The World's Most Dangerous Password 696
NonNullSet writes "Minutemen ICBMs were deployed in the early 1960s, and grew to over 1000 in number. They were allegedly protected from a "rogue launch" by an approach known as PAL (Permissive Action Link). The PAL required that the correct 8-digit launch code be entered by the missiliers before the missile would establish ignition. What if all the PAL codes had been set to '00000000,' and 'everyone' in the Strategic Air Command knew it? That is unbelievably what happened, as described in this article from the Center for Defense Information. Not exactly a great example for getting people to choose difficult passwords!"
Someone's gotta say it (Score:5, Funny)
Stupid David played with the WOPR again!
WOPR's 'guesses' (Score:5, Informative)
Now I realize that the movie wasn't nearly as stupid as reality.
Re:WOPR's 'guesses' (Score:3, Interesting)
Re:WOPR's 'guesses' (Score:5, Funny)
Re:WOPR's 'guesses' (Score:3, Funny)
Funny, yes. I laughed.
Re:WOPR's 'guesses' (Score:5, Insightful)
I think a +5, Informative on a joke about posting a root password to the world is as funny as the joke itself. It's like the mods adding to the original joke: "Here everyone, r00t this guy."
Re:WOPR's 'guesses' (Score:5, Funny)
Finally, the fact that this alledged 'root password' does not contain punctuation or non-printable characters was not held against it. It still works for the purposes of this joke. Lets hope they remain safely anonymous by not responding to this thread to express their outrage and incredulity.
My thoughts, however, go out to all the sysadmins out there who really DID have their root password outed this evening.
Thank you for your time, and have a pleasent tomorrow.
Re:WOPR's 'guesses' (Score:5, Funny)
In a related discussion someone pointed out thus /. knows the password of 6,510 people.
Re:WOPR's 'guesses' (Score:4, Funny)
Re:WOPR's 'guesses' (Score:5, Funny)
"Here everyone, r00t this guy."
That means something quite different here in Australia! I'll pass, thanks :)
Re:WOPR's 'guesses' (Score:4, Interesting)
You might be kidding, but I can't tell. Anyway, this wouldn't work because the minute differences in response times would not be measurable over a network. Packets do not always take the same amount of time to traverse the Internet, and will often even arrive out of order.
Even over a console connection, you would have to take into consideration that system load would impact the timings, as well.
I'd suggest starting off with some social engineering. You would be amazed at what you can get people to do if you sound like you know what you are talking about. If that fails, then own some joker's broadband PC and have it brute force them into submission. If that fails, then own a lot of boxes and have them all brute force. If nothing else, you'll kill two birds with one stone by doing a DDoS, too.
Re:WOPR's 'guesses' (Score:4, Funny)
And you try and tell the young people of today that
Re:Someone's gotta say it (Score:5, Interesting)
One pilot I talked to used to copilot one of the two big planes (747s?) that they send up that can launch all the missiles remotely in case NORAD gets knocked out. He told a story about how they would run all these drills where they would scramble, get in the air immediately, and then get transmitted codes from the ground. They would unscramble the codes as "do not launch" and then return to base without transmitting anything to the silos, drill over.
According to him, on one of these sorties received the "launch" code in error. So they asked the ground to repeat the transmission. Which they did, and it was the same. So they took a chance and broke protocol and radio'd the ground and told them that they had just sent the "launch" codes, and did they really want them to transmit this along to the silos? Of course the ground told them to cease and return to base.
Scary truth or dunken bravado? Who knows.
Re:Someone's gotta say it (Score:5, Insightful)
You read about trying to cut people out of the loop to save costs, think about this and just pay the $40k/year salary, for goodness sake.
Re:Someone's gotta say it (Score:5, Informative)
Re:Someone's gotta say it (Score:5, Funny)
At least they're default routers... (Score:5, Funny)
Username: cisco
password: cisco
'nuff said.
Re:At least they're default routers... (Score:5, Informative)
The Default Password List [phenoelit.de]
Indispensible tool.
trust (Score:4, Insightful)
Re:trust (Score:3, Insightful)
As has been clearly demonstrated recently in Iraq...
Oh wait, nevermind.
Re:trust (Score:3, Interesting)
Re:trust (Score:4, Insightful)
Indeed; incompetent politics can start wars as well as prevent them.
If Saddam Hussein didn't have WMDs, all he had to do was cooperate with the inspecters, verify he didn't have them, and there would have been no war. He'd still be alive, running the country, and killing whoever he pleased, whenever he pleased.
Instead, he let his ego get in the way of his politics, he fought the inspecters tooth and nail, and it ended up running his regime into the ground.
(There's some more to the story then that, such as how stupid it is to run a "shoot the messenger" regime if you actually want to survive, but that outline is true.)
Incompetent politics can definately start wars.
(Oh, you were trying to blame the current President? Maybe if he'd actually started this war that would make sense, but since there is an unbroken string of broken UN resolutions dating back to Saddam's invasion of Kuwait, I'd say it makes just as much sense to call this a continuation of that, Saddam's Greatest Mistake. Not saying Bush is blameless, just saying that if you want to point at one person who's utterly incompetent politics for over a decade started this war, it's much, much more rational to point at Saddam. One little thing he had to do to remove any pretense, and his ego wouldn't let him do it.)
Re:trust (Score:5, Insightful)
Re:trust (Score:4, Interesting)
I don't see you in the office for the third time about your ingrown toenail and say "hey lets amputate." You've had time to recover, this is just a problem. We need to *DO* something!
We did mostly nothing for 10 years to Iraq. Bush lays down the ultimatum and we "amputate" in like six months - for a wound that we can't find now.
Anyway - war is the last, *last*, **LAST** resort. We didn't approach it that way at all.
Rant off.
Cheers,
Greg
Re:trust (Score:5, Insightful)
Yes, announcing that you don't have significant weapons and appearing weak is a good idea when you have a powerful and belligerent Iran next door.
Re:trust (Score:5, Insightful)
Given a choice of fighting Iran or the US, I'd take Iran every single time.
wlll (Score:4, Insightful)
Yes, I'd say WMD, or the threat thereof, would be the only significant weapons you could bring to bear.
The question is, do you stop to consider facts before you make your arguments? A little less blindly jingoistic support for our president, a little more thought is in order.
Re:trust (Score:5, Insightful)
We overthrew an deomcratically elected gvmt in Iran in 1953 and supported the subsequest Iranian governments in large style.
When the Shah oppressed his people without consience for more than 20 years, and was finally thrown out, the Iranian revolution occured in 1979.
Jimmy Carter was elected in 1976 and had little time to reverse the course set by Eisenhower and the following administrations.
To blame Carter for the disaster that Eisenhower created in Iran is simply a foolish and ignorant thing to do.
And it's no wonder after US sponsered oppression that the Iranians hated us.
(And thus follows Iraq. We hate Iran. Saddam hates Iran. Lets arm that despot to attack Iran. Oops - that wasn't such a great plan... And thus follows our ignorant, evil, and "to-hell-with-the-rest-of-the-world-as-long-as-we
Cheers,
Greg
Re:trust (Score:5, Insightful)
Then I guess we'll be taking out Israel next, for all the UN resolutions they've broken/ignored?
Re:trust (Score:5, Insightful)
Link me to the UN resolution that gives the US executive power and the ability to act as its security council without oversight or resolution.
Re:trust (Score:4, Informative)
Should the Security Council consider that measures provided for in Article 41 would be inadequate or have proved to be inadequate, [the UN Security Council] may take such action by air, sea, or land forces as may be necessary to maintain or restore international peace and security. Such action may include demonstrations, blockade, and other operations by air, sea, or land forces of Members of the United Nations.
Re:trust (Score:5, Informative)
Well, according to Dr Hans Blix (the head of the inspection commission) Iraq was cooperating fairly well. The message that cooperation was inadequate was coming from the same source that was claiming incontrovertible evidence of ongoing WMD activity. Most of the world wanted inspections to continue, based on the doubts raised by the US, in spite of the fact that inspections were revealing nothing.
