Experts: Assume Foreign Spies Are Already Planted Throughout Military Computer Networks
- Posted on March 26, 2012 at 8:33am by
Guest Post
- Print »
- Email »
This post originally appeared on Business Insider by Eloise Lee.

(Photo: US Navy/Joshua J. Wahl)
The attack on American military computer networks has been so thorough, and so successful, security experts now say the U.S. should quit trying to stop it, and assume spies are already inside.
Security experts testifying before the Senate Armed Services said last week that it’s time the U.S. stopped building up its computer defense, and start retaliating against nations accessing U.S. networks.
The attacks on governmental and private defense networks has been non-stop for years, and last year the Pentagon declared it now regards cyberspace as a military-operable domain.
The 2011 U.S. strategy for operating in cyberspace says that cyberspace is no different than land, sea, air, and space. This means the military is silently building a “cyberforce” to safeguard America’s data.
The Defense Department’s 2013 Information Technology budget request of $37 billion includes $3.4 billion for defensive cybersecurity efforts.
The U.S. is crafting new military-like tactics and procedures.
“We are developing doctrine for a pro-active, agile cyber force that can ‘maneuver’ in cyberspace at the speed of the internet,” said General Keith Alexander, the commander of U.S. Cyber Command to the House Armed Services Subcommittee on Emerging Threats and Capabilities last week.
Although the networks and systems that make up the cyber domain, such as those of the Internet, are man-made and often privately-owned primarily for civilian use, cyberspace is a powerful gateway. And it can be threatened or breached — easily.
Cyber experts told the House Armed Services Subcommittee that the U.S. should acknowledge that is impossible to keep spies out of its networks, reported the BBC. Instead of focusing on keeping hackers out, the Defense Department should assume that foreign spies have already made their way in.
The DoD has said that their networks are probed millions of times everyday and successful breaches have led to the loss of thousands of files from U.S. networks and those of its allies and industry partners. Last March, a defense company’s network was hacked and 24,000 files containing Pentagon data were stolen in a single intrusion.
“Keystrokes originating in one country can impact the other side of the globe in the blink of an eye. In the 21st Century, bits and bytes can be as threatening as bullets and bombs,” reiterated William Lynn, former Deputy Secretary of Defense, after the intrusion during a speech last July at the National Defense University in Washington, D.C.
During the recent subcommittee hearing, General Alexander said the Intelligence Community’s world-wide threat brief to Congress in January raised cyber threats to just behind terrorism and proliferation among the biggest challenges facing the U.S. And It hits home:
“Americans have digitized and networked more of their businesses, activities, and their personal lives, and with good reason they worry more about their privacy and the integrity of their data.”
“So has our military,” he added.
For one thing, social media offers adversaries potential to tap into a wealth of information. This month, the military warned service members and their families about geo-tagging, the GPS-enabled tool on Facebook, Twitter, smartphones and mobile apps, that can pinpoint a user’s location when photos or messages are posted online.

(Image: US Army)
To civilians, geo-tagging and “checking-in” is a harmless feature of connectivity. To someone with the wrong motivation, it becomes a weapon.
In 2007, terrorists in Iraq downloaded pictures from Facebook of a new fleet of AH-64 Apache helicopters arriving at a base.
Some deployed soldiers had uploaded the photos and, unbeknownst to them, the exact coordinates of the helicopters were embedded into the images’ metadata.
The terrorists launched a precise mortar attack and destroyed four of the new Apaches in the military compound.
In another case of cyberspace manipulation, two weeks ago a fake Facebook account for NATO’s most senior commander, American Admiral James Stavridis, was set up by spies reportedly from China. According to Jason Lewis reporting for the Telegraph, a series of Stravridis’ colleagues fell for the deception and accepted Facebook friend requests, opening up their personal profiles to the spies and revealing private email addresses, phone numbers, and pictures.
It’s unlikely critical military intelligence was made available, but the incident is is just plain embarrassing.
DoD networks, both unclassified and secret, connect 7 million devices across the department; roughly 3.7 million people have active cyber identity credentials issued by the DoD. Half a million personnel use the Department’s secret network, which allows anonymous access. And there are 25,000 unclassified servers visible to the Internet with “countless” people exchanging information with personnel daily,confirmed Teresa Takai, the Defense Department’s Chief Information Officer, to the House Armed Services Subcommittee.
Takai said that they‘re trying to drive out anonymity from the Department’s secret networks by requiring visible user credentials. Based on the fallout of WikiLeaks, this security and accountability measure is overdue.
Dr. Kaigham Gabriel, acting director of DARPA, the agency behind some of the Defense Department’s cyber warfare technology, pointed to the reality that the U.S. cannot be over-confident that it dominates this domain:
“The United States continues to spend on cybersecurity with limited increase in security: The Federal Government expended billions of dollars in 2010, but the number of malicious cyber intrusions has increased.” There is still much to do, he said.





















Submitting your tip... please wait!
TexBork
Posted on March 27, 2012 at 7:58pmWe need to root out the spies and remove them, but that won‘t happen until after Obama’s lost the election in November.
Report Post »MN8
Posted on March 27, 2012 at 7:15pmWhy does a government that refuses to protect it’s sovereign borders care about cyber space?
Report Post »Max jones
Posted on March 26, 2012 at 1:54pmOBama will use this………here’s how……….
Report Post »I can’t believe this comes from madcow on MSNBC
Robert999
Posted on March 26, 2012 at 1:48pmI think you can assume any military secret will get out. During WWII, the Brits broke the German codes and the Germans broke the British codes. They might as well have been communicating in the clear and saved the time and expense of coding and decoding their messages.
Report Post »TruthPolice60
Posted on March 26, 2012 at 11:56amI understand foreign spies. But what about Americans engaged in espionage againt the U.S.? Can we at least get back to the death penalty for treason? Somehow I don’t believe that homosexual Bradley Manning, who shouldn’t have been allowed in the army in the first place, would have done what he did if he knew he was going to get a firing squad. The damage he did cannot be undone. But, at least we can have some closure when traitors get a just punishment for their deeds.
Report Post »Mikev5
Posted on March 26, 2012 at 10:05amspam dont do it
Get a grip Blaze
Report Post »Mikev5
Posted on March 26, 2012 at 10:04amKeep these scammer off this web dont do it people its a scam
F–U blaze for all the times I try to stop these things
Report Post »Mikev5
Posted on March 26, 2012 at 10:00amIf they want they can secure the Military networks I think they are letting them in they can have all the false info they can handle.
Believe me there are simple ways to stop this
Report Post »WeekendAtBernankes
Posted on March 26, 2012 at 11:44am““We are developing doctrine for a pro-active, agile cyber force that can ‘maneuver’ in cyberspace at the speed of the internet,” said General Keith Alexander”
BUT can they maneuver at the speed of the series of tubes?
Report Post »TomFerrari
Posted on March 26, 2012 at 12:05pmShould never have connected to public networks. Should have used proprietary hardware and software. Then all data would be required to be physically transported (sneakernet) in order to declassify or disseminate data.
Report Post »Yes, putting up red herrings may be helpful, but, until we have single-photon insertion / generation networks, there will always be one path that is less secure than others.
Physical security is best. (non-connection to public networks)
One should always assume whatever they transmit is, or will become, public.
Perhaps strongly-encrypted I/O devices? All data would be manipulated, transmitted, and stored in encrypted form.
Lobbyists funded by Microsoft, IBM, and other BigData, caused us to utilize civilian platforms, rather than a proprietary, disconnected strategy. America has been sold out… as usual.
blanco5
Posted on March 26, 2012 at 9:57amBig huge DUH there, folks.
Report Post »Snowleopard {gallery of cat folks}
Posted on March 26, 2012 at 9:45amSpies within and spies without; they accomplish much by having them infiltrate the armed services apparatus (computers and literal insider agents) and continue their penetration attacks; why settle for one type of control or inflicting of damage when you can do both.
Report Post »objectivetruth
Posted on March 26, 2012 at 9:37am@Mr.Butcher
Report Post »I agree to a point.It still burns me up though.We go out of our way to avoid the most easily hacked types of media, while our military and head honchos of same, use it and are exploited by it.Hell at this rate why bother to ever report crime,You have no idea if you are reporting it to our government or a foreign spy network.That even goes for local.
By the way banking isn’t much safer.The bank will protect itself but not necessarily their account holders.
Itsjusttim
Posted on March 26, 2012 at 9:21amWhat do they mean foreign spies? The American public school system has been creating millions and millions of Indoctrinated Communists for 50 years. I’d say they are quite infiltrated, and they are quite like the flesh of China and the old Soviet Union.
Report Post »Itsjusttim
Posted on March 26, 2012 at 9:27amWhat did you people expect, that parents would actually give a damned about the curriculum getting taught from K-12 and college, the same parents who levy heavy debt burdens on the souls of their grandchildren? I don’t think so.
Report Post »Itsjusttim
Posted on March 26, 2012 at 9:29amAnd if parents will do those wicked things to their children in good times, oh the heinous, horrific things they will do to their children in very hard times.
Report Post »JP4JOY
Posted on March 26, 2012 at 9:34am@IT
Report Post »Do you always try posting this way as an annoying moniker or do you suffer from a disorder?
semihardrock
Posted on March 26, 2012 at 9:20amRIDDLE ME THIS….BATMAN: If those who are currently in charge are as corrupt as we all know they are, and WANT the “One World Order” or the “Fundamental Transformation” of the US…
Dont you THINK the people within our own Government would have “Wikileaked” the information to China who are ALSO….Communists?
The Pharaoh…..on December 21 2012…..WILL control the entire Earth! Which maybe the REAL End of Days of life on the planet as you know it.
True Freedom….doesnt exist anymore! Maybe it never did…..But people BELIEVED in it!
Report Post »SpankDaMonkey
Posted on March 26, 2012 at 9:06am.
Spies like Bradly Manning? A Terrorist, or a Drug Lord with a hand full of dollars can buy a Spy………
Everybody has a Price…..You may not think so, but when enough money hits the table……
Report Post »TIME_2_END_THE_PAUL_CAMPAIGN_IN_12
Posted on March 26, 2012 at 9:09amAnd everyone should remember… Ron Paul has called Pvt Bradley Manning a “hero” and a “patriot.”
Report Post »youdidthis
Posted on March 26, 2012 at 12:43pmso a guy who outs the corruption and crimes of the gov’t is what…?
time ,
you are a worthless shill. no facts just bs 100% of the time.
fu.
Report Post »TIME_2_END_THE_PAUL_CAMPAIGN_IN_12
Posted on March 26, 2012 at 3:02pmYOU. You’re so enamored with Mr. Giggles rumpled suit that there is absolutely nothing that can be done for you.
Well, except for cutting off the oxygen to your spacey helmit…
Report Post »goahead.makemyday
Posted on March 26, 2012 at 9:00amWell DUH I thought it was obvious to expect spies everywhere. I mean isn’t that one of the functions of the CIA? As for the weak cybersecurity why haven’t we already done this stuff? Failing to protect America in this way should be considered criminal negligence. Who was in charge of this?
Report Post »JP4JOY
Posted on March 26, 2012 at 9:31amI‘m starting to believe it’s all intentional. There has been a movement afoot for years to take us down. There are so many imbedded useful idiots and some outright traitors at the top. This fall will be a watershed moment. We will necessarily need to fight for our survival as the nation we knew.
Report Post »Gonzo
Posted on March 26, 2012 at 8:42amI think it’s safe to assume there are foreign spies everywhere when we have one in the Oval Office.
Report Post »ChiefGeorge
Posted on March 26, 2012 at 9:01amThis would not have been tolerated during the cold war era! We are soooo dumb its a miracle that we even still have a country at all…maybe that too is an illusion.
Report Post »Pro-Palin
Posted on March 26, 2012 at 9:17amPoint well made Ted but if you knew the truth about this like I do working for a TOP contractor you would think more than that. Corporations Lossing data in teraflops per second going to —– but mostly a group out of Tiawon that traces back to places I dare not mention it would blow your mind.
Report Post »How to you go from being a Large communist Mass to a Superpower, simple you wait for the lease to expire then incorporate the best parts of that into your own empire again unification. Unification is their game and conquest is their game. Stealing technology and sometimes paying for it like those in the past for campain funds and long range missle tech hand outs….. They are fastly becoming a force greater than our own and Like Soviet russia numbers wont matter you may have a stealth front and no engine stealth ability but if you can out number them anyhow does the stealth not being 100% really matter ? We inovate, and dont protect what we have and loose our edge this way how will we compete ? But this also applies to Google and other types of companies with crazy user tracking agreements I am not a piece of meat for you to track and give me unwanted advertisements and or youtube recommends follow your history like snoops in your life as well corporate Facism and I dont say that lightly….. be a business with a good reputation to customers not a snoopy neighbor or detective on my life…..
Walkabout
Posted on March 26, 2012 at 11:14amI talked to one of my parents. They are not a birther. But they are surprised that there are not more leaks. Their opinion was that this will come out in 50 years when it doesn’t matter.
It is kind of like the healthy, vigorous JFK was not tan because he was in good health but because of the drugs. He had a degenerative, progressive disease that left him in pain. He had adulterous affairs right, left & center. Adulterous affairs are just part of the being Democrat & too many RINOs.
But what the hay, JFK had good hair. John F. Kennedy was out first purty boy President. Didn’t Carter & Clinton have purty hair, too?
I‘ll give points to JFK for putting himself in harm’s way for longer than John Kerry would ever consider doing. Three paper cuts & John Kerry, who formerly served in Vietnam, was out of there! Kerry gave it is all!. On the other hand JFK has been criticized for his handling of PT109 by other naval officer.
But everything about Kennedy was covered up just like everything is covered up for Obama & how they tried to cover for Clinton.
Report Post »SamIamTwo
Posted on March 26, 2012 at 8:38amAnd most of the so called spies were contracted…the IT folks are under government contracts and work for the Company who won the award of a federal contract…
And then you have all of the other people…the IT folks are suppose to catch such things…but who is watching the IT folks, eh?
Report Post »therealconservative
Posted on March 26, 2012 at 8:44amyour assumptions are not even close.
Report Post »MrButcher
Posted on March 26, 2012 at 8:47amSpies can be very useful.
Don’t take their infiltration as a bad sign.
This is nothing new.
Report Post »