Wednesday, May 25, 2022
  • About us
    • Write for us
    • Disclaimer
    • Terms of use
    • Privacy Policy
  • RSS Feeds
  • Advertise with us
  • Contact us
DefenceTalk
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
DefenceTalk
No Result
View All Result

24,000 files stolen from defense contractor: Pentagon

by Agence France-Presse
July 15, 2011
in Technology News
3 min read
0
Army to field integrated tactical network capability
14
VIEWS

A foreign intelligence service swiped 24,000 computer files from a US defense contractor in March in one of the largest ever cyberattacks on a Pentagon supplier, a top Defense Department official revealed.

“It is a significant concern that over the past decade, terabytes of data have been extracted by foreign intruders from corporate networks of defense companies,” Deputy Defense Secretary William Lynn said.

“In a single intrusion this March, 24,000 files were taken,” Lynn said in a speech at National Defense University here outlining the Pentagon’s strategy in cyberspace.

Speaking to reporters after his speech, Lynn described the theft of data from the unidentified defense contractor as “significant” and one of the largest ever.

“It was large — 24,000 files,” he said. “It was data-related to systems that are being developed for the Department of Defense.

“It was done, we think, by a foreign intelligence service,” he said. “In other words a nation state was behind it.”

China has been blamed for a number of probes of US corporate and military computer systems over the past few years but Lynn declined to point the finger at any specific suspects in the March intrusion.

“We don’t get into our understanding of exactly who it was,” he said.

Lynn said the data theft had “compromised information relative to the design of military equipment” but had not “set us back in terms of the development of the system.”

In his speech, Lynn said some of the data stolen by intruders is “mundane, like the specifications for small parts of tanks, airplanes, and submarines.

“But a great deal of it concerns our most sensitive systems, including aircraft avionics, surveillance technologies, satellite communications systems, and network security protocols,” he said.

“The cyber exploitation being perpetrated against the defense industry cuts across a wide swath of crucial military hardware, extending from missile tracking systems and satellite navigation devices to UAVs (unmanned aerial vehicles, or drones) and the Joint Strike Fighter,” he said.

Lynn also said he did not believe the March intrusion involved the use of SecurID tokens that were stolen from US computer security titan RSA Security in a sophisticated hacking attack in March.

RSA’s parent company, EMC Corp. has acknowledged that intruders breached its security systems at defense contractor Lockheed Martin in May using data swiped from RSA.

Outlining the Defense Department’s strategy in cyberspace, Lynn said the Pentagon considers cyberspace an operational domain, like land, air, sea and space.

“Treating cyberspace as a domain means that the military needs to operate and defend its networks, and to organize, train and equip its forces to perform cyber missions,” he said.

“In the 21st Century, bits and bytes can be as threatening as bullets and bombs,” he said. “Keystrokes originating in one country can impact the other side of the globe in the blink of an eye.”

Lynn said information technology has become so important to US military operations that it “virtually guarantees that future adversaries will target our dependence on it.

“Our assessment is that cyber attacks will be a significant component of any future conflict, whether it involves major nations, rogue states, or terrorist groups,” he said.

Lynn said US military power served as a deterrent against cyberattack from a nation state but “if a terrorist group gains disruptive or destructive cyber tools, we have to assume they will strike with little hesitation.”

The thrust of the Defense Department’s cyber strategy is defensive, he said, and “it should come as no surprise that the United States is prepared to defend itself.

“Just as our military organizes to defend against hostile acts from land, air and sea, we must also be prepared to respond to hostile acts in cyberspace,” he said.

“Accordingly, the United States reserves the right, under the laws of armed conflict, to respond to serious cyber attacks with a proportional and justified military response at the time and place of our choosing,” he said.

Lynn, who was accompanied by Marine General James Cartwright, vice chairman of the Joint Chiefs of Staff, declined to elaborate on US offensive cyber capabilities or what would constitute an act of war in cyberspace.

“It’s a judgment,” Cartwright said of an act of war. “It’s subjective. It’s in the eye of the beholder.”

Tags: contractorcyber attackcyber securityDefensehackingnetworks ecuritypentagon
Previous Post

McGuire AFB C-17 Globemaster – Air Power Over Hampton Roads 2011- Langley AFB

Next Post

Afghan women pilot candidates serve country, pursue history

Related Posts

US moves closer to retaliation over hacking as cyber woes grow

UK probes ‘Russian hack’ targeting army recruits

April 28, 2022

The UK defence ministry said Tuesday it was investigating a reported hack by Russia of its computer systems targeting more...

US needs top cyber coordinator, better hacker ‘deterrence’

Space Security Challenge 2022: Hack-A-Sat 3 Registration Opens

April 20, 2022

The U.S. Air and Space Force, in collaboration with the security research community, opened registration April 8 for the qualification...

Next Post
Afghan women pilot candidates serve country, pursue history

Afghan women pilot candidates serve country, pursue history

Latest Defense News

EU warns Belarus opening door to Russian nukes after vote

New military bases in western Russia in response to NATO expansion: minister

May 20, 2022
NATO warns Russia readying for ‘full-scale attack’ on Ukraine

Signs multiply Russia seeks control of south Ukraine

May 20, 2022
Biden to announce anti-gun violence measures

Biden begins Asia trip in South Korea, under North nuclear shadow

May 20, 2022
Russian Army Receives More Iskander-M Tactical Ballistic Missile System

Belarus buys S-400, Iskander missiles from Russia: Lukashenko

May 20, 2022
Turkey seeks alternatives to Russian energy after warplane crisis

Erdogan urges NATO allies to ‘respect’ concerns over Finland, Sweden

May 19, 2022
North Korea

North Korea ‘ready for nuclear test’ with Biden due in Seoul

May 19, 2022

Defense Forum Discussions

  • ADF General discussion thread
  • The Russian-Ukrainian War Thread
  • Royal Australian Navy Discussions and Updates 2.0
  • NZDF General discussion thread
  • The best strategy to defending Singapore Island
  • Possible VLF antennas near former Clark Air Force base Philippines
  • NATO
  • US Army News and updates general discussion
  • The Royal Navy Discussions and Updates
  • Japan, Koreas, China and Taiwan regional issues
DefenceTalk

© 2003-2020 DefenceTalk.com

Navigate Site

  • Defence Forum
  • Military Photos
  • RSS Feeds
  • About us
  • Advertise with us
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports

© 2003-2020 DefenceTalk.com