http://freebeacon.com/white-house-hack-attack/ By Bill Gertz Washington Free Beacon September 30, 2012 Hackers linked to China’s government broke into one of the U.S. government’s most sensitive computer networks, breaching a system used by the White House Military Office for nuclear commands, according to defense and intelligence officials familiar with the incident. One official said the cyber breach was one of Beijing’s most brazen cyber attacks against the United States and highlights a failure of the Obama administration to press China on its persistent cyber attacks. Disclosure of the cyber attack also comes amid heightened tensions in Asia, as the Pentagon moved two U.S. aircraft carrier strike groups and Marine amphibious units near waters by Japan’s Senkaku islands. China and Japan—the United States’ closest ally in Asia and a defense treaty partner—are locked in a heated maritime dispute over the Senkakus, which China claims as its territory. U.S. officials familiar with reports of the White House hacking incident said it took place earlier this month and involved unidentified hackers, believed to have used computer servers in China, who accessed the computer network used by the White House Military Office (WHMO), the president’s military office in charge of some of the government’s most sensitive communications, including strategic nuclear commands. The office also arranges presidential communications and travel, and inter-government teleconferences involving senior policy and intelligence officials. [...] -- Certified Ethical Hacker and CISSP with ExpandingSecurity.com gives the best training and support. Last 2012 CISSP and CEH starts Oct. 1! Take action now and be done before 2012 ends. Best program, best price. CISSP info signup http://www.expandingsecurity.com/product/cissp-live-online-10-week-course/ CEH info signup http://www.expandingsecurity.com/product/ceh-certified-ethical-hacker-online/ Our Live Online classes will not wreck your schedule.Received on Sun Sep 30 2012 - 22:39:01 PDT
This archive was generated by hypermail 2.2.0 : Sun Sep 30 2012 - 22:36:30 PDT