User Tag List

+ Reply to Thread
Results 1 to 5 of 5

Thread: High-tech sabotage Of U.S. defense & security

  1. #1
    Points: 15,875, Level: 30
    Level completed: 43%, Points required for next Level: 575
    Overall activity: 36.0%
    Achievements:
    VeteranTagger Second Class10000 Experience Points
    waltky's Avatar Senior Member
    Karma
    3381
    Join Date
    Oct 2012
    Posts
    3,245
    Points
    15,875
    Level
    30
    Thanks Given
    433
    Thanked 466x in 401 Posts
    Mentioned
    10 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    40

    Angry High-tech sabotage Of U.S. defense & security

    Sabotage with fake tech gear...

    Fake tech gear has infiltrated the U.S. government
    November 8th, 2012 - A record number of tech products used by the U.S. military and dozens of other federal agencies are fake. That opens up a myriad of national security risks, from dud missiles to short-circuiting airplane parts to cyberespionage.
    Despite laws designed to crack down on counterfeiters, suppliers labeled by the U.S. government as "high risk" are increasing their sales to federal agencies. Their presence in government's supply chain soared 63% over the past decade, according to a new study released by IHS, a supply chain management consultancy. Suppliers with the high-risk branding are known to engage in counterfeiting, wire fraud, product tampering and a laundry list of other illicit and illegal behaviors.

    Last year, 9,539 banned businesses were found to have sold technology the government. Roughly 10% of those incidents involved counterfeit parts or equipment. "What keeps us up at night is the dynamic nature of this threat, because by the time we've figured out how to test for these counterfeits, they've figured out how to get around it," said Vivek Kamath, head of Raytheon's supply chain operations. "It's literally on almost a daily basis they change. The sophistication of the counterfeiting is amazing to us." The number of fake tech products floating around in the market quadrupled from 2009 to 2011, according to IHS - and they're sneaking into some high-profile places.

    In September 2010, the Missile Defense Agency found that the memory in a high-altitude missile's mission computer was counterfeit. Fixing the problem cost $2.7 million. Had the bomb launched, it most likely would have failed, the agency said. Two years earlier, the FBI seized $76 million of counterfeit Cisco routers that the Bureau said could have provided Chinese hackers a backdoor into U.S. government networks. A number of government agencies bought the routers from an authorized Cisco vendor, but that legitimate vendor purchased the routers from a high-risk Chinese supplier.

    China continues to be the largest source for counterfeit and pirated goods found in the United States, accounting for 62% of the $178 million in products (with an estimated retail value of $1.1 billion) that the U.S. Customs and Border Protection agency seized last year. Some in Congress have pushed for a crackdown. "Counterfeit parts pose an increasing risk to our national security, to the reliability of our weapons systems and to the safety of our men and women in uniform," Sen. John McCain, a Republican from Arizona, said last year in support of anti-counterfeiting regulations.

    Source

  2. #2
    Points: 126,125, Level: 86
    Level completed: 3%, Points required for next Level: 3,125
    Overall activity: 0%
    Achievements:
    SocialOverdrive50000 Experience PointsVeteran
    GrassrootsConservative's Avatar Senior Member
    Karma
    51529
    Join Date
    Sep 2012
    Location
    Alliance, NE
    Posts
    15,658
    Points
    126,125
    Level
    86
    Thanks Given
    10,243
    Thanked 4,119x in 3,080 Posts
    Mentioned
    125 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    535
    Obama's fault.
    Government cares about people like fishhooks care about fish.

  3. The Following User Says Thank You to GrassrootsConservative For This Useful Post:

    waltky (11-11-2012)

  4. #3

    tPF Moderator
    Original Ranter
    V.I.P
    Points: 750,564, Level: 100
    Level completed: 0%, Points required for next Level: 0
    Overall activity: 99.9%
    Achievements:
    SocialCreated Album picturesOverdrive50000 Experience PointsVeteran
    Awards:
    Discussion Ender
    Peter1469's Avatar tPF Moderator
    Karma
    286094
    Join Date
    Jun 2011
    Location
    Northern VA
    Posts
    111,330
    Points
    750,564
    Level
    100
    Thanks Given
    61,441
    Thanked 44,295x in 31,156 Posts
    Mentioned
    1872 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    2977
    The government is looking for a fix.

    I remember when I was in Iraq we ordered some Sony TV flat screens for our TOC. We got some cheap knock offs with Sony labels and even the cardboard box looked legit.

  5. The Following User Says Thank You to Peter1469 For This Useful Post:

    waltky (11-11-2012)

  6. #4
    Points: 15,875, Level: 30
    Level completed: 43%, Points required for next Level: 575
    Overall activity: 36.0%
    Achievements:
    VeteranTagger Second Class10000 Experience Points
    waltky's Avatar Senior Member
    Karma
    3381
    Join Date
    Oct 2012
    Posts
    3,245
    Points
    15,875
    Level
    30
    Thanks Given
    433
    Thanked 466x in 401 Posts
    Mentioned
    10 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    40

    Red face

    Exposure of Alleged NSA Hacking Tools May Be Warning to US...

    Snowden: Exposure of Alleged NSA Tools May Be Warning to US
    Aug 16, 2016 — National Security Agency leaker Edward Snowden says the exposure of malicious software allegedly linked to his former employer may be a message from Moscow, adding a layer of intrigue to a leak that has set the information security world abuzz.
    Technical experts have spent the past day or so picking apart a suite of tools purported to have been stolen from the Equation Group, a powerful squad of hackers which some have tied to the NSA. The tools materialized as part of an unusual electronic auction set up by a group calling itself "Shadow Brokers," which has promised to leak more data to whoever puts in a winning bid. In a series of messages posted to Twitter, Snowden suggested the leak was the fruit of a Russian attack on an NSA malware server and could be aimed at heading off U.S. retaliation over allegations that the Kremlin was trying interfere in America's electoral process.


    "Circumstantial evidence and conventional wisdom indicates Russian responsibility," Snowden said. "This leak is likely a warning that someone can prove U.S. responsibility for any attacks that originated from this malware server. That could have significant foreign policy consequences. Particularly if any of those operations targeted U.S. allies. Particularly if any of those operations targeted elections."

    Snowden did not immediately return messages seeking additional comment. The NSA did not immediately return emails seeking comment on his claim. Messages sent to an address registered by the Shadow Brokers were not returned. The Equation Group was exposed last year by antivirus firm Kaspersky Lab, which described it at the time as a "God of cyberespionage." Many have since speculated that the NSA is behind the group, although attribution in the field of cyberespionage is a notoriously tricky issue.

    http://www.military.com/daily-news/2...arning-us.html

  7. #5
    Points: 15,875, Level: 30
    Level completed: 43%, Points required for next Level: 575
    Overall activity: 36.0%
    Achievements:
    VeteranTagger Second Class10000 Experience Points
    waltky's Avatar Senior Member
    Karma
    3381
    Join Date
    Oct 2012
    Posts
    3,245
    Points
    15,875
    Level
    30
    Thanks Given
    433
    Thanked 466x in 401 Posts
    Mentioned
    10 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    40

    Angry

    Whether mistake or deliberate, it's out there now...

    Exclusive: Probe of leaked U.S. NSA hacking tools examines operative's 'mistake'
    Thu Sep 22, 2016 | A U.S. investigation into a leak of hacking tools used by the National Security Agency is focusing on a theory that one of its operatives carelessly left them available on a remote computer and Russian hackers found them, four people with direct knowledge of the probe told Reuters.
    The tools, which enable hackers to exploit software flaws in computer and communications systems from vendors such as Cisco Systems and Fortinet Inc, were dumped onto public websites last month by a group calling itself Shadow Brokers. The public release of the tools coincided with U.S. officials saying they had concluded that Russia or its proxies were responsible for hacking political party organizations in the run-up to the Nov. 8 presidential election. On Thursday, lawmakers accused Russia of being responsible. Various explanations have been floated by officials in Washington as to how the tools were stolen. Some feared it was the work of a leaker similar to former agency contractor Edward Snowden, while others suspected the Russians might have hacked into NSA headquarters in Fort Meade, Maryland. But officials heading the FBI-led investigation now discount both of those scenarios, the people said in separate interviews.

    NSA officials have told investigators that an employee or contractor made the mistake about three years ago during an operation that used the tools, the people said. That person acknowledged the error shortly afterward, they said. But the NSA did not inform the companies of the danger when it first discovered the exposure of the tools, the sources said. Since the public release of the tools, the companies involved have issued patches in the systems to protect them. Investigators have not ruled out the possibility that the former NSA person, who has since departed the agency for other reasons, left the tools exposed deliberately. Another possibility, two of the sources said, is that more than one person at the headquarters or a remote location made similar mistakes or compounded each other's missteps. Representatives of the NSA, the Federal Bureau of Investigation and the office of the Director of National Intelligence all declined to comment.


    After the discovery, the NSA tuned its sensors to detect use of any of the tools by other parties, especially foreign adversaries with strong cyber espionage operations, such as China and Russia. That could have helped identify rival powers’ hacking targets, potentially leading them to be defended better. It might also have allowed U.S officials to see deeper into rival hacking operations while enabling the NSA itself to continue using the tools for its own operations. Because the sensors did not detect foreign spies or criminals using the tools on U.S. or allied targets, the NSA did not feel obligated to immediately warn the U.S. manufacturers, an official and one other person familiar with the matter said. In this case, as in more commonplace discoveries of security flaws, U.S. officials weigh what intelligence they could gather by keeping the flaws secret against the risk to U.S. companies and individuals if adversaries find the same flaws. Critics of the Obama administration's policies for making those decisions have cited the Shadow Brokers dump as evidence that the balance has tipped too far toward intelligence gathering.

    The investigators have not determined conclusively that the Shadow Brokers group is affiliated with the Russian government, but that is the presumption, said one of the people familiar with the probe and a fifth person. One reason for suspecting government instead of criminal involvement, officials said, is that the hackers revealed the NSA tools rather than immediately selling them. The publication of the code, on the heels of leaks of emails by Democratic Party officials and preceding leaks of emails by former U.S. Secretary of State Colin Powell, could be part of a pattern of spreading harmful and occasionally false information to further the Russian agenda, said Jim Lewis, a cybersecurity expert at the Center for Strategic and International Studies. "The dumping is a tactic they've been developing for the last five years or so," Lewis said. "They try it, and if we don't respond they go a little further next time."

    http://www.reuters.com/article/us-cy...-idUSKCN11S2MF

+ Reply to Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts


Critical Acclaim
Single Sign On provided by vBSSO