I wonder where the HACKERS really come from?

Started by Ognir, April 22, 2009, 05:05:04 AM

Previous topic - Next topic

Ognir

Hackers stole data on Pentagon's newest fighter jet

    * Story Highlights
    * Intruders got access to Joint Strike Fighter info through contractor computers
    * Hackers also gained entry to Air Force's air traffic control systems
    * Officials insist that no highly classified information was taken
    * F-35 Lightning II jet is designed to be used by all branches of military
    * Next Article in U.S. »

From Mike Mount
CNN Senior Pentagon Producer
Decrease font Decrease font
Enlarge font Enlarge font

WASHINGTON (CNN) -- Thousands of confidential files on the U.S. military's most technologically advanced fighter aircraft have been compromised by unknown computer hackers over the past two years, according to senior defense officials.
The F-35 Joint Strike Fighter's self-diagnostic system was compromised by hackers, officials say.

The F-35 Joint Strike Fighter's self-diagnostic system was compromised by hackers, officials say.

The Internet intruders were able to gain access to data related to the design and electronics systems of the Joint Strike Fighter through computers of Pentagon contractors in charge of designing and building the aircraft, according to the officials, who did not want to be identified because of the sensitivity of the issue.

In addition to files relating to the aircraft, hackers gained entry into the Air Force's air traffic control systems, according to the officials. Once they got in, the Internet hackers were able to see such information as the locations of U.S. military aircraft in flight.

The Joint Striker Fighter plane is the military's new F-35 Lightning II. It designed to become the aircraft used by all of the branches of service.

Most of the files broken into focused on the design and performance statistics of the fighter, as well as its electronic systems, officials said. The information could be used to make the plane easier to fight or defend against.

Additionally, the system used by the aircraft to conduct self-diagnostics during flight was compromised by the computer intrusions, according to the officials.

However, the officials insisted that none of the information accessed was highly sensitive data.

The plane uses stealth and other highly sensitive electronic equipment, but it does not appear that information on those systems was compromised, because it is stored on computers that are not connected to the Internet, according to the defense officials.

The Joint Strike Fighter's main contractor is Lockheed Martin Corp., and Northrop Grumman Corp. and BAE Systems PLC are major subcontractors in the plane's production.

Lockheed Martin's chief financial officer denied that there was any breach of classified information, which was first reported by the Wall Street Journal on Tuesday.

"The U.S. government doesn't talk a whole lot about this, and neither do we. But in response to the [Wall Street Journal] report, we think it's incorrect," said Bruce Tanner of Lockheed Martin. "There's never been any effective attack. We have measures in place, and there's never been a successful attack."

In a statement released later, the company reiterated its position that no classified information had been accessed.

"To our knowledge, there has never been any classified information breach. Like the government, we have attacks on our systems continually and have stringent measures in place to detect and stop attacks," the statement said.

Representatives of BAE Systems and Northrop Grumman would not comment on the story and referred all questions to Lockheed Martin.

Different variations of the Joint Strike Fighter will be produced for the different branches of service it will be used in. Many international partners are helping build the plane, and it will be sold to U.S.-allied countries.

The involvement of multiple nations raises concern about the level of computer security measures the partner countries have, officials said.

Companies contracting with the Department of Defense now have to prove that they are using the proper computer security before a contract can be awarded, Pentagon officials said. That measure was put into place within the past year because of the increase in cyber intrusions, they said.

Asked whether sensitive technology for the Joint Strike Fighter had been jeopardized, Pentagon spokesman Bryan Whitman said, "I am not aware of any specific concerns."

Whitman would not confirm the cyber-security breach on the Joint Strike Fighter program but said the number of attempted attacks on the U.S. military's network has been on the rise.

"We have seen the number of intrusion attempts more than double recently," he said. He would not reveal a timeline.

He said the computer systems of the Department of Defense are scanned thousands of times a day by entities looking for ways inside U.S. military computer networks.

Officials could not say who was behind the computer hacking, which has occurred numerous times since 2007. The intruders were able to cover their tracks, making it look like the virtual break-ins were coming from various parts of the world, according to officials.

The Wall Street Journal reported that the attacks appeared to originate in China, citing "former U.S. officials."

Last month, a Pentagon annual report to Congress about China's military power said China has been making continued progress in developing cyber-warfare techniques.

The report noted that U.S. government computers were the target of "intrusions that appear to have originated" in China, although they were not confirmed to be from the Chinese military.

CNN requested a comment about the accusation from the Chinese Embassy in Washington. An embassy spokesman denied the allegations to the Wall Street Journal.

The Air Force, the main program manager of the Joint Strike Fighter program, has a number of ongoing investigations into the multiple hackings, officials said.

The officials said that a number of safeguards have since been put into place to protect that system

http://edition.cnn.com/2009/US/04/21/pe ... index.html
Most zionists don't believe that God exists, but they do believe he promised them Palestine

- Ilan Pappe

mgt23

lets face it they could be from a desert island in the middle of nowhere, who knows. obviously money would be the motive

ehpg

Study: Most cyber attacks originate in U.S., Israel

USA Today
January 28, 2002

SAN FRANCISCO (Reuters) — More cyber attacks originate in the United States than in any other country, but the number of attacks that appear to come from Israel is nearly double that of any other nation, according to a study released Monday.

High-tech, financial services, media/entertainment and power and energy companies showed the highest intensity of attacks per company, each averaging more than 700 attacks per company over the six-month period.

On a percentage basis, most of the attacks were relatively benign in nature. But the number of severe attacks was still substantial, with critical and emergency-level events detected on 43% of the client networks, the study found.

"In fact, our findings strongly suggest that once companies connect their systems to the Internet, they are virtually guaranteed to suffer some form of attack," the report said.

Average attacks per company increased by nearly 80% over the six months studied.

Israel leads the list of countries in terms of number of computer attacks per 10,000 Internet users, followed by Hong Kong, Thailand, South Korea, France, Turkey, Malaysia, Poland, Taiwan and Denmark, according to the study from Riptech, a firm that provides security monitoring of corporate and other computer networks.

"Israel is a country with pretty sophisticated warfare capabilities," that spread through the relatively computer-literate general population, said Amit Yoran, president and chief executive of Alexandria, Va.-based Riptech.

For the study, Riptech investigated more than 128,000 cyber attacks found in the analysis of 5.5 billion log entries and alerts on its customer's networks between July and December. The company has about 300 customers in 25 countries.

While most attacks can be traced back to what is believed to be the source country, it is possible for malicious hackers to hide their exact location, according to Yoran.

The study found that attacks that appeared to originate in the United States — nearly 30% of the total — were nearly triple the second-ranked country. But only about 3.5 attacks were made per 10,000 U.S. Internet users, compared with 26 attacks per 10,000 Internet users in Israel, the study found.

Behind the United States in percentage of total attacks was South Korea, China, Germany, France, Canada, Taiwan, Italy, Great Britain and Japan.

Middle East targets power; Asia targets finance

The study found that power and energy companies were primarily targeted by the Middle East while high-tech and financial services companies were targeted by Asian attackers.

Of particular note was the fact that the Code Red and Nimda worms were so predominant — accounting for about 63% of the malicious activity detected by Riptech — that they were excluded from the study.

"We had to pull them out or they would have completely skewed any type of analysis," said Yoran. "They were just so prevalent over that six month period."

Excluding Nimda, attacks dipped during the week following Sept. 11 but began to rise in the third week of September, peaking in the middle of November and declining slightly in early December, according to the study.

Companies with more than 500 employees suffered at least 50% more attacks than smaller companies, while public companies suffered about twice as many attacks as private and non-profit companies.

Thirty-nine percent of the attacks looked targeted, appearing to be deliberate attempts to compromise a specific system or company. "That was just mindboggling to me," Yoran said.

Yoran said the study was different from most in that it relied on actual attack data rather than surveys of network administrators or other company officials, which Yoran said are not always accurate.

This article can be found at: http://www.usatoday.com/tech/news/2002/ ... -study.htm

Amit Yoran (btw Mr. Urine is Israeli) later headed up the National Cyber Security Division as director within the United States Department of Homeland Security. He took up the post in September 2003 and resigned in October 2004. I think Mr. Urine might not have been entirely honest in his report, he may have significantly played down the Israeli role.

also on a side note Kevin David Mitnick was one of the most famous cracker ever, also Jewish and after causing millions in damages He served eight months in solitary confinement at the Los Angeles Metropolitan Center and four months at Lompoc, near the cost. Afterwards, after six months in a Jewish transition residence in order to be reinserted into the community, Kevin Mitnick tried to rejoin the workforce. He got a programmer position in Las Vegas, but his employer was so afraid of his reputation that he could not stay alone in the computers room. Pursuant to the law, Kevin had to tell that he was a former convict.