Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security The Military IT

Cyber Attacks On US Military Jump Sharply In 2009 76

angry tapir writes "Cyber attacks on the US Department of Defense — many of them coming from China — have jumped sharply in 2009, a US congressional committee has reported. Citing data provided by the US Strategic Command, the US-China Economic and Security Review Commission said that there were 43,785 malicious cyber incidents targeting Defense systems in the first half of the year. That's a big jump. In all of 2008, there were 54,640 such incidents. If cyber attacks maintain this pace, the yearly increase will be around 60 percent. The full report (PDF) is available online."
This discussion has been archived. No new comments can be posted.

Cyber Attacks On US Military Jump Sharply In 2009

Comments Filter:
  • targeted attacks? (Score:2, Interesting)

    by sopssa ( 1498795 ) * <sopssa@email.com> on Saturday November 21, 2009 @03:13AM (#30182562) Journal

    What would be interesting to know is that if these are targeted attacks specifically against US military networks, or just random scanning for vulnerabilities by every day botnets? I think it's the later case, because if they were targeted attacks they would be stupid not to hide their origins and you wouldn't know they are from china or similar country. Or maybe they're just playing with people's image of bad china and north korea.

    And since when North Korean's have had internet?

  • define "attack" (Score:5, Interesting)

    by zkrige ( 1654085 ) on Saturday November 21, 2009 @03:29AM (#30182610)
    I have linux boxes all over the place and there are literally thousands of ssh/sft/etc attempts on each box each day. None of them are successful though. Can I claim that my boxes have more attacks than the US Military?
  • by reporter ( 666905 ) on Saturday November 21, 2009 @03:29AM (#30182612) Homepage
    The traditional approach toward dealing with Chinese hackers is to fortify all the computers in a company or institute. Fortification takes time and money.

    A better approach may be to rig some computers so that they are easy to hack. We install some deliberately malicious software on those fake computers. Then, we disperse those fake computers among the real computers.

    Here is the ideal scenario. A typical Chinese hacker will probe all the computers at the Department of Defense. The probe will easily succeed in penetrating one of the rigged computers. He downloads plenty of software. He will then try to run them. One of the ill-gotten applications then replicates itself and spreads throughout the Chinese Ministry of War.

    The rogue application disables the safety mechanism in a Chinese nuclear warhead. On the anniversary of the Chinese invasion of Tibet, the warhead explodes. It melts (literally) the entire military base and kills thousands of Chinese citizens in the nearby town.

    On the day of that fire ball, the Chinese hackers will cease their activities for several months.

  • by Daniel Dvorkin ( 106857 ) * on Saturday November 21, 2009 @03:31AM (#30182618) Homepage Journal

    Are there actually that many more attacks, or are they just detecting more of them? I wouldn't be at all surprised if in years past, a lot of military computers have been pwned without anyone knowing it happened ... especially given the DoD's ongoing love affair with Windows.

  • Re:Garbage (Score:3, Interesting)

    by Hurricane78 ( 562437 ) <deleted&slashdot,org> on Saturday November 21, 2009 @04:02AM (#30182716)

    The PRC is also recruiting from its growing population of technically skilled people, including those from the private sector, to increase its network capabilities. It is recruiting skilled network operators from information technology firms and computer science programs into the ranks of numerous Information Warfare Militia units.

    “network operators”.. “Information Warfare Militia”.. What?
    Try actually reading the linked PDF and see if you can take it seriously. All this stuff about increased “network attack incidences” and I can find absolutely nothing explicitly linking any incident with the Chinese government or anything even making explicit what a “network attack incident” is. (Also “network warfare” is a pretty small part of the report itself; the report isn’t about “network-warfare”, but US-China relations.)

    What’s wrong with that?

    Oooohhh... I seee... Well, there’s a “app“ for that [userscripts.org]! :D

  • Re:define "attack" (Score:3, Interesting)

    by flyingfsck ( 986395 ) on Saturday November 21, 2009 @04:13AM (#30182750)
    Exactly. I get tens of thousands of SSH password attempts per day. Is each one an attack?
  • by WindBourne ( 631190 ) on Saturday November 21, 2009 @04:23AM (#30182770) Journal
    You are simply the result of the many worms working its way through the net. All Western DOD's are under attack and are actively targeted.
  • Re:Garbage (Score:2, Interesting)

    by pspahn ( 1175617 ) on Saturday November 21, 2009 @05:52AM (#30183042)
    Keep in mind that attitudes like this create the same complacency that makes us vulnerable.

    Don't dismiss something at face value because you "feel" there is a political motive behind it. It might hurt, but try to remain objective.

What is research but a blind date with knowledge? -- Will Harvey

Working...