China hacked into Pentagon computer network successful cyber attack on the US defence | |
wing-ed
(OP) User ID: 281371 United States 09/04/2007 05:50 AM Report Abusive Post Report Copyright Violation | Praise The Holy Of Holy :: This is something that a first strike would use to shut down our response !! Praise The Lamb:: Amen Holy, holy,holy, Lord God Almighty, which was, and is, and is to come.Praise the one who gives you peace beyond all understanding Yes that scripture still sounds good ! |
wing-ed
(OP) User ID: 281371 United States 09/04/2007 06:31 AM Report Abusive Post Report Copyright Violation | Praise The Holy Of Holy :: If they really got in deep do you think the pentagon would admit it ! The story says's they really don't know how much or what was down loaded!! Holy, holy,holy, Lord God Almighty, which was, and is, and is to come.Praise the one who gives you peace beyond all understanding Yes that scripture still sounds good ! |
Webbot
User ID: 190126 United States 09/04/2007 08:38 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 241991 United Kingdom 09/04/2007 08:44 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 71498 United States 09/04/2007 09:13 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 291627 United States 09/04/2007 09:43 AM Report Abusive Post Report Copyright Violation | The U.S. is going to hell in a hand basket. Facee the facts...the world does not like us. Untill we stop all trade and bring all our resourses home (troops, money, businesses that have moved over seas, so on and so forth) we will continue a steady decline. |
Grizzled Old Goat
User ID: 293180 Canada 09/04/2007 09:49 AM Report Abusive Post Report Copyright Violation | The U.S. is going to hell in a hand basket. Facee the facts...the world does not like us. Untill we stop all trade and bring all our resourses home (troops, money, businesses that have moved over seas, so on and so forth) we will continue a steady decline. Quoting: Anonymous Coward 291627What the hell does that have to do with an ENEMY hack-job into a pentagon computer? |
Thoth
User ID: 285913 United States 09/04/2007 09:52 AM Report Abusive Post Report Copyright Violation | |
Webbot
User ID: 3638 United States 09/04/2007 09:58 AM Report Abusive Post Report Copyright Violation | They have a whole branch of their military dedicated to Computer Warfare. Quoting: Thothyes, and they do not know shit about security. we see them posting on some of the bleeding snort forums and all they care about is their endless certifications. They are very ignorant when it comes to actual practical network security beyond what cisco or symantec tells them. cisco and symantec also are clueless and ignorant about network security. Liberalism is a mental disorder. |
Emperor Kenton User ID: 239608 United States 09/04/2007 10:03 AM Report Abusive Post Report Copyright Violation | |
Elijah
User ID: 226084 United States 09/04/2007 10:10 AM Report Abusive Post Report Copyright Violation | I'm usually suspicious of claims someone hacked into a system like this. The hackee wouldn;t want to admit it, but keep the method a secret and provide disinformation int he future, while the hacker of course wants to keep the fact a secret to get more info in thje future. Back in the old days we had systems in place to drop a hacker into a routine that kept them busy and online while they were really just in an embedded program. Maybe they got something, maybe they didn't, but a story like this can be used to add validity to what is really useless data. |
Anonymous Coward User ID: 293191 United States 09/04/2007 10:10 AM Report Abusive Post Report Copyright Violation | The U.S. is going to hell in a hand basket. Facee the facts...the world does not like us. Untill we stop all trade and bring all our resourses home (troops, money, businesses that have moved over seas, so on and so forth) we will continue a steady decline. Quoting: Grizzled Old GoatWhat the hell does that have to do with an ENEMY hack-job into a pentagon computer? GOG -- did that guy just get released from a mental hospital? What the Hell is he saying? |
Anonymous Coward User ID: 273291 United States 09/04/2007 10:35 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 74029 United States 09/04/2007 10:52 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 223232 United States 09/04/2007 10:55 AM Report Abusive Post Report Copyright Violation | |
Grizzled Old Goat
User ID: 293180 Canada 09/04/2007 11:03 AM Report Abusive Post Report Copyright Violation | The U.S. is going to hell in a hand basket. Facee the facts...the world does not like us. Untill we stop all trade and bring all our resourses home (troops, money, businesses that have moved over seas, so on and so forth) we will continue a steady decline. Quoting: Anonymous Coward 293191What the hell does that have to do with an ENEMY hack-job into a pentagon computer? GOG -- did that guy just get released from a mental hospital? What the Hell is he saying? It's the fastest growing mental illness on the internet today! |
