BoatBanter.com

BoatBanter.com (https://www.boatbanter.com/)
-   General (https://www.boatbanter.com/general/)
-   -   Your military at work (https://www.boatbanter.com/general/117651-your-military-work.html)

Secular Humanist[_2_] August 26th 10 02:45 AM

Your military at work
 
Pentagon computers attacked with flash drive


WASHINGTON –(AP) A foreign spy agency pulled off the most serious
breach of Pentagon computer networks ever by inserting a flash drive
into a U.S. military laptop, a top defense official said Wednesday.

The previously classified incident, which took place in 2008 in the
Middle East, was disclosed in a magazine article by Deputy Defense
Secretary William J. Lynn and released by the Pentagon Wednesday.

He said a "malicious code" on the flash drive spread undetected on both
classified and unclassified Pentagon systems, "establishing what
amounted to a digital beachhead, from which data could be transferred to
servers under foreign control."

"It was a network administrator's worst fear: a rogue program operating
silently, poised to deliver operational plans into the hands of an
unknown adversary," Lynn wrote in an article for Foreign Affairs. "This
.... was the most significant breach of U.S. military computers ever and
it served as an important wake-up call."

The Pentagon operation to counter the attack, known as Operation
Buckshot Yankee, marked a turning point in U.S. cyberdefense strategy,
Lynn said.

In November 2008, the Defense Department banned the use of the small
high-tech storage devices that are used to move data from one computer
to another. The ban was partially lifted early this year with the
approval of limited use of the devices.

Lynn did not disclose what, if any, military secrets may have been
stolen in the 2008 penetration of the system, what nation orchestrated
the attack, nor whether there were any other repercussions.

The article went on to warn that U.S. adversaries can threaten American
military might without building stealth fighters, aircraft carriers or
other expensive weapons systems.

"A dozen determined computer programmers can, if they find a
vulnerability to exploit, threaten the United States' global logistics
network, steal its operational plans, blind its intelligence
capabilities, or hinder its ability to deliver weapons on target," Lynn
wrote.

"Knowing this, many militaries are developing offensive capabilities in
cyberspace, and more than 100 foreign intelligence organizations are
trying to break into U.S. networks," he said.

Defense officials have said repeatedly that the military system of some
15,000 computer networks and seven million computers suffers millions of
probes a day with threats coming from a range of attackers from routine
hackers to foreign governments looking to steal sensitive information or
bring down critical, life-sustaining systems.

Charles C. August 26th 10 11:33 PM

Your military at work
 


wrote in message
...


For that matter I am not sure
why the government uses the internet in confidential communications.
Why don't they have secure trunks with no contact to the outside
world. IBM had that.


What makes you think they don't?
Disinformation intended to intercepted on the Internet can be useful.





All times are GMT +1. The time now is 07:06 PM.

Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright ©2004 - 2014 BoatBanter.com