Military Review

US Air Force Launches Newest Cyber ​​Attack System

57
The US Air Force began to use a new system that protects computers departments from hacker attacks, reports TASS the message "The Wall Street Journal".




The Pentagon announces the new product as "armory system ”, one of the most powerful of its kind, capable of protecting up to a million users.

“In simple terms, this is a very solid barrier,” the newspaper quotes the words of Colonel VVS Pamela Vuli. “It allows you to check the incoming flow of information for the presence of any computer viruses and block them.” The system is constantly updated.

“It is becoming more complex every day,” Vuli added. - The new tool in the Pentagon’s digital arsenal is intended only for protection and cannot be used to attack other people's computers. We are not currently trying to use the cyber sphere for military purposes. "

“We are definitely not trying to operate outside the Air Force network,” she said.

According to the newspaper, weekly committed "several billion attempts to establish an unauthorized connection with the US Air Force computers." According to the military, their "networks are constantly under attack in the cybersphere."

Due to hacker attacks, the Pentagon is currently looking for a suitable option to create additional cyber units, staffed by officers.

“Together with the National Guard and reserve forces, we are looking for a way to recruit and mobilize them, how to manage them. Many incidents happen. Not that they are needed for a year, they are usually needed for about ten days, ”said Edward Cardon, head of the US Cyber ​​Command Command.

Now in the structure of the Pentagon, 133 of the cyber squad function, in which 9 thousand military men serve. This year their number is planned to increase to 41 thousand.
Photos used:
http://www.globallookpress.com/
57 comments
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. aszzz888
    aszzz888 30 January 2016 10: 59
    22
    I wonder how long does it take for the next student to crack this "newest system"? laughing
    1. bort4145
      bort4145 30 January 2016 11: 03
      +8
      It gets complicated every day, ”Wooley added.
      It will "catch up" itself, but there will be "helpers"
    2. Sly
      Sly 30 January 2016 11: 05
      12
      the system is constantly updated from Kaspersky servers)))
      1. smershxnumx
        smershxnumx 30 January 2016 17: 11
        +1
        And what? Avast Free will help them laughing laughing laughing
    3. MIKHAN
      MIKHAN 30 January 2016 11: 06
      43
      The joke was remembered:
      Chinese hackers ...
      After simultaneously 20 Chinese hackers were constantly typing the login and password "Mao Zedong" on the NATO server ... The NATO server agreed and gave access! laughing
      1. dr.Bo
        dr.Bo 30 January 2016 11: 43
        +4
        “We are definitely not trying to operate outside the Air Force network,” she said.
        If he says so, then 100% of the system will be used to attack others !! I.M.Kh.O. hi
    4. oldseaman1957
      oldseaman1957 30 January 2016 11: 12
      +3
      Quote: aszzz888
      I wonder how long does it take for the next student to crack this "newest system"?
      - Izya and Motya scratched their turnips ... John became nervous: Kaspersky asks too much for antiviruses! Kaspersky thought: and why do I give half the fat to these revs? !!!
    5. yushch
      yushch 30 January 2016 11: 12
      0
      It’s not logical, why should everyone be warned about this? Perhaps it would be easier for someone to get around this system? Warned bully means armed.
      1. SRC P-15
        SRC P-15 30 January 2016 11: 21
        12
        It allows you to check the incoming stream of information for any computer viruses and block them. "

        America still has not understood Russia: we need to be checked at the exit! laughing
      2. Vita vko
        Vita vko 30 January 2016 11: 33
        +1
        Quote: yushch
        It’s not logical, why should everyone be warned about this?

        This is like a report for the spent billions of dollars of American taxpayers' funds, and at the same time a way to "let the ardor and eyes" of the holders of the American public debt before the elections.
        Information technology has long been the most effective means of laundering budget funds around the world.
      3. Darkoff
        Darkoff 30 January 2016 20: 31
        +3
        Quote: yushch
        It’s not logical, why should everyone be warned about this? Perhaps it would be easier for someone to get around this system? Warned bully means armed.

        Right! I’m sure there are brainy guys who will perceive this news as a challenge ...
        For every tricky fifth point, sooner or later there is ... with a screw.
        And another law of dialectics: the evolution of defenses is always behind the evolution of means of destruction.
        1. avdkrd
          avdkrd 1 February 2016 00: 16
          0
          Quote: DarkOFF
          Right! I’m sure there are brainy guys who will perceive this news as a challenge ...
          For every tricky fifth point, sooner or later there is ... with a screw.
          And another law of dialectics: the evolution of defenses is always behind the evolution of means of destruction.

          So the Yankees are constantly announcing the next super system, and no matter in which area. They have a super F35 plane, there is a super destroyer Zumwalt, now here is a super cyber defense))))
          Apparently they do not know that any superiority within the "armor-shell" system is temporary.
      4. although
        although 30 January 2016 20: 34
        +1
        Quote: yushch
        It’s not logical, why should everyone be warned about this? Perhaps it would be easier for someone to get around this system? Forewarned is forearmed.

        It is just logical, otherwise how to organize testing of this system? to invest a few more lard ye, on testers alone? and here the "smartest" will do all the work for free, they will only have to evaluate the results and make changes.
    6. region58
      region58 30 January 2016 12: 59
      +2
      Quote: aszzz888
      I wonder how long does it take for the next student to crack this "newest system"?

      Yeah, Windows7 was hacked a few hours after the presentation, which just said that it was super reliable, as far as I remember our children.
      1. flay
        flay 30 January 2016 16: 24
        +1
        Unfortunately not ours. The Chinese opened the flaw first, how to activate the seven.
        Well, ours a bit later, activators also wrote
    7. Lord of the Sith
      Lord of the Sith 30 January 2016 13: 02
      +4
      Now in the structure of the Pentagon there are 133 cyber squads, in which 9 thousand military men are serving. This year their number is planned to increase to 41.

      9 thousand "daughters of a Russian officer" and all sorts of trolls wassat
    8. xenod55
      xenod55 30 January 2016 14: 23
      +1
      It seems that the wait for attempts to break into the new cyber system of amers is not long. Announced, then attracted attention. And all the hackers are VERY curious guys. We are waiting.
    9. Saburov
      Saburov 30 January 2016 14: 40
      +2
      The best defense against cyber attacks!
  2. NIKNN
    NIKNN 30 January 2016 10: 59
    +7
    Kaspersky to help them. lol
  3. SRC P-15
    SRC P-15 30 January 2016 10: 59
    +5
    "There's a threaded bolt on every tricky ass."
  4. avvg
    avvg 30 January 2016 10: 59
    +1
    There is no doubt that omniscient Hackers will find a way to hack the Pentagon account. This is just one way to cut the US military budget.
  5. Rassamaha
    Rassamaha 30 January 2016 10: 59
    +1
    genesis reverse report went
  6. Sinecote
    Sinecote 30 January 2016 11: 01
    +2
    According to the newspaper, "several billion attempts to establish an unauthorized connection to the US Air Force computers are made weekly."
    Yeah! From the US Air Force.
    1. Tatyana
      Tatyana 30 January 2016 11: 37
      0
      Sinecote
      Yeah! And from the US Air Force?

      And on the part of the US Air Force, trying to establish an unauthorized connection with the computers of the Air Forces of other countries is, in principle, not prohibited at all, because they, the Americans, are "chosen ones"! They can - they have already allowed themselves this long ago. Do not even doubt it!
      Thus, the US Air Force computer system will work both on defense and on attack! And why should people hang noodles on their ears? Would be silent better.
  7. Sirocco
    Sirocco 30 January 2016 11: 01
    +7
    Well? for a while it will save them, but given that the human mind is very curious, and that what man has created, the same thing can be destroyed or hacked. The struggle of brains, so we begin with education, and financing, so that these brains would work for our benefit, and the adversary would be jealous)))))
    1. GRAY
      GRAY 30 January 2016 11: 08
      +6
      Quote: Sirocco
      and that which is created by man, the same by him, can be destroyed, or hacked.

    2. Pajamas
      Pajamas 30 January 2016 12: 13
      +5
      Quote: Sirocco
      Well? for a while it will save them, but given that the human mind is very curious, and that what man has created, the same thing can be destroyed or hacked. The struggle of brains, so we begin with education, and financing, so that these brains would work for our benefit, and the adversary would be jealous)))))

      I don’t know if it’s upsetting you, but ciphers already exist, hacking them will require so much resources and time that there simply isn’t any real information for such a value, in particular, just imagining a system where the key is several times longer than the message itself.

      According to the read comments - weak prepared comrades confuse hacking systems with writing malware, searching for system vulnerabilities and creating vulnerabilities are two different things.

      According to sabzh, the weakest link is not a machine, but a person, it is often much easier to "hack" it - social engineering, neuro-linguistic programming, negligence.
      So a million "protected" users will fix it themselves))
      1. Sirocco
        Sirocco 30 January 2016 15: 23
        0
        Quote: Pajama
        I don’t know whether it’s upsetting you, but there are already ciphers, breaking them will require so much resources and time,

        How do you upset me? I am not special programming, I am a simple user. So bribes are smooth)))
        I’m talking about what, in the 80s, a circular grinding machine from Siemens came to the plant, so our engineers, so as not to bother with air conditioning, air filtration, plus positioning. A few days broke their heads and circuits, and started the machine.
        Something like this.
        1. Old shoe
          Old shoe 30 January 2016 17: 58
          +1
          so here are our engineers, so as not to bother with air conditioning, air filtration, plus positioning
          Well, getting around blocking a big mind is not required. And what, positioning is also disabled ??? laughing Well ... But seriously, how did this affect the accuracy of processing and increase the flow of equipment failures? All my life I worked on the repair of CNC machines and I know what I’m talking about (though I didn’t do such things myself, but I know how it happened at other enterprises). It would seem: obana! It works without filtering and without cooling! It’s only after a couple of months that it turns out that the accuracy does not give and the electronics began to pour in. That saved on air conditioners ...
        2. Pajamas
          Pajamas 31 January 2016 00: 31
          0
          I don’t have anything against it, just not everything can be hacked.
    3. cap
      cap 31 January 2016 05: 17
      0
      Quote: Sirocco
      Well? for a while it will save them, but given that the human mind is very curious, and that what man has created, the same thing can be destroyed or hacked. The struggle of brains, so we begin with education, and financing, so that these brains would work for our benefit, and the adversary would be jealous)))))


      Offended student hacked the St. Petersburg exam site (1 screenshot)
      Posted by: TriniBot
      17-06-2012, 21:46


      "The official website of the St. Petersburg Unified State Exam (ege.spb.ru), which published the results of the state exam,
      was hacked by an unknown hacker who did not pass the exam :)
      In the afternoon of June 15, a message appeared on the site: “After passing the exam, I don’t have enough points to enter the computer security faculty. They will have to provide work for those who have entered. ”
      Also on the website of the exam was posted images of a man in a mask of Guy Fawkes,
      characteristic of the hacking movement called Anonymous. "

      Old information about "safety" but actual. There is no true endings in the style of "everyone is happy and satisfied". And it's not clear how the guy with the exam is. And if you imagine that he has already graduated from the university, it is too early for Americans to rejoice hi .
  8. Primus pilus
    Primus pilus 30 January 2016 11: 02
    +3
    Interestingly, Snowden came in handy or not?
  9. Magic archer
    Magic archer 30 January 2016 11: 02
    +2
    I’m curious how soon some hacker breaks into the protection of some F-35 and steals it ?!
  10. hartlend
    hartlend 30 January 2016 11: 07
    0
    I wonder why only in the US Air Force? Apparently all the secrets are only in the Air Force.
  11. spech
    spech 30 January 2016 11: 08
    +5
    Better not to say laughing
  12. Masya masya
    Masya masya 30 January 2016 11: 12
    +4
    The US Air Force announced a competition: "who will quickly hack the latest system that blocks cyber attacks"
  13. Anchonsha
    Anchonsha 30 January 2016 11: 15
    +1
    It’s good if you can make free money and there’s nothing for you. So the United States uses its worthless green leaflet for them, releasing fabulous sums of money for war around the world, for coups, bribing the brazen pro-salesmen, including those from Russia, to work for them. But when is it supposed to end, and what will become of the vile Merika?
  14. ochakow703
    ochakow703 30 January 2016 11: 17
    +2
    Well, I’m not a hacker, and not even a gamer, but it’s also become interesting - will it break, will it not break? Imagine how itchy hands of people who understand this ...
    1. APASUS
      APASUS 30 January 2016 11: 47
      0
      Quote: ochakow703
      Well, I’m not a hacker, and not even a gamer, but it’s also become interesting - will it break, will it not break? Imagine how itchy hands of people who understand this ...

      China will launch its Tianhe-2 (Milky Way-2), with a performance of 33,86 petaflops so that it changes all the ignition keys to F-22 laughing
  15. valent45
    valent45 30 January 2016 11: 21
    0
    And in the states they saw money, how awesome!
  16. gelezo47
    gelezo47 30 January 2016 11: 21
    0
    There is a saying: For every cunning jo ... there is a cunning horseradish! ... I do not think that this system will live long ...
  17. LÄRZ
    LÄRZ 30 January 2016 11: 25
    +3
    According to the newspaper, "several billion attempts to establish an unauthorized connection to the US Air Force computers are made weekly."
    Have you tried to disconnect from the network? "........" S. Lavrov.
  18. izya top
    izya top 30 January 2016 11: 28
    +4
    But just did not try to disconnect a departmental network from the Internet?
    Russian hackers hacked the on-board computer of the Russian SU-27 fighter, now the aircraft has an infinite number of missiles
  19. Yak28
    Yak28 30 January 2016 11: 28
    +2
    Here is our answer to American electronic engineers hundreds of years in advance
  20. Great-grandfather of Zeus
    Great-grandfather of Zeus 30 January 2016 11: 34
    0
    If you launched the latest system, then you didn’t see the old one at all — does any preschooler hack?
  21. yuriy55
    yuriy55 30 January 2016 11: 37
    +3
    Now in the structure of the Pentagon are functioning 133 cyber squadsin which serve 9 thousand military. This year their number planned to increase to 41.


    I don’t know how it is with the cyber squads, but there is something with arithmetic ... what
    1. Thunderbolt
      Thunderbolt 30 January 2016 12: 14
      +1
      Maybe up to 41 thousand cyberwarfare?
  22. VALERIK_097
    VALERIK_097 30 January 2016 11: 40
    +1
    Quote: which serve 9 thousand military. This year their number is planned to be increased to 41.
    Good increase with a minus sign)))))
    1. hrapon
      hrapon 30 January 2016 12: 10
      +3
      Quote: VALERIK_097
      Quote: which serve 9 thousand military. This year their number is planned to be increased to 41.
      Good increase with a minus sign)))))


      For some reason, 41 immediately presented itself with thousands of military bespectacles who cut into World of tanks and still win the Global Tank Battle, following which the State Department requires indemnities ..
  23. Riv
    Riv 30 January 2016 12: 01
    +4
    Have they finally installed an antivirus? Well done ... I hope not "Pandu"?
  24. Stinger
    Stinger 30 January 2016 12: 53
    0
    No guys, Bill Gates has our guys working.
  25. mark2
    mark2 30 January 2016 13: 59
    +1
    The most reliable system from external cyberattacks is disconnecting servers from the system. I pulled out the cord and that’s all) Not a lock that can’t pick up a key. If the key is not selected, then the lock can be broken! right?)
    Bullshit is all that. It seems that in all spheres of human activity they are trying to incorporate certain rules of use. And even after that, the implementers are sure that it will be according to these rules that everyone will act.
    Tell me, which one of you will puzzle us to open a padlock on a barn with a lost key? they simply knock it down or cut it off. then buy a new one
    Similarly, in data protection systems. Hacking the system makes sense when there is a need to "hijack" some data so that the enemy could not find out about it for some time. When the task is to "drop" the server, there are already other methods. There is no need to strive to preserve, you just need to break.
    Here in American films, the cliche is very common, that if a thief crawls into the house, then for some reason he crawls through the glass door, trying to open the lock that locks it? Why, when can you just break the glass? Or is the thief worried about the order that you must definitely leave behind?)
    All protection systems are designed for non-professionals. A professional will always solve the problem.
  26. Alexfu
    Alexfu 30 January 2016 14: 14
    +1
    The low-level programming language is so designed that the protection, I emphasize, can be circumvented by any protection (read the book by Chris Kaspersky) and only then find a way to crack it.
  27. Mikhail Krapivin
    Mikhail Krapivin 30 January 2016 14: 28
    +2
    Having heard this bold statement, Russian hackers smiled, stretched their fingers and set to work :)
  28. aba
    aba 30 January 2016 14: 35
    0
    In simple terms, this is a very strong barrier

    If we take into account that the means of defense are based on existing means of attack, then it speaks of the duration of this barrier as prematurely.
  29. NDR-791
    NDR-791 30 January 2016 15: 12
    0
    According to the newspaper, weekly committed "several billion attempts to establish an unauthorized connection with the US Air Force computers." According to the military, their "networks are constantly under attack in the cybersphere."
    This is something that cannot be covered with such a budget. GIVE MONEY !!! LISTEN TO ALL !!! That's the whole conversation. Judging by the article, they even want to track purchases in E. stores, and especially mail. Mrs. Klinkina is back in jambs. So it was she who sent the SS documents by "unprotected" mail, no one addressed her "unauthorized". "Patriot Act" in action. Let them spend the money raising freebies to cut down the box. First of all, we don't care about their safety, and secondly, we will track ...
  30. flay
    flay 30 January 2016 16: 28
    +1
    It has long been known. Want a closed network? Only lokalka, Well, or the Internet 2-military .. laughing
  31. LÄRZ
    LÄRZ 30 January 2016 17: 25
    +3
    We should "screw up" their refrigerator with grub in the Pentagon, let them howl over the "clave". laughing
  32. doework
    doework 30 January 2016 19: 18
    +1
    Well, I think Russian graduates of IT departments of universities will not remain without work ...
  33. renics
    renics 30 January 2016 20: 37
    0
    Yes, stupid idiots do not hold, I'm not talking about software developers, but about those who order it to them. There are unlocks for all sorts of locks.
  34. Tambov Wolf
    Tambov Wolf 30 January 2016 22: 02
    0
    Penguin guys opened it, they open it and they will open it. Let them not hope.
  35. Fat
    Fat 30 January 2016 23: 09
    +1
    Nothing to say, it's cool ... Blessed is he who believes ... So - uh ... How much penza did you spend? I swear by yeast - in a month, two will, as usual, receive direct Yandex in requests ...