Sabotage of America's defense & security

Discussion in 'Security & Defenses' started by waltky, Nov 8, 2012.

  1. waltky

    waltky Well-Known Member

    Joined:
    Jan 26, 2009
    Messages:
    30,071
    Likes Received:
    1,204
    Trophy Points:
    113
    Gender:
    Male
    Sabotage with fake tech gear...
    :?
    Fake tech gear has infiltrated the U.S. government
    November 8th, 2012 - A record number of tech products used by the U.S. military and dozens of other federal agencies are fake. That opens up a myriad of national security risks, from dud missiles to short-circuiting airplane parts to cyberespionage.
     
  2. Ramboner

    Ramboner New Member

    Joined:
    Oct 12, 2011
    Messages:
    318
    Likes Received:
    11
    Trophy Points:
    0
    merika(lost the "A"), has no "defense". Only offence(offensive) to the people of earth who you idiots steal natural resources from.
    Get it ? 12/21/12. Have fun.
     
  3. Mushroom

    Mushroom Well-Known Member

    Joined:
    Jul 13, 2009
    Messages:
    12,497
    Likes Received:
    2,421
    Trophy Points:
    113
    Gender:
    Male
    Nothing new here. This has been going on since the Civil War and earlier.
     
  4. waltky

    waltky Well-Known Member

    Joined:
    Jan 26, 2009
    Messages:
    30,071
    Likes Received:
    1,204
    Trophy Points:
    113
    Gender:
    Male
    Major ongoing cyber-espionage effort against the US...
    :eekeyes:
    US is target of massive cyberespionage: report
    Tue, Feb 12, 2013 - The US intelligence community has concluded that the US is the target of a massive cyberespionage campaign that is threatening its competitiveness, the Washington Post reported late on Sunday.
     
  5. waltky

    waltky Well-Known Member

    Joined:
    Jan 26, 2009
    Messages:
    30,071
    Likes Received:
    1,204
    Trophy Points:
    113
    Gender:
    Male
    Obama gonna issue executive order to stop cyber attacks...
    :thumbsup:
    Sources: White House to issue cybersecurity order Wednesday
    2/11/13 - The White House is poised to release an executive order aimed at thwarting cyberattacks against critical infrastructure on Wednesday, two people familiar with the matter told The Hill.
     
  6. protectionist

    protectionist Banned

    Joined:
    May 3, 2011
    Messages:
    13,898
    Likes Received:
    126
    Trophy Points:
    0
    America is the biggest VICTIM of resource theft (imperialism) in world history. And America's colonizers ? A number of countries - led by Mexico, of course. Didn't you know ?
     
  7. waltky

    waltky Well-Known Member

    Joined:
    Jan 26, 2009
    Messages:
    30,071
    Likes Received:
    1,204
    Trophy Points:
    113
    Gender:
    Male
    Susan Rice speaks to U.S./China relations in wake of Chinese hacking...
    :cool:
    US: China Cyberespionage Puts 'Enormous Strain' on Ties
    SEPT. 21, 2015, WASHINGTON — Cyberespionage for economic gain by China is putting "enormous strain" on U.S.-China relations and needs to stop, President Barack Obama's national security adviser said Monday.
     
  8. APACHERAT

    APACHERAT Well-Known Member Past Donor

    Joined:
    Jun 23, 2013
    Messages:
    38,026
    Likes Received:
    16,042
    Trophy Points:
    113
    Gender:
    Male
    SUSAN RICE !!! :roflol:

    The same Susan Rice in 1996 who told President Bill Clinton not to except Sudan's offer to turn Osama bin Laden over to the USA.

    The same Susan Rice who blamed the terrorist attack on 9-11-11 on our consulate in Benghazi on a You Tube video.

    The same Susan Rice speaking for Barack Obama that the deserter Sgt. Bergdahl "Served With 'Honor and Distinction ." :roflol:
     
  9. waltky

    waltky Well-Known Member

    Joined:
    Jan 26, 2009
    Messages:
    30,071
    Likes Received:
    1,204
    Trophy Points:
    113
    Gender:
    Male
    Lawmakers are pushing military leaders to publicize some capabilities to deter raids on U.S. databases...
    :confusion:
    Lawmakers Push for Tougher US Stance in Cyberspace
    Oct 05, 2015 | As Sen. Angus King pressed national security officials to open up about their ability to wage war over the Internet, he turned not to some think tank white paper to make his point, but a five-decade-old film about the dangers of nuclear brinkmanship. "'Dr. Strangelove' taught us that if you have a doomsday machine and no one knows about, it's useless," the Maine independent said last week during a hearing of the Senate Armed Services Committee.
     
  10. waltky

    waltky Well-Known Member

    Joined:
    Jan 26, 2009
    Messages:
    30,071
    Likes Received:
    1,204
    Trophy Points:
    113
    Gender:
    Male
    Personal information of more than 1,300 U.S. military and government personnel stolen...
    :omg:
    Malaysian Hacker Linked to ISIS
    Friday, October 16, 2015 - Malaysian police have arrested a man suspected of hacking U.S. military information and providing it to members of the Islamic State.
     
  11. waltky

    waltky Well-Known Member

    Joined:
    Jan 26, 2009
    Messages:
    30,071
    Likes Received:
    1,204
    Trophy Points:
    113
    Gender:
    Male
    Exposure of Alleged NSA Hacking Tools May Be Warning to US...
    :confusion:
    Snowden: Exposure of Alleged NSA Tools May Be Warning to US
    Aug 16, 2016 — National Security Agency leaker Edward Snowden says the exposure of malicious software allegedly linked to his former employer may be a message from Moscow, adding a layer of intrigue to a leak that has set the information security world abuzz.
     
  12. waltky

    waltky Well-Known Member

    Joined:
    Jan 26, 2009
    Messages:
    30,071
    Likes Received:
    1,204
    Trophy Points:
    113
    Gender:
    Male
    Whether mistake or deliberate, it's out there now...
    :omg:
    Exclusive: Probe of leaked U.S. NSA hacking tools examines operative's 'mistake'
    Thu Sep 22, 2016 | A U.S. investigation into a leak of hacking tools used by the National Security Agency is focusing on a theory that one of its operatives carelessly left them available on a remote computer and Russian hackers found them, four people with direct knowledge of the probe told Reuters.
     

Share This Page