Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The Invasion Of The Chinese Cyberspies (into "secure" military computers)
Time Magazine ^ | Aug. 28, 2005 | NATHAN THORNBURGH

Posted on 08/28/2005 10:56:31 AM PDT by FairOpinion

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-39 last
To: Incorrigible

haha!!

I am back from the Golf Course :)


21 posted on 08/28/2005 2:12:58 PM PDT by MikefromOhio (It's called having class.....)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Incorrigible

dunno.

Probably some.

Some of them could have been using friggin XBoxes for all we know.

This isn't a new thing either. The Chinese have been hitting our networks in a concerted effort for nearly 10 years now....


22 posted on 08/28/2005 2:14:39 PM PDT by MikefromOhio (It's called having class.....)
[ Post Reply | Private Reply | To 15 | View Replies]

To: adam_az

Who cares. The number of Windows servers being compromised pales next to the number of Linux servers being broken into. Go over to zone-h.org and view statistics for web server defacements. Linux, by far, is the reigning champion of intrusion.


23 posted on 08/28/2005 3:13:41 PM PDT by Bush2000 (Linux -- You Get What You Pay For ... (tm)
[ Post Reply | Private Reply | To 20 | View Replies]

To: FairOpinion

China has long felt that they are senior, yes that is the word/attitude they would use, In world power !
They were able to steal our latest war head designs during Clinton’s watch and now are getting very aggressive towards America . Their military have made war like statements
and they appear to be willing to accept massive loses in an nuclear exchange with us.
They realize that their large army is next to useless in a war without occupation and
if china wants a war with America as they no doubt feel is inevitable they will attempt to go nuclear very early !
1.


24 posted on 08/28/2005 3:27:40 PM PDT by megimoo
[ Post Reply | Private Reply | To 1 | View Replies]

To: megimoo
They were able to steal our latest war head designs during Clinton’s watch and now are getting very aggressive towards America .

Steal, nothing. Bill Richardson's lax security at the DOE basically handed over this technology to the ChiComs. And what was Richardson's reward? The people of NM made him governor! Unfreakingbelievable!
25 posted on 08/28/2005 3:35:12 PM PDT by Bush2000 (Linux -- You Get What You Pay For ... (tm)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Bush2000

"Who cares. The number of Windows servers being compromised pales next to the number of Linux servers being broken into. Go over to zone-h.org and view statistics for web server defacements. Linux, by far, is the reigning champion of intrusion."

It's been pointed out to you before that this is a misinterpretation of those numbers.

Defacements of a web server which is vhosting 100 web sites is counted as 100 defacements.

The statistic is meaningless.


26 posted on 08/28/2005 3:41:13 PM PDT by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 23 | View Replies]

To: adam_az
Defacements of a web server which is vhosting 100 web sites is counted as 100 defacements.

I'm not talking about defacements on the same web server, dude, and you know it. Linux is by far the most hacked server on the Web.
27 posted on 08/28/2005 3:55:01 PM PDT by Bush2000 (Linux -- You Get What You Pay For ... (tm)
[ Post Reply | Private Reply | To 26 | View Replies]

To: xrp

I think most gubmint contactors, especially defense contractors, have outsourced their IT to some "meatshop" of a provider who only employs the cheapest, hense least-skilled employees, with very high turnover.


28 posted on 08/28/2005 4:15:45 PM PDT by evolved_rage (Fat, drunk, and stupid...)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Bush2000

"I'm not talking about defacements on the same web server, dude, and you know it. Linux is by far the most hacked server on the Web."

LOL

You aren't - the website you quoted is.

Any operating system can be hacked. It all depends on what's running on it, the network and application architecture, the policies surrounding it.

The most common hacks these days are at the application level - not the OS level. SQL injection attacks are not platform dependent, neither are client side scripting attacks.


29 posted on 08/28/2005 4:23:17 PM PDT by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 27 | View Replies]

To: RandyRep; Bush2000
Tom Clancy had a crazy Japanese guy fly a commercial airline into the Capitol during a State of the Union Address a long, long time ago. And on 911, everyone was saying, "Who could think of such a thing?"

