Pentagon servers attacked, but by whom?

Share this article:
Is the Chinese military responsible for recent attacks on Pentagon computers?

That's the question after numerous reports surfaced claiming that the People's Liberation Army of China hacked into a system in the office of U.S. Defense Secretary Robert Gates in June.

In a statement published Tuesday, Pentagon spokesman Bryan Whitman confirmed that a system in Gates' office was hacked in June.

He declined, however, to identify the origin of the attack.

China has denied any involvement in the attacks.

"Cyber- or non-kinetic type threats to military computer networks are viewed as just as real and just as significant as physical or kinetic threats," Whitman said in the statement. "The department aggressively responds to deter all intrusions to defend what is known as the GIG, the global information grid."

Herb Strauss, vice president and national security analyst at Gartner, told SCMagazineUS.com today that finding the origin of possible state-sponsored cyberattacks is no easy task.

"A number of attacks have emanated from China," he said. "This is just one in a series, and the question, the issue that makes it so hard, is answering when it's government-sponsored."

Many countries have developed what Strauss called "military capabilities in cyber-warfare." In addition, he believes that "every country with some form of IT is looking at how to protect itself and how to attack in the event of attack on itself. This was brought home by the Russian attacks on Estonia, which essentially took [Estonian financial institutions] offline.”

Strauss emphasized that just because the attack “originated in China doesn't necessarily make it a Chinese government attack.”

“It could be an attack managed from Bermuda that originated in servers in China," he said.

Strauss said these types of attacks are launched in response to major geo-political events. One such event occurred in April 2001 when a U.S. Navy surveillance plane collided in midair with a Chinese jet fighter.

“[It created a] big flurry of activity, and American citizens not with the government [were] trying to hack into Chinese government sites," he said.

Click here to email West Coast Bureau Chief Jim Carr.

Click here for the latest SC Magazine Podcast: Sept. 4, 2007: How an all-volunteer security organization helps to keep the bad guys in check.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.