Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

'Pentagon's computer network was breached by foreign power' (most serious breach ever)
Jerusalem Post ^ | 08/26/2010

Posted on 08/25/2010 8:55:41 PM PDT by VRWCTexan

A foreign spy agency pulled off the most serious breach of Pentagon computer networks ever by inserting a flash drive into a U.S. military laptop, a top defense official said Wednesday.

(Excerpt) Read more at jpost.com ...


TOPICS: Foreign Affairs; Government; News/Current Events; War on Terror
KEYWORDS: 2008; classifiedinfo; computers; cybersecurity; cyberspace; cyberstrategy; cyberthreats; cyberwar; dod; fivepillars; flashdrive; lynn; nationalsecurity; obama; pentagon; securitybreach
Navigation: use the links below to view more comments.
first previous 1-2021-4041-52 next last
To: 1COUNTER-MORTER-68

What is NEW is now linked in Post No. 15

The Pentagon has decided just today to “come clean” and declassify the story as to when and how there have been multiple serious national security breaches spanning since 2008

Also see link in Post 13


21 posted on 08/25/2010 9:51:53 PM PDT by VRWCTexan (Those who forget history, are doomed to repeat it !)
[ Post Reply | Private Reply | To 20 | View Replies]

To: 1COUNTER-MORTER-68

Correction see link in Post 16


22 posted on 08/25/2010 9:53:33 PM PDT by VRWCTexan (Those who forget history, are doomed to repeat it !)
[ Post Reply | Private Reply | To 20 | View Replies]

To: DBrow

A bit pricey, but this one is nice!!!

http://www.buy.com/prod/kingston-256gb-datatraveler-310-usb-flash-drive/q/loc/101/214525951.html


23 posted on 08/25/2010 10:21:01 PM PDT by LayoutGuru2 (0BAMAC0RN)
[ Post Reply | Private Reply | To 13 | View Replies]

To: VRWCTexan

Perhaps this incident is related to the wikileaks.

Reports like this confirm my misgivings in govt, and the bureaucrats who are supposed to serve and protect our nation, and us.

This is a byproduct of equal opportunity for muslims. Where muslims are given preference in govt positions in order to demonstrate to other muslim worlds how tolerant America is.

Apparently after 911, some of our illustrious bureaucrats determined we should seek to befriend muslims, as a strategy to discourage them from murdering us. So they hired them to work in sensitive areas.

“And now, you know the rest of the story.”


24 posted on 08/25/2010 10:21:22 PM PDT by takenoprisoner (America's internal axis of evil: Islamist ,Socialist, Marxist ,RINOist.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: VRWCTexan
It is old news. Operation Rampart Yankee was the response to it, and ever since, no USB thumb drives have been allowed on government computers.

NATO still allows them under some painful use requirements, but it's still better than the standard Army response that is less about solving the problem than it is bludgeoning the problem to death with a blunt instrument.

25 posted on 08/25/2010 10:22:41 PM PDT by Future Snake Eater ("Get out of the boat and walk on the water with us!”--Sen. Joe Biden)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Future Snake Eater

“no USB thumb drives have been allowed on government computers.”

Thanks. And rest assured, our sensitive documents are safe. Anyone who has ever tread to the dmv to waste a few hours, just so they can acquire permission to drive their car, can attest to this.


26 posted on 08/25/2010 10:50:36 PM PDT by takenoprisoner (America's internal axis of evil: Islamist ,Socialist, Marxist ,RINOist.)
[ Post Reply | Private Reply | To 25 | View Replies]

To: VRWCTexan

When the Boss (Obama) doesn’t care about protecting America, neither do the employees.


27 posted on 08/25/2010 10:58:33 PM PDT by historyrepeatz
[ Post Reply | Private Reply | To 1 | View Replies]

To: VRWCTexan

Two intriguing points:

1) A simultaneous attack was performed on the Department of Justice. See http://spectrum.ieee.org/riskfactor/computing/it/thumb_drive_security_peril_at ...this raises the specter that other attacks were occurring at the time and have not been reported. Or, detected [cue ominous music].

2) Shortly after these attacks, China banned Windows from critical government and military computers, moving instead to a version of FreeBSD Unix (familiar as the underpinnings of Mac OS X). http://www.h-online.com/security/China-installs-a-secure-operating-system-on-all-military-PCs—/news/113298


28 posted on 08/25/2010 11:16:37 PM PDT by RightOnTheLeftCoast (Obama: running for re-election in '12 or running for Mahdi now? [http://en.wikipedia.org/wiki/Mahdi])
[ Post Reply | Private Reply | To 1 | View Replies]

To: 1COUNTER-MORTER-68
"I never read where the flash drive came from though,,,"

See the first link I just posted.
29 posted on 08/25/2010 11:17:27 PM PDT by RightOnTheLeftCoast (Obama: running for re-election in '12 or running for Mahdi now? [http://en.wikipedia.org/wiki/Mahdi])
[ Post Reply | Private Reply | To 20 | View Replies]

To: All

NOTE The following text is a quote:

www.defense.gov//News/NewsArticle.aspx?ID=60600

Lynn Outlines Cyber Threats, Defensive Measures

By Lisa Daniel
American Forces Press Service

WASHINGTON, Aug. 25, 2010 – An infected flash drive inserted into a Defense Department computer in 2008 caused “a significant compromise” of the department’s classified computer networks and was a “wake-up call” for Pentagon officials to expedite cyber defense measures, the deputy secretary of defense revealed in a new magazine article.

The previously classified incident caused the most significant breach ever to U.S. military computers, William J. Lynn III wrote for an article appearing in the September/October issue of Foreign Affairs magazine.

Titled “Defending a New Domain,” the article outlines the evolution of computer network threats and measures the department has put into place to deal with them. The frequency and sophistication of intrusions into U.S. military networks have increased exponentially in the past 10 years, Lynn wrote. They now are probed thousands of times and scanned millions of times, every day, he added.

Sometimes the adversaries are successful, Lynn said, and they have acquired thousands of files from Defense Department networks and those of the Pentagon’s industry partners and U.S. allies, including weapons blueprints, operational plans and surveillance data.

To counter the threat, the Pentagon has built “layered and robust defenses” around military networks and created the new U.S. Cyber Command to integrate processes, Lynn said. Department officials are working with their counterparts at the Homeland Security Department, which has jurisdiction over the “dot-com” and “dot-gov” domains, to protect the networks.

The Defense Department has 15,000 networks and 7 million computing devices in use in dozens of countries, with 90,000 people working to maintain them, Lynn said, and it depends heavily on commercial industry for its network operations.

“Information technology enables almost everything the U.S. military does,” Lynn wrote, from logistical support and command and control to real-time intelligence and remote operations. Any future conflict will include cybersecurity, he has said.

In his article, Lynn outlines five pillars of the department’s emerging cybersecurity policy:

— Cyber must be recognized as a warfare domain equal to land, sea, and air;

— Any defensive posture must go beyond “good hygiene” to include sophisticated and accurate operations that allow rapid response;

— Cyber defenses must reach beyond the department’s dot-mil world into commercial networks, as governed by Homeland Security;

— Cyber defenses must be pursued with international allies for an effective “shared warning” of threats; and

— The Defense Department must help to maintain and leverage U.S. technological dominance and improve the acquisitions process to keep up with the speed and agility of the information technology industry.

Pentagon officials are developing a cyber strategy document to be released in the fall. It will address, among other things, any statutory changes needed for cyber defense, and the capability for “automated defenses,” such as the ability block malware at top speed, Lynn has said.

Biographies:
William J. Lynn III

Related Sites:
Foreign Affairs Magazine Article
Special Report: Cybersecurity


30 posted on 08/25/2010 11:34:35 PM PDT by Cindy
[ Post Reply | Private Reply | To 1 | View Replies]

To: RightOnTheLeftCoast; VRWCTexan
TANKS a bunch,ya’ll,,,

The Cyber Warfare Center was going to be at Barksdale,AFB

down the road from me,,,

We got the Global Strike Command instead since the nukes

were already here,,,and the B-52’s,,,

That said,,,

Somebody dropped the ball on this one,,,

The CWC’s job was to prevent this “hacking” and to trace

the source and to Cyber Bomb it...

31 posted on 08/25/2010 11:48:45 PM PDT by 1COUNTER-MORTER-68 (THROWING ANOTHER BULLET-RIDDLED TV IN THE PILE OUT BACK~~~~~)
[ Post Reply | Private Reply | To 29 | View Replies]

To: VRWCTexan

Driveby poster.


32 posted on 08/26/2010 12:55:29 AM PDT by upchuck (The Mosque at Ground Zero (sorry AP) is about SUBMISSION, not tolerance.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: VRWCTexan

This story happens every week!

Let me guess the country name begins with C and ends with A.

Am I close?


33 posted on 08/26/2010 6:41:02 AM PDT by Red in Blue PA (Anti-Gunners suffer from Factose Intolerance)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red in Blue PA

Columbia?

Czechoslovakia?


34 posted on 08/26/2010 6:43:19 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 33 | View Replies]

To: Red in Blue PA

Czechoslovakia?


35 posted on 08/26/2010 6:43:39 AM PDT by bvw
[ Post Reply | Private Reply | To 33 | View Replies]

To: driftdiver

Crimea?


36 posted on 08/26/2010 6:44:21 AM PDT by bvw
[ Post Reply | Private Reply | To 34 | View Replies]

To: Red in Blue PA
"Let me guess the country name begins with C and ends with A."

Blame CANADA!

37 posted on 08/26/2010 6:45:58 AM PDT by BlueLancer (I'm getting a fine tootsy-frootsying right here...)
[ Post Reply | Private Reply | To 33 | View Replies]

To: bvw

beat ya by 20 seconds!


38 posted on 08/26/2010 6:46:01 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 35 | View Replies]

To: driftdiver

You did! Because I had to chzeckz teh spelling.


39 posted on 08/26/2010 6:48:13 AM PDT by bvw
[ Post Reply | Private Reply | To 38 | View Replies]

To: DBrow
The military had a ban on flash drives for several months then lifted it because they installed patches.

I haven't heard the ban was lifted.

40 posted on 08/26/2010 6:52:48 AM PDT by rhombus
[ Post Reply | Private Reply | To 4 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-52 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson