Godlike Productions - Discussion Forum
Users Online Now: 2,059 (Who's On?)Visitors Today: 1,500,300
Pageviews Today: 2,061,914Threads Today: 509Posts Today: 9,073
04:10 PM


Rate this Thread

Absolute BS Crap Reasonable Nice Amazing
 

China hacked into Pentagon computer network successful cyber attack on the US defence

 
wing-ed
Offer Upgrade

User ID: 281371
United States
09/04/2007 05:02 AM
Report Abusive Post
Report Copyright Violation
China hacked into Pentagon computer network successful cyber attack on the US defence
By Demetri Sevastopulo in Washington and Richard McGregor in Beijing

Published: September 3 2007 19:00 | Last updated: September 3 2007 20:53

The Chinese military hacked into a Pentagon computer network in June in the most successful cyber attack on the US defence department, say American ­officials.

The Pentagon acknowledged shutting down part of a computer system serving the office of Robert Gates, defence secretary, but declined to say who it believed was behind the attack.

Current and former officials have told the Financial Times an internal investigation has revealed that the incursion came from the People’s Liberation Army.

One senior US official said the Pentagon had pinpointed the exact origins of the attack. Another person familiar with the event said there was a “very high level of confidence...trending towards total certainty” that the PLA was responsible. The defence ministry in Beijing declined to comment on Monday.

Angela Merkel, Germany’s chancellor, raised reports of Chinese infiltration of German government computers with Wen Jiabao, China’s premier, in a visit to Beijing, after which the Chinese foreign ministry said the government opposed and forbade “any criminal acts undermining computer systems, including hacking”.

“We have explicit laws and regulations in this regard,” said Jiang Yu, from the ministry. “Hacking is a global issue and China is frequently a victim.”

George W. Bush, US president, is due to meet Hu Jintao, China’s president, on Thursday in Australia prior to the Apec summit.

The PLA regularly probes US military networks – and the Pentagon is widely assumed to scan Chinese networks – but US officials said the penetration in June raised concerns to a new level because of fears that China had shown it could disrupt systems at critical times.

“The PLA has demonstrated the ability to conduct attacks that disable our system...and the ability in a conflict situation to re-enter and disrupt on a very large scale,” said a former official, who said the PLA had penetrated the networks of US defence companies and think-tanks.

Hackers from numerous locations in China spent several months probing the Pentagon system before overcoming its defences, according to people familiar with the matter.

The Pentagon took down the network for more than a week while the attacks continued, and is to conduct a comprehensive diagnosis. “These are multiple wake-up calls stirring us to levels of more aggressive vigilance,” said Richard Lawless, the Pentagon’s top Asia official at the time of the attacks.

The Pentagon is still investigating how much data was downloaded, but one person with knowledge of the attack said most of the information was probably “unclassified”. He said the event had forced officials to reconsider the kind of information they send over unsecured e-mail systems.

John Hamre, a Clinton-era deputy defence secretary involved with cyber security, said that while he had no knowledge of the June attack, criminal groups sometimes masked cyber attacks to make it appear they came from government computers in a particular country.

The National Security Council said the White House had created a team of experts to consider whether the administration needed to restrict the use of BlackBerries because of concerns about cyber espionage [link to www.defencetalk.com]
Holy, holy,holy, Lord God Almighty, which was, and is, and is to come.Praise the one who gives you peace beyond all understanding Yes that scripture still sounds good !
wing-ed  (OP)

User ID: 281371
United States
09/04/2007 05:50 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Praise The Holy Of Holy :: This is something that a first strike would use to shut down our response !! Praise The Lamb:: Amen
Holy, holy,holy, Lord God Almighty, which was, and is, and is to come.Praise the one who gives you peace beyond all understanding Yes that scripture still sounds good !
wing-ed  (OP)

User ID: 281371
United States
09/04/2007 06:31 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Praise The Holy Of Holy :: If they really got in deep do you think the pentagon would admit it ! The story says's they really don't know how much or what was down loaded!!
Holy, holy,holy, Lord God Almighty, which was, and is, and is to come.Praise the one who gives you peace beyond all understanding Yes that scripture still sounds good !
Webbot

User ID: 190126
United States
09/04/2007 08:38 AM

Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
they need autoshun
Liberalism is a mental disorder.
Anonymous Coward
User ID: 241991
United Kingdom
09/04/2007 08:44 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Looks like the Imperial War Machine isn't quite as invincible as they make it out to be.
Anonymous Coward
User ID: 71498
United States
09/04/2007 09:13 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Hell...put out word in the US that hacking into the PLA's network successfully wins a playstation 3! It'll be cracked in an hr......
Anonymous Coward
User ID: 291627
United States
09/04/2007 09:43 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
The U.S. is going to hell in a hand basket. Facee the facts...the world does not like us. Untill we stop all trade and bring all our resourses home (troops, money, businesses that have moved over seas, so on and so forth) we will continue a steady decline.
Grizzled Old Goat

User ID: 293180
Canada
09/04/2007 09:49 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
The U.S. is going to hell in a hand basket. Facee the facts...the world does not like us. Untill we stop all trade and bring all our resourses home (troops, money, businesses that have moved over seas, so on and so forth) we will continue a steady decline.
 Quoting: Anonymous Coward 291627

What the hell does that have to do with an ENEMY hack-job into a pentagon computer?
Thoth

User ID: 285913
United States
09/04/2007 09:52 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
They have a whole branch of their military dedicated to Computer Warfare.
All is fair in love & war.
Webbot

User ID: 3638
United States
09/04/2007 09:58 AM

Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
They have a whole branch of their military dedicated to Computer Warfare.
 Quoting: Thoth



yes, and they do not know shit about security. we see them posting on some of the bleeding snort forums and all they care about is their endless certifications. They are very ignorant when it comes to actual practical network security beyond what cisco or symantec tells them. cisco and symantec also are clueless and ignorant about network security.
Liberalism is a mental disorder.
Emperor Kenton
User ID: 239608
United States
09/04/2007 10:03 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
For quite awhile everyone seems to be hacking into everyone else. To make it more chaotic it could be that the best Geeks around are not necessarily employed by governments. Any code written can likely be breached, in fact anything made can be made [or un-made] by somebody else. So what do we do? Go deeper into the Orwellian slew? Or simply wake up to the fact that there are really no secrets, maybe no actual exclusive properties... and find a way to... relax. Idealistic? Utopian dreaming? Or hard-ass fact. We now have information terminals and computers way more powerful than the systems that launched our Saturn rockets to the moon. Uh-oh, what a deal!
Elijah

User ID: 226084
United States
09/04/2007 10:10 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
I'm usually suspicious of claims someone hacked into a system like this. The hackee wouldn;t want to admit it, but keep the method a secret and provide disinformation int he future, while the hacker of course wants to keep the fact a secret to get more info in thje future.

Back in the old days we had systems in place to drop a hacker into a routine that kept them busy and online while they were really just in an embedded program.

Maybe they got something, maybe they didn't, but a story like this can be used to add validity to what is really useless data.
Anonymous Coward
User ID: 293191
United States
09/04/2007 10:10 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
The U.S. is going to hell in a hand basket. Facee the facts...the world does not like us. Untill we stop all trade and bring all our resourses home (troops, money, businesses that have moved over seas, so on and so forth) we will continue a steady decline.

What the hell does that have to do with an ENEMY hack-job into a pentagon computer?
 Quoting: Grizzled Old Goat

GOG -- did that guy just get released from a mental hospital?
What the Hell is he saying?
Anonymous Coward
User ID: 273291
United States
09/04/2007 10:35 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
who can't break into pentacunt? From McKinnon to chinese or virtual flight 77...
Anonymous Coward
User ID: 74029
United States
09/04/2007 10:52 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Hell...put out word in the US that hacking into the PLA's network successfully wins a playstation 3! It'll be cracked in an hr......
 Quoting: Anonymous Coward 71498

laugh
Anonymous Coward
User ID: 223232
United States
09/04/2007 10:55 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
all they need is port monster
Grizzled Old Goat

User ID: 293180
Canada
09/04/2007 11:03 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
The U.S. is going to hell in a hand basket. Facee the facts...the world does not like us. Untill we stop all trade and bring all our resourses home (troops, money, businesses that have moved over seas, so on and so forth) we will continue a steady decline.

What the hell does that have to do with an ENEMY hack-job into a pentagon computer?

GOG -- did that guy just get released from a mental hospital?
What the Hell is he saying?
 Quoting: Anonymous Coward 293191

It's the fastest growing mental illness on the internet today!
wing-ed  (OP)

User ID: 281371
United States
09/04/2007 11:10 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Praise The Holy Of Holy :: May bee the hackers in the new Die Hard movie are more real that we would like to think !! All of our communications to drones , missiles , command centers ,even banks , could be could be effected with the right key strokes !! Praise The Lamb:: Amen
Holy, holy,holy, Lord God Almighty, which was, and is, and is to come.Praise the one who gives you peace beyond all understanding Yes that scripture still sounds good !
Anonymous Coward
User ID: 5174
United States
09/04/2007 11:26 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
[link to www.china-israel.co.il]

[link to www.israel21c.org]

don't make me do the math for you.
Anonymous Coward
User ID: 293233
United States
09/04/2007 11:37 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Like we've never hacked into their systems. Please people.
Anonymous Coward
User ID: 215600
United States
09/04/2007 11:43 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Like we've never hacked into their systems. Please people.
 Quoting: Anonymous Coward 293233


thats not the point...
Anonymous Coward
User ID: 215600
United States
09/04/2007 11:45 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
"He said the event had forced officials to reconsider the kind of information they send over unsecured e-mail systems."

Now thats a scary statement.
Gradient
Get over yourself

User ID: 258484
United States
09/04/2007 11:46 AM

Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Good post Wing-ed. You have to read between the lines to see how bad this could be.
coexistt


glptrainer(at)yahoo.com
Anonymous Coward
User ID: 272038
Finland
09/04/2007 11:49 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
pentagon uses windows 95
wing-ed  (OP)

User ID: 281371
United States
09/04/2007 11:50 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Good post Wing-ed. You have to read between the lines to see how bad this could be.
 Quoting: Gradient

Praise The Holy Of Holy :: If this is what they are telling us I cannot imagine what they aren't! Praise the Lamb:: Amen
Holy, holy,holy, Lord God Almighty, which was, and is, and is to come.Praise the one who gives you peace beyond all understanding Yes that scripture still sounds good !
Anonymous Coward
User ID: 258840
United States
09/04/2007 11:59 AM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
the pentagon probably detected the chinese attempts and then let them into an unimportant system in the hope of misdirecting the chinese efforts by giving them the false belief that they had already succeeded
Shady
User ID: 9898
United States
09/04/2007 12:22 PM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Good post Wing-ed. You have to read between the lines to see how bad this could be.

Praise The Holy Of Holy :: If this is what they are telling us I cannot imagine what they aren't! Praise the Lamb:: Amen
 Quoting: wing-ed


So if this is so bad, I fail to see the relevance of all these Praising the Holy of Holies and the Lamb?

rant
wing-ed  (OP)

User ID: 281371
United States
09/04/2007 12:32 PM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
Good post Wing-ed. You have to read between the lines to see how bad this could be.

Praise The Holy Of Holy :: If this is what they are telling us I cannot imagine what they aren't! Praise the Lamb:: Amen


So if this is so bad, I fail to see the relevance of all these Praising the Holy of Holies and the Lamb?

rant
 Quoting: Shady 9898

Praise the Holy of Holy :I do a lot af praising but I write here in doxology=A doxology (from the Greek doxa, glory + logos, word or speaking) is a short hymn of praise to God in various Christian worship services, often added to the end of canticles, psalms, and hymns. The tradition derives from a similar practice in the Jewish synagogue: Praise The Lamb: Amen Rev 4:8 And the four beasts had each of them six wings about him; and they were full of eyes within: and they rest not day and night, saying, Holy, holy, holy, Lord God Almighty, which was, and is, and is to come. I can talk and write like you also ! When You have the Holy Spirit with you you ave a peace that goes beyond all understanding!! Praise The Lamb:: Amen
Holy, holy,holy, Lord God Almighty, which was, and is, and is to come.Praise the one who gives you peace beyond all understanding Yes that scripture still sounds good !
BlueStraza

User ID: 287727
United States
09/04/2007 12:54 PM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
ahaha there have been people hacking into the pentagon, FBI, CIA and other Federal branches for years that arent just chinese. its just funn how when the chinese do it, and at this particular time, it is publicized.. man the legnth the governemt will go to make their people hate another's...
Anonymous Coward
User ID: 293276
United States
09/04/2007 01:21 PM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
ahaha there have been people hacking into the pentagon, FBI, CIA and other Federal branches for years that arent just chinese. its just funn how when the chinese do it, and at this particular time, it is publicized.. man the legnth the governemt will go to make their people hate another's...
 Quoting: BlueStraza


So true!