Re:trust (Score:5, Interesting)
Eventually, I'd suspect it appeared to him that the inspectors weren't there to find WMD's, but to gather intelligence on what his forces were, etc, etc.
Now, this would appear more correct than paranoia.
But, exactly how do you go about saying "we want to see the WMD's" and know that you're being taken to the correct places? The spys tell you where they are, of course. Again, breaking the trust.
Inspectors: "Hi, We'd like to inspect this list of locations for WMD's."
Iraq: "Who gave you the list?"
Spys: "Don't say spys. Don't say spys."
Inspectors: "Ummm, we guessed?"
Iraq: "Ok, we'll give you access to those locations"
Inspectors: "We didn't find anything there, you must be hiding them, we want to see what you have at these installations now."
Lather, rinse, repeat.
Now imagine any group of inspectors trying to see what the US has hiding around the world. It isn't going to happen. The US has enough to destroy the world many times over, and in reality that's unchecked. Everyone knows "Area 51", but there are countless other "secret" installations that foreign (read: enemy) inspectors can't just walk into.
The US is powerful enough where any country won't push for inspection, in fear that the US would push back.
Foreign Power: "Let us check all of your 'secret' bases!"
U.S.: "Sure, let us nuke you first."
Foreign Power: "Fair enough, give us a diplomatic tour of Washington D.C., with plenty of liquer and hookers."
U.S.: "I see we understand each other."
Re:trust (Score:4, Informative)
Re:who modded that insightful? (Score:5, Funny)
From page 164 of The Glossary of Slashdot, 2003 Edition:
Re:trust (Score:4, Insightful)
And the incompetent warriors at the top of the Pentagon went in without an exit strategy - just an exit fantasy of slavish Iraqi gratitude. Their further incompetence at fighting a guerilla war, which has been standard warfare since their incompetence in Vietnam certified it, has kept the war going. To stave off the inevitable "support the troops" replies, I note that the troops actually fighting are tactically competent, topping the world in killing power. Too bad their strategy leaders in the Pentagon don't support them as well as we do.
So we've got political competence combined with warrior incompetence, and a war. Probably the worst war the US has seen since WWII - and there's no limit to what's to come. I never felt so bad about being right.
Re:trust (Score:4, Informative)
"They" in my original post [slashdot.org] referred to "the incompetent warriors at the top of the Pentagon" in the preceeding sentence. Where was Rumsfeld during the last vicious conjob war? Working his way through the ranks to become the Secretary of Defense presiding over the defeat in Vietnam. Cheney was his partner in crime. The actual prosecutors of that war, whose shoes they eventually filled, promoted these same warmongers through the ranks. So comparisons to Vietnam are apt, even beyond the effectiveness of Asian guerillas against the Pentagon. It's the same people running the show!
Moving on to your tripe contrasting American troops losing 58,000 protecting a hated regime, and losing 900 troops removing a hated regime... We lost a very few removing the Hussein regime, after we decimated them in 1990, then continued bombing their shut down country for the 10 intervening years. We have lost most since then, defending the American occupying regime, increasingly hated, with no end in sight.
So talk out of your ass about JFK, but get your head out of the past and focus on the Texan in charge of the nightmare raging *today*. This nightmare in Iraq can spiral out of control beyond even the stupidest propaganda justifying Vietnam. And if you and your partisan buddies keep lying about both wars, you'll never learn enough to get us out of this one.
Re:trust (Score:5, Insightful)
In the current political establishment in the US, it is the politicians & Pentagon civilians who are promoting war, and the officers were generally very skeptical of what they were doing.
Basically one portion of the political elite has decided that we should start acting like Israel if we are to maintain political power in the world, and they have gone on the offensive, entering into many regional conflicts around the world. I would argue this goes back to the Clinton administration at least; Wolfowitz and Pearle have taken it to the logical extreme.
Remember how skeptical retired General Clark was of the war when he became a politician? So was Eisenhower; he warned us of the military-industrial complex, which becomes dangerous because the big money/corporate side of it has lots of influence on Washington politicians. Guys with military experience often know better than the politicians, and this is why Kerry or McCain would be much better leaders than the wide array of war cheerleaders in power now who avoided the draft in various ways [see last couple of weeks of doonesbury].
