Free Republic
Browse · Search
News/Activism
Topics · Post Article


1 posted on 08/25/2010 8:55:43 PM PDT by VRWCTexan
[ Post Reply | Private Reply | View Replies ]


To: VRWCTexan

you mean the Obama’s were allowed on a pentagon laptop ?


2 posted on 08/25/2010 8:57:29 PM PDT by ncalburt (e)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan

Can’t link to the site.

However, if the story is true, somebody left the “GATES” open, eh Secretary?


3 posted on 08/25/2010 8:59:09 PM PDT by MadMax, the Grinning Reaper
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan

The military had a ban on flash drives for several months then lifted it because they installed patches.

This could be old news recycled, or the patch/protocols didn’t work.


4 posted on 08/25/2010 9:02:46 PM PDT by DBrow
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan

Pentagon is now infested with Muslims and Muslim Brotherhood agenst and moles.


9 posted on 08/25/2010 9:13:02 PM PDT by Frantzie (Imam Ob*m* & Democrats support the VICTORY MOSQUE & TV supports Imam)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan

Unbelievable.


10 posted on 08/25/2010 9:14:00 PM PDT by Mad_Tom_Rackham (It is the duty of the patriot to protect his country from its government -- Thomas Paine)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan

And this is the outfit (U.S. Government) that some people are willing to trust to manage and control their healthcare? They obviously have a death wish!


12 posted on 08/25/2010 9:22:48 PM PDT by Tucker39
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan

Perhaps this incident is related to the wikileaks.

Reports like this confirm my misgivings in govt, and the bureaucrats who are supposed to serve and protect our nation, and us.

This is a byproduct of equal opportunity for muslims. Where muslims are given preference in govt positions in order to demonstrate to other muslim worlds how tolerant America is.

Apparently after 911, some of our illustrious bureaucrats determined we should seek to befriend muslims, as a strategy to discourage them from murdering us. So they hired them to work in sensitive areas.

“And now, you know the rest of the story.”


24 posted on 08/25/2010 10:21:22 PM PDT by takenoprisoner (America's internal axis of evil: Islamist ,Socialist, Marxist ,RINOist.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan

When the Boss (Obama) doesn’t care about protecting America, neither do the employees.


27 posted on 08/25/2010 10:58:33 PM PDT by historyrepeatz
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan

Two intriguing points:

1) A simultaneous attack was performed on the Department of Justice. See http://spectrum.ieee.org/riskfactor/computing/it/thumb_drive_security_peril_at ...this raises the specter that other attacks were occurring at the time and have not been reported. Or, detected [cue ominous music].

2) Shortly after these attacks, China banned Windows from critical government and military computers, moving instead to a version of FreeBSD Unix (familiar as the underpinnings of Mac OS X). http://www.h-online.com/security/China-installs-a-secure-operating-system-on-all-military-PCs—/news/113298


28 posted on 08/25/2010 11:16:37 PM PDT by RightOnTheLeftCoast (Obama: running for re-election in '12 or running for Mahdi now? [http://en.wikipedia.org/wiki/Mahdi])
[ Post Reply | Private Reply | To 1 | View Replies ]

To: All

NOTE The following text is a quote:

www.defense.gov//News/NewsArticle.aspx?ID=60600

Lynn Outlines Cyber Threats, Defensive Measures

By Lisa Daniel
American Forces Press Service

WASHINGTON, Aug. 25, 2010 – An infected flash drive inserted into a Defense Department computer in 2008 caused “a significant compromise” of the department’s classified computer networks and was a “wake-up call” for Pentagon officials to expedite cyber defense measures, the deputy secretary of defense revealed in a new magazine article.

The previously classified incident caused the most significant breach ever to U.S. military computers, William J. Lynn III wrote for an article appearing in the September/October issue of Foreign Affairs magazine.

Titled “Defending a New Domain,” the article outlines the evolution of computer network threats and measures the department has put into place to deal with them. The frequency and sophistication of intrusions into U.S. military networks have increased exponentially in the past 10 years, Lynn wrote. They now are probed thousands of times and scanned millions of times, every day, he added.

Sometimes the adversaries are successful, Lynn said, and they have acquired thousands of files from Defense Department networks and those of the Pentagon’s industry partners and U.S. allies, including weapons blueprints, operational plans and surveillance data.

To counter the threat, the Pentagon has built “layered and robust defenses” around military networks and created the new U.S. Cyber Command to integrate processes, Lynn said. Department officials are working with their counterparts at the Homeland Security Department, which has jurisdiction over the “dot-com” and “dot-gov” domains, to protect the networks.

The Defense Department has 15,000 networks and 7 million computing devices in use in dozens of countries, with 90,000 people working to maintain them, Lynn said, and it depends heavily on commercial industry for its network operations.

“Information technology enables almost everything the U.S. military does,” Lynn wrote, from logistical support and command and control to real-time intelligence and remote operations. Any future conflict will include cybersecurity, he has said.

In his article, Lynn outlines five pillars of the department’s emerging cybersecurity policy:

— Cyber must be recognized as a warfare domain equal to land, sea, and air;

— Any defensive posture must go beyond “good hygiene” to include sophisticated and accurate operations that allow rapid response;

— Cyber defenses must reach beyond the department’s dot-mil world into commercial networks, as governed by Homeland Security;

— Cyber defenses must be pursued with international allies for an effective “shared warning” of threats; and

— The Defense Department must help to maintain and leverage U.S. technological dominance and improve the acquisitions process to keep up with the speed and agility of the information technology industry.

Pentagon officials are developing a cyber strategy document to be released in the fall. It will address, among other things, any statutory changes needed for cyber defense, and the capability for “automated defenses,” such as the ability block malware at top speed, Lynn has said.

Biographies:
William J. Lynn III

Related Sites:
Foreign Affairs Magazine Article
Special Report: Cybersecurity


30 posted on 08/25/2010 11:34:35 PM PDT by Cindy
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan

Driveby poster.


32 posted on 08/26/2010 12:55:29 AM PDT by upchuck (The Mosque at Ground Zero (sorry AP) is about SUBMISSION, not tolerance.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan

This story happens every week!

Let me guess the country name begins with C and ends with A.

Am I close?


33 posted on 08/26/2010 6:41:02 AM PDT by Red in Blue PA (Anti-Gunners suffer from Factose Intolerance)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan

“Do you want to play a game?”


41 posted on 08/26/2010 6:59:05 AM PDT by tnlibertarian
[ Post Reply | Private Reply | To 1 | View Replies ]

To: VRWCTexan; P-Marlowe; SandRat; pissant; Lancey Howard

It is an extremely serious breach of security to acknowledge a breach of security.

Every security officer knows this. There is absolutely no point in doing so.


42 posted on 08/26/2010 7:10:07 AM PDT by xzins (Retired Army Chaplain and proud of it. Those who truly support our troops pray for their victory!)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson