root@The TITANs cometh
[hr]
Maybe the TITANs did it, but I'm betting on a certain nation state that I won't name in the interest of not bringing automated hacking attention to a website I like.—
[ @-rep +1
| c-rep +1
| g-rep +1
| r-rep +1
]
[img]http://boxall.no-ip.org/img/A_Rep.jpg[/img] 2 [img]http://boxall.no-ip.org/img/R_Rep.jpg[/img] 7 [img]http://boxall.no-ip.org/img/C_Rep.jpg[/img] 2
[img]http://i.imgur.com/qtBZ9.jpg[/img]
[img]http://i.imgur.com/AT25J.jpg[/img]
root@The TITANs cometh
[hr] There are two ways to hack a complex control system at the assembly level. Either you built it, or you have the resources to reverse engineer it. Complex industrial control systems are not a dime a dozen, so the reverse engineering team would have to find a way to get access to a few million dollars worth of equipment form Seimens, and enough equipment to go about the reverse engineering process. This stack of equipment is shipped out to few enough locations that the only groups with enough sway to make records of that purchase disappear are nation states. And that is not even including the question of how the hell they got access to Windows source code.@-rep +1
|c-rep +1
|g-rep +1
|r-rep +1
]root@The TITANs cometh
[hr] I wouldn't jump too quickly on deciding which group made and released this first war program. There are a number of groups with the interest and the ability to set this up, and it might not even have been one of Iran's enemies. And this is totally the kinds of hacks I think exist in Eclipse Phase. Computer security might have gotten better by orders of magnitude, but the possible vectors of attack will have grown much faster.@-rep +1
|c-rep +1
|g-rep +1
|r-rep +1
]"The ruins of the unsustainable are the 21st century’s frontier."
— Bruce Sterling