{"id":917,"date":"2010-09-06T23:48:48","date_gmt":"2010-09-06T16:48:48","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/?p=917"},"modified":"2010-09-06T23:48:48","modified_gmt":"2010-09-06T16:48:48","slug":"military-computer-attack-confirmed","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2010\/09\/military-computer-attack-confirmed\/","title":{"rendered":"Military Computer Attack Confirmed"},"content":{"rendered":"<p>A top Pentagon official has confirmed a previously classified incident that he describes as \u201cthe most significant breach of U.S. military computers ever,\u201d a 2008 episode in which a foreign intelligence agent used a flash drive to infect computers, including those used by the Central Command in overseeing combat zones in Iraq and Afghanistan.<\/p>\n<p>Plugging the cigarette-lighter-sized flash drive into an American military laptop at a base in the Middle East amounted to \u201ca digital beachhead, from which data could be transferred to servers under foreign control,\u201daccording to William J. Lynn 3d, deputy secretary of defense,\u00a0<a title=\"Article in Foreign Affairs\" href=\"http:\/\/www.foreignaffairs.com\/articles\/66552\/william-j-lynn-iii\/defending-a-new-domain\">writing in the latest issue of the journal Foreign Affairs<\/a>.<\/p>\n<p><!--more--><\/p>\n<p>\u201cIt was a network administrator\u2019s worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary,\u201d Mr. Lynn wrote.<\/p>\n<p>The incident was<a title=\"Danger Room blog of Wired magazine\" href=\"http:\/\/www.wired.com\/dangerroom\/2008\/11\/army-bans-usb-d\/\"> first reported<\/a> in November 2008 by the Danger Room blog of Wired magazine, and then\u00a0<a href=\"http:\/\/articles.latimes.com\/2008\/nov\/28\/nation\/na-cyberattack28\">in greater detail<\/a> by The Los Angeles Times, which said that the matter was sufficiently grave that President\u00a0<a title=\"More articles about George W. Bush.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/people\/b\/george_w_bush\/index.html?inline=nyt-per\">George W. Bush<\/a> was briefed on it. The newspaper mentioned suspicions of Russian involvement.<\/p>\n<p>But Mr. Lynn\u2019s article was the first official confirmation. He also put a name \u2014 Operation Buckshot Yankee \u2014 to the Pentagon operation to counter the attack, and said that the episode \u201cmarked a turning point in U.S. cyber-defense strategy.\u201d In an early step, the Defense Department banned the use of portable flash drives with its computers, though it later modified the ban.<\/p>\n<p>Mr. Lynn described the extraordinary difficulty of protecting military digital communications over a web of 15,000 networks and 7 million computing devices in dozens of countries against farflung adversaries who, with modest means and a reasonable degree of ingenuity, can inflict outsized damage. Traditional notions of deterrence do not apply.<\/p>\n<p>\u201cA dozen determined computer programmers can, if they find a vulnerability to exploit, threaten the United States\u2019s global logistics network, steal its operational plans, blind its intelligence capabilities or hinder its ability to deliver weapons on target,\u201d he wrote.<\/p>\n<p>Security officials also face the problem of counterfeit hardware that may have remotely operated \u201ckill switches\u201d or \u201cback doors\u201d built in to allow manipulation from afar, as well as the problem of software with rogue code meant to cause sudden malfunctions.<\/p>\n<p>Against the array of threats, Mr. Lynn said, the\u00a0<a title=\"More articles about National Security Agency, U.S.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/n\/national_security_agency\/index.html?inline=nyt-org\">National Security Agency<\/a> had pioneered systems \u2014 \u201cpart sensor, part sentry, part sharpshooter\u201d \u2014 that are meant to automatically counter intrusions in real time.<\/p>\n<p>more from the <a href=\"http:\/\/www.nytimes.com\/2010\/08\/26\/technology\/26cyber.html?_r=3&amp;th&amp;emc=th\" target=\"_blank\">NY Times<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A top Pentagon official has confirmed a previously classified incident that he describes as \u201cthe most significant breach of U.S. military computers ever,\u201d a 2008 episode in which a foreign&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-917","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-eN","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=917"}],"version-history":[{"count":1,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/917\/revisions"}],"predecessor-version":[{"id":918,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/917\/revisions\/918"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}