Topic: Pentagon Discloses Largest-Ever Cyber Theft | |
---|---|
WASHINGTON – The Pentagon on Thursday revealed that in the spring it suffered one of its largest losses ever of sensitive data in a cyberattack by a foreign government. It's a dramatic example of why the military is pursuing a new strategy emphasizing deeper defenses of its computer networks, collaboration with private industry and new steps to stop "malicious insiders."
William Lynn, the deputy secretary of defense, said in a speech outlining the strategy that 24,000 files containing Pentagon data were stolen from a defense industry computer network in a single intrusion in March. He offered no details about what was taken but in an interview before the speech he said the Pentagon believes the attacker was a foreign government. He didn't say which nation. "We have a pretty good idea" who did it, Lynn said the interview. He would not elaborate. Many cyberattacks in the past have been blamed on China or Russia. One of the Pentagon's fears is that eventually a terrorist group, with less at stake than a foreign government, will acquire the ability to not only penetrate U.S. computer networks to steal data but to attack them in ways that damage U.S. defenses or even cause deaths. In his speech at the National Defense University, Lynn said that sophisticated computer capabilities reside almost exclusively in nation-states, and that U.S. military power is a strong deterrent against overtly destructive cyberattacks. Terrorist groups and rogue states, he said, are a different problem and harder to deter. "If a terrorist group gains disruptive or destructive cybertools, we have to assume they will strike with little hesitation," he said. The Pentagon has long worried about the vulnerability of its computer systems. The concern has grown as the military becomes more dependent not only on its own computers but also on those of its defense contractors, including providers of the fuel, electricity and other resources that keep the military operating globally. At his Senate confirmation hearing last month, new Defense Secretary Leon Panetta cited "a strong likelihood that the next Pearl Harbor" could well be a cyberattack that cripples the U.S. power grid and financial and government systems. He said last weekend that cybersecurity will be one of the main focuses of his tenure at the Pentagon. The Pentagon operates more than 15,000 computer networks and 7 million computers in dozens of countries. "For the Department of Defense, our networks are really our lifeblood," Marine Gen. James Cartwright, vice chairman of the Joint Chiefs of Staff, told reporters in an interview prior to Lynn's release of the new strategy. As shown by the March attack on a defense industry computer network that contained sensitive defense data, the military's vulnerability extends beyond its own computers. In a new pilot program, the Pentagon is sharing classified threat intelligence with a handful of companies to help them identify and block malicious activity. Lynn said intrusions in the last few years have compromised some of the Pentagon's most sensitive systems, including surveillance technologies and satellite communications systems. Penetrations of defense industry networks have targeted a wide swath of military hardware, including missile tracking systems and drone aircraft, he said. In Cartwright's view, a largely defensive approach to the problem is inadequate. He said the Pentagon currently is focused 90 percent on defensive measures and 10 percent on offense; the balance should be the reverse, he said. For the federal government as a whole, a 50-50 split would be about right, Cartwright argued. "If it's OK to attack me and I'm not going to do anything other than improve my defenses every time you attack me, it's difficult" to stop that cycle, Cartwright said. "There is no penalty for attacking (the U.S.) right now." He added that a number of complex legal and cultural issues need to be sorted out before the Pentagon can devise a comprehensive offensive strategy. In response to an audience member's question after his speech, Lynn the White House could be expected to consider using military force in response to a cyberattack "if there is massive damage, massive human losses, significant economic damage." Earlier this year, President Barack Obama signed executive orders that lay out how far military commanders around the globe can go in using cyberattacks and other computer-based operations against enemies and as part of routine espionage. The orders detail when the military must seek presidential approval for a specific cyberattack on an enemy, defense officials and cybersecurity experts told the AP. The strategy unveiled by Lynn is oriented toward defensive rather than offensive measures. It calls for developing more resilient computer networks so the military can continue to operate if critical systems are breached or taken down. It also says the Pentagon must improve its workers' cyber "hygiene" to keep viruses and other intrusions at bay. And it calls for fuller collaboration with other federal agencies, companies and foreign allies. The strategy also is focused on insider threats. Without citing specifics, it says it will try to deter "malicious insiders" by "shaping behaviors and attitudes through the imposition of higher costs for malicious activity." Stewart Baker, a former assistant secretary at the Department of Homeland Security, called the plan thoughtful but lacking in some aspects. "It's an incomplete description of a defensive strategy," he said. "If the Pentagon announced that our nuclear warfare strategy centered on fallout shelters, we'd all hope that they had a real strategy that was better than that." Read more: http://www.foxnews.com/politics/2011/07/14/pentagon-discloses-largest-ever-cyber-theft/#ixzz1S8kQ59ec Damn, Obama needs to quit being such a coward. Any cyber attack by ANY Government should be considered and act of war and we should respond with full force and bomb them back to the stone age. He is such a coward and I am sick of other nations messing with us and Obama hiding under his desk. We need to elect a new President they WILL take care of business. |
|
|
|
I predict they will use something like this as an excuse to try and shutdown the net further like they want to.
Problem......reaction......solution. They create the problem, we react, they provide a solution to the problem that fits their agendas. It's gone on for years. |
|
|
|
I predict they will use something like this as an excuse to try and shutdown the net further like they want to. Problem......reaction......solution. They create the problem, we react, they provide a solution to the problem that fits their agendas. It's gone on for years. Not at all, hopefully they will just respond with full military force! Unfortunatly Obama is to much of a coward to do that. I just hope too much damage hasn't happened by 2013 when we get a new President. Right now it will take probably atleast 20 years to undo and fix ALL of the messes and mitstakes that Obama made to date. |
|
|
|
I predict they will use something like this as an excuse to try and shutdown the net further like they want to. Problem......reaction......solution. They create the problem, we react, they provide a solution to the problem that fits their agendas. It's gone on for years. I strongly doubt it! |
|
|
|
Not at all, hopefully they will just respond with full military force! ![]() ![]() ![]() ![]() ![]() |
|
|
|
I predict they will use something like this as an excuse to try and shutdown the net further like they want to. Problem......reaction......solution. They create the problem, we react, they provide a solution to the problem that fits their agendas. It's gone on for years. Lpdon where is your conspiracy picture? I think its time for that again XD. |
|
|
|
Pentagon discloses largest-ever cyber theft
The Pentagon is revealing that it suffered one of its largest-ever losses of sensitive defense data this spring to a cyber attack that it blames on an unspecified foreign government. Which means Israel is behind the attack, because if it were any government other than Israel, it would be specified. Only Israel can attack the United States and be protected by the US Government. "Evidence linking these Israelis to 9/11 is classified. I cannot tell you about evidence that has been gathered. It's classified information." -- US official quoted in Carl Cameron's Fox News report on the Israeli spy ring and its connections to 9-11. Read more: http://www.cbsnews.com/8618-201_162-20079424.html?assetTypeId=30&messageId=11021132#ixzz1SDJJLeaZ |
|
|