DoD Computers Penetrated In Cyber-Attack
A cyber-attack on Defense Department computers this past week was so severe and widespread that military leaders decided to brief President Bush. The attack was aimed at networks in the U.S. Central Command; this is the group that oversees U.S. involvement in Iraq and Afghanistan.
According to the DoD, the attack was successful in penetrating at least one highly protected classified network.
Military computers are regularly beset by outside hackers, computer viruses and worms. But defense officials said the most recent attack involved an intrusive piece of malicious software, or "malware," apparently designed specifically to target military networks.
"This one was significant; this one got our attention," said one defense official, speaking on condition of anonymity when discussing internal assessments.
One possible source for the cyber-attack is software called 'agent.btz' which has been seen else where in the U.S. But last week, the Pentagon banned flash drives, which can spread the virus.
(Integrated Network Operations and Security Center)
The identity of the hacker(s) is not known; it may never be possible to identify the source of the attacks.
For many of us, the first introduction to the idea of a cyber-attack was in the 1984 novel Neuromancer, by William Gibson. In the novel, hackers use specialized software to penetrate closed networks to steal information. Gibson helps the reader visualize the process using the idea of cyberspace - "A graphic representation of data abstracted from banks of every computer in the human system....":
"Data transfer from Bockris Systems GmbH, Frankfurt, advises, under coded transmission, that content of shipment is Kuang Grade Mark Eleven penetration program. Bockris further advises that interface with Ono-Sendai Cyberspace 7 is entirely compatible and yields optimal penetration capabilities, particularly with regard to existing military systems..."
He slotted the Chinese virus, paused, then drove it home.
The Chinese virus was unfolding around them. Polychrome shadow, countless translucent layers shifting and recombining. Protean, enormous, it towered above them, blotting out the void.
(Read more about Kuang Grade Mark Eleven Penetration Program and ICE (intrusion countermeasures electronics))
Some experts are concerned that these might be state-sponsored attacks; see the related story Cyber-Warfare Waged on Estonia By Russia?. From Cyber-attack on Defense Department computers raises concerns; thanks to an anonymous reader who submitted the tip on this story.
Scroll down for more stories in the same category. (Story submitted 11/28/2008)
Follow this kind of news @Technovelgy.
| Email | RSS | Blog It | Stumble | del.icio.us | Digg | Reddit |
you like to contribute a story tip?
Get the URL of the story, and the related sf author, and add
Comment/Join discussion ( 0 )
Related News Stories -
AIREAL Lets You Feel Virtual Objects In The Open Air
'Startled, he touched his mouth. 'How the devil did you do that?' he shouted.'- Frederick Pohl, 1965.
Millimeter-Scale Computing For 'Internet of Things'
'In their megalomania they thought to make the very sand beneath their feet intelligent...'- Stanislaw Lem, 1965.
Fujitsu Touchscreen Mixes Real And Virtual Worlds
'His hands flashed over the keyboard - it had not been there a moment before, but it was operative...'- Frederik Pohl, 1965.
Nanowire Memristor Networks Form 'Brains'
'He had constructed ... a brain, of metal... whose atomic structure he claimed was analogous to the atomic structure of a living brain.'- Edmond Hamilton, 1926.
Technovelgy (that's tech-novel-gee!)
is devoted to the creative science inventions and ideas of sf authors. Look for
the Invention Category that interests
you, the Glossary, the Invention
Timeline, or see what's New.
Haute Cuisine On International Space Station
'The gas gave sufficient heat for the culinary apparatus...'
Tongue Mouse Created By Valve Engineer
'He pressed hard with his tongue against his right upper first molar.'
K5 Autonomous Data Machine The Future Of Mall Security
''Halt!' A robot guard appeared...'
RF Safe-Stop Shuts Cars Off
'...a police control-override.'
Army's New Bird-Like Surveillance UAV
'The prototype blue-bellied, gray-backed tracer-bird with the wide-angle eye...'
Honda's Tumblebug - The UNI-CUB beta
'A tumblebug does not give a man dignity...'
NASA's LADEE Enters Lunar Orbit
'... dust normally on the surface picks up and keeps a charge.'
3D Printing An Entire Car
"... Almost as good as the original it was printed from."
Aldebaran Robot Talks Like C3PO - Almost
'See Vee Threepio - Vee for versatility - at your service...'
Google's Skin Tattoo Lie Detector
'Three and a half centimetres in diameter, permanently fixed in the centre of his forehead.'
inFORM Dynamic Shape Output Device
Like that pushpin device you remember, but supercharged.
Owlet Vitals, The Future Of Baby Monitoring
'In every diaper there is a fine copper wire...'
Robert Heinlein, Your Personal Electric Helicopter Will Be Ready In 2016
"They were half way home when a single flyer, hopping free in a copter harness, approached the little parade."
WildCat Runs Faster Than You, Untethered
'...moving with such drifting ease that it was like a single solid cloud of black-grey smoke blown at him in silence.' Almost.
HiBot's ACM-R5H Robot Video Shows Graceful Terminator-Style Swimming
'No! No! Aaaaaaarrrrrrgh!'
tDCS Jumpstarts Your Future
'We invented a scanner that can change the labyrinthine neural connections of the brain by tiny electronic impulses...'.
More SF in the News Stories
More Beyond Technovelgy science news stories