[citation][nom]sferguson[/nom]Obviously the author and the people who engineered this study know nothing about the controls paced on nuclear weapons in the US. The two man system is still in place (two separate people have to actually work together to launch a weapon and the layers of security are a bit beyond someone calling and saying "please send a missile or nuclear armed bomber to this target." Another thing, while lower security area have been breached at the Pentagon, anything that involves high levels of security is plugged into a separate network and is never connected to the wider Internet (a recent article in Popular Mechanics talked about this with one of the DOD's head security people).The recent quality of the articles at Tom's have gone down so far that its getting hard to believe anything I read here. Really, a little research and common sense goes a long ways, this is the type of hysterical reporting I expect from ABC, CBS and the LA and NY Times.[/citation]
at very least they can have access to the information needed. I will outline the path for you here, if you're up to date you will see the information leak path.
white house pc's connected to internet>president + other phones have bluetooth and wi-fi>compromise the phone via the white house network (easily done if p2p networks can get through, already proven)> you have a whole network of bugs, anything with a mic. there's one WIDE OPEN path to compromise that's already been proven, and likely has been taken advantage of, we just don't know about it.