海角大神

Modern field guide to security and privacy

Chinese hackers penetrating key computer networks for Pentagon

A Senate investigation focused on the 鈥榮ophisticated鈥 cyberincursions into the computer systems of contractors for US Transportation Command, which plays a crucial role in the military鈥檚 response to global crises.

Hackers from the Chinese military have repeatedly penetrated key computer networks for the Pentagon, potentially compromising US military operations, warns a newly declassified Senate investigation.

One year in the making, the bipartisan report, released Wednesday, focused on the 鈥渟ophisticated鈥 cyberincursions into the computer systems of contractors for US Transportation Command.

While TRANSCOM is one of the lesser-known and seemingly less-captivating commands, it is integral to the mobilization and deployment of US military forces and plays a crucial role in the military鈥檚 response to crises around the world.

鈥淲hat we found is very disturbing,鈥 Sen. Carl Levin (D) of Michigan and chairman of the Senate Armed Services Committee, said Wednesday in a briefing with reporters.聽

In a 12-month period beginning in June 2012, there were at least 20 sophisticated cyberincursions into contractor systems, all of which 鈥渙riginated with the Chinese government,鈥 Senator Levin said, adding that the Chinese military stole documents, flight details, and passwords from encrypted e-mails.

These cyberattacks have the 鈥減otential to impact military operations,鈥 since the private sector plays 鈥渁 crucial role鈥 in US military force mobilization and deployment, according to the report.

Roughly 90 percent of the Pentagon鈥檚 ability to transport troops, for example, and more than one-third of its bulk cargo capability are supplied by private airlines, which are particularly vulnerable to these attacks.

This is in large part because the 鈥渙verwhelming majority鈥 of Defense Department deployment and distribution records 鈥 more than 90 percent 鈥 are kept on unclassified computer systems.

While that news is 鈥渂ad enough,鈥 Levin said that a second key finding of the investigation 鈥渋s, frankly, just as disturbing.鈥

This is the realization that the vast majority of cyberattacks simply aren鈥檛 being reported by the government contractors. In the rare event they are, that news 鈥渋sn鈥檛 getting to where it needs to go in order to protect the security of US military operations,鈥 he said.

The report found that of 20 major security breaches into the computer systems of contractors investigated by Senate staffers, TRANSCOM was made aware of only two and 鈥渨as in the dark about the vast majority of intrusions.鈥

The problem is that there is not a clear mechanism for the private sector to report these intrusions, said Sen. James Inhofe (R) of Oklahoma and the ranking member of the Senate Armed Services Committee, at the briefing with reporters.

New bipartisan measures sponsored by both senators will create a 鈥渃learinghouse鈥 for private contractors to report these computer incursions, which will relieve contractors 鈥渙f some of the responsibility for inadvertently not reporting [cyberattacks] when they should be reported,鈥 Senator Inhofe noted. 鈥淭hese are serious offenses.鈥

Director of National Intelligence James Clapper recently warned that cybertheft 鈥渋s almost certainly allowing our adversaries to close the technological gap between our respective militaries.鈥

What鈥檚 more, the report warns, US officials who study Chinese military planning have raised the alarm that China could use cyberattacks to keep US troops from deploying during a vital operation 鈥 by using cyberincursions to corrupt information that relates to supplies or troop convoys, for example.

The problem, Levin said 鈥 paraphrasing recent remarks from Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff 鈥 is that 鈥渨e can鈥檛 stop a cyberattack unless we see it.鈥

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
海角大神 was founded in 1908 to lift the standard of journalism and uplift humanity. We aim to 鈥渟peak the truth in love.鈥 Our goal is not to tell you what to think, but to give you the essential knowledge and understanding to come to your own intelligent conclusions. Join us in this mission by subscribing.
QR Code to Chinese hackers penetrating key computer networks for Pentagon
Read this article in
/World/Passcode/2014/0917/Chinese-hackers-penetrating-key-computer-networks-for-Pentagon
QR Code to Subscription page
Start your subscription today
/subscribe