Thank you Sh*thead, NATHAN THORNBURGH, for letting the whole world know about Guangdong. I'm sure the Chicoms will leave them there to facillitate our counterespionage.

Bill Richardson? Richardson was the tough guy brought in to straighten things out after the O'Leary cow allowed aqny and all total access to DOE materials.!

30 posted on 08/28/2005 6:57:35 PM PDT by thegreatbeast (Quid lucrum istic mihi est?)
[ Post Reply | Private Reply | To 18 | View Replies]

To: FairOpinion

Thanks, FairO', good to know.


31 posted on 08/28/2005 7:44:37 PM PDT by SunkenCiv (Down with Dhimmicrats! I last updated by FR profile on Sunday, August 14, 2005.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: thegreatbeast

Yep, and Tom Clancy is the guy who had terrorists coming across the border in NM and shooting up shopping malls in 4 places. In another book, he had terrorists pumping Ebola into air systems at convention halls. Very creative fellow!

I read "The Bear and the Dragon" just as the Iraq War started - the weapons Clancy described were the ones we used in the war.

I think Clancy is about 3 years ahed of history...of course, his alternate history created through his Ryan series of books is a bit far fetched now, but it sure was creative and interesting to think about.

Dittoes on your thoughts about Richardson, OLeary and all. You should add Ron Brown to the list.


32 posted on 08/28/2005 9:54:51 PM PDT by RandyRep
[ Post Reply | Private Reply | To 30 | View Replies]

To: FairOpinion
It's worth clicking through all five pages of the story

Dittos.

Poor guy, you'd think the fibs would hire him, sounds like he's really good.

I do kind of wonder why he didn't ask them to hire at the beginning or CYA himself somehow.

I mean, maybe he was being patriotic or just enjoying the chase, but he was doing good work for free.

I hope we have guys doing similar things to them. Well, maybe we do, NSA snoops on the whole world after all.

33 posted on 08/29/2005 12:37:02 AM PDT by benjaminjjones
[ Post Reply | Private Reply | To 1 | View Replies]

To: FairOpinion

BTTT!


34 posted on 08/29/2005 7:50:51 AM PDT by BayouCoyote (The 1st victim of islam is the person who practices the lie.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
They were able to steal our latest war head designs during Clinton’s watch and now are getting very aggressive towards America .

Steal, nothing. Bill Richardson's lax security at the DOE basically handed over this technology to the ChiComs. And what was Richardson's reward? The people of made him governor! Unfreakingbelievable!


The warhead designs were not on a netted computer but an internal mainframe data base only .
The labs employee a Chinese designer who copied them to a personal computer (laptop) and was working from that data base !Coping them from the mainframe is a violation of security and
he just suspended from the lab but was not fired.
The laptop are not allowed to be removed from the site and was lost due to security lack !They knew he was working from a laptop but they couldn't find it for several weeks !
The laptop was finally located minus its disk in an storage room and from there to the China via Clinton’s lax policy !
By the way UCLA runs/manages the the labs and the engineer
who took the designs was going to school there !
Probably an exchange student ? He has returned to China !
35 posted on 08/29/2005 8:50:38 AM PDT by megimoo
[ Post Reply | Private Reply | To 2 | View Replies]

To: RedStateRocker

"Anyone who hasn't read "The Art Of Deception" by Kevin Mitnick might want to. "

I heard him on the Art Bell show one night. The guy is super sharp and has a lot of eye-opening information.


36 posted on 08/29/2005 8:57:03 AM PDT by dljordan
[ Post Reply | Private Reply | To 17 | View Replies]

To: RandyRep

IF you have a secret and want to keep it
NEVER PUT IT ON A COMPUTER !!
by the way Read Clancy's "The Teeth of the tiger"


37 posted on 08/29/2005 8:57:52 AM PDT by megimoo
[ Post Reply | Private Reply | To 35 | View Replies]

To: Bush2000
Thursday, November 29, 2001
REMEMBER LOS ALAMOS
Lab security chief too trusting of Lees?
Memos reveal missteps by former counterintelligence head

By Paul Sperry
© 2001 WorldNetDaily.com
“(Vrooman has been quoted or cited in no less than 20 Post articles since Aug. 17, 1999, nearly all of them written by either Vernon Loeb or Walter Pincus, or both. National security writer Pincus' wife, Ann Terry Pincus, worked in State Department intelligence and research as a Clinton appointee. A staunch Democrat from a prominent Little Rock family, she has ties to the Rose Law Firm.)

The 64-year-old Vrooman, who was in charge of catching spies at Los Alamos, says he never thought Lee, who had worked on the W-88 computer code, engaged in espionage – even when he learned that Lee lied to him about his Chinese contacts.

For instance, Lee failed to report to him, as required, that he met with China's top bomb designer, Hu Side, during a 1988 trip to Beijing.

And according to internal memos, Vrooman let Lee continue working in the lab's top-secret X Division, even after the FBI's Albuquerque, N.M., field office advised Vrooman to remove Lee in October 1997. That year, Lee downloaded additional restricted data onto computer tapes. Several of the classified tapes he stole from the lab last decade are still missing.”
38 posted on 08/29/2005 11:48:06 AM PDT by megimoo
[ Post Reply | Private Reply | To 35 | View Replies]

To: Bush2000




The application for Lee Wen Ho’s job doesn’t mention
any security clearances required to develop nuclear war heads for America .
It sure looks like a great job for a Chinese spy !
The W 88 design mentioned is the 100 megaton warhead used in the Peacekeeper
multiple independent reentry vehicles (also called )mirve’s,
The Peacekeeper is 10 /100 megaton warheads in one container, each to a different target .

HERE IS THE JOB POSTING AT UCLA

Postdoctoral Position: PD006076 COMPUTATIONAL FLUID DYNAMICS
Los Alamos National Laboratory, Los Alamos, NM, USA

The Mathematical Modeling and Analysis Group (T-7) and the Center for Nonlinear Studies (CNLS) at Los Alamos National Laboratory are currently seeking
highly motivated PH.D. graduates to participate in the Post Doctoral Fellowship program.

There are specific opportunities at this time for Postdoctoral fellow with strong computational and mathematical experience in the numerical solution of partial differential equations.
One of the projects is the development and implementation of new Arbitrary Lagrangian Eulerian (ALE) finite difference/finite volume methods for the solution of
multidimensional high speed fluid flow problems on unstructured grids.

These are highly competitive positions. Experience in developing codes based on Lagrangian, continuous rezone (ALE) methods, or Free Lagrangian methods is preferred.
Familiarity with modern multidimensional methods for advection is desirable.
Extensive experience in FORTRAN coding on a variety of computing
platforms is required.

Los Alamos National Laboratory, located in the beautiful
mountains of northern New Mexico, is a multi-disciplinary,
multi-program laboratory employing over 6,000 technical
professionals conducting basic and applied research with the
overall mission to reduce global nuclear danger.

A Ph.D. in Applied Mathematics, Mathematical Physics, or in
another area in Scientific Computing completed within the
LAST THREE YEARS or soon to be completed is required.
Appointments have a duration of two years,
with possibility of extension for a third year.

Candidates may compete for a Director's
Fellowship and outstanding candidates may be considered for the
prestigious J. Robert Oppenheimer, Richard P. Feynman or Frederick
Reines Fellowships.
Further details about the Postdoctoral Program
may be found at: http://www.hr.lanl.gov/postdoc/

For consideration, please submit a resume which also
contains lists of your publications, oral presentations,
and the names and addresses of three or more
references, along with a cover letter, and a 1 page proposal describing
your research plans to postdoc-jobs@lanl.gov
(no attachments, please!) The proposal must follow
the outline specified at
www.hr.lanl.gov/hrstaffing/Postdoc/guide.stm.

OR SUBMIT TWO paper COPIES of the above material to:

Postdoc Program Office, PD006076
MS P290
Los Alamos National Laboratory
Los Alamos, NM 87545


39 posted on 08/29/2005 2:39:29 PM PDT by megimoo
[ Post Reply | Private Reply | To 38 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-39 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson