US Nuclear Missile Silos Use Safe, Secure 8" Floppy Disks 481
Hugh Pickens DOT Com (2995471) writes "Sean Gallagher writes that the government built facilities for the Minuteman missiles in the 1960s and 1970s and although the missiles have been upgraded numerous times to make them safer and more reliable, the bases themselves haven't changed much and there isn't a lot of incentive to upgrade them. ICBM forces commander Maj. Gen. Jack Weinstein told Leslie Stahl from "60 Minutes" that the bases have extremely tight IT and cyber security, because they're not Internet-connected and they use such old hardware and software. "A few years ago we did a complete analysis of our entire network," says Weinstein. "Cyber engineers found out that the system is extremely safe and extremely secure in the way it's developed." While on the base, missileers showed Stahl the 8-inch floppy disks, marked "Top Secret," which is used with the computer that handles what was once called the Strategic Air Command Digital Network (SACDIN), a communication system that delivers launch commands to US missile forces. Later, in an interview with Weinstein, Stahl described the disk she was shown as "gigantic," and said she had never seen one that big. Weinstein explained, "Those older systems provide us some, I will say, huge safety, when it comes to some cyber issues that we currently have in the world.""
That big? (Score:5, Funny)
"I've never seen a floppy that big!"
"Wait til you see it spinning."
Re: (Score:3)
Re:That big? (Score:5, Interesting)
She may actually have used a terminal for data entry, or research in the 70s; but she wouldn't have been saving to her personal floppy disk. She'd have been saving to a file in her space (highly unlikely), printing out hard copy (more likely), or hitting some "file" button to send it to her editor (most likely).
But she'd have no more clue which disks they used then a subsistence farmer from Mozambique. Her first exposure to disks would probably be reporting on the Apple II, which used Woz's famous new disk-drive-control circuits and 5 1/2" disks.
those systems are SO OLD... (Score:3)
that to mount a "man in the middle" attack, you need a horse and a lance.
Re: (Score:3)
They say 8" (Score:5, Funny)
They say 8", but their wives privately shared that they were only 6" on a good day.
Re:They say 8" (Score:5, Funny)
They say 8", but their wives privately shared that they were only 6" on a good day.
5 1/4.
Or, for some unfortunates, 3.5
Re:They say 8" (Score:5, Funny)
Wang word processors had 2 1/2" floppies, IIRC. A co-irker was complaining that he had to find some special equipment to "examine a 2 1/2 inch Wang".
"...and said she had never seen one that big" (Score:5, Funny)
"Uh... phrasing."
Security through obscurity (Score:4, Insightful)
Those older systems provide us some, I will say, huge safety, when it comes to some cyber issues that we currently have in the world.
No, they don't. Claiming obsolete hardware and software is more secure is just a thinly veiled security through obscurity claim. There are other claims here; the machines are airgapped, and I suspect that the physical site security is pretty good; but the use of old software and hardware adds nothing at all to that.
Re:Security through obscurity (Score:5, Insightful)
You have to admit, the old hardware makes it hard for some random officer to violate the air gap by plugging in his USB-using cellphone.
Re:Security through obscurity (Score:5, Informative)
SACCS and SACDIN are nearly the same, often interchanged in terminology. Most of us called it SACCS. We were the BALLS. That kind of stuff went on and on... it never got old.
The systems are not nearly as outdated as you think. The endpoints are old, but the stuff in the middle is much newer. The code is reviewed every 6 months. There is probably code in there from the 60's, but it has been reviewed hundreds of times. There is new stuff and changes all the time.
There are modern computers that the programmers code with. There are modern computers in the links from SAC to silo. They are hardended and locked down, but let's be honest, the airmen have physical access. That's why you need a clearance just to touch the computers that make the code that runs the network.
That's all I have to say about that.
Re: (Score:2)
Re: (Score:2)
The other thing worth mentioning is the simplicity of these systems. Older hardware is suprisingly easy to servic
Re: (Score:3)
Sure, you can get the same security by isolating modern machines from a network and loading code using USB's or CD's and DVD's,
Except that's not the same security - Anybody these days can get their hands on USB drives, CDs, and DVDs, but you'd be hard pressed to find a working 8" floppy, drive, and computer to write it with.
Re: (Score:2)
Indeed. The principle security here seems to be that they are in a well-secured facility and are airgapped. Windows 95 would be relatively secure in such an environment.
Re: (Score:3)
I don't think that's true, how long would it take you to ensure no backdoor had been slipped into even the Windows 95 binaries you're installing on the machine compared to auditing the source code and compilation process of even say an early version of DOS? let alone something even more simplistic again.
The fact is more code = more chance of missing malicious code. Older hardware and software almost always means smaller codebases, more simplicity, and less scope for malicious code.
Re:Security through obscurity (Score:5, Insightful)
Re: (Score:3)
Actually I'd argue that's not entirely true. It's far easier to verify there's no back door in vastly simpler hardware and software from back then than there is in the vastly more complex hardware and operating systems of today.
That was a time before I believe we even had computers automatically attempting to optimise circuitry - it was all hand done and the reasons for designs were entirely understandable and known by humans.
Back then processors did exactly what you told them to, nothing more, and nothing
Re:Security through obscurity (Score:5, Insightful)
Actually, you're wrong.
These old networks are airgapped in so many ways, not just by removing the CAT6 to the Internet. The disks themselves are airgapped, as they're not constantly in systems which can read them; likewise, there's a huge airgap between a spy and a reader: if the disks are stolen, they need a huge honkin' machine to read them, or they need to use base facilities which have cameras and guards. Further, the media is low-density: you need to physically transport a truckload to get what fits on a modern CD-R, much less on a 64GB microSDHC.
Just as with 1000 iteration hashing, these large systems impose a time limitation on mass copy. If you want to access this top-secret file, it's merely 15kB of text stored on a 40kB disk. If you want to steal the wealth of information archived here, you must find the disks you want and then copy each of them. If you want it all, you must spend weeks if not months copying each individual disk to a portable flash drive.
There are some real difficulties involved in stealing this much data in this form. That provides a layer of security by requiring high-visibility or excessively slow methods of data access, both of which sharply increase risk in espionage. You are more likely to catch and interrupt any significant espionage attempt in this model than in a model where we put all our stuff on a USB drive that's taken to a modern machine in a secure room.
Re: (Score:3)
Re: (Score:3)
At least they are no longer using a clay tablet reader.
Did they replace that with the CueCat reader?
Re:Security through obscurity (Score:5, Insightful)
At least they are no longer using a clay tablet reader.
I'll say one thing for clay tablets: few other formats just shrug when somebody burns your civilization to the ground...
Sounds like we have a new phrase... (Score:3)
Instead of "Security through obscurity", we now have "Security though obsolescence."
Re: (Score:2)
Re: (Score:2)
Re:Sounds like we have a new phrase... (Score:4, Insightful)
Instead of "Security through obscurity", we now have "Security though obsolescence."
Actually, obsolete is in the eye of the user. Sure, you wouldn't want that as a computer you use for watching videos; but if it reliably does its designed job than it is not obsolete. Old hardware has an advantage; it has been tested and debugged and known to work as planned. Replacing it would involve a lot of work for little gain if the old stuff works; and you run the risk of introducing new bugs and problems that could cause serious problems. A system designed today probably wouldn't rely on ancient hardware; however as long as you can keep it working replacing it is neither cost nor operably beneficial. Security is an added benefit.
Re: (Score:3)
Is something obsolete if it can still perform it's design function effectively and economically? About 5 years ago, I gave a friend a Windows 98 computer as a backup for the one he had running an engraving machine. (For plaques that go on awards and trophies) The system is stand-alone and is designed for that type of computer. A replacement system would cost thousands and would not provide any additional benefit to his business. I wonder about the supportability issue, but otherwise I don't see a probl
Not Internet Connected (Score:5, Insightful)
The silo wins the security battle through two things:
1) Physical security
2) Not being on the Internet
Yes, it's old stuff. Who cares? Nobody can touch it, and it's not on the global network. Not much else is required.
Re:Not Internet Connected (Score:5, Insightful)
The silo wins the security battle through two things:
1) Physical security
2) Not being on the Internet
3) Armed guards with instructions to shoot on sight.
They are to security what rubber hoses are to cryptoanalysis.
Re: (Score:2)
As long as they're awake....
Re:Not Internet Connected (Score:5, Insightful)
Those silos are protected by the most dangerous weapon system in the US Military inventory: A bored 18 year old with an automatic weapon.
Re:Not Internet Connected (Score:5, Insightful)
Are there any old drives around that read these? (Score:2)
Are there any old drives around that can read these disks? What do they do if the drives fail? I am surprised this really still works, but I guess the stuff works, so they have no real inclination to upgrade it anytime soon. What old operating system do you need to read 8" floppy disks? Would DOS 6.22 work or would you need something even older?
Re:Are there any old drives around that read these (Score:4, Interesting)
IBM PC architecture never used the 8" FDD to my knowledge.
I seem to remember those 8" drives on old DEC equipment - VAX minicomps and the like.
Re: (Score:2)
IBM PC architecture never used the 8" FDD to my knowledge.
I seem to remember those 8" drives on old DEC equipment - VAX minicomps and the like.
I worked on systems in the late 80's that used 8 inch floppies (Network 90 DCS - which I think ABB owns nowadays). These were installed in the Operator Interface Units (OIUs) for backups etc. In my case I was running a pseudo multi-tasking program written in TI-Basic that read and wrote data to the floppies by overlaying variables in the Basic address space with absolute sectors from the floppies.
Yes .. it was primitive, even for its time.
Re: (Score:2)
A lot of CP/M machines had them too. I have a TRS-80 Model 4p at home that has two built-in 8" drives.
http://en.wikipedia.org/wiki/T... [wikipedia.org]
Re:Are there any old drives around that read these (Score:5, Funny)
I have a TRS-80 Model 4p at home that has two built-in 8" drives.
This guy is one of the greatest threats to the US Minuteman missile system.
Re:Are there any old drives around that read these (Score:5, Informative)
Yes, there are. I have one, and a Catweasel controller that can read and write basically any format on it.
The 8 inch standard format is very similar to the 1.2MB 5.25 inch format. Actually, it's the other way around, as when IBM built the PC AT and the high-density drives for it they apparently intentionally made the formats nearly identical. They're so close that computers that use 8 inch diskettes can typically be modified to run with 1.2MB HD 5.25 drives and media with only a new controller to drive cable and new drive power supply (8 inch drives typically take either AC mains power to run the spindle or 24VDC, and 5.25 drives take 12VDC to run the spindle). See http://nemesis.lonestar.org/co... [lonestar.org] for some tech info on how to do this with one of the first multiuser 'personal' computers, the Radio Shack TRS-80 Model 16 (and descendents the 16B and the 6000). Also see http://www.dbit.com/fdadap.htm... [dbit.com] for the 'proper' adapter board.
8 inch diskettes are famously reliable with good quality media, and the bits aren't packed so densely that an EMP event will wipe them out, as long as they're in a faraday cage with sufficient attenuation and power handling capacity.
Current production high-density PC FDC's can easily handle the 8 inch drive with the proper adapter cable, but the number of supported formats is small. More flexible is the USB interfaced Kryoflux, and the PCI Catweasel MK3 and MK4 (the Kryoflux is currently in production and available for purchase; the Catweasels have been out of production for a while and are a bit difficult to obtain last I checked; I bought my MK4 from amigakit.com, but they appear to only have the Amiga-specific MK2's in stock.
Re: (Score:2)
Re: (Score:2)
Doesn't magnetic storage start to degrade after 40 years?
Re: (Score:2)
Do you really think that the United States military, very specifically, the part of it that can unleash a version of hell that you have trouble even imagining, does not have the budget to get those drives manufactured, one off or any other part of the system?
Re: (Score:2)
Some VAX computers (11/780 series) used 8" floppy to read the boot loader. OSes like VAX/VMS, RSX-11, RT-11 will read/write them. I also suspect that any old IBM computer/OS will read them.
The main problem is that hardware was more proprietary in those days. You cannot just plug in any 8" drive.
File systems and formatting were different between OSes and vendors, so you need the OS that wrote it to be able to read it (or an emulator).
Penis jokes aside... (Score:5, Interesting)
I see no downside to this. There's no reason for our nuclear silos to be networked or to run modern hardware. If it works, don't fix it.
Related: anyone remember in the pilot of the Battlestar Galactica remake how they explained that the reason there was all that old tech (phones with cords, manual doors) aboard a starship made with technology hundreds of years superior to our own was that they designed it that way on purpose to prevent hacking? Kinda makes you wonder--if there's actually a cyber warfare component to the next major conflict, will the military tech that's developed afterwards end up resembling 1970s (or earlier) era hardware more so than the "futuristic" tech you see in most modern SF?
Re: (Score:2)
Re: (Score:3)
launch the missile by pulling a piece of string from behind a blast screen.
From the manual: "Antiship missile (with loud report). Light, and get away".
Re: (Score:3)
Re:Penis jokes aside... (Score:4, Insightful)
Correlation != Causation. You could just as easily say that he cured the budget deficit and created more jobs than any president in the previous hundred years because he had a better equipped office.
Re:Penis jokes aside... (Score:5, Insightful)
It was interesting, that also in BSG they claimed that the fleet did have much newer starships - the Galactica was being decommissioned due to being obsolete.
All those other starships in the fleet perished quickly due to network infiltration by the Cylons. The only remaining operational hardware was the non-networked stuff.
Re:Penis jokes aside... (Score:4, Interesting)
I do and I grinned when I heard those lines. Like so many of us on here, I work in the IT field (mainly solving problems created by others), and want to continually smack people upside the head when I hear them talking about wanting to add devices at random to the network or all the things they do on their smart phones.
The amount of people, in IT especially, who think networking everything is the be all and end all is staggering simply because these people, do not think the process through to realize the HUGE security issues they are opening themselves up to. These are the same people who think pushing the envelope of technology is a good thing until it bites them in the ass and they come running to my area to fix what it is they broke.
In a way, I get a sense of schadenfreude when I hear about people who have their phones lost/stolen with all their information on it, or who install the latest and greatest piece of software and find themselves wide open to attack.
Like most things, there is a reason not being at the forefront of technology is a good thing. You let others make the mistake and get exploited so you know how to be safe. In the case of Galactica, not being networked and not having the latest and greatest was its strongest defense.
Re: (Score:3)
I see no downside to this. There's no reason for our nuclear silos to be networked or to run modern hardware. If it works, don't fix it.
Related: anyone remember in the pilot of the Battlestar Galactica remake how they explained that the reason there was all that old tech (phones with cords, manual doors) aboard a starship made with technology hundreds of years superior to our own was that they designed it that way on purpose to prevent hacking? Kinda makes you wonder--if there's actually a cyber warfare component to the next major conflict, will the military tech that's developed afterwards end up resembling 1970s (or earlier) era hardware more so than the "futuristic" tech you see in most modern SF?
People keep hyping up drones as the way of the future but I can't help but wonder if that enthusiasm won't be dampened by the first large scale incident of drone formations being hijacked or brought down by hacking or shot down in droves after their command links have been jammed. One good thing about pilots, they are very hard to jam and pretty resistant to hacking. There is a persistent rumour that the RQ-170 (aka. "The Beast of Kandahar") was brought down by jamming its satellite and ground control signa
Reality (Score:5, Insightful)
You find it surprising to find that a fictional world is built to accommodate the plot set in it? Seriously, fiction is a very, very, bad way to evaluate things for the real world.
Disclaimer: While I don't play a nuclear weapons technician on TV, I was one in real life. (Fire Control Technician (Ballistic Missiles) Second Class (Submarines), USN Submarine Service 1981-1991.) I've worked with weapons system components (both installed and spare) that were years and decades old, and have studied the issues as a civilian as well.
Actually, there's a number of downsides, most of which should be obvious with a few minutes serious thought:
Etc..., etc...
The USAF claiming that older tech makes them more 'safe' is just making lemons into lemonade. (And the situation is mostly a product of how far the missiles are from being a priority.) Mostly, I evaluate the claims as a way to deflect attention from the number of serious incidents they've had recently and from their significant personnel problems.
Re: (Score:3)
"If it works, don't fix it."
Close. The phrase is actually "If it works, then you can't get a multi-billion dollar contract from the government to fix it."
Re: (Score:2)
Re:Penis jokes aside... (Score:4, Insightful)
If you take all that old stuff apart, little of it looks very hard to manufacture. And that's if you need to... most can probably be reconditioned or simply acquired from spares. Injection molded plastic will certainly get brittle, but making new 70s-era injection molded parts is not rocket science... if you even need them to be injection molded plastic. Machinable or rapid prototyped materials probably would work just fine. Remember that they don't need consumer-level cost effectiveness here.
this is reassuring (Score:2)
quoth ICBM forces commander Maj. Gen. Jack Weinstein
"Those older systems provide us some, I will say, huge safety, when it comes to some cyber issues that we currently have in the world.""
Note that the guy in charge of all the nuclear missiles in the United States invokes a security-though-obscurity argument to justify obsolete systems.
Re: (Score:2)
More like security through not pandering to user ease-of-use.
Re: (Score:2)
Security is about forcing the blackhats to go through time and expense. STO usually doesn't work, but with using thirty year old technology, it would require an attacker to jump through a lot of hoops just to even procure a computer that can read an 8" floppy drive, the drive itself, and the exact media used (hard-sectored or soft-sectored). Even then, there are different ways to format the disk, be it CAV or CLV, one read/write head or two.
Of course, once a usable disk is obtained, it is a lot harder to
Re:this is reassuring (Score:5, Interesting)
to justify obsolete systems.
Wow, you just don't get it! Your remark implies that he is some sort of Luddite with the attitude of, "it worked for my grand pappy so it is good enough for me!"
What the man said is that they did a complete audit of the systems and given the requirements they determined that what they have is the most secure system they can come up with.
Your remark also implies that they should be all modern with a nice tomcat stack running php, python or god alone only knows what bit of Swiss cheese stack of cruft to control the very things that could quite easily turn this entire planet into a spinning ball of radioactive fire."
Re: (Score:2)
quoth ICBM forces commander Maj. Gen. Jack Weinstein
"Those older systems provide us some, I will say, huge safety, when it comes to some cyber issues that we currently have in the world.""
Note that the guy in charge of all the nuclear missiles in the United States invokes a security-though-obscurity argument to justify obsolete systems.
Well, he does have a point.
For starters, if there's no modern input method (i.e., network connection, USB ports), there's no way to hack the system with modern electronics, and I doubt you could successfully sneak an era-specific "portable" computer [wikipedia.org] in unnoticed.
The other good reason I thought of* is the fact that old, analog electronics are more likely to survive the EMP from a nuclear blast than modern, solid-state stuff. To wit, if a well-placed air-burst nuke drops EM radiation across the continental US
Re: (Score:2)
Re: (Score:2)
Running obsolete systems isn't quite on par with typical security through obscurity. It's not a matter of guessing the right URL to access elevated permissions. It's a matter of procuring 50-year old technology, which by the way nobody outside of the US ever actually got good at producing. How exactly would you go about hacking into a system not connected to any networks and controlled by 8" floppy disks? Especially since, in addition to the obscurity, there are armed guards everywhere?
It's also important t
wha? (Score:2)
"Cyber engineers"?
I'm sorry, but anyone that uses this phrase is highly suspect.
I don't think it affects the information in this case, but there is a reason we think that journalists are stupid when it come to tech.
Floppy drives? (Score:2)
My concern here is not cybersecurity, but data integrity. Not sure what's on those ancient floppy disks, but if it is mission critical, then that's a problem. The failure rates on those would be unacceptably high.
Re: (Score:2)
That was my first thought, too. Decades-old floppy disks might well have developed bad sectors – they do have backups, don't they?
Re:Floppy drives? (Score:4, Funny)
This is the US military. There's a very good chance they have a six acre warehouse full of eight inch floppy disks that's fully climate controlled and guarded by snipers and dogs.
Re: (Score:2)
Re: (Score:3)
Hmmm.....
I know this is opening things up for lots of bad jokes..... but, it really boils down to whether the cookie's lubricant is still effective at allowing the cookie to spin to the correct RPM, +/- the FDC's tolerance. And that is dependent upon the storage conditions (mostly humidity) and the media quality. Being in a military application, this media is likely the most expensive made, if not the highest quality.
Yes, the actual magnetic media is called a 'cookie.' And the word 'cookie' is a bit more
TRS-80 Model II Used 8" Floppies (Score:2)
The TRS-80 Model II was the business version of the early Radio Shack computers.
We bought one in 1979 and used it for for five years until we bought one of the first Macs in 1984.
