. Military Space News .




.
CYBER WARS
24,000 files stolen from defense contractor: Pentagon
by Staff Writers
Washington (AFP) July 14, 2011

A foreign intelligence service swiped 24,000 computer files from a US defense contractor in March in one of the largest ever cyberattacks on a Pentagon supplier, a top Defense Department official revealed on Thursday.

"It is a significant concern that over the past decade, terabytes of data have been extracted by foreign intruders from corporate networks of defense companies," Deputy Defense Secretary William Lynn said.

"In a single intrusion this March, 24,000 files were taken," Lynn said in a speech at National Defense University here outlining the Pentagon's strategy in cyberspace.

Speaking to reporters after his speech, Lynn described the theft of data from the unidentified defense contractor as "significant" and one of the largest ever.

"It was large -- 24,000 files," he said. "It was data-related to systems that are being developed for the Department of Defense.

"It was done, we think, by a foreign intelligence service," he said. "In other words a nation state was behind it."

China has been blamed for a number of probes of US corporate and military computer systems over the past few years but Lynn declined to point the finger at any specific suspects in the March intrusion.

"We don't get into our understanding of exactly who it was," he said.

Lynn said the data theft had "compromised information relative to the design of military equipment" but had not "set us back in terms of the development of the system."

In his speech, Lynn said some of the data stolen by intruders is "mundane, like the specifications for small parts of tanks, airplanes, and submarines.

"But a great deal of it concerns our most sensitive systems, including aircraft avionics, surveillance technologies, satellite communications systems, and network security protocols," he said.

"The cyber exploitation being perpetrated against the defense industry cuts across a wide swath of crucial military hardware, extending from missile tracking systems and satellite navigation devices to UAVs (unmanned aerial vehicles, or drones) and the Joint Strike Fighter," he said.

Lynn also said he did not believe the March intrusion involved the use of SecurID tokens that were stolen from US computer security titan RSA Security in a sophisticated hacking attack in March.

RSA's parent company, EMC Corp. has acknowledged that intruders breached its security systems at defense contractor Lockheed Martin in May using data swiped from RSA.

Outlining the Defense Department's strategy in cyberspace, Lynn said the Pentagon considers cyberspace an operational domain, like land, air, sea and space.

"Treating cyberspace as a domain means that the military needs to operate and defend its networks, and to organize, train and equip its forces to perform cyber missions," he said.

"In the 21st Century, bits and bytes can be as threatening as bullets and bombs," he said. "Keystrokes originating in one country can impact the other side of the globe in the blink of an eye."

Lynn said information technology has become so important to US military operations that it "virtually guarantees that future adversaries will target our dependence on it.

"Our assessment is that cyber attacks will be a significant component of any future conflict, whether it involves major nations, rogue states, or terrorist groups," he said.

Lynn said US military power served as a deterrent against cyberattack from a nation state but "if a terrorist group gains disruptive or destructive cyber tools, we have to assume they will strike with little hesitation."

The thrust of the Defense Department's cyber strategy is defensive, he said, and "it should come as no surprise that the United States is prepared to defend itself.

"Just as our military organizes to defend against hostile acts from land, air and sea, we must also be prepared to respond to hostile acts in cyberspace," he said.

"Accordingly, the United States reserves the right, under the laws of armed conflict, to respond to serious cyber attacks with a proportional and justified military response at the time and place of our choosing," he said.

Lynn, who was accompanied by Marine General James Cartwright, vice chairman of the Joint Chiefs of Staff, declined to elaborate on US offensive cyber capabilities or what would constitute an act of war in cyberspace.

"It's a judgment," Cartwright said of an act of war. "It's subjective. It's in the eye of the beholder."




Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries


Pentagon releases strategy for cyberspace
Washington (AFP) July 14, 2011 - The Pentagon unveiled its strategy Thursday for defending critical networks and responding to growing threats in cyberspace.

"In the 21st Century, bits and bytes can be as threatening as bullets and bombs," Deputy Defense Secretary William Lynn said in a speech accompanying the release of the cyberspace strategy document.

"Keystrokes originating in one country can impact the other side of the globe in the blink of an eye."