Re:trust (Score:5, Insightful)
You, sir, are completely incorrect in your assertation. Once upon a time, you might have been largely correct--back in the days when those who had military power were the same people as those with political power (Napoleon for example) the warriors would be the ones to start the wars.
OTOH, looking at the history of 20th century US wars, not one was started by soldiers. Politicians are the ones who lead us into wars. Soldiers are the ones who die fighting them. Learn the difference.
That's a really good password! (Score:5, Funny)
Re:That's a really good password! (Score:5, Funny)
Re:That's a really good password! (Score:4, Funny)
Change the password on your luggage.
Hilarious (Score:5, Funny)
Funniest thing I've read all day. Makes lots of seemingly 'implausible' films about unauthorised nuke launches and hacking, a lot less implausible.
'Hmm.. it's asking for a password ? Try zero zero zero'
Re:Hilarious (Score:3, Insightful)
Does it really matter? (Score:4, Insightful)
So, the passwords were surprisingly effective. FUD at its finest
You're an idiot (Score:4, Insightful)
The fact that everyone in SAC knew them means that if a terrorist had gotten to a low level in position in SAC he would have known the codes. At this point your detterent is useless. If the code was distributed on a proper need to know basis then this wouldn't be possible.
This isn't fud, mcnamara himself was outraged, those locks were there for a damn good reason. That password should NOT be available to everyone in SAC regardless their security clearance. It is should be strictly need to know.
Re:You're an idiot (Score:3, Insightful)
I can imagine people laughing, "Guess what? The code to the bombs is all zeros!" You'd want to share that nugget!
A worthless code does not inspire respect.
Another conversation (Score:5, Funny)
Terrorist 1: "We have done it! We have infiltrated the missile silos! Death to the [insert appropriate derrogatory term for American]s! Victory is ours!"
Terrorist 2: "Mua-ha-ha-ha-ha! Let us hurry and launch the missiles! Wh... what is this?"
Terrorist 1: "It... it appears to be some sort of security mechanism... What do we do?!?"
Terrorist 2: "We have no choice. We must try every combination and hope to find the correct sequence before we are captured. We will start from '00000000' and count upwards."
Terrorist 1: "Are you insane? Even if we could test one sequence per second, it would take us tens of thousands of hours to find the code! Our fingers would be worn into nubs so short that we wouldn't be able to depress the launch button! We could even die of starvation first!"
Terrorist 2: "You're right. We've failed."
At least it wasn't... (Score:5, Funny)
Re:At least it wasn't... (Score:5, Informative)
Damn, beat me to it. Here it is anyway since you left out Skroob's quote :)
I can just picture world war 3 starting. (Score:5, Funny)
Airman 2: Dunno. Try P-A-S-S-W-O-R-D or something.
Airman 1: Nah, it's just numerals. And it's not like the secret code could be 0000000. Nobody would be _that_ stupid.
*ATTENTION - PREPARE FOR GLOBAL THERMONUCLEAR WAR*
Airman 1: What you say!
Re:I can just picture world war 3 starting. (Score:5, Funny)
If a hacker (Score:5, Funny)
Re:If a hacker (Score:3, Funny)
Its only a bad password (Score:3, Interesting)
Re:Its only a bad password (Score:3, Interesting)
Re:Its only a bad password (Score:5, Informative)
The physical security refers to someone trying to get in from the outside. The two guys inside the silo launch center would be able to get the launch off in time.
Insofar as a single deranged person trying to launch the missiles, both launch keys have to be turned at the same time. The keylocks are separated by a distance making it impossible for a single human being to turn both simultaneously.
Crews are rotated such that the same two are not on duty on any but one shift (to prevent conspiracy), and the crewmen are subjected to some excruciatingly serious background and psychological tests before, during, and after their tours of duty in the silos.
Great care was taken in designing a fail-safe mechanism, where if the protection mechanism fails, it fails into a safe mode (like a default-deny in IPTables).
It was determined that it was better that a few missiles not leave the silos during a nuclear exchange than a few leave a silo during peace-time.
Re:Its only a bad password (Score:5, Insightful)
*zoom back three years* "the fact that noone has ever deliberately flown a jumbojet into a building shows it is perfectly secure" I hope the military has some better understanding of risk analysis
There were serious layers of physical security? How serious? Just as serious as their passwords? Besides, the brass may be tough but the grunts guarding it are not above blackmail or greed.
Good security is layered. That also means that breach of security shouldn't be caused by a single failure. But in reality it often turns out one or no layers of security are actually *working* because everybody assumes the other layers will cover for it.
Kjella
Re:Its only a bad password (Score:4, Informative)
Re:Its only a bad password (Score:4, Informative)
Re:Its only a bad password (Score:5, Informative)
What?? You thinking putting a bar on someone's shoulder makes them "tough?" And just because you call someone a "grunt" they're more suceptible to "blackmail or greed?" Newsflash -- EVERYBODY is suceptible to blackmail and greed. That's why the people who work with nukes are vetted by the security services -- officers and enlisted alike. You think the techs who worked on those missiles didn't know how to bypass those PALs regardless of what password was used?
My point is simple -- don't question someone's patriotism because I'm enlisted -- just because they don't get paid as much doesn't mean their values aren't just as strong as an officer's. The enlisted men and women in the military are the ones you have to trust -- we're the ones who make it all work.
Space Balls anybody? (Score:3, Funny)
ROLAND: No, wait, wait. I'll tell. I'll tell.
HELMET: I knew it would work. All right, give to me.
ROLAND: The combination is one.
HELMET: One.
SANDURZ: One.
ROLAND: Two.
HELMET: Two.
SANDURZ: Two.
ROLAND: Three.
HELMET: Three.
SANDURZ: Three
ROLAND: Four.
HELMET: Four.
SANDURZ: Four.
ROLAND: Five.
HELMET: Five.
SANDURZ: Five.
HELMET: So the combination is one, two, three, four, five. That's the stupidest combination I've ever heard in my life. That's the kinda thing an idiot would have on his luggage.
HELMET: We have the combination.
SKROOB: Great. Now we can take every last breath fresh air from planet Druidia. What's the combination?
SANDURZ: One, two, three, four, five.
SKROOB: One, two, three, four, five? That's amazing. I've got the same combination on my luggage.
Reminds me ... (Score:5, Interesting)
Re:Reminds me ... (Score:5, Informative)
so 111-1111111 aswell as 111-2020201 would work. the first 3 numbers could be anything.
this was on a lot of pre-98 microsoft cds.
more info on microsoft cd-keys [omnitechdesign.com]
Re:Reminds me ... (Score:5, Funny)
No wait... no I didn't...
The world was different then (Score:5, Insightful)
For better or worse, the system seemed to have worked - there weren't any unauthorized missiles launched that I'm aware of.
Google Cache (Score:3, Informative)
Totally wrong. (Score:4, Insightful)
in addition, the passwords for the different sub-systems would vary as well as require a number of actual physical keys in order to get the nuclear war machine into motion.
If you really think it only takes one password to launch an american military nuke (even if we were in the 60s), you're totally mislead.
Re: (Score:3)
RT()A (Score:5, Informative)
So assuming the article's correct: a) there wasn't even one password in the launch process at the time, only physical keys, b) four people in the right place could launch nuclear missiles, and no countermeasures would have been able to stop them, and c) given the lack of stringent security in allowing visitors access to those sites, it's not inconceivable that outsiders could have seized the opportunity to take control of two launch centers.
Don't underplay this, it's still bad... (Score:3, Insightful)
And let's be blunt here. A single Minuteman launched at a major world city could kill millions of people. Doesn't it make you even slightly nervous that the military was prepared to discard one of the layers of security in the interest
Re:Totally wrong. (Score:5, Interesting)
Now wait a minute, who has been misled here? One layer of security was complete and utter bullshit - and the Secretary of Defense who had it installed didn't know. How many other layers were complete and utter bullshit?
Not only that, but this was the moral equivalent of a military coup against the elected government. The PALs were there to prevent the military from launching without authorization from the National Command Authority (i.e. the President or his successor).
No worries (Score:5, Funny)
Just enter the recall code. Mandrake has told us it's a variation of the letters POE, which probably stands for 'Purity Of Essence' or 'Peace On Earth'. Just try all the variations, and the launch will be aborted. Hooray!
Now stop fighting in the War Room!
I here have a scan of a manual (funny as hell) (Score:5, Funny)
It's even worse than you think... (Score:5, Funny)
Verizon (Score:3, Interesting)
This isn't a joke, after all the hacking, the passwords are still the same! Even after Palifornia passed the law about reporting security break ins, they still are not reported!
Here is a sample list of actual of passwords I've kept track.
lucent:lucent
nortel:nortel
nortel:etas
admin:setup
admin:admin
admin:config
setup:se
root:toor
FOA WCDMA hardware that all you need to do is telnet too (no ssh) and run a simple password guessing program, and gain access.
IT's worse than you think.
maybe this is just the duress password (Score:5, Interesting)
Dammit (Score:5, Funny)
Disclaimer at the beginning of Dr Strangelove (Score:3, Insightful)
Throws that one out the window then?
Mein Fuehrer! sorry.. Mr President.
Combination locks (Score:5, Funny)
15 years later and 5000 miles away on a continent on the other side of the planet, I'm on the walking trails beside our hotel and come across a gate on the boundary fence which has the exact same combination lock. And yes, it had the exact same access code.
The writeup is misleading.... (Score:5, Insightful)
The story here, then, is not that a bad password was chosen, but that somebody decided to disobey orders by disabling the password, and that the higherups were completely in the dark about it.
Poor ICBM security ...who cares? Right? (Score:5, Insightful)
RTFA. Blair and Brewer point out that, at the time, the military wanted to improve their public relations and would give TOURS of LCC's! B&B repeatedly point out that virtually anyone who asked could get access! The physical security was crap and the codes weren't in place. IE, any moderately funded and motivated terrorist group could have had a field day if they'd know about this severe weakness.
"Four individuals (two persons in each of two separate LCCs in the same squadron) acting in concert could succeed in mechanically launching one or more missiles." In seconds. Not minutes or hours.
"[...] annually thousands of visitors holding no clearance whatsoever were permitted access to operational LCCs."
"Located in each LCC are two launch keys, one for each member of the crew, and the codes needed to authenticate presidential launch directives. Only the launch keys, not the codes, are physical prerequisites for generating valid launch commands, the purpose of the codes being exclusively that of authenticating an execution directive."
B&B make it sound as if you happened to be on a tour and decided to overpower the minimal security force (two crew members + a couple of guards at best (isolated locations, remember?) then it's good to go - you already know the launch codes because it's always all zero's. Or, even worse:
"Technically, crew members can launch a nuclear attack with or without approval from higher authority. Unless PAL or its equivalent forecloses this option, as many as 50 missiles could be illicitly fired. Moreover, unless adequate precautions were instituted, an even more drastic option would be available. Crew members could conspire in the formatting and transmittal of strategic strike directives, deceiving the full contingent of Strategic Air Command (SAC) LCCs, as well as higher authorities, into reacting to a spurious launch directive as if it were valid and authentic. Or they could render the U.S. strategic force virtually impotent by formatting and transmitting messages invalidating the active inventory of presidential execution codes. Finally, crew members could aid accomplices in stealing thermonuclear warheads from missiles on active alert."
Keep in mind that Blair was working in an LCC as a crew member in the mid-70's. He was obviously in a unique position (which virtually none of us were or are) to write this paper. His direct observation on how to subvert the access/security controls on the ICBM's trump anyone else's estimate on what might or might not happen. His letters and paper in 1977 are basically what got those locks activated in... 1977.
It is especially hypocritical that the majority of the Slashdot comments were fine with this poor use of a password mechanism. In your own place of business you most likely would NEVER allow this to happen and you just run some servers - as opposed to ICBM's capable turning your city into a big kitty litter box. Don't defend the actions of those in charge in the 60's and 70's. They were flat out wrong and frankly should have been thrown in military prison for such a massive security breach.
Re:Poor ICBM security ...who cares? Right? (Score:4, Informative)
Having worked in this field I'll tell you:
1. A civilian is never allowed in a live LCC.
2. The crew is sealed in the live LCC's.
3. To get access to a live LCC is much more then cutting the chain link.
4. Even if you got into one, you need to get into two to do anything.
5. Nevermind the hoards of SP's and armed Helicopters descending around you.
6. While crew members can send messages between LCCs (and I believe between bases, I can't recall) these messages are not and can not be EAM's which are only sendable from the NCA via special terminals.
7. Even if you could send the EAM, who would believe an order coming from the wrong originator.
8. The comm systems in question are not as stupid as e-mail, they are part of a dedicated MLS (b3) system.
9. Nuclear command and control has always relied on personal responsibility, do you think nuclear submarine commanders or the alert bomber force can/could not just decide to launch, or are you deluded enough to think they have some crm114 gizmo that overrides them?
In my place of business I'd have no problem with a null password if all access to the server required two trusted administrators with keys that are kept stored in seperate combination locked safes. In fact, a password beyond the assertion of two trusted people would be stupid, and if you don't trust the people allowing them access to the keys would also be stupid.
Your scenario would be something like this:
1. Something needs done to the server, so you call the CIO
2. He gives you and your other Sys Admin a one-time password for the server.
3. You two go open your safes with your combos (each of you only know one of these combos)
4. You remove your keys and open the server locks.
5. You enter the password you got from the CIO
6. You do your business, and relock the server
7. You put your keys away
Damn, I'd hate to work in your shop. Most of us only have trusted sys admins and single passwords.
Dan
Not Stupid (Score:3, Funny)
Re:Not Stupid (Score:4, Informative)
It has to be something the lowest common denominator on the security team can remember.
Consider the source (Score:3, Interesting)
Blair's assertion is very serious if it's true. But as Sagan used to say, extraordinary claims require extraordinary proof. In my book, this one ranks as an extraordinary claim.
Nice story, But i dont buy it (Score:4, Interesting)
Its his word against common sense for some of his statements, and i personally dont belive him.
It's the same for Maniac Mansion! (Score:5, Funny)
Found this out the hard way when I was a kid- I was stuck and didn't know where to look for the code, so I figured I'd brute force it (yes, I was BORED), and.... surprise, it worked on the first go. Found out it was tied to the arcade machine when I inadvertently closed the door and tried to open it again later.
Man, that game kicked all of the ass.
My God.... (Score:5, Funny)
MAD - Mutually Assured Destruction (Score:5, Insightful)
Including the Kremlin.
LCF (Score:5, Interesting)
A lot of really strange things can happen in the military involving authentication, encrypting and decrypting information and in the whole target selection process itself.
Perhaps one of the weirdest occurences that I was personally aware of was when a missile dropped off of "Strategic Alert" (Green Status). There was a two man team of airmen checking out a communications problem in an adjoining building.
Another team arrived on site and entered into the launch facility and saw that the Nuclear Warhead was missing. Needless to say this scurried people from all over with all kinds of alerts being issued... Losing a nuclear weapon was pretty much frowned upon, needless to say.
It turned out that the warhead had fallen off of the missile to the bottom of the launch tube 100 feet below.
The problem was traced to a fuse being changed on the communication box in the soft support building with a screwdriver rather than a fuse puller.
There was a undetected defect in the onboard computer which combined with the shorting of the communications fuse caused the computer to send the "Fire Retro rockets" signal to the RV (nuclear reentry vehicle)
Another time I was programming the computer with its needed information when some "never seen before" status lights lit. D-1 and D-3 which if I remember correctly was "Launch Commanded" and "Launch in Progress".
Normally an individual has to look up these codes in a reference manual. Being the nerd I was back then, I had memorized all of the codes. So I had only a few seconds to react and I proceeded to pop some circuit breakers that would shutdown parts of the operation in case the status was real.
