Government

Experts: Assume Foreign Spies Are Already Planted Throughout Military Computer Networks

This post originally appeared on Business Insider by Eloise Lee. 

Experts Say U.S. Government and Private Defense Cyber Force Needs to Be More Pro Active

(Photo: US Navy/Joshua J. Wahl)

The attack on American military computer networks has been so thorough, and so successful, security experts now say the U.S. should quit trying to stop it, and assume spies are already inside.

Security experts testifying before the Senate Armed Services said last week that it’s time the U.S. stopped building up its computer defense, and start retaliating against nations accessing U.S. networks.

The attacks on governmental and private defense networks has been non-stop for years, and last year the Pentagon declared it now regards cyberspace as a military-operable domain.

The 2011 U.S. strategy for operating in cyberspace says that cyberspace is no different than land, sea, air, and space. This means the military is silently building a “cyberforce” to safeguard America’s data.

The Defense Department’s 2013 Information Technology budget request of $37 billion includes $3.4 billion for defensive cybersecurity efforts.

The U.S. is crafting new military-like tactics and procedures.

“We are developing doctrine for a pro-active, agile cyber force that can ‘maneuver’ in cyberspace at the speed of the internet,” said General Keith Alexander, the commander of U.S. Cyber Command to the House Armed Services Subcommittee on Emerging Threats and Capabilities last week.

Although the networks and systems that make up the cyber domain, such as those of the Internet, are man-made and often privately-owned primarily for civilian use, cyberspace is a powerful gateway. And it can be threatened or breached — easily.

Cyber experts told the House Armed Services Subcommittee that the U.S. should acknowledge that is impossible to keep spies out of its networks, reported the BBC. Instead of focusing on keeping hackers out, the Defense Department should assume that foreign spies have already made their way in.

The DoD has said that their networks are probed millions of times everyday and successful breaches have led to the loss of thousands of files from U.S. networks and those of its allies and industry partners. Last March, a defense company’s network was hacked and 24,000 files containing Pentagon data were stolen in a single intrusion.

“Keystrokes originating in one country can impact the other side of the globe in the blink of an eye.  In the 21st Century, bits and bytes can be as threatening as bullets and bombs,” reiterated William Lynn, former Deputy Secretary of Defense, after the intrusion during a speech last July at the National Defense University in Washington, D.C.

During the recent subcommittee hearing, General Alexander said the Intelligence Community’s world-wide threat brief to Congress in January raised cyber threats to just behind terrorism and proliferation among the biggest challenges facing the U.S. And It hits home:

“Americans have digitized and networked more of their businesses, activities, and their personal lives, and with good reason they worry more about their privacy and the integrity of their data.”

“So has our military,” he added.

For one thing, social media offers adversaries potential to tap into a wealth of information. This month, the military warned service members and their families about geo-tagging, the GPS-enabled tool on FacebookTwitter, smartphones and mobile apps, that can pinpoint a user’s location when photos or messages are posted online.

Experts Say U.S. Government and Private Defense Cyber Force Needs to Be More Pro Active

(Image: US Army)

To civilians, geo-tagging and “checking-in” is a harmless feature of connectivity. To someone with the wrong motivation, it becomes a weapon.

In 2007, terrorists in Iraq downloaded pictures from Facebook of a new fleet of AH-64 Apache helicopters arriving at a base.

Some deployed soldiers had uploaded the photos and, unbeknownst to them, the exact coordinates of the helicopters were embedded into the images’ metadata.

The terrorists launched a precise mortar attack and destroyed four of the new Apaches in the military compound.

In another case of cyberspace manipulation, two weeks ago a fake Facebook account for NATO’s most senior commander, American Admiral James Stavridis, was set up by spies reportedly from China. According to Jason Lewis reporting for the Telegraph, a series of Stravridis’ colleagues fell for the deception and accepted Facebook friend requests, opening up their personal profiles to the spies and revealing private email addresses, phone numbers, and pictures.

