Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Sabotaging The System-60 Minutes

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
Swede Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-09-09 11:56 AM
Original message
Sabotaging The System-60 Minutes
Could hackers get into the computer systems that run crucial elements of the world's infrastructure, such as the power grids, water works or even a nation's military arsenal?

http://www.cbsnews.com/video/watch/?id=5578986n
Printer Friendly | Permalink |  | Top
ChairmanAgnostic Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-09-09 12:39 PM
Response to Original message
1. Let's see. Tom Clancy wrote about planes used as weapons
a decade ago. (If only Condi Rice had read something other than her press releases . . . )

The latest Die Hard movie actually makes computers and viruses exciting. Then again, killing an armed helicopter with a car did add a little to it.
Printer Friendly | Permalink |  | Top
 
Vincardog Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-09-09 12:46 PM
Response to Original message
2. Could those companies be paying the terrorists to run their computer systems? Outsourcers beware
Printer Friendly | Permalink |  | Top
 
951-Riverside Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-09-09 12:53 PM
Response to Original message
3. This "problem" can easily be solved by removing these sensitive systems from the internet and/or...
Edited on Mon Nov-09-09 12:53 PM by 951-Riverside
wireless/remote networks.

Why would anyone allow this sensitive systems access the internet anyway?
Printer Friendly | Permalink |  | Top
 
Swede Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-09-09 01:01 PM
Response to Reply #3
4. In the video they explained how hackers got by the best firewalls.
They leave memory sticks lying around where employees will pick them up. I am assuming that means breaking into houses etc. In the stick is a trojan. One attack let someone into the Pentagon's computer undetected for more than a day.
Printer Friendly | Permalink |  | Top
 
RC Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-09-09 03:23 PM
Response to Reply #3
5. Convenience. They can monitor from home or whatever.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue May 07th 2024, 05:47 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC