Government facilities targets of cyber attacks

BOSTON Wed Jul 6, 2011 7:50pm EDT

Related Topics

BOSTON (Reuters) - Two U.S. government-funded research laboratories and a defense contractor were targets of a "highly sophisticated" cyber attack last week, representatives of the organizations said, the latest in a string of assaults on U.S. interests.

The attacks struck Pacific Northwest National Laboratory (PNNL) in Richland, Washington; Thomas Jefferson National Laboratory in Newport News, Virginia and Battelle Corp, a government contractor that manages PNNL.

The three shut down Internet access on Friday, when they became aware of the attacks, they said. The two laboratories have yet to restore access to their external websites.

"The good news is no classified information has been compromised or is in danger from this attack," said PNNL spokesman Greg Koller. "At this time, we have not found any indication of 'exfiltration' of information from our unclassified networks as well."

The attack follows cyber assaults that shut down network access at Lockheed Martin Corp, the Pentagon's No. 1 supplier by sales, and the Oak Ridge National Laboratory, which is managed by UT-Battelle for the U.S. Energy Department.

In Washington, retired Air Force General Michael Hayden, a former director of central intelligence and ex-head of the Pentagon's National Security Agency, said on Wednesday that growing cyber threats were pushing security planners into uncharted territory.

"This is really hard for us to think about," he told a forum on cyber deterrence hosted by the Potomac Institute for Policy Studies, a nonpartisan research group focused on science and technology. "If we don't act boldly, something really bad is going to happen. Then we'll over-react."

James Mulvenon, a specialist on the Chinese military and Chinese cyber issues at Defense Group Inc, a consultant to the U.S. intelligence community, told the same forum that the United States must operate on the assumption that its networked systems already have been penetrated by foes.

U.S. strategy, he said, should be to enhance "resilience" so that the United States can recover relatively quickly from possible cyber-enabled attack.

Recently, a group of private experts briefed a U.S. intelligence audience about how they could go 90 percent of the way toward bringing down a major U.S. city's vital systems without anyone being able to tell, Michael Tiffany, a cyber security expert, told the session.

"Force multiplication is cheap," said Tiffany, chief architect at Recursion Ventures, a security technologies company. "And there are no indicators of force buildup" when malicious code is carefully inserted into a system.

(Reporting by Jim Finkle in Boston and Jim Wolf in Washington; Editing by Derek Caney, Richard Chang and Tim Dobbyn)

We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. For more information on our comment policy, see
Comments (1)
kschltr wrote:
Cyber attacks are going to continue while Human Intelligence Operations grow unchecked within the borders of all developed and developing nations. The Maddoff NASDAQ Ponzi Scheme was NOT designed by Maddoff and was NOT for his personal profit. It was a covert operation designed to create a mechanism by which a group of investors could manipulate and entire Market Index remotely and leave someone like Maddoff holding the bag. He was just doing his daily Technical Analysis and felt the need to send a signal via a LARGE POSITION CHANGE whenever the Index was performing dangerously outside of Technical Analysis expectations, thereby creating a potential risk to, not only the NASDAQ, but the S&P and DOW et al as well if it were driven too high or too low by manipulators here and abroad who just watched Bernie’s trading behavior for a signal to change there own positions. This is necessary in order for such large scale financial schemes to be effective. Economics IS WAR in a globalized trading arena. CYBER CRIMINALS AND THEIR APPARATUS REQUIRE HUMAN INTERFACES IN ORDER TO DEFLECT SUSPICION AWAY FROM THE SOURCES OF INFECTION AND MANIPULATION. THESE SCHEMES REQUIRE HUMAN AND ELECTRONIC DEPOSITORIES FOR THE COLLECTION OF DATA WHICH DEFLECT SUSPICION AND CREATE A MASK BEHIND WHICH THE ENEMIES OF THE PEOPLES OF ALL NATIONS CAN HIDE. SO, THEY WILL HIDE AMONG ALL PEOPLES AND ALL NATIONS TO DEFLECT SUSPICION FROM THEMSELVES.

Jul 07, 2011 1:45pm EDT  --  Report as abuse
This discussion is now closed. We welcome comments on our articles for a limited period after their publication.