Skip to comments.Chinese hackers took over NASA's Jet Propulsion Lab, Inspector General reveals
Posted on 03/01/2012 3:05:47 PM PST by Doogle
Chinese hackers gained control over NASAs Jet Propulsion Laboratory (JPL) in November, which could have allowed them delete sensitive files, add user accounts to mission-critical systems, upload hacking tools, and more -- all at a central repository of U.S. space technology, according to a report released Wednesday afternoon by the Office of the Inspector General.
That report revealed scant details of an ongoing investigation into the incident against the Pasadena, Calif., lab, noting only that cyberattacks against the JPL involved Chinese-based Internet Protocol (IP) addresses.
Paul K. Martin, NASAs inspector general, put his conclusions bluntly.
The attackers had full functional control over these networks, he wrote.
JPL is a jewel in NASA's space technology crown.
(Excerpt) Read more at foxnews.com ...
Idiots. Complete idiots. There is no point even having JPL sensitive material even linked or accessed from the internet. You can’t protect a site from attacks, the best thing is not to put it online. Fools.
You would think, in any company or agency that has ultra-sensitive information they would leave the most sensitive on a system that is completely cut off and sealed off from every other system. IE A server sitting in a room plugged in only to the power outlet.
But who said there is common sense in the government or corporate world? As we all know the so-called smartest people usually lack common sense.
It wouldn't surprise me to find out that this Marxist administration is funneling the code to them.
For the life of me, I don’t understand why sensitive technologies like this aren’t completely physically disconnected from the web.
In Nov 2011 the Chinese hacked into JPL and could get anything they wanted.
In Dec of 2011 the US drone went down in Iran.
One of the key elements in hijacking the drone would have been interception of the up and downlink to satellites used to relay flight control information.
2. Filter out all of the sensitive stuff
3. Generate a report of the findings for non-secret consumption.
Now how to get it onto the main network for publishing and distribution. Could use a thumbdrive, but it could have a virus on it. Could do some sort of sneakernet, but what if you have dozens of such reports to create on a daily basis?
I’m no IT security expert. All I know is to be secure from any/all internet hacking you need to be cut off from the internet altogether.
Indeed. More proof that this unconscionable tool in the WH is doing his level best to sell this nation down the river and destroy it outright. He needs to be defeated in this election. Removed in disgrace would be better.
I would like to blame everything on BO and his goon squad but in all probability this was/is a systemic policy stemming from laziness and too much bureaucracy that started years ago.
I saw some expert the other day say that there is a method whereby they can access you computer through the power lines, if they really want to.
Indeed you are correct. However, BO is the one who shut down our STS. He is the one who started the whole Muslim outreach program at NASA. He does things daily that weaken us and expose us to those who would gladly do harm to the USA.
..who's running security? Sandy Berger?
Windows on the net !
I’d like to agree to point at 0, but...
The sellout to China started long before 0! Period.
A very long list of Reps and Dems are bought and sold on the DC market daily. Just a portion of several score hundred billion dollars in USA wealth transferred to foreign nations, in the past 20-30 years. Technology and IP corporate and USG, slip sliding away, in front of your eye.
locations/organizations with sensitive information should have internal networks that have NO physical, external network or internet capable connection and have no user-access points, local or remote that have external connections; even if it means certain people at these locations have more than one PC/terminal that they have to do their work on; and “sharing” sensitive information, even between authorized persons, should NOT be achieved using Internet connections, “secure” or otherwise.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.