Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

A Weak Spot in Our Defenses
Washington Post ^ | June 23, 2009 | Heather Wilson

Posted on 06/23/2009 9:04:55 AM PDT by La Lydia

Congressional computers have been penetrated, probably by the Chinese. The avionics system of the F-22 fighter may be compromised. Computers of our presidential candidates were hacked into -- and probably not by teenagers...Last year's advance of Russian tanks into Georgia was accompanied by the disruption of Georgian government computer systems.

...Attacks on computer systems will be an integral element of future conflict, and the United States is more dependent on computer networks than any other nation.

...policymakers and the military are in the early stages of coming to grips with this. We need to take some important first steps to strengthen our national capability to defend ourselves in cyberspace.

First, we must abandon the notion that static defenses will help us against sophisticated threats. One bipartisan Senate bill proposes to establish a government committee to set standards for all computer systems and software. This is the electronic equivalent of building a Maginot Line of concrete fortifications against a mobile enemy. It may keep common criminals at bay, but it will be no defense against a mobile and adaptable top-tier adversary. American government and private computer systems operate on an interconnected global network that is constantly changing...It operates at light speed, and both friends and adversaries are connected to the same network. We must anticipate that the most dangerous players will stay quiet until a time of tension.

Our cyber-defense capabilities must be inherently dynamic, with a close connection between system operators, intelligence analysts, researchers who can rapidly build and deploy tools to protect or restore vital capabilities.

Second, our intelligence on other countries' cyber-capabilities must be strengthened. We have scores of trained experts who know the ins and outs of foreign radars and missile systems and almost none who are daily tracking cyberthreats in all their manifestations....

(Excerpt) Read more at washingtonpost.com ...


TOPICS: Business/Economy; Foreign Affairs; Government
KEYWORDS: aerospace; avionics; belarus; bhochina; bhorussia; bhoussr; china; coldwar2; cybersecurity; cyberwar; f22; georgia; heatherwilson; maginotline; redchina; russia; sovietunion; usaf
Hopefully we have learned from history and are not still fighting the last war.
1 posted on 06/23/2009 9:04:56 AM PDT by La Lydia
[ Post Reply | Private Reply | View Replies]

To: La Lydia

A Weak Spot in Our Defenses

Commander in Chief is a pretty weak spot right now


2 posted on 06/23/2009 9:07:36 AM PDT by skully (Our hottest chick is Sarah; theirs is Barney Frank)
[ Post Reply | Private Reply | To 1 | View Replies]

To: La Lydia

Pish, posh. The Chinese just need a big hug is all. Nothing to see. Move along.


3 posted on 06/23/2009 9:07:36 AM PDT by bgill (The evidence simply does not support the official position of the Obama administration)
[ Post Reply | Private Reply | To 1 | View Replies]

To: La Lydia

Wait till we get out “smart grid” up and running, hackers are going to have a field day.


4 posted on 06/23/2009 9:17:34 AM PDT by SirFishalot
[ Post Reply | Private Reply | To 1 | View Replies]

To: La Lydia

Our best and brightest do not work for the military or the government. Other countries’ best and brightest do, so we’ll always be a step behind.


5 posted on 06/23/2009 9:20:54 AM PDT by Mr. Jeeves ("If you cannot pick it up and run with it, you don't really own it." -- Robert Heinlein)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SirFishalot

You have to wonder. Has no one in a position of responsibility thought this through? Are they so hell bent on imposing this agenda on the entire country that they don’t care about the unintended consequences — even if they affect our survival. And who in Congress is behind the legislation that would set up this “control committee,” which, if it is like any committee I have ever served on, will still be trying to schedule its first meeting when disaster strikes?


6 posted on 06/23/2009 9:20:55 AM PDT by La Lydia (.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: skully

I think the weak spot is sitting behind the desk in the Oval Office. Does he have time to sit there? He’s always in front of cameras. I thought Clinton was a camera hound. This guy has him beat.


7 posted on 06/23/2009 9:22:45 AM PDT by RC2
[ Post Reply | Private Reply | To 2 | View Replies]

To: SirFishalot
Okay, I found the legislation on Thomas, S 773 by Rockefeller, Bayh, Nelson, and Snowe -- bad omen. Another bad omen that it misspells the word "detterence" in the actual bill language as filed with the Clerk! Here is a link to an article that discusses it and has a link to the text.

http://www.cs.columbia.edu/~smb/blog/2009-04/2009-04-12.html

8 posted on 06/23/2009 9:30:28 AM PDT by La Lydia (.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: La Lydia

Sigh - in some places of the FedGov, there ARE adults in charge.

More here

http://www.afcyber.af.mil/


9 posted on 06/23/2009 10:15:54 AM PDT by ASOC (Who IS that fat lady, and why is she singing?????)
[ Post Reply | Private Reply | To 6 | View Replies]

To: La Lydia

If only we had a really smart, not fully educated computer czar. And make it somebody young. You cannot trust anyone over 30.


10 posted on 06/23/2009 10:53:01 AM PDT by 1010RD (First Do No Harm)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ASOC

But not in Congress!


11 posted on 06/23/2009 11:00:45 AM PDT by La Lydia (.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: La Lydia

A (The) Weak Spot in Our Defenses is the voting public.


12 posted on 06/23/2009 12:12:39 PM PDT by RoadTest (For there is one God, and one mediator between God and men, the man Christ Jesus - I Tim 2:5)
[ Post Reply | Private Reply | To 1 | View Replies]

To: La Lydia

It is simply astounding that Heather Wilson is trying to remake herself into some sort of cyber security sage.

Consider the case of Shawn Carpenter (http://en.wikipedia.org/wiki/Shawn_Carpenter), a former cyber security analyst that was fired from Sandia National Laboratories in 2005 for passing information to the United States Army and the FBI. Carpenter uncovered a sophisticated cyber espionage ring dubbed “Titan Rain” while employed at Sandia. According to TIME Magazine and other reporting, “hundreds of military installations, government agencies (including Sandia Labs) and defense contractor networks were penetrated and sensitive information was being systematically stolen. The firing and resulting wrongful discharge trial was covered widely in the local and national press. Carpenter prevailed at trial, with the outraged jury awarding him almost $5 millon - most of which was punitive damages.

Heather Wilson didn’t utter a peep while she was in office about this case, even though the local media was plastered with reporting. Additionally, it is hard to miss a TIME cover article (http://www.time.com/time/printout/0,8816,1098961,00.html) that involves a national laboratory in your home state. Doing so may have offended her campaign donors (i.e. Lockheed, who operates Sandia for the government). According to news reporting, Carpenter had to go elsewhere for Congressional support, as his own Congressional Representatives in New Mexico couldn’t be bothered with his concerns.

Her quote from the oped, “Yet an important part of protecting ourselves is sharing information about what probes and compromises are found...” rings hollow. It is absolutely absurd that she is now consulting on cyber security. It is incredible that WAPO printed her self-promoting platitudes without more closely examining her background and record on cyber security. It seems ironic that Ms. Wilson is now espousing the dangers of cyberwarfare now that she is out of office. She is nothing more than a talking head promoting her new career. Where was she when it happened in her own back yard? Take a wild stab at where all of the pilfered data was going when she was a Congressional Representative in NM...


13 posted on 06/23/2009 2:01:32 PM PDT by retired_sandian
[ Post Reply | Private Reply | To 1 | View Replies]

To: retired_sandian

Yikes! So everything in this article is inaccurate? It sounded plausible to me. And I never knew that Sandia was not allowed to share its research with the military and the FBI. Why did they go after this man instead of going after the espionage ring? At this point I hope he is working for the military. Thanks for your insight.


14 posted on 06/23/2009 3:25:50 PM PDT by La Lydia (.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: bgill

Nope. Everything to see and be wary of.

Switch to a non-computer based ring of networks in the event the computers are disabled, and keep them offline at all times.


15 posted on 06/23/2009 7:31:42 PM PDT by myknowledge (F-22 Raptor: World's Largest Distributor of Sukhoi parts!)
[ Post Reply | Private Reply | To 3 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson