DoD Computers Penetrated In Cyber-Attack

A cyber-attack on Defense Department computers this past week was so severe and widespread that military leaders decided to brief President Bush. The attack was aimed at networks in the U.S. Central Command; this is the group that oversees U.S. involvement in Iraq and Afghanistan.

According to the DoD, the attack was successful in penetrating at least one highly protected classified network.

Military computers are regularly beset by outside hackers, computer viruses and worms. But defense officials said the most recent attack involved an intrusive piece of malicious software, or "malware," apparently designed specifically to target military networks.

"This one was significant; this one got our attention," said one defense official, speaking on condition of anonymity when discussing internal assessments.

One possible source for the cyber-attack is software called 'agent.btz' which has been seen else where in the U.S. But last week, the Pentagon banned flash drives, which can spread the virus.


(Integrated Network Operations and Security Center)

The identity of the hacker(s) is not known; it may never be possible to identify the source of the attacks.

For many of us, the first introduction to the idea of a cyber-attack was in the 1984 novel Neuromancer, by William Gibson. In the novel, hackers use specialized software to penetrate closed networks to steal information. Gibson helps the reader visualize the process using the idea of cyberspace - "A graphic representation of data abstracted from banks of every computer in the human system....":

"Data transfer from Bockris Systems GmbH, Frankfurt, advises, under coded transmission, that content of shipment is Kuang Grade Mark Eleven penetration program. Bockris further advises that interface with Ono-Sendai Cyberspace 7 is entirely compatible and yields optimal penetration capabilities, particularly with regard to existing military systems..."

He slotted the Chinese virus, paused, then drove it home.

The Chinese virus was unfolding around them. Polychrome shadow, countless translucent layers shifting and recombining. Protean, enormous, it towered above them, blotting out the void. (Read more about Kuang Grade Mark Eleven Penetration Program and ICE (intrusion countermeasures electronics))

Some experts are concerned that these might be state-sponsored attacks; see the related story Cyber-Warfare Waged on Estonia By Russia?. From Cyber-attack on Defense Department computers raises concerns; thanks to an anonymous reader who submitted the tip on this story.

Scroll down for more stories in the same category. (Story submitted 11/28/2008)

Follow this kind of news @Technovelgy.

| Email | RSS | Blog It | Stumble | del.icio.us | Digg | Reddit |

Would you like to contribute a story tip? It's easy:
Get the URL of the story, and the related sf author, and add it here.

Comment/Join discussion ( 0 )

Related News Stories - (" Computer ")

String Art Courtesy Of Robot Artist
The number of different ways to span a thread between a larger number of hooks is astronomical.

Tetraplegics Dominate Avatar Races
Well, just speaking brain-to-computer...

IBM's Grain Of Sand Computer
'Our ancestors... thought to make the very sand beneath their feet intelligent...' - Stanislaw Lem, 1965.

Can An Entire Brain Be Simulated In A Computer?
'The miles of relays and photocells had given way to the spongy globe of platinum iridium about the size of the human brain.' - Isaac Asimov, 1941.

 

Google
  Web TechNovelgy.com   

Technovelgy (that's tech-novel-gee!) is devoted to the creative science inventions and ideas of sf authors. Look for the Invention Category that interests you, the Glossary, the Invention Timeline, or see what's New.

 

 

 

 

 

Current News

Unfurl The Future! Huawei Mate X versus Galaxy Fold
'A paper thin polycarbon screen unfurled silently from the top of the unit and immediately grew rigid.'

Amazon Echo And Google Home Should Have Morality Software
'The Dwoskin Morality Rating-Computer could 'spot the slightest tendency to deviation' from the social norm...'

China Building Robot Wives
'Want a life-companion, a pleasant one?'

China Social Credit System Like State-Run Whuffie
'At least there was no mandatory Whuffie check on the monorail platform...'

Project Soli Radar Gesture Chip Now FCC Approved
'He waved his hand and the circuit switched abruptly.'

Stan, Robot Valet, Will Drag Your Car Away
'He activated the grapple tracks. '

Jibo Home Robot Says Goodbye, Is Killswitched
'It resembles an oyster....'

Johns Hopkins Says Asteroid Deflection Will Be Difficult
'This obelisk is one huge deflector mechanism...'

Fabric Automatically Cools Or Insulates Based On Environment
'...a high-efficiency filter and heat-exchange system.'

Deepfakes From OpenAI GPT-2 Algorithm
'How can you compete with an IBM heavy-duty logomatic analogue?'

John Deere Self-Driving Tractor
'The huge plow... seemed to shake itself - and began to move back southward.'

North Focals Smart Glasses Provide Augmented Reality In Style
'The world ... is drenched in unfamiliar information all the way to the horizon.'

Tesla Driver Caught Napping Behind The Wheel
'Mary Risling settled back for a little nap...'

Hayabusa 2 To Begin Asteroid Mining
'We must dig down, and then doubtless we shall find the metal.'

Ionocraft Drone Powered By Electrohydrodynamic Thrust
'He saw one hiss by him as he rounded the corner, trailing a short whip antenna...'

Purdue Pharma Ready To Profit From OxyContin Use Or Addiction Recovery
'It may be organic damage. It may be permanent. Time'll tell, and only after you are off Substance D for a long while.'

More SF in the News Stories

More Beyond Technovelgy science news stories

Home | Glossary | Invention Timeline | Category | New | Contact Us | FAQ | Advertise |
Technovelgy.com - where science meets fiction™

Copyright© Technovelgy LLC; all rights reserved.