wing-ed
(OP) User ID: 281371 United States 09/04/2007 11:10 AM Report Abusive Post Report Copyright Violation | Praise The Holy Of Holy :: May bee the hackers in the new Die Hard movie are more real that we would like to think !! All of our communications to drones , missiles , command centers ,even banks , could be could be effected with the right key strokes !! Praise The Lamb:: Amen Holy, holy,holy, Lord God Almighty, which was, and is, and is to come.Praise the one who gives you peace beyond all understanding Yes that scripture still sounds good ! |
Anonymous Coward User ID: 5174 United States 09/04/2007 11:26 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 293233 United States 09/04/2007 11:37 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 215600 United States 09/04/2007 11:43 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 215600 United States 09/04/2007 11:45 AM Report Abusive Post Report Copyright Violation | |
Gradient
Get over yourself User ID: 258484 United States 09/04/2007 11:46 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 272038 Finland 09/04/2007 11:49 AM Report Abusive Post Report Copyright Violation | |
wing-ed
(OP) User ID: 281371 United States 09/04/2007 11:50 AM Report Abusive Post Report Copyright Violation | Good post Wing-ed. You have to read between the lines to see how bad this could be. Quoting: GradientPraise The Holy Of Holy :: If this is what they are telling us I cannot imagine what they aren't! Praise the Lamb:: Amen Holy, holy,holy, Lord God Almighty, which was, and is, and is to come.Praise the one who gives you peace beyond all understanding Yes that scripture still sounds good ! |
Anonymous Coward User ID: 258840 United States 09/04/2007 11:59 AM Report Abusive Post Report Copyright Violation | |
Shady User ID: 9898 United States 09/04/2007 12:22 PM Report Abusive Post Report Copyright Violation | Good post Wing-ed. You have to read between the lines to see how bad this could be. Quoting: wing-edPraise The Holy Of Holy :: If this is what they are telling us I cannot imagine what they aren't! Praise the Lamb:: Amen So if this is so bad, I fail to see the relevance of all these Praising the Holy of Holies and the Lamb? |
wing-ed
(OP) User ID: 281371 United States 09/04/2007 12:32 PM Report Abusive Post Report Copyright Violation | Good post Wing-ed. You have to read between the lines to see how bad this could be. Quoting: Shady 9898Praise The Holy Of Holy :: If this is what they are telling us I cannot imagine what they aren't! Praise the Lamb:: Amen So if this is so bad, I fail to see the relevance of all these Praising the Holy of Holies and the Lamb? Praise the Holy of Holy :I do a lot af praising but I write here in doxology=A doxology (from the Greek doxa, glory + logos, word or speaking) is a short hymn of praise to God in various Christian worship services, often added to the end of canticles, psalms, and hymns. The tradition derives from a similar practice in the Jewish synagogue: Praise The Lamb: Amen Rev 4:8 And the four beasts had each of them six wings about him; and they were full of eyes within: and they rest not day and night, saying, Holy, holy, holy, Lord God Almighty, which was, and is, and is to come. I can talk and write like you also ! When You have the Holy Spirit with you you ave a peace that goes beyond all understanding!! Praise The Lamb:: Amen Holy, holy,holy, Lord God Almighty, which was, and is, and is to come.Praise the one who gives you peace beyond all understanding Yes that scripture still sounds good ! |
BlueStraza
User ID: 287727 United States 09/04/2007 12:54 PM Report Abusive Post Report Copyright Violation | ahaha there have been people hacking into the pentagon, FBI, CIA and other Federal branches for years that arent just chinese. its just funn how when the chinese do it, and at this particular time, it is publicized.. man the legnth the governemt will go to make their people hate another's... |
Anonymous Coward User ID: 293276 United States 09/04/2007 01:21 PM Report Abusive Post Report Copyright Violation | ahaha there have been people hacking into the pentagon, FBI, CIA and other Federal branches for years that arent just chinese. its just funn how when the chinese do it, and at this particular time, it is publicized.. man the legnth the governemt will go to make their people hate another's... Quoting: BlueStrazaSo true! This is all smoke and BS. Do you really think the US would connect their computers in such away to let data stream from one point on the globe to the other? And not notice what was taken? The #1 rule of hacking is "If it's online and on the net a hacker can get in "If you can get to the internet, the internet can get to you." |
