Pentagon official reveals "most significant" military breach
2010-08-27 0:00

By Brian Knowlton | NYTimes.com


A top Pentagon official has confirmed a previously classified incident that he describes as the most significant breach of U.S. military computers ever, a 2008 episode in which a foreign intelligence agent used a flash drive to infect computers, including those used by the Central Command in overseeing combat zones in Iraq and Afghanistan.

Plugging the cigarette-lighter-sized flash drive into an American military laptop at a base in the Middle East amounted to a digital beachhead, from which data could be transferred to servers under foreign control, according to William J. Lynn 3d, deputy secretary of defense, writing in the latest issue of the journal Foreign Affairs.

It was a network administrators worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary, Mr. Lynn wrote.


Pentagon Teams Up With DHS For Cyber Security

Video from: YouTube.com



The incident was first reported in November 2008 by the Danger Room blog of Wired magazine, and then in greater detail by The Los Angeles Times, which said that the matter was sufficiently grave that President George W. Bush was briefed on it. The newspaper mentioned suspicions of Russian involvement.

But Mr. Lynns article was the first official confirmation. He also put a name Operation Buckshot Yankee to the Pentagon operation to counter the attack, and said that the episode marked a turning point in U.S. cyber-defense strategy. In an early step, the Defense Department banned the use of portable flash drives with its computers, though it later modified the ban.

Mr. Lynn described the extraordinary difficulty of protecting military digital communications over a web of 15,000 networks and 7 million computing devices in dozens of countries against farflung adversaries who, with modest means and a reasonable degree of ingenuity, can inflict outsized damage. Traditional notions of deterrence do not apply.

A dozen determined computer programmers can, if they find a vulnerability to exploit, threaten the United Statess global logistics network, steal its operational plans, blind its intelligence capabilities or hinder its ability to deliver weapons on target, he wrote.

Security officials also face the problem of counterfeit hardware that may have remotely operated kill switches or back doors built in to allow manipulation from afar, as well as the problem of software with rogue code meant to cause sudden malfunctions.

Against the array of threats, Mr. Lynn said, the National Security Agency had pioneered systems part sensor, part sentry, part sharpshooter that are meant to automatically counter intrusions in real time.

His article appeared intended partly to raise awareness of the threat to United States cybersecurity the frequency and sophistication of intrusions into U.S. military networks have increased exponentially, he wrote and partly to make the case for a larger Pentagon role in cyberdefense.

Various efforts at cyberdefense by the military have been drawn under a single organization, the U.S. Cyber Command, which began operations in late May at Fort Meade, Maryland, under a four-star general, Keith B. Alexander.

But under proposed legislation, the Department of Homeland Security would take the leading role in the defense of civilian systems.

Though the Cyber Command has greater capabilities, the military operates within the United States only if ordered to do so by the president.

Another concern is whether the Pentagon, or government in general, has the nimbleness for such work. Mr. Lynn acknowledged that it takes the Pentagon 81 months to make a new computer system operational after it is first funded. By contrast, he noted, the iPhone was developed in 24 months.


Article from: NYTimes.com

Top Image: Source





Pentagon Enlists Computer Nerds for Covert Global Cyber War

Video from: YouTube.com




Related Articles
US Cyber Command logo contains coded message
Code Cracked! Cyber Command Logo Mystery Solved
Cyber Command: We Dont Wanna Defend the Internet (We Just Might Have To)
Report Reveals Cyberattacks on Oil Companies
Former US officials fend off simulated cyberattack
IMPACT, ITU calls for borderless effort on cybersecurity
Pentagon plans new cyberspace war command
EU wants Internet G12 to govern cyberspace
Could a Massive False-Flag Cyberattack Be On The Horizon?
Russian hackers penetrate Pentagon computer system in cyber attack (2008)
Hacker cracks ATM machines remotely
Bail denied for G20 hacker arrestee
Hackers Slam Australia Government With A S**t Storm Of Porn
"NASA-UFO Hacker" McKinnon tells all (Video)
Pentagon Enlists Teenage Geeks for Cyber War (video)
Insiders Doubt 2008 Pentagon Hack Was Foreign Spy Attack (Updated)
US military begins Operation Buckshot Yankee (Satire)


Latest News from our Front Page

Minister of Migration attacked by asylum seeker with fire extinguisher
2015-03-27 2:12
Sweden’s Minister of Justice & Migration also known as Morgan “only 1%” Johansson, has been attacked with a fire extinguisher when he visited an asylum home for future Swedes. Regional newspaper, Kristiandstadsbladet reported that a man who had been living at the home for a couple of weeks grabbed a fire extinguisher and sprayed foam all over the minister who didn’t ...
Hollywood agents: Difficult for white actors to find work now that shows required ‘to go ethnic’
2015-03-27 1:51
According to an article by Nellie Andreeva published yesterday at Deadline Hollywood, the television landscape has shifted so much this season that white actors are finding it increasingly difficult to find roles. In addition to new hit shows with mostly minority casts — Black-ish, Empire, Fresh Off the Boat, and How to Get Away with Murder — shows that were originally ...
Congratulations Pussy Porters!
2015-03-26 18:52
Mural paid for by the government, decorates a Swedish school. On International Women’s day Julia Caesar published this chronicle in Swedish on Snaphanen which I’ve translated but prior to reading it I’d like to provide you with some background information on certain terms which are incomprehensible to non-Swedes. First and foremost “pussy porter” and “penis porter” are terms that third-wave feminists in ...
Germanwings co-pilot appears to have crashed plane deliberately – prosecutor
2015-03-26 18:08
The Germanwings co-pilot seemed to have crashed the plane deliberately, killing 150 people on board. The co-pilot wouldn’t let the captain inside the cabin, with the “intension to destroy” the jet, the French prosecutor said at a press conference. Follow RT’s live updates on investigation into Germanwings plane crash The Germanwings co-pilot was identified as Andreas Lubitz. The captain was between 30 ...
Sweden adds gender-neutral pronoun to dictionary
2015-03-25 19:38
The official dictionary of the Swedish language will introduce a gender-neutral pronoun in April, editors at the Swedish Academy have announced. “Hen” will be added to “han” (he) and “hon” (she) as one of 13,000 new words in the latest edition of the Swedish Academy’s SAOL. The pronoun is used to refer to a person without revealing their gender – either because ...
More News