Wednesday, July 27, 2011

Pentagon new enemies

U.S. Deputy Defense Secretary, William Lynn, the Department of Defense issued a 24 000 files have been stolen hackers (hackers). Data retrieved through a computer network defense contracting company in cooperation with the Pentagon.
Lynn said the U.S. government has a "good idea" about who was responsible for this incident. In the past, such attacks are always blamed on China or Russia.
However, the Pentagon fears is, thieves this time a terrorist group that has the ability to steal data. At a speech at the National Defense University in Washington DC., Thursday, July 15, 2011, local time, Lynn said that the Pentagon has suffered cyber attacks, many foreign files stolen by hackers. About 24,000 files, stolen from a computer network defense industry in March. This is one of the biggest cyber attack in U.S. history.
This attack in a speech reported by Lynn about the new cyber-strategy, which formally declared the dimension of cyberspace as a new fighter, like air, land and sea. This speech called for the development of computer networks are more robust so that the military could operate if the system is essential to penetrate or be taken over.
With regard to the new dimension, at the beginning of this year U.S. President Barack Obama has also signed a decision regulating the extent to which military commanders can use cyber-attacks and other computer-based operations to attack the enemy.
As reported by The Telegraph, the Pentagon has long worried about vulnerability of computer systems. Concern is growing as the military becomes more dependent, not only on his own computer, but also on its contractors.
The attack on the Pentagon's contractor for example, occurs at Booz Allen Hamilton (BAH), a technology provider for the U.S. military, including cyber security for the military and intelligence.
Group of hackers managed to get tens of thousands of U.S. military email addresses of those companies that were then distributed on the internet and make it vulnerable to hacker attacks another.
According to The Telegraph, July 12, 2011, Anonymous hacker group, stole 90 000 email addresses and passwords from the network system BAH on Monday last week. A total of 53,000 of whom have a domain name. Mi meaning associated with the military.
It is feared that the leaked emails easily send the software breaker or destroyer of the network system. Besides email and password to steal data, delete the group Anonymous are also four gigabytes of data belongs to BAH. They call this attack "Liquefaction Military Monday". Anonymous groups say they can easily infiltrate into the tissue because the BAH a lousy security system.
***
Penetration of the Pentagon's computer systems in recent years the Department of Defense associated with the system's most sensitive technologies, including satellite reconnaissance and communications systems. Penetration into the target computer networks of military equipment including missile tracker system.
This is what is causing the Pentagon to assess that the hackers in cyberspace began to spread threats are no less fatal to the conventional enemies, like soldiers or tanks. "In the 21st century, bits and bytes can be as dangerous as bullets and bombs," said Lynn, as quoted by BBC news station.
He worried that the cyber attacks in the future not only focused steal data, but also undermine the U.S. defense, can even cause death. This is related to the efforts of hackers trying to break through the computer network to steal data missile technology and most advanced fighter aircraft.
Lynn then revealed that at least one fatal attack occurred in 2008. Hacked into secret computer systems the Pentagon, the attack was carried out by the secret intelligence service. "We know know who did it," Lynn said as quoted by the Associated Press.
He refused to call a foreign intelligence service in question. According to him, the stolen data is information that is "normal" look, such as spare parts spesifikiasi tanks, planes, submarines and American-made.
"But we are concerned about some of the most sensitive data, such as aircraft navigation systems, surveillance technology, satellite communications systems, and network security protocols," said Lynn.
Marine Gen. James Cartwright, Vice Chief of the U.S. Joint Armed Forces, judging that the mechanism has been applied to protect computer systems have been too predictable. In addition, there are no penalties for hackers who could give a deterrent effect. "The system is too defensive. We should think of a way to change it," said Cartwright.
He emphasized that the U.S. should focus more offensive in cyberspace. "For the Department of Defense, the network computer is actually a network of blood."
Last month, Defense Minister Leon Panetta stated, there is a strong tendency attack "Pearl Harbor" is the next-cyber attacks that hit the main U.S. force, financial systems and governance.

0 comments:

Post a Comment

loading...