Anonymous Coward User ID: 285746 United States 09/04/2007 01:37 PM Report Abusive Post Report Copyright Violation | FYI: Israelis Hold Keys to NSA and U.S. Government Computers *PIC* Posted By: ChristopherBollyn Date: Friday, 16 June 2006, 12:39 a.m. CRITICAL U.S. GOVERNMENT AND MILITARY COMPUTER American Free Press The most critical computer and communication networks used by the U.S. government and military are secured by encryption software written by an Israeli "code breaker" tied to an Israeli state-run scientific institution. The National Security Agency (NSA), the U.S. intelligence agency with the mandate to protect government and military computer networks and provide secure communications for all branches of the U.S. government uses security software written by an Israeli code breaker whose home office is located at the Weizmann Institute in Israel. A Bedford, Massachusetts-based company called RSA Security, Inc. issued a press release on March 28, 2006, which revealed that the NSA would be using its security software: "U.S. Department of Defense Agency Selects RSA Security Encryption Software" was the headline of the company's press release which announced that the National Security Agency had selected its encryption software to be used in the agency's "classified communications project." RSA stands for the names of the founders of the company: Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. Adi Shamir, the lead theoretician, is an Israeli citizen and a professor at the Weizmann Institute, a scientific institution tied to the Israeli defense establishment. "My main area of research is cryptography – making and breaking codes," Shamir's webpage at the Weizmann Institute says. "It is motivated by the explosive growth of computer networks and wireless communication. Without cryptographic protection, confidential information can be exposed to eavesdroppers, modified by hackers, or forged by criminals." The NSA/Central Security Service defines itself as America’s cryptologic organization, which "coordinates, directs, and performs highly specialized activities to protect U.S. government information systems and produce foreign signals intelligence information." The fact that the federal intelligence agency responsible for protecting the most critical computer systems and communications networks used by all branches of the U.S. government and military is using Israeli-made encryption software should come as no surprise. The RSA press release is just the icing on the cake; the keys to the most critical computer networks in the United States have long been held in Israeli hands. AFP inquired with the NSA about its use of Israeli-made security software for classified communications projects and asked why such outsourcing was not seen as a national security threat. Why is "America’s cryptologic organization" using Israeli encryption codes? NSA spokesman Ken White said that the agency is "researching" the matter and would respond in the coming week. American Free Press has previously revealed that scores of "security software" companies – spawned and funded by the Mossad, the Israeli military intelligence agency – have proliferated in the United States. The "security" software products of many of these usually short-lived Israeli-run companies have been integrated into the computer products which are provided to the U.S. government by leading suppliers such as Unisys. Unisys integrated Israeli security software, provided by the Israel-based Check Point Software Technologies and Eurekify, into its own software, so that Israeli software, written by Mossad-linked companies, now "secures" the most sensitive computers in the U.S. government and commercial sector. The Mossad-spawned computer security firms typically have a main office based in the U.S. while their research and development is done in Israel. The Mossad start-up firms usually have short lives before they are acquired for exaggerated sums of money by a larger company, enriching their Israeli owners in the process and integrating the Israeli directors and their Mossad-produced software into the parent company. RSA, for example, an older security software company, acquired an Israeli-run security software company, named Cyota, at the end of 2005 for $145 million. In January 2005, Cyota, "the leading provider of online security and anti-fraud solutions for financial institutions" had announced that "security expert" Amit Yoran, had joined the company's board of directors. Prior to becoming a director at Cyota, Yoran, a 34-year old Israeli, had already been the national "Cyber Czar," having served as director of the Department of Homeland Security's National Cyber Security Division. Yoran had been appointed "Cyber Czar" at age 32 by President George W. Bush in September 2003. Before joining DHS, Yoran had been vice president for worldwide managed security services at Symantec. Prior to that, he had been the founder, president and CEO of Riptech, Inc., an information security management and monitoring firm, which Symantec acquired in 2002 for $145 million. Yoran and his brother Naftali Elad Yoran are graduates of the U.S. Military Academy at Westpoint. Elad graduated in 1991 and Amit in 1993. Along with their brother Dov, the Yoran brothers are key players in the security software market. Amit has also held critical positions in the U.S. government overseeing computer security for the very systems that apparently failed on 9/11. Before founding Riptech in 1998, Yoran directed the vulnerability-assessment program within the computer emergency response team at the US Department of Defense. Yoran previously served as an officer in the United States Air Force as the Director of Vulnerability Programs for the Department of Defense's Computer Emergency Response Team and in support of the Assistant Secretary of Defense's Office. In June 2005, Yoran joined the board of directors of Guardium, Inc., another Mossad-spawned "provider of database security solutions" based in Waltham, Massachusetts. Guardium is linked with Ptech, an apparent Mossad "cut out" computer security company linked with the 9/11 attacks. Ptech, a computer software company in Quincy, Mass., was supposedly a small start-up company founded by a Lebanese Muslim and funded by a Saudi millionaire. Yet Ptech's clients included all the key federal governmental agencies, including the U.S. Army, the U.S. Air Force, the U.S. Naval Air Command, Congress, the Department of Energy, the Federal Aviation Administration, the Internal Revenue Service, NATO, the Federal Bureau of Investigation, the Secret Service and even the White House. The marketing manager at Ptech, Inc. when the company started in the mid-1990s, however, was not a Muslim or an Arab, but an American Jewish lawyer named Michael S. Goff who had suddenly quit his law firm for no apparent reason and joined the Arab-run start-up company. Goff was the company's information systems manager and had single-handedly managed the company's marketing and "all procurement" of software, systems and peripherals. He also trained the employees. Goff was obviously the key person at Ptech. In the wake of 9/11, during the Citizens' Commission hearings in New York, Indira Singh, a consultant who had worked on a Defense Advanced Research Project, pointed to Ptech and MITRE Corp. being involved in computer "interoperability issues" between the FAA and NORAD. At this time Ptech's ties to Arabs was the focus, and Goff was out of the picture. "Ptech was with MITRE Corporation in the basement of the FAA for two years prior to 9/11," Singh said. "Their specific job is to look at interoperability issues the FAA had with NORAD and the Air Force in the case of an emergency. If anyone was in a position to know that the FAA – that there was a window of opportunity or to insert software or to change anything – it would have been Ptech along with MITRE." The Mossad-run Guardium company is linked with Ptech through Goff Communications, the Holliston, Mass.-based public relations firm previously run by Michael S. Goff and his wife Marcia, which represents Guardium. Since being exposed in AFP in 2005, however, Michael's name no longer appears on the company website. Photo: Amit Yoran, the Israeli "Cyber Security Czar" appointed by President George W. Bush in 2003. Yoran has held various positions since the 1990s in which he oversaw computer security for the Dept. of Defense computers. Although he and his brother reportedly grew up in Pound Ridge, New York during the 1970s and 1980s, the heads of the Jewish community told AFP that they had never heard of him. One said that she had conducted a survey of the Jews living in the small village of Pound Ridge in the 1970s and she would have remembered if a wealthy Israeli family named Yoran had been found. Why did the locals in Pound Ridge NOT remember the Yorans? Probably because they were NOT in Pound Ridge - but in Israel. The Pound Ridge address was used to give the appearance that the Yorans were Americans. I spoke with Elad and he has a distinctive Israeli accent - not what you would expect for a guy who grew up in a posh Yankee village. So who are the Yorans? Who are their parents and why did they come to the United States? To raise a couple high-level moles to infiltrate the most sensitive U.S. computer networks? How could they have lived for 20 years in Pound Ridge and NOT be remembered. |