The "Department of Defense Strategy for Operating in Cyberspace" calls for the Pentagon to treat cyberspace as an operational domain, like land, air, sea and space.

"Treating cyberspace as a domain means that the military needs to operate and defend its networks, and to organize, train and equip is forces to perform cyber missions," Lynn said at the National Defense University here.

He said the thrust of the strategy was defensive and "it should come as no surprise that the United States is prepared to defend itself."

"Just as our military organizes to defend against hostile acts from land, air and sea, we must also be prepared to respond to hostile acts in cyberspace," Lynn said.

"Accordingly, the United States reserves the right, under the laws of armed conflict, to respond to serious cyber attacks with a proportional and justified military response at the time and place of our choosing," he said.

New Defense Secretary Leon Panetta, in a statement accompanying the release of the strategy document, said it is "critical" that the United States "strengthen our cyber capabilities to address the cyber threats we're facing.

"I view this as an area in which we're going to confront increasing threats in the future and think we have to be better prepared to deal with the growing cyber challenges that will face the nation," Panetta said.

Lynn said information technology has become so important to American military operations that it "virtually guarantees that future adversaries will target our dependence on it.

"Our assessment is that cyber attacks will be a significant component of any future conflict, whether it involves major nations, rogue states, or terrorist groups," he said.

Lynn said US military power served as a deterrent against a cyber attack from a nation state but "if a terrorist group gains disruptive or destructive cyber tools, we have to assume they will strike with little hesitation."





. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
McCain calls for special cybersecurity panel
Washington (AFP) July 13, 2011
Veteran US Senator John McCain on Wednesday urged the creation of a special Senate committee on cybersecurity and electronic intelligence leaks to cut through legislative delays to crafting a US response. McCain requested the move in a letter to Democratic Senate Majority Leader Harry Reid and Republican Senate Minority Leader Mitch McConnell citing a need for "congressional leadership on th ... read more


CYBER WARS
US senators voice worry over radar deal with Turkey

New Missile Warning Satellite Delivers First Infrared Imagery

STSS Demonstration Satellites Demo New Remote Cueing Capabilities During Aegis Test

Israel to join U.S. Mideast missile shield

CYBER WARS
Iran says fired missiles into Indian Ocean

Northrop Grumman-Led ICBM Prime Integration Team Participates in Test Launch of Minuteman III Missile

Taiwan testfires own sub-launched missile: report

Raytheon UK Awarded Four-Year Support Contract for U.K. Paveway

CYBER WARS
Brazil unmanned aircraft hunt drug gangs

Unmanned Global Hawk Completes First Production Acceptance Multi-Intelligence Sensor Flight

Northrop Grumman to Help US Navy Study Options for Developing Fleet of Carrier-Launched Unmanned Systems

X-47B Can Operate From an Aircraft Carrier

CYBER WARS
Celebrating 10 years of Artemis

Raytheon BBN Technologies Awarded $2.4 Million to Advance Satellite Communications

Raytheon Wins Competitive Long Term Evolution Broadband Communications Network Contract

Battlefield Airborne Communications Node System Completes 2,000 Tactical Missions

CYBER WARS
Lockheed Martin Delivers First F-35 Production Jet For Training To Eglin AFB

Thales touts its AEW system

Lockheed Martin Completes AN/AAQ-39 Targeting System Deliveries To The U.S. Air Force

Northrop Grumman Awarded $65 Million Contract to Provide Situational Awareness for U.S. Air Force Airlift Crews

CYBER WARS
Cost of Boeing's US Air Force contract could overrun: report

US efforts to record weapons sales criticized

Turkish armored vehicle exports soar

India approves $2.4 bn French Mirage jet upgrade

CYBER WARS
French politicians attack critic of July 14 military parade

Obama welcomes Dalai Lama, to China's anger

Obama decides to meet Dalai Lama, upsetting China

Hopeful Dalai Lama welcomes young monk to US

CYBER WARS
System Integration of High Energy Laser Technology Demonstrator Completed

Raytheon Acquires Directed Energy Capabilities of Ktech Corporation


Memory Foam Mattress Review
Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News
.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2011 - Space Media Network. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement