Posted on Jun 4, 2015
Capt Flight Commander
4.04K
9
10
3
3
0
http://www.washingtonpost.com/world/national-security/chinese-hackers-breach-federal-governments-personnel-office/2015/06/04/889c0e52-0af7-11e5-95fd-d580f1c5d44e_story.html

Huge breach. These hacks are becoming very bold and very large scale. I wonder where the line gets drawn as to what constitutes an act of war. Attribution can be tricky, but we know these bombshell hacks are coming out of China. It seems there isn't much deterrence to prevent these things happening over and over again. Each act doesn't seem to be large enough to merit action (at least overt), but it sometimes feels like death by 1000 cuts. What are everyone's thoughts?
Posted in these groups: 987f343c HackingChina ChinaImages %2831%29 Cyber
Edited >1 y ago
Avatar feed
Responses: 5
LTC Yinon Weiss
1
1
0
Edited >1 y ago
We've up to now assumed that any information we post on social media can be seen by anybody. We're now moving into a time where any information you give to the government should also be assumed that it will one day be seen by foreign or domestic hackers. Unfortunately under these conditions, I think it would be foolish to believe that anything submitted online will not eventually be exposed if it's valuable enough.
(1)
Comment
(0)
Capt Flight Commander
Capt (Join to see)
>1 y
As a lesson to my generation.... As one rises in society, one's information becomes more valuable, so we all need to mind what we put out there...things may show up at an inopportune time down the road
(1)
Reply
(0)
LTC Yinon Weiss
LTC Yinon Weiss
>1 y
Capt (Join to see) - Unfortunately with what we've seen with WikiLeaks, Snowden, and now OPM... even things we submit to the government might as well be assumed to get out eventually. Data security has become more of a matter of delay rather than full proof security.
(0)
Reply
(0)
Capt Flight Commander
Capt (Join to see)
>1 y
Pretty much. The SF86 database that they took was particularly troubling. I guess time will tell if these are simply precautionary deterrence actions by them, or if they plan on a more vertical escalation at some point in the future. Hopefully for the world, it is the former.
(1)
Reply
(0)
Avatar small
TSgt Joshua Copeland
1
1
0
(1)
Comment
(0)
Avatar small
MAJ Ken Landgren
0
0
0
They have been conducting these operations for many years. They have the ability to hack the most secure sites and steal all the data in half an hour.
(0)
Comment
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close