Page 2 of 2 FirstFirst 12
Results 11 to 15 of 15
  1. #11
    Join Date
    Mar 2009
    PG County, MD
    Quote Originally Posted by borednva View Post
    This is one reason i never liked having such large parts of critical infrastructure made exclusively outside the country.
    And a really good one. We have no chance at supply chain security if we don't make anything.

  2. #12
    Join Date
    Aug 2014
    "I have many people, but few men."
    -Xerxes, King of Persia, at the battle of Thermopylae

    "Charity has got everything to do with giving and absolutely nothing to do with taking."

    "Studies show that a rapist who has been shot several times loses ardor."
    -Fred Reed

    "Una salus victus nullam sperare salutem"


  3. #13
    Join Date
    May 2018
    Apple is calling for a retraction of the article.

  4. #14
    Join Date
    Apr 2005
    Quote Originally Posted by Mike Heckathorn View Post
    Iím sorry, but I have to ask... Why is anyone surprised?

    Sent from my iPhone using Tapatalk
    I already assumed this was the case years ago. Not the specific method, but that they do something like this.
    "Why should I trade one tyrant 3,000 miles away for 3,000 tyrants one mile away. An elected legislature can trample a man's rights as easily as the king can." Benjamin Martin, The Patriot

  5. #15
    Join Date
    Oct 2018
    Cincinnati, Ohio
    I work in IT Security for a Dispatch Call center, and do ITSec contracting with another company when local gigs are available. I can tell you this is a very real threat. We forbid any kind of USB storage devices on any of our work computers for good reason. Not just because someone could use them to steal HIPAA info or other PII for nefarious purposes. But also because they can easily infect computers with all kinds of malicious malware, and some can even hold electric capacitors that will dump electricity back into computers to destroy them. It is a well known cyber espionage tactic in Business(and other organizations) for a bad actor to leave high value USB drives scattered around office sites they are trying to infiltrate, by smokers areas, lobbies etc. in order to have a non-security minded fool plug it right into their work computer to see what is on it, or to try and wipe because they are greedy and want a USB that holds a few hundred GB's of data.
    This is just the evolution of that old tactic, and it went right under the noses of people that should know better. The chips were disguised as signal conditioning couplers, which would look out of place on the board if someone really knew what to look for, but would easily fool 99.9% of the population. If you are doing anything sensitive on a computer, learn to use various encryption methods. PGP is a solid one for safe communications, unless a key is compromised. I can talk all day about ITSec, if anyone has any questions feel free to ask!

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts