Unauthorized Access of Pentagon Network

alwaysfresh

New Member
Well I hope you people know something about computers. These articles only say one thing "people working with the Pentagon Network are incompetent." LOL... hacking is not magic. You must actually put a hole into your system or allow someone to put a hole into you system.
 

akinkhoo

Junior Member
Beijing have a cyberwarfare unit, so does Washington and Taipei... and they do actively test each other for years. but like all "incident" of this kind, the policy office have to control over the released of the news.

imo, cyberwarfare isn't just about hackers, but also network. The ability to control, block and bottleneck the traffic before it reaches your system is equally important. the great firewall of china may serve a different kind of mission in wartime.
 

Nethappy

NO WAR PLS
VIP Professional
Imo this is just BS somebody put out after the Russians massive cyber attack on Estonia to play on the China threat story and if this really did happen I fully agree with alwaysfresh that the people working with the Pentagon Network are incompetent.

Forgodsake US or China is not Estonia, their national network defence are porably the best in the world.
 

Hendrik_2000

Lieutenant General
Some one come with the loot of 24,000 file of highly classified info over months Now who could that be ?
Please, Log in or Register to view URLs content!


he Pentagon has confirmed that some of the nation's closely guarded secrets have been looted wholesale by spies who managed to break into government computers.

Plans for the wars in Iraq and Afghanistan, secret information about American satellites, and plans for a new fighter plane are gone, vacuumed up in computer hacking apparently by hostile governments.

The confirmation came today in a speech in Washington by Deputy Secretary of Defense William Lynn. "To date, malicious cyber activity has been directed at nearly every sector of our infrastructure and economy," he said.

CBS News national security correspondent David Martin got the first television camera ever into the Pentagon's Command Center that defends against computer attacks.

FORT MEADE, Md. - The Joint Strike Fighter is the Pentagon's high-priced ticket to air superiority for the 21st century. Except four months ago the designs for that and other sophisticated weapons were stolen from defense industry computers by hackers - 24,000 files in all.

"Designs of satellites, UAV's - the unmanned aerial vehicles - cutting-edge military technology," were stolen Lynn said.

"Is somebody out there robbing us blind?" Martin asked.

"There are lots of people out there taking a lot of information," Lynn replied.

Read the full Defense Department strategy (pdf)
ZDNet's Larry Dignan on the security breach

Lynn told CBS News the U.S. is still not sure who stole the data, although the most likely suspects are China and Russia. But Lynn is sure there is a mismatch between America's dependence on the technology of cyberspace.

"It drives our navigation. It drives our targeting. It drives our communications," Lynn said.

And its ability to defend against cyberattacks.

"The attackers are ahead of the defenders in cyberspace," Lynn said. "The technology for intrusions is far ahead of the technology for defenses and we need to catch up."

"How often are there attacks on the Pentagon's networks," Martin asked.

"There are attempted intrusions thousands of times a day," Lynn replied.

These intrusions are not pranks but espionage conducted by foreign intelligence agencies. Cyber spies could be lurking undetected inside one or more of the Defense Department's 15,000 computer networks.

"They're in and we don't know it?" Martin asked.

"It's entirely possible," Lynn replied. "Three years ago we found that someone had gotten into our classified network and we didn't think that was possible because it's completely separate from the Internet."

A foreign intelligence agency, Lynn won't say which one, penetrated a classified computer network used by the U.S. Central Command which runs the wars in Iraq and Afghanistan.

"How long were they in?" Martin asked.

"It was probably a matter of months," Lynn replied.

"They were in a matter of months undetected?"

"Yes."

"That must have been a wake up call."

"That was a wake up call," Lynn said. "It led us to the creation of the Cyber Command to try and organize our defenses. This can't be a pick up game."

More about Cyber Command

Cyber Command is located inside the headquarters of the top secret National Security Agency. CBS News got an exclusive look at the new command's operations center.

