Since the announcement by Defense Secretary Ash Carter, the following cyber âevents have occurred': Penn State reports hackers have been stealing data from the university's DoD-affiliated engineering department for years (blamed on Chinese hacker spies), the IRS says at least 10,000 tax returns have been compromised (blamed on "Russian organized crime syndicates"), and, on Thursday evening, Washington reportswhat may end up being the largest data breach in history (blamed on China). As noted last month, these events represent a remarkable step up the cyber attack accusation ladder compared to Washington's attempt to blame North Korea for cyber-sabotaging James Franco and Seth Rogen last year.
Whether or not the most recent virtual attack on the US did indeed emanate from China or one of Washington's other so-called "cyberadversaries" (the list includes Iran, Russia, and North Korea) will likely never be known the public, but rest assured the blame will be placed with a state actor so as to ensure the DoD has some precedent to refer to when, for whatever reason, the Pentagon decides it's time to deploy an "offensive" cyberattack later on down the road.
Irrespective of where the attack originated, it appears obsolete technology was ultimately to blame, because as Bloomberg reports, "Einstein" wasn't much help in preventing the intrusion.
The hackers who stole personal data on 4 million government employees from the U.S. Office of Personnel Management sneaked past a sophisticated counter-hacking system called Einstein 3, a highly-touted, multimillion-dollar and mostly secret technology that's been years in the making.
It's behind schedule, the result of inter-agency fights over privacy, control and other matters, and only about half of the government was protected when the hackers raided OPM's databases last December.
It's also, by the government's own admission, already obsolete..
Over the last several months, U.S. officials have said that perimeter-based defenses such as Einstein, even backed by the National Security Agency's own corps of hackers, can never prevent break-ins.
Like banks and technology companies, government agencies must move to a model that assumes hackers will always get in, specialists said. They'll need to buy cutting-edge technologies that can detect intruders inside networks and eject them quickly, before the data is gone.
Of course that likely won't be possible, because after all, no self-respecting bureaucracy processes important initiatives expeditiously and no modern US lawmaking body actually legislates.
Given the slow pace of government acquisition, the inter-agency rivalries and budget fights, though, the initiative may take several years or more to implement, leaving the possibility that the new technology will be old by the time it's installed.
Congress has yet to act on the personnel agency's Feb. 2 request for a $32 million budget increase for fiscal 2016, said Senator Angus King, a Maine independent, in an interview.
"Most of the funds," the agency said, "will be directed towards investments in IT network infrastructure and security."
The latest intrusion points to the need for Congress to pass a cybersecurity bill, White House Press Secretary Josh Earnest said. He stopped short of saying whether the measure would have prevented the OPM breach.
That looks a bit like an attempt on the administration's part to put the blame on an ineffectual Congress, which would seem to be counterproductive at a time when there is clearly a need for less pettiness and more compromise. Some lawmakers were quick to acknowledge this and moved swiftly to rise above Presidential finger-pointing by
"It's too early to determine at this point what precisely would have prevented this particular cyber-intrusion," Earnest said Friday at a press briefing. "What is beyond argument is that these three pieces of legislation that the president sent to Congress five months ago would significantly improve the cybersecurity of the United States, not just the federal government's cybersecurity, but even our ability to protect private computer networks".
"Where is the leadership?" said Cory Fritz, a spokesman for House Speaker John Boehner, an Ohio Republican. "The federal government has just been hit by one of the largest thefts of sensitive data in history, and this White House is trying blame anyone but itself. It's absolutely disgusting."
As you can see, everyone appears to be on the same page here as both the Executive and Legislative branches look set to work together on a comprehensive, bipartisan approach to preventing cyber intrusions. Fortunately for the millions of federal employees who are now left to wonder whether or not their personal information is safe on government servers, Defense Secretary Ash Carter may ultimately take matters into his own hands by consulting someone who knows a thing or two about using technology to co-opt personal information:
Defense Secretary Ashton Carter spoke to technology leaders in Palo Alto, California, in April, tossing around ideas for recruiting engineers for temporary missions in government and meeting with Facebook's Mark Zuckerberg.
Have no fear America, Facebook will cyber-protect you from belligerent foreign governments.
Chief among the 'elegance will suffice' advocates are some string theorists. Because string theory is supposedly the 'only game in town' capable of unifying the four fundamental forces, they believe that it must contain a grain of truth even though it relies on extra dimensions that we can never observe. Some cosmologists, too, are seeking to abandon experimental verification of grand hypotheses that invoke imperceptible domains such as the kaleidoscopic multiverse (comprising myriad universes), the 'many worlds' version of quantum reality (in which observations spawn parallel branches of reality) and pre-Big Bang concepts. These unprovable hypotheses are quite different from those that relate directly to the real world and that are testable through observations — such as the standard model of particle physics and the existence of dark matter and dark energy. As we see it, theoretical physics risks becoming a no-man's-land between mathematics, physics and philosophy that does not truly meet the requirements of any.
Richard Dawid argues that physics, or at least parts of it, are about to enter an era of post-empirical science. "How are we to determine whether a theory is true if it cannot be validated experimentally ask Frank and Gleiser. "Are superstrings and the multiverse, painstakingly theorized by hundreds of brilliant scientists, anything more than modern-day epicycles?"
Yes, yes. Panic! There's a Java 0day! Dear Lord forfend! Of course, as you read this you are probably running Windows, with tons of extensions and software. You're probably using Flash. You probably have a web browser - heck, obviously you have a web browser. Well, not to worry: After disabling Java you will be completely safe.
Yes. The article can be found here: http://www.jstor.org/stable/10.1086/669034
Didn't I just read on this very site (or possibly Gizmodo; they all run together) that Jurassic Park was impossible because DNA degrades too fast? So how is this going to work? Because I'm pretty sure DNA (if that was how Martian life worked) would be subject to conditions that were even more harsh.
Okay. I read your blog post at the link. Your definition of rape omits the concept of consent, and randomly includes premarital sex (which would fit the definition in the first line) and homosexuality. Good luck with your mimeographed newsletter; I shall file you under "troll" and carry on. I sine Deus.
Atheism leads to this.
I'm pretty sure you don't need to believe in God to consider rape and murder unethical, immoral, and just wrong. In fact, plenty of people have pointed out (repeatedly) the fallacy of assuming that one needs God and/or religion to be good, so there is no reason to say more on that topic here. Go forth and Google.
The culture of consent and contraception, leads to this.
I'm not sure what the "culture of contraception" is, but I am pretty sure it does not lead to this kind of behavior, either. In fact, I strongly suspect this behavior - in general, minus the Internet - predates the widespread availability of contraception.
So he's a slashdotter who might end up in Congress. Fine. What I want to know is does he run Linux???
Bell Labs Unix -- Reach out and grep someone.