Science Fiction Dictionary
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z

 

DoD Computers Penetrated In Cyber-Attack

A cyber-attack on Defense Department computers this past week was so severe and widespread that military leaders decided to brief President Bush. The attack was aimed at networks in the U.S. Central Command; this is the group that oversees U.S. involvement in Iraq and Afghanistan.

According to the DoD, the attack was successful in penetrating at least one highly protected classified network.

Military computers are regularly beset by outside hackers, computer viruses and worms. But defense officials said the most recent attack involved an intrusive piece of malicious software, or "malware," apparently designed specifically to target military networks.

"This one was significant; this one got our attention," said one defense official, speaking on condition of anonymity when discussing internal assessments.

One possible source for the cyber-attack is software called 'agent.btz' which has been seen else where in the U.S. But last week, the Pentagon banned flash drives, which can spread the virus.


(Integrated Network Operations and Security Center)

The identity of the hacker(s) is not known; it may never be possible to identify the source of the attacks.

For many of us, the first introduction to the idea of a cyber-attack was in the 1984 novel Neuromancer, by William Gibson. In the novel, hackers use specialized software to penetrate closed networks to steal information. Gibson helps the reader visualize the process using the idea of cyberspace - "A graphic representation of data abstracted from banks of every computer in the human system....":

"Data transfer from Bockris Systems GmbH, Frankfurt, advises, under coded transmission, that content of shipment is Kuang Grade Mark Eleven penetration program. Bockris further advises that interface with Ono-Sendai Cyberspace 7 is entirely compatible and yields optimal penetration capabilities, particularly with regard to existing military systems..."

He slotted the Chinese virus, paused, then drove it home.

The Chinese virus was unfolding around them. Polychrome shadow, countless translucent layers shifting and recombining. Protean, enormous, it towered above them, blotting out the void. (Read more about Kuang Grade Mark Eleven Penetration Program and ICE (intrusion countermeasures electronics))

Some experts are concerned that these might be state-sponsored attacks; see the related story Cyber-Warfare Waged on Estonia By Russia?. From Cyber-attack on Defense Department computers raises concerns; thanks to an anonymous reader who submitted the tip on this story.

Scroll down for more stories in the same category. (Story submitted 11/28/2008)

Follow this kind of news @Technovelgy.

| Email | RSS | Blog It | Stumble | del.icio.us | Digg | Reddit |

Would you like to contribute a story tip? It's easy:
Get the URL of the story, and the related sf author, and add it here.

Comment/Join discussion ( 0 )

Related News Stories - (" Computer ")

Automatic Bot Traffic Is 38 Percent Of HTTP Requests
'there were so many worms and counterworms loose in the data-net...' - John Brunner, 1975

Neuroplatform Human Brain Organoid Bioprocessor Uses Less Electricity
'Cultured brains on a slab.'- Peter Watts, 1999

AI Worms That Spread
'...there were so many worms and counterworms loose in the data-net now' - John Brunner, 1975.

Great. Now AIs Have Access To Hacking Tools
'... when you and the Flatline punch through that ice and scramble the cores.' - William Gibson, 1984.

 

Google
  Web TechNovelgy.com   

Technovelgy (that's tech-novel-gee!) is devoted to the creative science inventions and ideas of sf authors. Look for the Invention Category that interests you, the Glossary, the Invention Timeline, or see what's New.

 

 

 

 

Science Fiction Timeline
1600-1899
1900-1939
1940's   1950's
1960's   1970's
1980's   1990's
2000's   2010's

Current News

Mechazilla Arms Catch A Falling Starship, But Check Out SF Landing-ARMS
'...the rocket’s landing-arms automatically unfolded.'

A System To Defeat AI Face Recognition
'...points and patches of light... sliding all over their faces in a programmed manner that had been designed to foil facial recognition systems.'

Robot Hand Separate From Robot
'The crawling, exploring object was V-Stephen's surgeon-hand...'

Hybrid Wind Solar Devices
'...the combined Wind-Suncatcher, like a spray of tulips mounted fanwise.'

Is Optimus Autonomous Or Teleoperated?
'I went to the control room where the three other men were manipulating their mechanical men.'

Robot Masseuse Rubs People The Right Way
'The automatic massager began to fumble gently...'

Solar-Powered Space Trains On The Moon
'The low-slung monorail car, straddling its single track, bored through the shadows on a slowly rising course.'

Drone Deliveries Instead Of Waiters In Restaurants?
'It was a smooth ovoid floating a few inches from the floor...'

Optimus Robot Can Charge Itself
'... he thrust in his charging arm to replenish his store of energy.'

Skip Movewear Arc'teryx AI Pants
'...the terrible Jovian gravity that made each movement an effort.'

'Robovan' Name Already Taken - Elon, Try These
There are alternative names that are probably in the public domain by now.

How Old Are Tesla Designs?
You be the judge.

Is Your Autonomous Tractor Safe?
'The field-minder finished turning the top-soil of a two-thousand-acre field.'

Smart TVs Are Listening!
'You had to live -- did live, from habit that became instinct -- in the assumption that every sound you made was overheard...'

Police Drones In China Would Like To Have A Word With You
''OVERRIDE,' the City Fathers said suddenly, without being asked anything at all.'

Oh Great (Part 2), Fence-Climbing Robots
Please, no stingers.

More SF in the News Stories

More Beyond Technovelgy science news stories

Home | Glossary | Invention Timeline | Category | New | Contact Us | FAQ | Advertise |
Technovelgy.com - where science meets fiction™

Copyright© Technovelgy LLC; all rights reserved.