There's a war going on out in cyberspace and this is its nerve center. Cyberspace is now just like air, land and sea -- one more theater in which the U.S. military has to fight.

"There's been very few weapons, probably no weapons in the history of warfare that have been developed and not used," Lynn said.

Right now only states like China and Russia have the capability to launch a cyberattack that could take down this country's power grid or banking system. But once a rogue state or terrorist group with no stake in the world economy gets it, the U.S. will be facing the threat of an attack from cyberspace by a weapon of mass disruption.

uly 14, 2011 5:45 PM EDT
Please, Log in or Register to view URLs content!


The Pentagon suffered the most significant breach yet of its cyber security system, underscoring fears that secret defense files and networks are vulnerable to cyber attacks and lending a sense of urgency to the institution's push to bolster its cyber security.

The website of the U.S. Central Intelligence Agency (CIA) was unresponsive and unavailable after reports that the website had been attacked by internet hackers in Washington June 15, 2011. The Lulz Security group of hackers said in a Tweet that it had launched an attack on the public Web site of the U.S. Central Intelligence Agency.

The website of the U.S. Central Intelligence Agency (CIA) was unresponsive and unavailable after reports that the website had been attacked by internet hackers in Washington June 15, 2011. The Lulz Security group of hackers said in a Tweet that it had launched an attack on the public Web site of the U.S. Central Intelligence Agency.

Deputy U.S. Secretary of Defense William Lynn said that hackers stole 24,000 sensitive defense department files in a single March operation. He said that the Pentagon believes the attack came from a nation rather than a lone hacker or a group but declined to elaborate, saying only that officials had a "pretty good idea" of who was responsible. He added that while previous cyber attacks are believed to have emanated from Russia or China, hostile terrorist groups pose a greater threat because they would be less fearful of repercussions.

"If a terrorist group gains disruptive or destructive cybertools, we have to assume they will strike with little hesitation," Lynn said in a speech at the National Defense University.

Numerous government agencies have been the targets of cyber attacks in recent weeks, forcing a recognition that the government is not fully prepared for the nimble adversaries it will face in a world of cyber warfare. According to military's cyber command, about 250,000 potential attackers scope out the Pentagon's defenses each hour. At his Senate confirmation hearing last month, new Defense Secretary Leon Panetta cited "a strong likelihood that the next Pearl Harbor" would be a debilitating cyber attack aimed at government networks or energy grids, and he has vowed to make cyber security a priority.

"The cyber threats we face are urgent, sometimes uncertain and potentially devastating as adversaries constantly search for vulnerabilities," Lynn said in a statement. "Our infrastructure, logistics network and business systems are heavily computerized. With 15,000 networks and more than seven million computing devices, DoD continues to be a target in cyberspace for malicious activity."

The main focus of a new cyber security strategy will be safeguarding the numerous contractors the federal government employs, with a recognition that the laws of warfare apply online. Marine Gen. James Cartwright, vice chairman of the Joint Chiefs of Staff, said that the government needed to rethink its strategy so that it can actively anticipate attacks, rather than playing catch up.

"If it's OK to attack me and I'm not going to do anything other than improve my defenses every time you attack me, it's difficult" to deter future attacks, Cartwright said.
 
Last edited:

KingLouis

Junior Member
Is a good thing that computer scientist haven't figure P=NP problem yet or else all encryption will be cracked easily.
 

AssassinsMace

Lieutenant General
I saw that story on TV. I'm confused because the F-35 data was stolen when? There have been reports that this happened a while ago and the story made it sound as if it recently happened.
 

Red___Sword

Junior Member
Is a good thing that computer scientist haven't figure P=NP problem yet or else all encryption will be cracked easily.

I got the idea you are saying the modern encryption simply depending on the scarce of big Prime Numbers... that's true. Manipulating prime numbers is all what computer science do.

I didn't get the "P=NP" stuff, "Prime=Non-Prime" ? That one day non-primes can be used as encryption seed?
 
Top