you mean the Obama’s were allowed on a pentagon laptop ?
Can’t link to the site.
However, if the story is true, somebody left the “GATES” open, eh Secretary?
The military had a ban on flash drives for several months then lifted it because they installed patches.
This could be old news recycled, or the patch/protocols didn’t work.
Pentagon is now infested with Muslims and Muslim Brotherhood agenst and moles.
Unbelievable.
And this is the outfit (U.S. Government) that some people are willing to trust to manage and control their healthcare? They obviously have a death wish!
Perhaps this incident is related to the wikileaks.
Reports like this confirm my misgivings in govt, and the bureaucrats who are supposed to serve and protect our nation, and us.
This is a byproduct of equal opportunity for muslims. Where muslims are given preference in govt positions in order to demonstrate to other muslim worlds how tolerant America is.
Apparently after 911, some of our illustrious bureaucrats determined we should seek to befriend muslims, as a strategy to discourage them from murdering us. So they hired them to work in sensitive areas.
“And now, you know the rest of the story.”
When the Boss (Obama) doesn’t care about protecting America, neither do the employees.
Two intriguing points:
1) A simultaneous attack was performed on the Department of Justice. See http://spectrum.ieee.org/riskfactor/computing/it/thumb_drive_security_peril_at ...this raises the specter that other attacks were occurring at the time and have not been reported. Or, detected [cue ominous music].
2) Shortly after these attacks, China banned Windows from critical government and military computers, moving instead to a version of FreeBSD Unix (familiar as the underpinnings of Mac OS X). http://www.h-online.com/security/China-installs-a-secure-operating-system-on-all-military-PCs—/news/113298
NOTE The following text is a quote:
www.defense.gov//News/NewsArticle.aspx?ID=60600
Lynn Outlines Cyber Threats, Defensive Measures
By Lisa Daniel
American Forces Press Service
WASHINGTON, Aug. 25, 2010 An infected flash drive inserted into a Defense Department computer in 2008 caused a significant compromise of the departments classified computer networks and was a wake-up call for Pentagon officials to expedite cyber defense measures, the deputy secretary of defense revealed in a new magazine article.
The previously classified incident caused the most significant breach ever to U.S. military computers, William J. Lynn III wrote for an article appearing in the September/October issue of Foreign Affairs magazine.
Titled Defending a New Domain, the article outlines the evolution of computer network threats and measures the department has put into place to deal with them. The frequency and sophistication of intrusions into U.S. military networks have increased exponentially in the past 10 years, Lynn wrote. They now are probed thousands of times and scanned millions of times, every day, he added.
Sometimes the adversaries are successful, Lynn said, and they have acquired thousands of files from Defense Department networks and those of the Pentagons industry partners and U.S. allies, including weapons blueprints, operational plans and surveillance data.
To counter the threat, the Pentagon has built layered and robust defenses around military networks and created the new U.S. Cyber Command to integrate processes, Lynn said. Department officials are working with their counterparts at the Homeland Security Department, which has jurisdiction over the dot-com and dot-gov domains, to protect the networks.
The Defense Department has 15,000 networks and 7 million computing devices in use in dozens of countries, with 90,000 people working to maintain them, Lynn said, and it depends heavily on commercial industry for its network operations.
Information technology enables almost everything the U.S. military does, Lynn wrote, from logistical support and command and control to real-time intelligence and remote operations. Any future conflict will include cybersecurity, he has said.
In his article, Lynn outlines five pillars of the departments emerging cybersecurity policy:
— Cyber must be recognized as a warfare domain equal to land, sea, and air;
— Any defensive posture must go beyond good hygiene to include sophisticated and accurate operations that allow rapid response;
— Cyber defenses must reach beyond the departments dot-mil world into commercial networks, as governed by Homeland Security;
— Cyber defenses must be pursued with international allies for an effective shared warning of threats; and
— The Defense Department must help to maintain and leverage U.S. technological dominance and improve the acquisitions process to keep up with the speed and agility of the information technology industry.
Pentagon officials are developing a cyber strategy document to be released in the fall. It will address, among other things, any statutory changes needed for cyber defense, and the capability for automated defenses, such as the ability block malware at top speed, Lynn has said.
Biographies:
William J. Lynn III
Related Sites:
Foreign Affairs Magazine Article
Special Report: Cybersecurity
Driveby poster.
This story happens every week!
Let me guess the country name begins with C and ends with A.
Am I close?
“Do you want to play a game?”
It is an extremely serious breach of security to acknowledge a breach of security.
Every security officer knows this. There is absolutely no point in doing so.