Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Pentagon Hit by Unprecedented Cyber Attack
FoxNews ^ | 11/20/08

Posted on 11/20/2008 4:43:58 PM PST by Sammy67

Edited on 11/20/2008 4:48:23 PM PST by Admin Moderator. [history]

Thursday, November 20, 2008 The Pentagon has suffered from a cyber attack so alarming that it has taken the unprecedented step of banning the use of external hardware devices, such as flash drives and DVD's, FOX News has learned.

The attack came in the form of a global virus or worm that is spreading rapidly throughout a number of military networks.


(Excerpt) Read more at foxnews.com ...


TOPICS: Breaking News; Foreign Affairs; Government; News/Current Events; War on Terror
KEYWORDS: china; coldwar2; communists; computers; crime; cyberattack; cybersecurity; defensedepartment; dod; homelandsecurity; internet; iran; military; nationalsecurity; news; pentagon; russia; sovietunion; spyware; trojan; unitedstates; virus; war; web; worm; wot
Navigation: use the links below to view more comments.
first previous 1-20 ... 181-200201-220221-240241-245 next last
To: zeugma

Ohhhhh, I can see the big MacAttack coming down the road with lights and sirens on...

;-)


201 posted on 11/21/2008 7:11:43 AM PST by stevie_d_64
[ Post Reply | Private Reply | To 4 | View Replies]

To: AFreeBird

I would recommend eComStation

www.ecomstation.com


202 posted on 11/21/2008 7:16:20 AM PST by FroggyTheGremlim
[ Post Reply | Private Reply | To 48 | View Replies]

To: milford421

Ping.


203 posted on 11/21/2008 7:34:48 AM PST by nw_arizona_granny ( http://www.freerepublic.com/focus/chat/1990507/posts?page=451 SURVIVAL, RECIPES, GARDENS, & INFO)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

The *real* problem is homogeneity of OSes. The *only* answer is heterogeneity.

Some Windows, some Macs, some Linux, some OS/2 ...

Throughout history monocultures have come crashing down with crushing consequences. Yet we never seem to learn.


204 posted on 11/21/2008 7:35:33 AM PST by FroggyTheGremlim
[ Post Reply | Private Reply | To 138 | View Replies]

To: Sammy67

bump...


205 posted on 11/21/2008 7:36:24 AM PST by indthkr
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo

Seems to me like it would be pretty simple to block a group of IP addresses to stop an attack. Unless someone brought something inside, then it might be more difficult to isolate, but not impossible to stop.


206 posted on 11/21/2008 7:44:23 AM PST by southlake_hoosier (.... One Nation, Under God.......)
[ Post Reply | Private Reply | To 5 | View Replies]

To: southlake_hoosier

Once the system is compromised and your internal servers become the attack vector, you’re screwed.


207 posted on 11/21/2008 7:52:10 AM PST by Salo
[ Post Reply | Private Reply | To 206 | View Replies]

To: Strategerist; Thunder90
Isn't enough money in the universe, much less the defense budget, for that.

Integrity-178B from Green Hills Software is the only EAL6+ certified operating system. But it's not suited to desktop or server use, more real-time embedded. Aside from that, the highest OS-related thing I know of in use is IBM's z partitioning system for mainframes (LPAR isolation), at EAL5.

At last estimate it would cost $10 billion to rewrite Linux. Count at least a decade and ten times the money to make a modern EAL7 desktop/server OS kernel since every single element of it must be formally designed and verified using mathematical models and proofs. I'm not even sure it can be done for a whole OS. The guy who can pull it off is a god among OS designers. I only know of one piece of software that has achieved EAL7, and it's a specialized network program.

208 posted on 11/21/2008 8:04:34 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 97 | View Replies]

To: Strategerist
How about a 17 year old kid from Lithuania?

Possible. Not only is China a great source of attacks, it's also a great source of open proxies for others around the world to use for attacks.

209 posted on 11/21/2008 8:07:28 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 114 | View Replies]

To: FlyVet
I remember in the late 90's the .mil net was getting beaten up pretty badly by a certain kind of virus

ILOVEYOU, a.k.a., VBS/Loveletter, a.k.a., Love Bug.

210 posted on 11/21/2008 8:27:28 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 118 | View Replies]

To: FreedomOfExpression
I was reading a report on a Linux site that told of how at a recent security conference, the Mac was the first OS to be taken over using "known vulnerabilities" in browsers.

It was first because they worked for weeks in advance to find and exploit a bug and first publicly used it at the conference. The bug was there, but the relative time to hack was meaningless.

211 posted on 11/21/2008 8:30:29 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 190 | View Replies]

To: pas
Let’s see.....who could have done this? Does it start with a c and end with an a?

We're being attacked by Canada?

212 posted on 11/21/2008 8:32:07 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 193 | View Replies]

To: FreedomOfExpression
I was reading a report on a Linux site that told of how at a recent security conference, the Mac was the first OS to be taken over using "known vulnerabilities" in browsers. The PC was second, and Linux wasn't taken over at all during the 3 days, but the report stressed that ALL OS are vulnerable to attacks targeting browsers.

The conference you are referring to was CANSEC WEST (Canadian Security Conference West) and the Mac was indeed taken over first... and it took only two minutes to accomplish. However, the security consultant who did it, Charles Miller, is an ex-NSA computer expert whose team of himself and two other ex-NSA computer experts worked THREE WEEKS to find the security vulnerability and construct a means of exploiting it.

They did NOT use a "known vulnerability" (except that it was known to them because they had discovered it in the preceding three weeks) in OS X, but rather a vulnerability in JAVA. Miller stated that his exploit would have worked on any of the three OSes in the challenge as well. He just wanted the MacBook Air, which was the prize if he compromised it.

None of the three machines failed during the first day when the attack had to work via an external attack. The winning exploit only worked after the first day of the contest when the rules were relaxed and user participation was allowed. The exploit worked because the referees were required to navigate to a prepared site and click on a link or download a file and install it.

Incidentally, the team that broached the Windows Vista machine did it in under six hours with no prior preparation...

213 posted on 11/21/2008 8:42:17 AM PST by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 190 | View Replies]

To: antiRepublicrat
We're being attacked by Canada?

Nope... California.

214 posted on 11/21/2008 8:50:16 AM PST by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 212 | View Replies]

To: Sammy67

From Seven Steps to a Caliphate:

“The Fourth Phase. Between 2010 and 2013, Hussein writes that al-Qaida will aim to bring about the collapse of the hated Arabic governments. The estimate is that “the creeping loss of the regimes’ power will lead to a steady growth in strength within al-Qaida.” At the same time attacks will be carried out against oil suppliers and the US economy will be targeted using cyber terrorism.


215 posted on 11/21/2008 8:56:37 AM PST by rjp2005 (Lord have mercy on us)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Strategerist

How does it present itself? Black screen or what?

My screen has been fading in and out since yesterday.

But maybe that’s another problem.

I run McAfee every day, but I guess some worms and viruses still get through.


216 posted on 11/21/2008 9:39:29 AM PST by Palladin (Obama on Ayers: "He's just a guy in my neighborhood." LIAR!!!)
[ Post Reply | Private Reply | To 94 | View Replies]

To: big'ol_freeper
They'd be better off banning the use of Windows.

That is a very profound statement, and true statement. DoD already has moved toward Apple servers. They should adopt Mac desktops and laptops also. Our troops deserve the best.


Any system can be hacked!!! Not just Windows. If they want a more difficult system to hack, then they need something that is proprietary to the DoD. Apple is JUST as hackable, it's just not as popular so you have less main stream viruses hitting those systems, as is Linux and other Unix based systems.
217 posted on 11/21/2008 9:48:43 AM PST by cmurphy
[ Post Reply | Private Reply | To 20 | View Replies]

To: leapfrog0202
As for thumb drives and other externals, many offices purchase them for their senior mgmt as a way for them to work at home w/o having to take the laptop home. Much more can be lost if a laptop is misplaced or stolen.

Not only that, but they must interface with contractors and others, even within DoD, who prefer to send copies of presentations and such on thumb drives, rather than going to the trouble of burning CD-ROMS. But of course a worm or Trojan could ride back to the DoD internal net on a CD/DVD ROM just as easily as on a flash drive.

218 posted on 11/21/2008 10:26:24 AM PST by El Gato ("The Second Amendment is the RESET button of the United States Constitution." -- Doug McKay)
[ Post Reply | Private Reply | To 183 | View Replies]

To: snowrip
My fear is that we are woefully unprepared for Chinese cyber attacks

These guys are likely on them like white on rice.


219 posted on 11/21/2008 10:38:20 AM PST by El Gato ("The Second Amendment is the RESET button of the United States Constitution." -- Doug McKay)
[ Post Reply | Private Reply | To 187 | View Replies]

To: cmurphy
Any system can be hacked!!!

True.

Apple is JUST as hackable

False. A bump-proof, pick- and drill-resistant, boron alloy steel MUL-T-LOCK is less "hackable" than a Wal-Mart Master Lock. They're both padlocks, and both can conceivably be compromised, but one is just designed and built better to make it harder to compromise. That there are far fewer of them on the market is irrelevant.

220 posted on 11/21/2008 10:53:29 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 217 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 181-200201-220221-240241-245 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson