1. Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Air Force manual describes shadowy cyberwar world

Discussion in 'Networking & Security' started by segalaw19800, Oct 25, 2010.

  1. segalaw19800

    segalaw19800

    Joined:
    Jan 26, 2010
    Messages:
    381 (0.22/day)
    Thanks Received:
    65
    Location:
    Lost in space
    What got my attention!! Is the part that say "The manual points out that much of the Internet's hardware and software are produced and distributed by private vendors in other countries who "can be influenced by adversaries to provide altered products that have built-in vulnerabilities, such as modified chips." Here the manual link in pdf. http://www.e-publishing.af.mil/shared/media/epubs/AFDD3-12.pdf
     
    streetfighter 2 says thanks.
  2. Wrigleyvillain

    Wrigleyvillain PTFO or GTFO

    Joined:
    Oct 13, 2007
    Messages:
    7,667 (2.99/day)
    Thanks Received:
    1,775
    Location:
    Chicago
  3. streetfighter 2

    streetfighter 2 New Member

    Joined:
    Jul 26, 2010
    Messages:
    1,658 (1.07/day)
    Thanks Received:
    732
    Location:
    Philly
    This is just policy from the air force and it's targeted specifically at educating servicemen (so far as I can tell).

    There are a lot of classified papers regarding cyber warfare tactics and logistics. I believe some have been released, in heavily redacted form, that give much better insight into the reach of the gubernment in a shit-hitting-fan scenario.

    A choice bit on pg. 35
     
  4. segalaw19800

    segalaw19800

    Joined:
    Jan 26, 2010
    Messages:
    381 (0.22/day)
    Thanks Received:
    65
    Location:
    Lost in space
    wow
     
  5. Wrigleyvillain

    Wrigleyvillain PTFO or GTFO

    Joined:
    Oct 13, 2007
    Messages:
    7,667 (2.99/day)
    Thanks Received:
    1,775
    Location:
    Chicago
  6. Steevo

    Steevo

    Joined:
    Nov 4, 2005
    Messages:
    8,370 (2.55/day)
    Thanks Received:
    1,221
    If you believe any system does not have at least one backdoor built in for dev, support, security, oh shit, or government purposes you are silly. My cousin works for Lockheed Martin, and he made a few interesting comments on the latest cyber attack on the Iranian nuclear facility.


    If a system has a kernel level listening port that only responds to a specific IP source, key, and port number out of all the ports, IP's, and keys you could generate do you think they would have found it by now? Hell no.
     
    10 Million points folded for TPU
  7. andrew123 New Member

    Joined:
    Jan 18, 2010
    Messages:
    30 (0.02/day)
    Thanks Received:
    3
    Location:
    Canada
    You'd be surprised how much Telecom grade gear comes out of Israel. For such a tiny little country, the produce TONNES of digital cross-connect, muxers...
     
  8. xmountainxlionx

    Joined:
    Oct 5, 2007
    Messages:
    584 (0.23/day)
    Thanks Received:
    30
    Location:
    North Carolina, USA
    All i will say is "Its not what you think"
     

Currently Active Users Viewing This Thread: 1 (0 members and 1 guest)

Share This Page