This is all smoke and BS. Do you really think the US would connect their computers in such away to let data stream from one point on the globe to the other? And not notice what was taken? The #1 rule of hacking is "If it's online and on the net a hacker can get in "If you can get to the internet, the internet can get to you."
Anonymous Coward
User ID: 285746
United States
09/04/2007 01:37 PM
Report Abusive Post
Report Copyright Violation
Re: China hacked into Pentagon computer network successful cyber attack on the US defence
FYI:

Israelis Hold Keys to NSA and U.S. Government Computers *PIC*

Posted By: ChristopherBollyn
Date: Friday, 16 June 2006, 12:39 a.m.

CRITICAL U.S. GOVERNMENT AND MILITARY COMPUTER
American Free Press

The most critical computer and communication networks used by the U.S. government and military are secured by encryption software written by an Israeli "code breaker" tied to an Israeli state-run scientific institution.

The National Security Agency (NSA), the U.S. intelligence agency with the mandate to protect government and military computer networks and provide secure communications for all branches of the U.S. government uses security software written by an Israeli code breaker whose home office is located at the Weizmann Institute in Israel.

A Bedford, Massachusetts-based company called RSA Security, Inc. issued a press release on March 28, 2006, which revealed that the NSA would be using its security software:

"U.S. Department of Defense Agency Selects RSA Security Encryption Software" was the headline of the company's press release which announced that the National Security Agency had selected its encryption software to be used in the agency's "classified communications project."

RSA stands for the names of the founders of the company: Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. Adi Shamir, the lead theoretician, is an Israeli citizen and a professor at the Weizmann Institute, a scientific institution tied to the Israeli defense establishment.

"My main area of research is cryptography – making and breaking codes," Shamir's webpage at the Weizmann Institute says. "It is motivated by the explosive growth of computer networks and wireless communication. Without cryptographic protection, confidential information can be exposed to eavesdroppers, modified by hackers, or forged by criminals."

The NSA/Central Security Service defines itself as America’s cryptologic organization, which "coordinates, directs, and performs highly specialized activities to protect U.S. government information systems and produce foreign signals intelligence information."

The fact that the federal intelligence agency responsible for protecting the most critical computer systems and communications networks used by all branches of the U.S. government and military is using Israeli-made encryption software should come as no surprise. The RSA press release is just the icing on the cake; the keys to the most critical computer networks in the United States have long been held in Israeli hands.

AFP inquired with the NSA about its use of Israeli-made security software for classified communications projects and asked why such outsourcing was not seen as a national security threat. Why is "America’s cryptologic organization" using Israeli encryption codes?

NSA spokesman Ken White said that the agency is "researching" the matter and would respond in the coming week.

American Free Press has previously revealed that scores of "security software" companies – spawned and funded by the Mossad, the Israeli military intelligence agency – have proliferated in the United States. The "security" software products of many of these usually short-lived Israeli-run companies have been integrated into the computer products which are provided to the U.S. government by leading suppliers such as Unisys.

Unisys integrated Israeli security software, provided by the Israel-based Check Point Software Technologies and Eurekify, into its own software, so that Israeli software, written by Mossad-linked companies, now "secures" the most sensitive computers in the U.S. government and commercial sector.

The Mossad-spawned computer security firms typically have a main office based in the U.S. while their research and development is done in Israel. The Mossad start-up firms usually have short lives before they are acquired for exaggerated sums of money by a larger company, enriching their Israeli owners in the process and integrating the Israeli directors and their Mossad-produced software into the parent company.

RSA, for example, an older security software company, acquired an Israeli-run security software company, named Cyota, at the end of 2005 for $145 million.

In January 2005, Cyota, "the leading provider of online security and anti-fraud solutions for financial institutions" had announced that "security expert" Amit Yoran, had joined the company's board of directors. Prior to becoming a director at Cyota, Yoran, a 34-year old Israeli, had already been the national "Cyber Czar," having served as director of the Department of Homeland Security's National Cyber Security Division.

