Military Review

The Pentagon is in shock: hacking into the electronic systems of the US armed forces is easy

According to representatives of the Accounts Chamber of the United States of America, the cybersecurity of new electronic systems that control most of the country's strategic types of weapons was at a very low level. Specialists who test the complexity of connecting or penetrating into such Pentagon systems have revealed more than a hundred weak points and not less weak links in the electronic protection circuits.

Using only standard computer facilities, US IT auditors were able to connect to the Pentagon’s security system and a number of other complexes that control, among other things, the remote control of satellites and air defense radars throughout the country.

At the same time, these potential hackers went unnoticed by the full-time administrators and military operators of these systems, which further aggravates the situation with the cybersecurity of such military complexes. In addition, it turned out that most of the communication channels used by the US military are unencrypted, and by connecting to them, you can get practically important confidential information.

The last thing that the report of the American Accounting Chamber points to is the fact that far from everything was able to test. Most likely, the found flaws in the virtual security of the electronic military systems of the United States are only a small part of all the existing problems in this sector of the army, as a rule, classified information. The Pentagon has lately preoccupied with this problem, and now ITs in khaki have to work hard to bring all US combat systems to the proper level of cyber defense.

On the other hand, such reports in the United States are most often aimed at getting another portion of funding from the budget. Fortunately, in this case, the reason is "relevant" - the need to protect against "Russian hackers."
Photos used:

Subscribe to our Telegram channel, regularly additional information about the special operation in Ukraine, a large amount of information, videos, something that does not fall on the site:

Dear reader, to leave comments on the publication, you must sign in.
  1. NEXUS
    NEXUS 10 October 2018 11: 55
    Captains evidence ...
    1. Shurik70
      Shurik70 10 October 2018 12: 55
      If the stars are lit, someone needs it.
      If this information was allowed in the media, it means that another fake about "mean hackers" is being prepared.
      It remains only to choose which ones. Russian, Chinese, Iranian, or North Korean.
  2. Kurare
    Kurare 10 October 2018 11: 58
    Fortunately, in this case the reason is "relevant" - the need to protect against "Russian hackers".

    Here is the quintessence of this test! Dengi, give more dengi!
    1. Berber
      Berber 10 October 2018 16: 50
      I have the impression that Hollywood specifically formatted their brains. They live in an illusory world.
  3. DMoroz
    DMoroz 10 October 2018 12: 01
    it’s our hackers who haven’t tested them yet ... while they are busy with the Netherlands, England and others who are closer ... yes
  4. The comment was deleted.
  5. Alexander Galaktionov
    Alexander Galaktionov 10 October 2018 12: 04
    The Pentagon is in shock: hacking into the electronic systems of the US armed forces is easy
    passwords 123123 123321 or 12348765 laughing
    1. rocket757
      rocket757 10 October 2018 12: 07
      Oh! How did they know the password for "my" bank account in Switzerland ???
    2. Jerk
      Jerk 10 October 2018 12: 11
      their digital passwords are different, tolerant. "3-2-races" winked Well there - Obama 3-2-races. McCain 3-2-races. Nicky Haley, although a woman, but still 3-2 races
  6. Yrec
    Yrec 10 October 2018 12: 05
    To have competent IT specialists at all levels, no budget is enough. Even the Pentagon. Here shame through the holes and peeps. This is also our MO, including.
    1. Berber
      Berber 10 October 2018 12: 21
      Our closed networks are physically separated from the open ones, and they have software. Although good intelligence, and so everything can dig up. Only the cost of such information is much more expensive.
      1. Jerk
        Jerk 10 October 2018 12: 32
        Comrade bАSHIROV laughing They also send keys to launch ICBMs by mail - there is no courier service. So you and Petrov’s work is no end ...
        1. Berber
          Berber 10 October 2018 12: 34
          And here they identified. laughing
      2. Henderson
        Henderson 10 October 2018 12: 42
        Quote: BerBer
        We have closed networks separated from open ones physically

        and many other tales

        According to "Fontanka", users of the website of the Ministry of Defense can find out the salary, position and place of service if they indicate the date of birth and personal number of the soldier in the personal account. As an example, the publication used information about the pilot Roman Filipov who died in Syria.
        1. Berber
          Berber 10 October 2018 12: 44
          This is not a fairy tale, I know for sure. Here the problem is the separation of open and closed information.
          1. Henderson
            Henderson 10 October 2018 15: 31
            Quote: BerBer
            Here the problem is the separation of open and closed information.

            about that and speech.
            Even the physical separation of networks gives absolutely no guarantee of hacking the system and access to confidential information.
        2. Berber
          Berber 10 October 2018 12: 47
          As far as I remember, unclassified salary lists have the chipboard signature stamp (For official use).
        3. sogdy
          sogdy 10 October 2018 14: 21
          6,1 + 7 + 95 + 1 = adnaka, 146% is obtained.
          I’m not even talking about the fact that "OS on the platform is supposedly" - these are EU networks, exclusively internal.
          Solaris and Unix require their own iron. Did someone Herman personally climb into Solaris?
          MS DOS, MS aircraft - station _fourth_ level. Would you like to contact them? Flag in hand, drum ...
          I would like to see the staff on Novella ... From $ 1000 to $ 20000 per seat.
          65% Windows NT - do we have so many 3-5 stumps? 486-5x-x6? And where else will you stick NT3-NT4? And yes, this is an office only. Now (10-15 years already) even 1C will not pull.

          Something is wrong with your Fontanka ...
          1. Henderson
            Henderson 10 October 2018 15: 29
            Quote: sogdy
            6,1 + 7 + 95 + 1 = adnaka, 146% is obtained

            Adnaka on the same processor Elbrus is used simultaneously by Windows and Linux. 200% adnaka.
            Quote: sogdy
            Solaris and Unix require their own iron.

            strange, they work quietly on my x86 laptop without problems
            Quote: sogdy
            Windows NT - do we have so many 3-5 stumps?

            Windows NT is, incidentally, both XP and Vista and 7,8,10. They work quietly on any modern hardware.
            Chota with your knowledge of IT is not so.
  7. Ros 56
    Ros 56 10 October 2018 13: 37
    This is the zeal of the striped, and what will happen if the Russian hackers get in there, hang on the striped, you have a khan.
    1. sogdy
      sogdy 10 October 2018 14: 29
      Quote: Ros 56
      it will be if Russian hackers get in there

      Yes, it’s not interesting there. The main supply lists of the National Guard, which, vashcheta, is supplied by the administration of each state. Armament and ammunition formed 30 years ago, have not changed. And those who sometimes work and study - rangers and FSB - are absent there. External bases (the same deployment forces) circulate in the Ministry of Justice.
  8. voyaka uh
    voyaka uh 10 October 2018 15: 03
    All major armies are now setting up cyber security departments. They mobilize the best hackers. Often they are taken directly from prisons or "service instead of imprisonment."
  9. alstr
    alstr 10 October 2018 19: 36
    Hmm. Nothing has changed in half a century. But there was a real story when one comrade took the data from the film. And lo and behold, the phone and password came up.
  10. Carib
    Carib 11 October 2018 08: 52
    As I understand it, the next time the Arab hijackers, more precisely the Pentagon, put the gold depository, the New York Stock Exchange, at the same time turning off the Radars, so that the air defense would not interfere ... laughing
  11. gridasov
    gridasov 11 October 2018 09: 50
    Binary code is a linear recording of information code. Therefore, it is always mathematically and practically possible to access the system. It’s like that ball that will lead to the goal. On the contrary, the multipolar code based on the numbers of the series is built on the principle of algorithms and a spatial recording model. Therefore, the resource-intensiveness in the recording options does not allow to crack such systems on any data arrays. This is our future with the expanding volumes of inflation and all the properties associated with them.