US: Spies behind 2008 cyber attack
Friday 27 August 2010
A foreign spy agency led a 2008 cyber attack on US military computer systems, a top Pentagon official said, shedding light on what he called the most significant breach of American military cyber security.
Deputy Defense Secretary William Lynn said the attack took place after an infected flash-drive was inserted into a US military laptop at a base in the Middle East, uploading malicious computer code onto the Central Command network.
"That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead from which data could be transferred to servers under foreign control," Lynn wrote in an article for Foreign Affairs magazine published on Wednesday.
"This previously classified incident was the most significant breach of U.S. military computers ever."
Lynn did not say which country's spy agency was behind the attack. But he said that more than 100 foreign intelligence organizations were trying to break into US networks.
"Some governments already have the capacity to disrupt elements of the US information infrastructure," he wrote.
Every year, he said, hackers steal enough data from U.S. government agencies, businesses and universities to fill the US Library of Congress many times over.
When it comes to attacks on the military, the difficulty identifying culprits behind attacks make them very hard to respond to and alluring for hostile governments, he said.
"Cyber attacks offer a means for potential adversaries to overcome overwhelming U.S. advantages in conventional military power and to do so in ways that are instantaneous and exceedingly hard to trace," he wrote.
Counterfeit hardware had already been detected in systems that had been procured by the Defense Department, Lynn said - a danger since computer chips can be written with remotely operated "kill switches" and hidden backdoors.
"The risk of compromise in the manufacturing process if very real and is perhaps the least understood cyber threat," Lynn wrote.
Rogue code, including so-called "logic bombs" that cause malfunctions, can also be inserted into software as its being developed, he said.
Lynn said the attack was a wake-up call for the Pentagon, which has since launched a Cyber Command and taken measures to bolster defenses.
Policymakers now need to consider whether Pentagon capabilities should be extended to shield civilian infrastructure from attack, Lynn said. He noted that U.S. defense contractors have already been targeted "and sensitive weapons systems have been compromised."
"The US government has only just begun to broach the larger question of whether it is necessary and appropriate to use national resources, such as defenses that now guard military networks, to protect civilian infrastructure," he said.
Life & Style blogs
Company breaks open Apple Watch to discover what it says is 'planned obsolescence'
KickAssTorrents down: biggest file-sharing site moves to .cr domain after takedowns
Audrey Hepburn is officially Britain’s style icon – 22 years after her death
Is PMS real? The tale of the premenstrual monster and its meaning
The confessions of men who ordered mail-order brides
General Election 2015: Chuka Umunna on the benefits of immigration, humility – and his leader Ed Miliband
The sickening truth about food banks that the Tories don't want you to know
Aaron and Melissa Klein: Oregon anti-gay bakers ordered to pay $135,000 after refusing to make cake for same-sex wedding
Andrew Lloyd Webber: Phantom of the Opera writer mocked after issuing a warning about Ed Miliband and Nicola Sturgeon
General election 2015: Labour will toughen hate crimes legislation surrounding Islamophobia
EU exit would hit UK economy much harder than neighbouring countries, study finds
- 1 Frank Lampard's face drops when Holly Willoughby introduces him as a 'Man City legend'
- 2 Company breaks open Apple Watch to discover what it says is 'planned obsolescence'
- 3 The confessions of men who ordered mail-order brides
- 4 General Election 2015: Stephen Hawking says he will vote Labour
- 5 Yazidi sex slaves undergoing surgery to 'restore virginity' after being raped by Isis militants
iJobs Gadgets & Tech
£20000 - £25000 per annum: Recruitment Genius: This B2B software supplier, spe...
£22000 - £29000 per annum: Recruitment Genius: This fast growing SaaS (Softwar...
£20000 - £25000 per annum: Recruitment Genius: An Online Marketing Executive i...
£16000 - £32000 per annum: Recruitment Genius: This is a hands-on role which i...