![]() |
SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997 |
![]() |
#1 |
Navy Seal
![]() Join Date: Apr 2008
Location: Banana Republic of Germany
Posts: 6,170
Downloads: 62
Uploads: 0
|
![]()
__________________
Putting Germ back into Germany. ![]() |
![]() |
![]() |
![]() |
#2 | |
Chief of the Boat
|
![]() Quote:
![]() |
|
![]() |
![]() |
![]() |
#3 |
Soaring
|
![]()
Breaching several Western nation's government networks seem to have become a hobby for some factions in the last 12 months ( and longer ago). It seems the Chinese are getting bored of just doing Kung-Fu.
![]()
__________________
If you feel nuts, consult an expert. |
![]() |
![]() |
![]() |
#4 |
Ocean Warrior
![]() |
![]()
It could also be kids doing it for lulz as they put it.
Of course storing such stuff on systems connected to the internet is just plain dumb. |
![]() |
![]() |
![]() |
#5 |
Eternal Patrol
![]() Join Date: Mar 2006
Location: CATALINA IS. SO . CAL USA
Posts: 10,108
Downloads: 511
Uploads: 0
|
![]()
Espionage is a serious crime. In the 50's it was a Death penalty crime.
|
![]() |
![]() |
![]() |
#6 |
Ocean Warrior
![]() |
![]()
If it was kids in the states, I doubt espionage charges would stick unless they tried to sell it to another country.
If it was done by professional "spys" then they will likely never be caught, and it would have probably been committed from another country. |
![]() |
![]() |
![]() |
#7 |
Seasoned Skipper
![]() Join Date: Jan 2002
Location: Canada
Posts: 695
Downloads: 1
Uploads: 0
|
![]() |
![]() |
![]() |
![]() |
#8 | |
Rear Admiral
![]() Join Date: Mar 2005
Posts: 13,224
Downloads: 5
Uploads: 0
|
![]() Quote:
![]()
__________________
Follow the progress of Mr. Mulligan : http://www.subsim.com/radioroom/showthread.php?t=147648 |
|
![]() |
![]() |
![]() |
#9 |
Stowaway
Posts: n/a
Downloads:
Uploads:
|
![]()
Considering it were several terabytes having been downloaded, I doubt it waskids fun. They usually lack the money for such expensive hardware, especially in China.
|
![]() |
![]() |
#10 |
Fleet Admiral
![]() |
![]()
I still don't understand how sensitive information is being allowed on nonsecure networks and worse on laptops.
![]() I don't care how convenient it is. Security is not supposed to be easy or convenient. The easier you make it for the good guys to get the information, the easier it is for the bad guys to get the information. Any and all information on a nonsecure network can be hacked. This is why there are secure networks. One of these days we are gonna take security seriously. ![]()
__________________
abusus non tollit usum - A right should NOT be withheld from people on the basis that some tend to abuse that right. |
![]() |
![]() |
![]() |
#11 | |
Ace of the Deep
![]() Join Date: Aug 2008
Location: West Virginia
Posts: 1,207
Downloads: 14
Uploads: 0
|
![]() Quote:
But most of the hacking that is done today comes from China and is state sponsored, so cost of hardware is not a factor in this. Especially since almost all our hardware is made in China anyways. One of my Instructors last year works as IT Security Manager for NIST, and he mentioned over and over again that the most problems the Feds IT guys have are caused by Chinese hackers and sloppy lazy Scientist. Even Merkel made a point out of it awhile ago on her visit to China. |
|
![]() |
![]() |
![]() |
#12 |
Stowaway
Posts: n/a
Downloads:
Uploads:
|
![]()
Jup I know, Germany had quite a bit of hassle with chinese cyberattacks as well over the course of the last years.
|
![]() |
![]() |
#13 |
Captain
![]() Join Date: Jan 2007
Location: Tennessee
Posts: 546
Downloads: 17
Uploads: 0
|
![]()
For the record, I will let it be known, that seemingly secure protocols, are not always as secure as one might think they are. This is especially true, if the data is being transferred over a wireless network of any fashion, because there are programs in existence, they are designed to collect packets, and after 400-800K are captured, they will attempt to find two packets encrypted with the same stream cipher, and then they key can be deduced mathematically. This is only a weakness with wireless protocols that use stream ciphers as far as i know, im not so sure with block ciphers though. Don't forget any of the large number of viruses that could be rootkitted into a work computer that could open a port allowing the computer to be remotly acessed.
__________________
![]() |
![]() |
![]() |
![]() |
#14 |
Rear Admiral
![]() Join Date: Apr 2005
Posts: 11,866
Downloads: 0
Uploads: 0
|
![]()
As they said, they probably only got flight performance data. The truly classified information is not connected to a network so they got none of that.
-S |
![]() |
![]() |
![]() |
|
|