To: blam
um... why would classified military information even be on a computer connected to the internet?
seriously.
It doesn’t take a rocket scientist to know that someone can’t hack a computer not connected to the internet.
8 posted on
05/28/2013 10:28:44 AM PDT by
TexasFreeper2009
(Obama lied .. the economy died.)
To: TexasFreeper2009
I was thinking the same thing. I read that some groups were concerned that hackers or saboteurs could hack into a nuke power plant and make it malfunction. Surely, no one would connect the control systems for a powerplant to the internet? Hacking into secret information is a little more believable. Maybe they got in through some obscure connection to a nonsecure network and found a bridge to a secure network? Or maybe they had an insider?
24 posted on
05/28/2013 10:50:14 AM PDT by
Sender
(It's never too late to be who you could have been.)
To: TexasFreeper2009
My old outfit issued each of us one of these for use at our workstations. Upon close inspection, I discovered the words "Made in China" stamped on the side. I immediately returned mine to the procurement officer, and refused to use it telling her precisely why. I was prohibited from brining my cell phone into the sensitive area, but was required to use Chi-com produced hardware directly connected to a U.S. Govt. computer system. It gets worse. Our scramble phones, and passports with those state of the art electronic security features are made in in Indonesia and Malaysia. From flash drives to phone parts. Nothing displayed any form of security certification. The enemy is inside the perimeter. Has been for a very long time.
29 posted on
05/28/2013 11:06:00 AM PDT by
PowderMonkey
(WILL WORK FOR AMMO)
To: TexasFreeper2009
Ah common sense does exist. This is so stupid the story is beyond words.
To: TexasFreeper2009
um... why would classified military information even be on a computer connected to the internet? seriously. It doesnt take a rocket scientist to know that someone cant hack a computer not connected to the internet. My first thought as well, going by the (as ever, misleading) headline.
Perhaps this part of the excerpt explains it:
Evidently part of the big haul was schematics for small parts needed to set up manufacturing for these weapons systems. China apparently uses several different means to gain access to these Defense Systems, most of them utilizing what Information Security experts call "human engineering" when manipulative emails or clever online con-men actually get victims to divulge information on their own.
'Victims'...uh, OK. There's no defense against stupidity.
45 posted on
05/28/2013 12:32:07 PM PDT by
Moltke
("I am Dr. Sonderborg," he said, "and I don't want any nonsense.")
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson