Krypt3ia

(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

JSF Data: All are data belong to us!

leave a comment »

Hackers break into Pentagon’s fighter jet project

Hackers allegedly downloaded terabytes of data before they were discovered
By Sumner Lemon , IDG News Service , 04/21/2009

Hackers broke into U.S. Department of Defense computers and downloaded terabytes of data containing design information about the Joint Strike Fighter, a $300 billion stealth fighter currently under development, according to The Wall Street Journal.

The stolen files all relate to the design of the Joint Strike Fighter and its electronic systems, The Wall Street Journal reported, saying they could be used to help defend against the jet.

However, the most sensitive files were not compromised since they are stored on computers that are not connected to the Internet, the report said.

The reported attack raised more questions than it answered.

For example, the report did not say how attackers managed to download terabytes of data before being discovered. A single terabyte can take up to several weeks to download over a relatively fast data connection, such as a DSL or cable modem.

The report also suggested China could be behind the stolen data, noting that investigators believe the attack originated in China. However, it said the exact identities of the people behind the attack had not been established.

DOH! So, are we so sure that those “other” systems weren’t connected to the intranet at the very least? C’mon, you know you wanna admit that they were! Ugh, oddly enough I had a conversation with someone in the rings who complained that things were not being done right… Gee…

Of course do you have any idea how long it would have taken to exfiltrate a terabyte of data? A couple weeks at least! So, who was at the switch here? I mean, no one had an IDS or any other monitoring tool network wise to see massive amounts of data being pumped out of their network?

I think that GD and SECDEF Gates need to really step up the hiring process for “Hackers” to protect our networks….

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: