• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

US Nuclear weapons R&D labs slammed by massive cyber attack

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.
Where does this notion come from that we can effortlessly trace the hacker and then punish them. Any hacker able to mount an attack that sophisticated will hack into some other computer network and then all we bomb is some ignorant smuck who unknowingly let their computer get owned.

Wireless networks with insufficient protections are easy targets, if a hacker owns a number of them, they need not use any such network twice in such an attack.
 
So, once again, the double standard - cyber attacks on *us* justify killing people; we or our allies doing a cyber attack on Iran greatly affecting THEIR national security far more (imaging the US nuclear arsenal being taken out of commission for years), they have no right to kill Americans for that.
 
So, once again, the double standard - cyber attacks on *us* justify killing people; we or our allies doing a cyber attack on Iran greatly affecting THEIR national security far more (imaging the US nuclear arsenal being taken out of commission for years), they have no right to kill Americans for that.

The fallacy in your argument is putting the Iranian government on the same level as ours. Iran having a nuclear arsenal is a threat in that they might actually use it for petty, irrational purposes. You don't give an adult with the brain of a child the keys to a car just because he wants it and is over 18.

Besides, If we caught a spy attempting to steal top secret info on our nuclear arsenal, wouldn't we jail/execute him? Why should we stop just because the spy made it to another country?

Now I'm not advocating carpet-bombing Bejing over a cyber attack, but if we can trace the attack to a building and have confirmed intel, by all means lob a cruise missile into it.
 


Disrupting and rerouting networks is what amateurs do. The real trick is getting inside the network and stealing information. The Chinese may have gotten a look at our military traffic, but all the important stuff is encrypted. You didn't really think the government sent classified information through the internet unencrypted did you? You might as well broadcast over the airwaves.
 
Cut china off of the backbone of the internet.

Problem solved.

Side note: Probable internal revolt from the WoW gold farmers.
 
So, once again, the double standard - cyber attacks on *us* justify killing people; we or our allies doing a cyber attack on Iran greatly affecting THEIR national security far more (imaging the US nuclear arsenal being taken out of commission for years), they have no right to kill Americans for that.

Like I always say when you throw out these sorts of analogies: They're more than welcome to try.
 
Where does this notion come from that we can effortlessly trace the hacker and then punish them. Any hacker able to mount an attack that sophisticated will hack into some other computer network and then all we bomb is some ignorant smuck who unknowingly let their computer get owned.

Wireless networks with insufficient protections are easy targets, if a hacker owns a number of them, they need not use any such network twice in such an attack.

Until we destroyed so many that either there were no more open networks to get "owned" either through complete destruction, or by a deterrent effect caused by the first few sites being bombed making others realize they need to tighten up their own security.
 
Israel could well be in the running too as the hackers.

But I agree, there may be something vastly wrong with the computer security at Oak Ridge. But maybe not if no sensitive data was compromised.

The oak ridge folks were kinda mum on that subject, even if they confessed the hack took a full eight days to clean out.
Holy sh*t I've never seen a guy so hard in the pants for Israel. Are the Jews responsible for the vibrating in my car's brakes right now?

Anyway, China needs to piss off, but we keep buying their stuff, we are directly funding this kind of behavior, assuming it is them. I doubt it's France or Canada, eh?
 
I posted regarding this.
http://forums.anandtech.com/showthread.php?t=2159414&highlight=china


There's little doubt that the responsible party is China. If it's any consolation we read what's been done to our systems. I suspect that China has had it's share of intrusions.


That's like saying you suspect the NSA and CIA have spies. Hacking into computers and water boarding people are some of least objectionable things these guys do. What comes around goes around and around and around and part of their job is to figure out just how far they can push the envelope.
 
http://www.isssource.com/oak-ridge-fights-off-cyber-attack/


As many of you know, Oak Ridge and Y-12 manufacturers and researches nuclear weapons and their components. It is also home to some of the most powerful supercomputers in the nation as well as cutting edge energy and climate change research.

Looks like a targeted phishing attack, possibly browser exploit? Somehow, I doubt they were after our nation's climate change research...

Care to place any bets on which nation's "rogue, misguided patriots" committed this attack?

Chinese IP space on the other end...
 
Israel could well be in the running too as the hackers.

But I agree, there may be something vastly wrong with the computer security at Oak Ridge. But maybe not if no sensitive data was compromised.

The oak ridge folks were kinda mum on that subject, even if they confessed the hack took a full eight days to clean out.

Umm Israel can just ask...
 
Disrupting and rerouting networks is what amateurs do. The real trick is getting inside the network and stealing information. The Chinese may have gotten a look at our military traffic, but all the important stuff is encrypted. You didn't really think the government sent classified information through the internet unencrypted did you? You might as well broadcast over the airwaves.


That arrogant my Titanic security is unsinkable mentality is the Achilles heel that has brought down many an empire and country.
 
I love how everyone has ignored that the classified networks aren't connected externally at all. They might have stolen some facebook passwords though.
 
So, once again, the double standard - cyber attacks on *us* justify killing people; we or our allies doing a cyber attack on Iran greatly affecting THEIR national security far more (imaging the US nuclear arsenal being taken out of commission for years), they have no right to kill Americans for that.

Nothing to do with their "right" to do it and everything to do with their ability.
 
So, once again, the double standard - cyber attacks on *us* justify killing people; we or our allies doing a cyber attack on Iran greatly affecting THEIR national security far more (imaging the US nuclear arsenal being taken out of commission for years), they have no right to kill Americans for that.

Iran is welcome to attack the United States or Israel if they so please, but they know what the consequences of such a thing will be, just as we know the consequences of getting into a shooting war with a major oil producer during a shaky economic recovery.

Also, there is a good chance America was not involved with Stuxnet, no one has claimed responsibility. But, most people suspect Mossad (Israel).
 
Nothing to do with their "right" to do it and everything to do with their ability.

Anything classified going outside of the facility would have to go through SIPERNET encrypted. The classified stuff will not be connected to the outside or the "low side" of their networks.
 
Back
Top