Jump to content
Washington DC Message Boards
Sign in to follow this  
Human

Report: White House e-mail system attacked

Recommended Posts

A suggestion to the current administration as well as to the incoming Administration; RUN a SYSTEM WIDE security check on ALL white house computers "AND I DO MEAN ALL".

 

Also whatever programs that have been downloaded by staff unto the computers? MUST BE PERMENANTLY DELETED ASAP.

 

The article does not surprise me in the slightest.

 

-----------------------------------------------------------------------------------------------------------------------

 

http://news.cnet.com/8301-1009_3-10086732-83.html

 

Posted by Robert Vamos

 

It was revealed this week that the presidential campaigns of Barack Obama and John McCain were hacked over the summer. Now, a report has surfaced that the White House has suffered multiple attacks in recent months as well.

 

According to a story by the Financial Times on Friday, U.S. officials have confirmed that the White House e-mail archives were attacked several times in recent months. The report says the National Cyber Investigative Joint Task Force, a new unit established in 2007 to tackle cybersecurity, detected the attacks on the White House, and also traced the attacks back to servers based in China.

 

The quoted source said each time the attack was detected, new defenses were put in place. "It is constant cat and mouse."

 

Overall, the attackers apparently only had access to the unclassified White House computer network. Nonetheless, the data could still have value.

 

The unnamed official quoted within the report speculated that the cyberattacks might follow the "grain of sands" approach used by Chinese intelligence. That involves parsing through often low-level information to find a few nuggets.

Share this post


Link to post
Share on other sites
Guest BlackSun_*

I am not surprised either. We seem to let the Chinese walk all over us.

 

http://www.foxnews.com/story/0,2933,435681,00.html

 

The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned.

 

It is still not known how much information was stolen. But sources inside the bank confirm that servers in the institution's highly-restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July.

 

In total, at least six major intrusions — two of them using the same group of IP addresses originating from China — have been detected at the World Bank since the summer of 2007, with the most recent breach occurring just last month.

 

In a frantic midnight e-mail to colleagues, the bank's senior technology manager referred to the situation as an "unprecedented crisis." In fact, it may be the worst security breach ever at a global financial institution. And it has left bank officials scrambling to try to understand the nature of the year-long cyber-assault, while also trying to keep the news from leaking to the public.

Share this post


Link to post
Share on other sites
Guest Obama-Biden Transition Project

Protect Our Information Networks

 

As president, Barack Obama will lead an effort, working with private industry, the research community and our citizens, to build a trustworthy and accountable cyber infrastructure that is resilient, protects America's competitive advantage, and advances our national and homeland security.

#

 

Strengthen Federal Leadership on Cyber Security: Barack Obama will declare the cyber infrastructure a strategic asset and will establish the position of national cyber advisor who will report directly to the president and will be responsible for coordinating federal agency efforts and development of national cyber policy.

#

 

Initiate a Safe Computing R&D Effort and Harden our Nation's Cyber Infrastructure: Barack Obama will support an initiative to develop next-generation secure computers and networking for national security applications. He will work with industry and academia to develop and deploy a new generation of secure hardware and software for our nation's critical cyber infrastructure.

#

 

Protect the IT Infrastructure That Keeps America's Economy Safe: The public and private infrastructure that keeps America running is increasingly brought online to improve efficiency and reduce costs. Barack Obama will work with the private sector to establish tough new standards for cyber security and physical resilience for critical infrastructure.

#

 

Prevent Corporate Cyber-Espionage: Innovations in software, engineering, pharmaceuticals and other fields are being stolen online from U.S. businesses at an alarming rate. These losses are making America less safe and less competitive and costing us jobs here at home. Barack Obama will work with industry to develop the systems necessary to protect our nation's trade secrets and our research and development.

#

 

Develop a Cyber Crime Strategy to Minimize the Opportunities for Criminal Profit: Barack Obama will shut down the mechanisms used to transmit criminal profits by shutting down untraceable Internet payment schemes. Barack Obama will also initiate a grant and training program to provide federal, state, and local law enforcement agencies the tools they need to detect and prosecute cyber crime.

#

 

Mandate Standards for Securing Personal Data and Require Companies to Disclose Personal Information Data Breaches: Nearly 10 million Americans are victims of identity theft each year, costing more than $55 billion. We must ensure that the privacy of personnel data in computer systems is better protected. The federal government must partner with industry and our citizens to secure personal data stored on government and private systems. An Obama administration will institute a common standard for securing such data across industries and will back strong legislation to protect the rights of individuals in the information age.

Share this post


Link to post
Share on other sites
Guest human_*

BlackSun "straight up" I would love to take a team of techs that I know of to the white house, and make their servers impenetrable.

 

No games No Bull, because to me it is a Respect for that Particular Branch of Government no matter which Party is in charge of That Branch of Government.

 

As for the hackers in China? I hope that the Chinese Government deals with them appropriately.

-----------------------------------------------------------------------------------------------------------------------

[As the Chinese would say "With a Smile, and a Bow".] <~~~~~~~ Since we are on the internet, Western Eyes will not understand what this means.

 

-----------------------------------------------------------------------------------------------------------------------

I am not surprised either. We seem to let the Chinese walk all over us.

 

http://www.foxnews.com/story/0,2933,435681,00.html

 

The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned.

 

It is still not known how much information was stolen. But sources inside the bank confirm that servers in the institution's highly-restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July.

 

In total, at least six major intrusions — two of them using the same group of IP addresses originating from China — have been detected at the World Bank since the summer of 2007, with the most recent breach occurring just last month.

 

In a frantic midnight e-mail to colleagues, the bank's senior technology manager referred to the situation as an "unprecedented crisis." In fact, it may be the worst security breach ever at a global financial institution. And it has left bank officials scrambling to try to understand the nature of the year-long cyber-assault, while also trying to keep the news from leaking to the public.

Share this post


Link to post
Share on other sites
Guest
You are commenting as a guest. If you have an account, please sign in.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
Sign in to follow this  

×