The Model II had a word processor, database, and spreadsheet program.
http://www.trs-80.com/wordpres... [trs-80.com]
Secure against Cylons (Score:4, Insightful)
let's play global thermonuclear war (Score:2)
What side to you want.
1. USA
2. USRR
3. United Kingdom
4. France
5. China
6. India
7. Pakistan
8. North Korea
9. Israel
Cue the immaturity (Score:2)
"...Stahl described the disk she was shown as "gigantic," and said she had never seen one that big."
And she realized only when the last syllable rolled off her tongue the double meaning of her words, punctuated by the shit-eating grin the General couldn't wipe off his face as he tried to explain that nuclear cowboys wrangling silos must swing big disks to be "secure"...
Needs an update badly (Score:3, Insightful)
This is way out of date. We need to put our missiles in The Cloud, and re-do the launch control UI so it looks pretty. Get on it right away, I expect nothing less than $10 billion spent for a non-working system. Boy though, the guy wearing the fedora will think it's the best thing in the world. It is good for him too. It'll pay off most of his student debt.
Re: (Score:2)
Re:Security through Antiquity? (Score:5, Funny)
Security through Obscurity, if it works for m$ IE, it'll work for one of the largest nuclear stock piles.
Re:Security through Antiquity? (Score:5, Funny)
Where the bugs in the code are silverfish.
Re:Security through Antiquity? (Score:5, Insightful)
Not so much. This is actually more along the lines of "If it aint broken, don't fix it".
Some systems are so deeply entrenched that replacing them often becomes a nightmare and you are not necessarily gauranteed with a more stable, robust replacement system.
Even though some of these systems are old, they are often very very stable.
Re: (Score:2)
Not so much. This is actually more along the lines of "If it aint broken, don't fix it"
I think you've just broached the interesting problem of fixes, spare parts, and replacements.
Re: (Score:3)
Re: (Score:3, Funny)
Re:Security through Antiquity? (Score:4, Interesting)
I knew someone who used to work in the Blue Cube (air force base that monitored early warning systems) in the early 90s, and was told that they still used lots of PDPs, sat at metal desks, and other stuff from the 70s even though they were sitting in the heart of silicon valley.
Last I saw an 8" floppy was for the PDP-11 console that sat inside a VAX cabinet in order to help it boot up.
Now how to fix this stuff? During glasnost era I presume you could second source parts from USSR clones... You could replace the entire system and stick it on a chip and have it all done as a student project. But these computers weren't used as general purpose computers, a lot of the reasons they're kept around is because of a specific hardware interface to other equipment and because it requires people with high security clearances and a budget to design replacements (ie, no student projects). Probably a requirement too to be resistent to electromagnetic pulses which is a plus for a lot of older equipment.
Re:Security through Antiquity? (Score:5, Insightful)
Sure, it's terrible energy-inefficient, and the support costs must be through the roof, but i'm more comfortable knowing that the missile control systems are running on pre-internet (and even ARPANET?) systems. It means the many enemies of the US cannot just hack into the missile control systems and start armageddon. No internet, no hacking, no problem.
Re: (Score:2)
(which are next-to-impossible for Joe Bloggs to get hold of)
I don't think Joe Bloggs is the one trying to breach a US nuclear silo.
Re:Security through Antiquity? (Score:4, Insightful)
This sounds a whole lot like security through obscurity. Not that obscurity isn't good if it makes things harder, but it would be a mistake to rely upon it in any way.
Given the agents you are trying to secure against - i.e. foreign governments - the resources to acquire and develop for 70s and 80s era equipment are easily obtainable.
If the technology being old leads to a lack of developers familiar with the equipment and software, it could quickly become a significant hindrance to good security.
Re:Security through Antiquity? (Score:5, Insightful)
Its not security via obscurity because the real security doesn't rely on the lack of 8" floppies. The real protection is a) not being hooked up to the internet, b) lots of doors & guys with weapons standing between you and the control station. But I guess if some airforce commander throws a few bones to a dumb journalist and has a laugh about it back at the club with the boys, is that obscuring the real security?
Re: (Score:3)
You mean Ogre? I don't think that can actually physically destroy a plate:
http://wiw.org/~meta/vsum/view... [wiw.org]
If you mean something else, I would be interested in hearing how it actually manages to change the head flying altitude...
