- Man arrested in car bomb plot at Kansas airport
- Prison inmates take up ‘Knockout’ game, target female officers
- U.S. Army hails success with drone-shooting laser
- John Kerry: Israel-Palestinian peace deal paved for April
- India diplomat who touts women’s rights busted for $3 wage to nanny
- MSNBC host Ed Schultz paid $252K by unions in 2012-2013
- Korean War memorial ordered to take down Christian cross
- Billy Graham near death, ‘close to going home to be with the Lord’
- SeaTac, Wash.: City’s new $15 minimum wage heads to court
- Obama mulls support for Islamists in Syria, with conditions
Army defense task force targeting hackers
The U.S. Army has set up a task force to counter the theft of sensitive data by hackers breaking into the computer networks of military contractors.
The Defense Industrial Base Cyber-Security Task Force was quietly established earlier this year, in the face of what an Army document says are continuing large-scale thefts of "controlled unclassified information" from contractor systems.
"Exfiltrations of unclassified data from [military contractor computer] systems have occurred and continue to occur, potentially undermining and even neutralizing the technological advantage and combat effectiveness of the future force," the document says.
At stake is sensitive data "used in the development of war-fighting systems during the acquisition life-cycle." In military lingo, that means information about weapons programs being developed and produced by private-sector contractors.
The document, produced in August for the Pentagon's department for acquisition, technology and logistics and first reported last week by Inside Defense, says that the task force will also address the fact that the increasing use of non-U.S. suppliers "raises the risk that adversaries could insert malicious or counterfeit components into U.S. Army weapons systems."
A report last year from the Defense Science Board warned that the globalization of the supply chain, with software for high-technology systems increasingly developed outside the United States, created targets for unfriendly countries or other U.S. adversaries.
The task force is also coordinating an interagency pilot program to assess the impact of past cyber-attacks against contractors "to determine whether there may have been compromises of data on current and future U.S. Army weapons program, scientific and research projects and war-fighting capabilities that could cause a loss of technological advantage against our adversaries."
The effort will focus on companies making technology for "command control communications, intelligence surveillance and reconnaissance" systems, the document says.
By Mangosuthu Buthelezi
Memories of a long brotherhood tempered in common struggle
- U.S. Navy-China showdown: Chinese try to halt U.S. cruiser in international waters
- Obama birther theories float as Hawaii health director killed in crash
- House budget bargain faces Senate filibuster; Republicans line up to oppose
- PRUDEN: The last living witnesses; they wore the yellow star and remember the Nazi terror
- Obama's Afghanistan experts stumped on U.S. death toll, war costs during hearing
- North Korea's official report on Jang Song Thaek
- Billy Graham near death, close to going home to be with the Lord
- NAPOLITANO: A conspiracy so vast
- James Bond: The spy who is really an alcoholic
- U.S. pilot scares off Iranians with 'Top Gun'-worthy stunt: 'You really ought to go home'
Independent voices from the The Washington Times Communities
Topics will include politics, religion, race, culture, and anything else that needs to be discussed...
Our Choice: Individual responsibility and self-government or the abandonment of the American Revolution
A stat-head’s outlook, direct from his worn in couch cushion.
John Glaser turns his pen toward foreign policy and international relations around the world
Extraordinary day at Redskins Park
White House pets gone wild!
Let it snow