Yoran had been appointed "Cyber Czar" at age 32 by President George W. Bush in September 2003.

Before joining DHS, Yoran had been vice president for worldwide managed security services at Symantec. Prior to that, he had been the founder, president and CEO of Riptech, Inc., an information security management and monitoring firm, which Symantec acquired in 2002 for $145 million.

Yoran and his brother Naftali Elad Yoran are graduates of the U.S. Military Academy at Westpoint. Elad graduated in 1991 and Amit in 1993. Along with their brother Dov, the Yoran brothers are key players in the security software market. Amit has also held critical positions in the U.S. government overseeing computer security for the very systems that apparently failed on 9/11.

Before founding Riptech in 1998, Yoran directed the vulnerability-assessment program within the computer emergency response team at the US Department of Defense. Yoran previously served as an officer in the United States Air Force as the Director of Vulnerability Programs for the Department of Defense's Computer Emergency Response Team and in support of the Assistant Secretary of Defense's Office.

In June 2005, Yoran joined the board of directors of Guardium, Inc., another Mossad-spawned "provider of database security solutions" based in Waltham, Massachusetts.

Guardium is linked with Ptech, an apparent Mossad "cut out" computer security company linked with the 9/11 attacks.

Ptech, a computer software company in Quincy, Mass., was supposedly a small start-up company founded by a Lebanese Muslim and funded by a Saudi millionaire. Yet Ptech's clients included all the key federal governmental agencies, including the U.S. Army, the U.S. Air Force, the U.S. Naval Air Command, Congress, the Department of Energy, the Federal Aviation Administration, the Internal Revenue Service, NATO, the Federal Bureau of Investigation, the Secret Service and even the White House.

The marketing manager at Ptech, Inc. when the company started in the mid-1990s, however, was not a Muslim or an Arab, but an American Jewish lawyer named Michael S. Goff who had suddenly quit his law firm for no apparent reason and joined the Arab-run start-up company.

Goff was the company's information systems manager and had single-handedly managed the company's marketing and "all procurement" of software, systems and peripherals. He also trained the employees. Goff was obviously the key person at Ptech.

In the wake of 9/11, during the Citizens' Commission hearings in New York, Indira Singh, a consultant who had worked on a Defense Advanced Research Project, pointed to Ptech and MITRE Corp. being involved in computer "interoperability issues" between the FAA and NORAD. At this time Ptech's ties to Arabs was the focus, and Goff was out of the picture.

"Ptech was with MITRE Corporation in the basement of the FAA for two years prior to 9/11," Singh said. "Their specific job is to look at interoperability issues the FAA had with NORAD and the Air Force in the case of an emergency. If anyone was in a position to know that the FAA – that there was a window of opportunity or to insert software or to change anything – it would have been Ptech along with MITRE."

The Mossad-run Guardium company is linked with Ptech through Goff Communications, the Holliston, Mass.-based public relations firm previously run by Michael S. Goff and his wife Marcia, which represents Guardium. Since being exposed in AFP in 2005, however, Michael's name no longer appears on the company website.

Photo: Amit Yoran, the Israeli "Cyber Security Czar" appointed by President George W. Bush in 2003. Yoran has held various positions since the 1990s in which he oversaw computer security for the Dept. of Defense computers.

Although he and his brother reportedly grew up in Pound Ridge, New York during the 1970s and 1980s, the heads of the Jewish community told AFP that they had never heard of him. One said that she had conducted a survey of the Jews living in the small village of Pound Ridge in the 1970s and she would have remembered if a wealthy Israeli family named Yoran had been found.

Why did the locals in Pound Ridge NOT remember the Yorans?

Probably because they were NOT in Pound Ridge - but in Israel. The Pound Ridge address was used to give the appearance that the Yorans were Americans. I spoke with Elad and he has a distinctive Israeli accent - not what you would expect for a guy who grew up in a posh Yankee village.

So who are the Yorans? Who are their parents and why did they come to the United States? To raise a couple high-level moles to infiltrate the most sensitive U.S. computer networks? How could they have lived for 20 years in Pound Ridge and NOT be remembered.





GLP