Re: (Score:3)
Re: (Score:3)
Indeed. How long has it been since anyone manufactured 8" disks? Twenty years at least, I'd say. I inherited an old Tandy 6000 computer running Xenix which had an 8" drive back in the early 1990s, and I remember even then they were special order items. At that point high density 5.25" inch and 3.5" drives were coming into their own.
Not only are the floppies old, but the drives are old, and keeping old floppy drives going can be a pain.
Re: (Score:2)
I have a set of 8" Floppy drives that I can't give away! (DS-DD drives with a 1.2 MB capacity!) Post a reply if you want them (SE Wisconsin area)
Re:Security through Antiquity? (Score:5, Funny)
I have a set of 8" Floppy drives that I can't give away! (DS-DD drives with a 1.2 MB capacity!) Post a reply if you want them (SE Wisconsin area)
USB or SATA hookup?
Re:Security through Antiquity? (Score:5, Funny)
Steam turbine with wooden cogs would be my guess.
Re: (Score:3)
50 pin Shugart would be the most useful, unless you really really need DEC RX01 or RX02.
Re:Security through Antiquity? (Score:5, Funny)
Oh sure, you think we're that easy to fool? Trying to get us to use your 8" disks with hidden backdoors encoded in them? No thank you. We get all of our supplies from official channels, which source from the IBM division called Lenovo.
Maj. Gen. Jack Weinstein
Commander, U.S. Strategic Command
Re: (Score:3)
The same as a world without lawyers...
Re:Security through Antiquity? (Score:5, Interesting)
It's secure against a Stuxnet style sabotage attack, and secure against a remote hack. But hijacking a nuclear missile silo is a different type of mission.
You could likely simulate the entire system on a damn Arduino. On site, just open a panel, swap out a cable, bypass the whole control system.
Even if the floppies themselves contained some data or codes necessary to access/program the missiles (for example), given the low data densities, by modern standards the magnetic domains are the size of cows. You could easily jury-rig up a hand-held reader from commercial components and a bit of hard-hack know-how. And brute force decrypting anything from that era should be doable on a modern laptop.
Any custom system is safe, provided the enemy doesn't know how it works. But security-by-antiquity is a particularly bad example of security-by-obscurity given the likelihood of information leakage over time by people who didn't realise that their systems were still in use (particularly if they were never told what they were used for.) And chances are, your own intelligence people aren't even going to know what to listen for: "Yeah, just some hobbyists talking about early '70s computer technology. Disregard."
Re:Security through Antiquity? (Score:5, Insightful)
Since it is secure via remote hack and secure again a USB drop, then your only remaining option is a local intrusion.
That is when the guys with guns come in handy, and the military is good at that. :)
Are places like Ft. Hood secure? No. Is a nuclear missile silo secure? I dam well hope so...
If not, then I'd agree there is a problem.
Re:Security through Antiquity? (Score:5, Interesting)
On site, just open a panel, swap out a cable, bypass the whole control system.
Just so you know, when you open that panel, you're dead. They have antipersonnel mines built in, in case of unauthorized access to the panel. ICBM security doesn't fuck around.
This is the sort of security that involves lethal countermeasures, and yes, they thought of that. That too. There were geeks involved in the planning, so that other thing you think is clever? Lethal countermeasures.
Re: (Score:3)
It may be possible for the primary missile console. It's in a vault, manned by two specially chosen and armed airmen who are authorised to shoot each other if their partner causes a problem, designed so that it's physically impossible for a single person to operate alone, etc etc. It wouldn't surprise me if they had actual honest-to-god booby-traps in the console itself.
When doing maintenance, you switch out missile ops to the second control room, send in bomb-techs to turn off the booby-traps, then and onl
Re: (Score:2)
Plus you ensure nobody can use the launch computers for anything else, even if it is reportedly the most boring job in the world being on watch down in the missile silo.
They can't play a nice game of chess on them? Only global thermo nuclear war?
Re: (Score:3)
Well, in my experience the good quality double-sided drives are more reliable as they age. The reason being is that a single-sided drive has a rather critical piece of felt as a pressure pad on the top surface, and those pads are notorious for the glue holding them to the head carriage drying out and causing them to fall off.
Double-sided drives, on the other hand, have an actual head on the top surface and those tend to stay put.