It’s unlikely critical military intelligence was made available, but the incident is is just plain embarrassing.

DoD networks, both unclassified and secret, connect 7 million devices across the department; roughly 3.7 million people have active cyber identity credentials issued by the DoD. Half a million personnel use the Department’s secret network, which allows anonymous access. And there are 25,000 unclassified servers visible to the Internet with “countless” people exchanging information with personnel daily,confirmed Teresa Takai, the Defense Department’s Chief Information Officer, to the House Armed Services Subcommittee.

Takai said that they‘re trying to drive out anonymity from the Department’s secret networks by requiring visible user credentials. Based on the fallout of WikiLeaks, this security and accountability measure is overdue.

Dr. Kaigham Gabriel, acting director of DARPA, the agency behind some of the Defense Department’s cyber warfare technology, pointed to the reality that the U.S. cannot be over-confident that it dominates this domain:

“The United States continues to spend on cybersecurity with limited increase in security: The Federal Government expended billions of dollars in 2010, but the number of malicious cyber intrusions has increased.” There is still much to do, he said.

Comments (31)

  • TexBork
    Posted on March 27, 2012 at 7:58pm

    We need to root out the spies and remove them, but that won‘t happen until after Obama’s lost the election in November.

    Report Post » TexBork  
  • MN8
    Posted on March 27, 2012 at 7:15pm

    Why does a government that refuses to protect it’s sovereign borders care about cyber space?

    Report Post »  
  • Max jones
    Posted on March 26, 2012 at 1:54pm

    OBama will use this………here’s how……….
    I can’t believe this comes from madcow on MSNBC

    Report Post » Max jones  
  • Robert999
    Posted on March 26, 2012 at 1:48pm

    I think you can assume any military secret will get out. During WWII, the Brits broke the German codes and the Germans broke the British codes. They might as well have been communicating in the clear and saved the time and expense of coding and decoding their messages.

    Report Post »  
  • TruthPolice60
    Posted on March 26, 2012 at 11:56am

    I understand foreign spies. But what about Americans engaged in espionage againt the U.S.? Can we at least get back to the death penalty for treason? Somehow I don’t believe that homosexual Bradley Manning, who shouldn’t have been allowed in the army in the first place, would have done what he did if he knew he was going to get a firing squad. The damage he did cannot be undone. But, at least we can have some closure when traitors get a just punishment for their deeds.

    Report Post »  
  • Mikev5
    Posted on March 26, 2012 at 10:05am

    spam dont do it

    Get a grip Blaze

    Report Post » Mikev5  
  • Mikev5
    Posted on March 26, 2012 at 10:04am

    Keep these scammer off this web dont do it people its a scam

    F–U blaze for all the times I try to stop these things

    Report Post » Mikev5  
  • Mikev5
    Posted on March 26, 2012 at 10:00am

    If they want they can secure the Military networks I think they are letting them in they can have all the false info they can handle.

    Believe me there are simple ways to stop this

    Report Post » Mikev5  
    • WeekendAtBernankes
      Posted on March 26, 2012 at 11:44am

      ““We are developing doctrine for a pro-active, agile cyber force that can ‘maneuver’ in cyberspace at the speed of the internet,” said General Keith Alexander”

      BUT can they maneuver at the speed of the series of tubes?

      Report Post » WeekendAtBernankes  
    • TomFerrari
      Posted on March 26, 2012 at 12:05pm

      Should never have connected to public networks. Should have used proprietary hardware and software. Then all data would be required to be physically transported (sneakernet) in order to declassify or disseminate data.
      Yes, putting up red herrings may be helpful, but, until we have single-photon insertion / generation networks, there will always be one path that is less secure than others.
      Physical security is best. (non-connection to public networks)
      One should always assume whatever they transmit is, or will become, public.
      Perhaps strongly-encrypted I/O devices? All data would be manipulated, transmitted, and stored in encrypted form.
      Lobbyists funded by Microsoft, IBM, and other BigData, caused us to utilize civilian platforms, rather than a proprietary, disconnected strategy. America has been sold out… as usual.

      Report Post » TomFerrari  
  • blanco5
    Posted on March 26, 2012 at 9:57am

    Big huge DUH there, folks.

    Report Post »  
  • Snowleopard {gallery of cat folks}
    Posted on March 26, 2012 at 9:45am

    Spies within and spies without; they accomplish much by having them infiltrate the armed services apparatus (computers and literal insider agents) and continue their penetration attacks; why settle for one type of control or inflicting of damage when you can do both.

    Report Post » Snowleopard {gallery of cat folks}  
  • objectivetruth
    Posted on March 26, 2012 at 9:37am

    @Mr.Butcher
    I agree to a point.It still burns me up though.We go out of our way to avoid the most easily hacked types of media, while our military and head honchos of same, use it and are exploited by it.Hell at this rate why bother to ever report crime,You have no idea if you are reporting it to our government or a foreign spy network.That even goes for local.
    By the way banking isn’t much safer.The bank will protect itself but not necessarily their account holders.

    Report Post »  
  • Itsjusttim
    Posted on March 26, 2012 at 9:21am

    What do they mean foreign spies? The American public school system has been creating millions and millions of Indoctrinated Communists for 50 years. I’d say they are quite infiltrated, and they are quite like the flesh of China and the old Soviet Union.

    Report Post » Itsjusttim  
    • Itsjusttim
      Posted on March 26, 2012 at 9:27am

      What did you people expect, that parents would actually give a damned about the curriculum getting taught from K-12 and college, the same parents who levy heavy debt burdens on the souls of their grandchildren? I don’t think so.

      Report Post » Itsjusttim  
    • Itsjusttim
      Posted on March 26, 2012 at 9:29am

      And if parents will do those wicked things to their children in good times, oh the heinous, horrific things they will do to their children in very hard times.

      Report Post » Itsjusttim  
    • JP4JOY
      Posted on March 26, 2012 at 9:34am

      @IT
      Do you always try posting this way as an annoying moniker or do you suffer from a disorder?

      Report Post » JP4JOY  
  • semihardrock
    Posted on March 26, 2012 at 9:20am

    RIDDLE ME THIS….BATMAN: If those who are currently in charge are as corrupt as we all know they are, and WANT the “One World Order” or the “Fundamental Transformation” of the US…

    Dont you THINK the people within our own Government would have “Wikileaked” the information to China who are ALSO….Communists?

    The Pharaoh…..on December 21 2012…..WILL control the entire Earth! Which maybe the REAL End of Days of life on the planet as you know it.

    True Freedom….doesnt exist anymore! Maybe it never did…..But people BELIEVED in it!

    Report Post » semihardrock  
  • SpankDaMonkey
    Posted on March 26, 2012 at 9:06am

    .
    Spies like Bradly Manning? A Terrorist, or a Drug Lord with a hand full of dollars can buy a Spy………

    Everybody has a Price…..You may not think so, but when enough money hits the table……

    Report Post » SpankDaMonkey  
    • TIME_2_END_THE_PAUL_CAMPAIGN_IN_12
      Posted on March 26, 2012 at 9:09am

      And everyone should remember… Ron Paul has called Pvt Bradley Manning a “hero” and a “patriot.”

      Report Post » TIME_2_END_THE_PAUL_CAMPAIGN_IN_12  
    • youdidthis
      Posted on March 26, 2012 at 12:43pm

      so a guy who outs the corruption and crimes of the gov’t is what…?

      time ,
      you are a worthless shill. no facts just bs 100% of the time.

      fu.

      Report Post »  
    • TIME_2_END_THE_PAUL_CAMPAIGN_IN_12
      Posted on March 26, 2012 at 3:02pm

      YOU. You’re so enamored with Mr. Giggles rumpled suit that there is absolutely nothing that can be done for you.

      Well, except for cutting off the oxygen to your spacey helmit…

      Report Post » TIME_2_END_THE_PAUL_CAMPAIGN_IN_12  
  • goahead.makemyday
    Posted on March 26, 2012 at 9:00am

    Well DUH I thought it was obvious to expect spies everywhere. I mean isn’t that one of the functions of the CIA? As for the weak cybersecurity why haven’t we already done this stuff? Failing to protect America in this way should be considered criminal negligence. Who was in charge of this?

    Report Post » goahead.makemyday  
    • JP4JOY
      Posted on March 26, 2012 at 9:31am

      I‘m starting to believe it’s all intentional. There has been a movement afoot for years to take us down. There are so many imbedded useful idiots and some outright traitors at the top. This fall will be a watershed moment. We will necessarily need to fight for our survival as the nation we knew.

      Report Post » JP4JOY  
  • Gonzo
    Posted on March 26, 2012 at 8:42am

    I think it’s safe to assume there are foreign spies everywhere when we have one in the Oval Office.

    Report Post » Gonzo  
    • ChiefGeorge
      Posted on March 26, 2012 at 9:01am

      This would not have been tolerated during the cold war era! We are soooo dumb its a miracle that we even still have a country at all…maybe that too is an illusion.

      Report Post » ChiefGeorge  
    • Pro-Palin
      Posted on March 26, 2012 at 9:17am

      Point well made Ted but if you knew the truth about this like I do working for a TOP contractor you would think more than that. Corporations Lossing data in teraflops per second going to —– but mostly a group out of Tiawon that traces back to places I dare not mention it would blow your mind.
      How to you go from being a Large communist Mass to a Superpower, simple you wait for the lease to expire then incorporate the best parts of that into your own empire again unification. Unification is their game and conquest is their game. Stealing technology and sometimes paying for it like those in the past for campain funds and long range missle tech hand outs….. They are fastly becoming a force greater than our own and Like Soviet russia numbers wont matter you may have a stealth front and no engine stealth ability but if you can out number them anyhow does the stealth not being 100% really matter ? We inovate, and dont protect what we have and loose our edge this way how will we compete ? But this also applies to Google and other types of companies with crazy user tracking agreements I am not a piece of meat for you to track and give me unwanted advertisements and or youtube recommends follow your history like snoops in your life as well corporate Facism and I dont say that lightly….. be a business with a good reputation to customers not a snoopy neighbor or detective on my life…..

      Report Post » Pro-Palin  
    • Walkabout
      Posted on March 26, 2012 at 11:14am

      I talked to one of my parents. They are not a birther. But they are surprised that there are not more leaks. Their opinion was that this will come out in 50 years when it doesn’t matter.

      It is kind of like the healthy, vigorous JFK was not tan because he was in good health but because of the drugs. He had a degenerative, progressive disease that left him in pain. He had adulterous affairs right, left & center. Adulterous affairs are just part of the being Democrat & too many RINOs.

      But what the hay, JFK had good hair. John F. Kennedy was out first purty boy President. Didn’t Carter & Clinton have purty hair, too?

      I‘ll give points to JFK for putting himself in harm’s way for longer than John Kerry would ever consider doing. Three paper cuts & John Kerry, who formerly served in Vietnam, was out of there! Kerry gave it is all!. On the other hand JFK has been criticized for his handling of PT109 by other naval officer.

      But everything about Kennedy was covered up just like everything is covered up for Obama & how they tried to cover for Clinton.

      Report Post »  
  • SamIamTwo
    Posted on March 26, 2012 at 8:38am

    And most of the so called spies were contracted…the IT folks are under government contracts and work for the Company who won the award of a federal contract…

    And then you have all of the other people…the IT folks are suppose to catch such things…but who is watching the IT folks, eh?

    Report Post » SamIamTwo  

Sign In To Post Comments! Sign In