lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 4 Jun 2012 15:01:49 -0400
From: Joel Esler <jesler@...rcefire.com>
To: noloader@...il.com
Cc: FunSec List <funsec@...uxbox.org>,
	Full Disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Re: Obama Order Sped Up Wave of Cyberattacks
 Against Iran

So, a quote, from a book?  Isn't that kinda circular?

Also, there are no quotes from anyone in the room and no one is referenced except by association.  Not saying it's not true, but there's nothing there that indicates it is.  

The only people who will know if this is 100% true were in the Oval Office at the time, and those people aren't going to be quoted in a NYTimes article.   

http://upload.wikimedia.org/wikipedia/commons/1/18/%22Citation_needed%22.jpg    

--  
Joel Esler


On Monday, June 4, 2012 at 2:52 PM, Jeffrey Walton wrote:

> https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html
>  
> WASHINGTON — From his first months in office, President Obama secretly
> ordered increasingly sophisticated attacks on the computer systems
> that run Iran’s main nuclear enrichment facilities, significantly
> expanding America’s first sustained use of cyberweapons, according to
> participants in the program.
> Hasan Sarbakhshian/Associated Press
>  
> Mr. Obama decided to accelerate the attacks — begun in the Bush
> administration and code-named Olympic Games — even after an element of
> the program accidentally became public in the summer of 2010 because
> of a programming error that allowed it to escape Iran’s Natanz plant
> and sent it around the world on the Internet. Computer security
> experts who began studying the worm, which had been developed by the
> United States and Israel, gave it a name: Stuxnet.
>  
> At a tense meeting in the White House Situation Room within days of
> the worm’s “escape,” Mr. Obama, Vice President Joseph R. Biden Jr. and
> the director of the Central Intelligence Agency at the time, Leon E.
> Panetta, considered whether America’s most ambitious attempt to slow
> the progress of Iran’s nuclear efforts had been fatally compromised.
> ...
>  
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>  
>  



Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