and they appear to be willing to accept massive loses in an nuclear exchange with us.
They realize that their large army is next to useless in a war without occupation and
if china wants a war with America as they no doubt feel is inevitable they will attempt to go nuclear very early !
1.
"Who cares. The number of Windows servers being compromised pales next to the number of Linux servers being broken into. Go over to zone-h.org and view statistics for web server defacements. Linux, by far, is the reigning champion of intrusion."
It's been pointed out to you before that this is a misinterpretation of those numbers.
Defacements of a web server which is vhosting 100 web sites is counted as 100 defacements.
The statistic is meaningless.
I think most gubmint contactors, especially defense contractors, have outsourced their IT to some "meatshop" of a provider who only employs the cheapest, hense least-skilled employees, with very high turnover.
"I'm not talking about defacements on the same web server, dude, and you know it. Linux is by far the most hacked server on the Web."
LOL
You aren't - the website you quoted is.
Any operating system can be hacked. It all depends on what's running on it, the network and application architecture, the policies surrounding it.
The most common hacks these days are at the application level - not the OS level. SQL injection attacks are not platform dependent, neither are client side scripting attacks.
Thank you Sh*thead, NATHAN THORNBURGH, for letting the whole world know about Guangdong. I'm sure the Chicoms will leave them there to facillitate our counterespionage.
Bill Richardson? Richardson was the tough guy brought in to straighten things out after the O'Leary cow allowed aqny and all total access to DOE materials.!
Thanks, FairO', good to know.
Yep, and Tom Clancy is the guy who had terrorists coming across the border in NM and shooting up shopping malls in 4 places. In another book, he had terrorists pumping Ebola into air systems at convention halls. Very creative fellow!
I read "The Bear and the Dragon" just as the Iraq War started - the weapons Clancy described were the ones we used in the war.
I think Clancy is about 3 years ahed of history...of course, his alternate history created through his Ryan series of books is a bit far fetched now, but it sure was creative and interesting to think about.
Dittoes on your thoughts about Richardson, OLeary and all. You should add Ron Brown to the list.
Dittos.
Poor guy, you'd think the fibs would hire him, sounds like he's really good.
I do kind of wonder why he didn't ask them to hire at the beginning or CYA himself somehow.
I mean, maybe he was being patriotic or just enjoying the chase, but he was doing good work for free.
I hope we have guys doing similar things to them. Well, maybe we do, NSA snoops on the whole world after all.
BTTT!
"Anyone who hasn't read "The Art Of Deception" by Kevin Mitnick might want to. "
I heard him on the Art Bell show one night. The guy is super sharp and has a lot of eye-opening information.
IF you have a secret and want to keep it
NEVER PUT IT ON A COMPUTER !!
by the way Read Clancy's "The Teeth of the tiger"
The application for Lee Wen Hos job doesnt mention
any security clearances required to develop nuclear war heads for America .
It sure looks like a great job for a Chinese spy !
The W 88 design mentioned is the 100 megaton warhead used in the Peacekeeper
multiple independent reentry vehicles (also called )mirves,
The Peacekeeper is 10 /100 megaton warheads in one container, each to a different target .
HERE IS THE JOB POSTING AT UCLA
Postdoctoral Position: PD006076 COMPUTATIONAL FLUID DYNAMICS
Los Alamos National Laboratory, Los Alamos, NM, USA
The Mathematical Modeling and Analysis Group (T-7) and the Center for Nonlinear Studies (CNLS) at Los Alamos National Laboratory are currently seeking
highly motivated PH.D. graduates to participate in the Post Doctoral Fellowship program.
There are specific opportunities at this time for Postdoctoral fellow with strong computational and mathematical experience in the numerical solution of partial differential equations.
One of the projects is the development and implementation of new Arbitrary Lagrangian Eulerian (ALE) finite difference/finite volume methods for the solution of
multidimensional high speed fluid flow problems on unstructured grids.
These are highly competitive positions. Experience in developing codes based on Lagrangian, continuous rezone (ALE) methods, or Free Lagrangian methods is preferred.
Familiarity with modern multidimensional methods for advection is desirable.
Extensive experience in FORTRAN coding on a variety of computing
platforms is required.
Los Alamos National Laboratory, located in the beautiful
mountains of northern New Mexico, is a multi-disciplinary,
multi-program laboratory employing over 6,000 technical
professionals conducting basic and applied research with the
overall mission to reduce global nuclear danger.
A Ph.D. in Applied Mathematics, Mathematical Physics, or in
another area in Scientific Computing completed within the
LAST THREE YEARS or soon to be completed is required.
Appointments have a duration of two years,
with possibility of extension for a third year.
Candidates may compete for a Director's
Fellowship and outstanding candidates may be considered for the
prestigious J. Robert Oppenheimer, Richard P. Feynman or Frederick
Reines Fellowships.
Further details about the Postdoctoral Program
may be found at: http://www.hr.lanl.gov/postdoc/
For consideration, please submit a resume which also
contains lists of your publications, oral presentations,
and the names and addresses of three or more
references, along with a cover letter, and a 1 page proposal describing
your research plans to postdoc-jobs@lanl.gov
(no attachments, please!) The proposal must follow
the outline specified at
www.hr.lanl.gov/hrstaffing/Postdoc/guide.stm.
OR SUBMIT TWO paper COPIES of the above material to:
Postdoc Program Office, PD006076
MS P290
Los Alamos National Laboratory
Los Alamos, NM 87545
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.