Our job was not to troubleshoot any further at that point so I never found out whether the computer was intending on really launching or if there were two defective lamp drivers.
Of course there is a policy that two trained people always had to be present (two man concept) to ensure that nothing illegal was attempted.
The members of the targeting team were always armed while couriering and programming the launch codes and other vital information into the missile.
More on Permissive Action Links (Score:5, Funny)
The quote at the beginning has become one of my favourite metaphors for describing a process that should be close to impossible:
"Bypassing a PAL should be, as one weapons designer graphically put it, about as complex as performing a tonsillectomy while entering the patient from the wrong end."
Sounds a bit Alarmist (Score:5, Interesting)
In short, perhaps if someone could gain access to a capsule they could have commanded a lauch, but they'd have had to subvert 2 complete LCC crews to command an immediate launch, and that's just not likely, even if the PALs were not active. One LCC could not command an immediate launch, and would have been overriden by the other capsules in the flight had it attempted to. As discussed above, penetrations of the control center or the actual missile facility could not yield results before an overwhelming response ended the threat. The way we were watched (and the capsule crews were more watched than we were) I doubt four people so profoundly without anyone noticing.
As for the "bad guys" gaining access to a warhead from the missile site... not a chance. First, to do that they'd have to penetrate the missile facility (not less than 12 hours work) without setting off any alarms and without any of the heavy equipment being noticed be the frequent roving patrols. Penetrating the LCC would not give anyone "access" to the warheads, as the LCC did not control the locks at the missile site, they just monitored them.
The only significant risk of the warhead falling in the "wrong hands" was during transport, and I can speak from personal experience that those movements were exceptionally well prepared monitored, and armed, with air support close by at all times.
Re:hmm (Score:3, Interesting)
Wasn't there a Sherlock Holmes novel where the police ransack some guys apartment looking for a document, prying up floorboards and turning every page of every book, and whatnot? he document ended up being in a stack of letters on the guys desk, or something. Hiding stuff in the most obvious place _is_ a well used technique, but I don't think
Re:hmm (Score:5, Informative)
And damn good it is too.
Re:hmm (Score:5, Interesting)
I couldn't find this particular scene in the canon anywhere, although, "A Scandal in Bohemia" from The Adventures Of Sherlock Holmes [gutenberg.net] , seems to fit somewhat.
Parinoid (Score:3, Insightful)
I think this shows how parinoid they were. By having everyone in the chain of command know the password(s) for launch they enabled the ability for a launch to happen even if the right people weren't around.
So that if there was a launch against the US and no one was able to react fast enough in the chain of command and order the launch, then Joe Anybody could still affect the launch.
I know it'
The article really is quite fascinating (Score:5, Insightful)
Re:Biopreparat (Score:5, Interesting)
Don't be. I'm a microbiologist and personally I think all this noise about bioweapons is a lot of nonsense. None of it has been shown to work in practice, while nuclear weapons have, and are a hell of a lot simpler, and thus scarier.
Alibek would just have been one of the numerous unemployable ex-Soviet scientists if he hadn't exaggerated the technology of a country that had little to no biological infrastructure (thanks to Trofim Lysenko, who managed to get nearly every competent Soviet biologist killed off from 1930-1960)
However, there's no question that all this hysteria has pumped money into microbiology -- the institute where I work has gotten quite deeply into anthrax research, despite B. anthracis basically being boring B. subtilis with a bad attitute.
Re:Biopreparat (Score:5, Interesting)
Mother Nature's bioweapons did a devastating job on the native populations of the Americas when the Europeans arrived.
If reports are true, an accidental release of weaponized Soviet smallpox killed several vaccinated people at Aralsk in 1971. The reports may not be true -- Dr. Donald Henderson(*) is skeptical and he knows smallpox well.
Bioweapons are bad candidates for military weapons because they're hard/impossible to control once released. Artillery shells go exactly where they're told and don't mutate in midair. Generals don't like *uncontrollable* destruction. Terrorists might.
(*)Leader of the worldwide effort that eradicated smallpox last century. Deserves a statue for winning the war against a virus which had killed more people than Stalin, Hitler and Pol Pot put together.