Terrorist Nuclear Attack via Internet Possible

Page 3 - Seeking answers? Join the Tom's Guide community: where nearly two million members share solutions and discuss the latest tech.
Status
Not open for further replies.
TERRORISTS LIVE IN CAVES.

THERE IS NO INTERNET CAVES. I CAN BARELY GET WIRELESS IN MY LIVING ROOM.
 
nuclear controller1: our web server is being attacked by IP addresses in another country. nuclear controller2: LAUNCH MISSLES!
 
[citation][nom]FartsMcgee[/nom]TERRORISTS LIVE IN CAVES. THERE IS NO INTERNET CAVES. I CAN BARELY GET WIRELESS IN MY LIVING ROOM.[/citation]

They're very high tech caves... you should see the cave paintings they're turning out with Photoshop BC10000
 
I see 2 reasons as to why this article could have possibly been published for.

1. To make the internet seem unsafe to stupid people, so that the governments of the western world have another reason to filter our internet.
Heres my suggestion: Set up a national child porn investigation unit run by the police who are specifically hired to do just that type of work.

2. Scare tactics for national security, as an excuse to remove more freedoms and its not like we have that many these days.

 
god, assuming that hypothetically, the nuclear controls are actually connected to the internet, allow me to solve your security concerns. "unplug the Ethernet cable"...
 
I am calling bs on this.. I am sure our nukes are not online just waiting for a launch code from some hacker... Get real and think about it.....
 
I'm just wondering what kind of broadband connection a nuclear submarine has. Certainly isn't cable, and my laptop has a hard time staying connected to the wifi router downstairs. It has to be something really exotic like DSL over VLF radio. Talk about an expensive internet connection.
 
Breaking News! Tomshardware.com has been taken over by terrorists who are printing stories that are even more goofy than usual.
 
Down with Bush!!....errr...wait I mean...

This couldn't possibly be propaganda, Obama is in office and sharing this with you is just unprecedented transparency. You'll get comfortable with it. Did you see what is on TV tonight? Nothing. Obama will be holding his 10,000th pull the wool over your eyes make you feel all warm and fuzzy while not talking about the real issues press conference.

Clearly this vulnerability is a case for nuclear disarming. And as with global "warming" the U.S. will lead the way regardless of whether other superpowers agree to do the same. After all everyone wanted change. Er wait not everyone.
 
Didn't Terminator 3 end with nuclear missiles launching from all over the world? Maybe Skynet will be the ultimate terrorists!!
 
I knew this was Kevin Parish's article before I even looked up to check.

The paper uses 9/11 as a comparison: using unconventional weapons in "an unprecedented attack."
Oh yeah, them there terrorists are a pack of geniuses. They knew that jet fuel could demolish two buildings even though the laws of physics make it completely impossible. They knew that NORAD was on a coffee break and could continue to fly a known hijacked plane.

So sure they could definitely do this too.
 
Used 9/11 as a comparison...... yeah right.
Who was behind this? It sure was not OBL, FBI says so. Check their site.
Ans if OBL was not behind it, Taliban had no part of it... yet here we are waging war in A'stan.

Let's have some more Kool-Aid, shall we?
 
It is my understanding that it is impossible to launch nuclear weapons from the internet alone. This is straight out propaganda for other nations to try to pressure nations like America to abandon our nuclear arsenal which is our greatest defense towards increasingly hostile countries in order so that Americans can be wiped out without fear of retaliation. Don't believe this garbage.
 
This is from the ICNND, so the probe was probably worldwide. It's certainly a scare tactic. The only sliver of a chance might be for it to start in some other, less stable country. I don't know if Pakistan or India put their nukes or their incomming warning/detection systems on the web, I sure as fff hope not.
 
Obviously the author and the people who engineered this study know nothing about the controls paced on nuclear weapons in the US. The two man system is still in place (two separate people have to actually work together to launch a weapon and the layers of security are a bit beyond someone calling and saying "please send a missile or nuclear armed bomber to this target." Another thing, while lower security area have been breached at the Pentagon, anything that involves high levels of security is plugged into a separate network and is never connected to the wider Internet (a recent article in Popular Mechanics talked about this with one of the DOD's head security people).

The recent quality of the articles at Tom's have gone down so far that its getting hard to believe anything I read here. Really, a little research and common sense goes a long ways, this is the type of hysterical reporting I expect from ABC, CBS and the LA and NY Times.
 
[citation][nom]sferguson[/nom]Obviously the author and the people who engineered this study know nothing about the controls paced on nuclear weapons in the US. The two man system is still in place (two separate people have to actually work together to launch a weapon and the layers of security are a bit beyond someone calling and saying "please send a missile or nuclear armed bomber to this target." Another thing, while lower security area have been breached at the Pentagon, anything that involves high levels of security is plugged into a separate network and is never connected to the wider Internet (a recent article in Popular Mechanics talked about this with one of the DOD's head security people).The recent quality of the articles at Tom's have gone down so far that its getting hard to believe anything I read here. Really, a little research and common sense goes a long ways, this is the type of hysterical reporting I expect from ABC, CBS and the LA and NY Times.[/citation]

at very least they can have access to the information needed. I will outline the path for you here, if you're up to date you will see the information leak path.

white house pc's connected to internet>president + other phones have bluetooth and wi-fi>compromise the phone via the white house network (easily done if p2p networks can get through, already proven)> you have a whole network of bugs, anything with a mic. there's one WIDE OPEN path to compromise that's already been proven, and likely has been taken advantage of, we just don't know about it.
 
Status
Not open for further replies.