Oh, goodie, goodie, gumdrops. Think of all the WONDERFUL uses to which they can put this![quote]The Pentagon is training people to hack into its own comp..."/>

REAL WORLD EVENT DISCUSSIONS

Pentagon trains workers to hack Defense computers

POSTED BY: NIKI2
UPDATED: Tuesday, March 16, 2010 10:06
SHORT URL:
VIEWED: 745
PAGE 1 of 1

Monday, March 15, 2010 9:23 AM

NIKI2

Gettin' old, but still a hippie at heart...


Oh, goodie, goodie, gumdrops. Think of all the WONDERFUL uses to which they can put this!
Quote:

The Pentagon is training people to hack into its own computer networks.

"To beat a hacker, you need to think like one," said Jay Bavisi, co-founder and president of the International Council of Electronic Commerce Consultants, or EC-Council. His company was chosen by the Pentagon to oversee training of Department of Defense employees who work in computer security-related jobs and certify them when the training is complete.

The Department of Defense does not consider this hacking.

"DoD personnel are not learning to hack. They are learning to defend the network against hackers," said spokesman Lt. Col. Eric Butterbaugh.

But the EC-Council calls the program "Certified Ethical Hacker certification." The purpose of the training is to teach Defense Department employees to defend their computer network.

Almost 45,000 attacks on Defense Department computers were reported in the first half of 2009, according to a government report. The report estimated that for all of 2009, the number of attacks would be up 60 percent from the previous year. Fending off the attacks costs the Pentagon about $100 million.

Bavisi said the training focuses on teaching the art of hacking, using the same tools and tricks that traditional hackers use to break into computer networks.

Bavisi said that Defense Department employees who complete the training and certification will not be assigned to use their new knowledge to hack into privately owned or civilian computers. But he said that any kind of training, including ethical hacking, could be used for nefarious purposes.

"You can teach me to cut an apple with a knife, and I can turn around and stab you with the knife," Bavisi said.

http://www.cnn.com/2010/TECH/03/10/pentagon.hacking/index.html?hpt=Sbi
n



"I'm just right. Kinda like the sun rising in the east and the world being round...its not a need its just the way it is." The Delusional "Hero", 3/1/10

NOTIFY: Y   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Monday, March 15, 2010 11:17 AM

KWICKO

"We'll know our disinformation program is complete when everything the American public believes is false." -- William Casey, Reagan's presidential campaign manager & CIA Director (from first staff meeting in 1981)


Niki, I actually know one of the guys who does that for a living (for the government). He was recently tasked with "attacking" a major US Air Force Base (I won't say which one, to protect both his identity and the dignity of the base commander). He was given 24 hours to "infiltrate" their systems and compromise their computer security. It took he and his team less than 12 hours to not only compromise their DATA security, but to virtually take over the entire base, at which time he could have issued orders in the commander's name via e-mails and electronic communications, and they would have been followed to the letter.

I find that scary as hell.

Also, you should know that last year, some 15 terabytes of data were stolen from the Pentagon's "secure" systems. All eyes are looking at China as the culprit. How much is 15Tb? Well, the Library of Congress's entire collection comprises around 12Tb. So 15Tb is a lot. Sources say virtually EVERY nuclear warhead design we have is now in the hands of the data-thieves (presumed to be China, but if you were a smart hacker, you'd of course MAKE it look like China did it), along with all the data on all of our stealth aircraft and ship projects. And that's just for starters.

So yeah, I'd say if you're going to have this data lying around, you really, REALLY want to try to make sure it's secure.




"I supported Bush in 2000 and 2004 and intellegence [sic] had very little to do with that decision." - Hero, Real World Event Discussions


NOTIFY: Y   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Monday, March 15, 2010 12:33 PM

FIVVER


Nothing new. The DOD first formed Tiger Teams back in the 70s to test their computer security.

NOTIFY: N   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Tuesday, March 16, 2010 9:27 AM

NIKI2

Gettin' old, but still a hippie at heart...


Eeep Mike, that IS scary. Ah, the age of the computer; ain't it wonderful?


"I'm just right. Kinda like the sun rising in the east and the world being round...its not a need its just the way it is." The Delusional "Hero", 3/1/10

NOTIFY: Y   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Tuesday, March 16, 2010 10:06 AM

KWICKO

"We'll know our disinformation program is complete when everything the American public believes is false." -- William Casey, Reagan's presidential campaign manager & CIA Director (from first staff meeting in 1981)


Yup. Never forget what Frem has said time and again: Technology is a double-edged sword. Every advantage it gives us, can be used AGAINST us just as easily.

NOTIFY: N   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

YOUR OPTIONS

NEW POSTS TODAY

USERPOST DATE

FFF.NET SOCIAL