Pentagon hit by 'major' cyber-attacks

Rep. Curt Weldon, R-Pa., sounded a warning call that the United States is under cyber-attack as Pentagon officials confirmed that they are investigating a "major attack of our computer networks."

"The civilian infrastructure is in danger, and we need to take steps" to halt such intrusions, said Weldon spokesman Pete Peterson. "All those systems that are vulnerable to Y2K are just as vulnerable to terrorists using high-tech computers." Weldon chairs the House Armed Services Research and Development Subcommittee.

The attack has not yet jeopardized sensitive military computer systems, it is believed, but it is much more sustained than the 60 to 100 "low-level" attempts at intrusion that occur every day at the Department of Defense, said a Pentagon spokesperson.

The attack came to the attention of members of Congress in the question and answer session before closed hearings of Weldon's subcommittee last week. In prepared remarks before the closed hearing began, Deputy Defense Secretary John Hamre outlined what the department has done to guard against such attacks by hackers, highlighting the "Solar Sunrise" attack of February 1998.

"The attacks were widespread, systematic and showed a pattern that indicated they might be the preparation for a coordinated attack on the Defense Information Infrastructure. The attacks targeted key parts of Defense networks at a time we were preparing for possible military operations against Iraq," Hamre said.

Hamre said that DoD had instituted a 24-hour cyber patrol, installed intrusion detection systems of key systems nodes, and began working with officials at the FBI's National Infrastructure Protection Center.

ABC News reported that Pentagon sources said the attacks had been traced to computers in Russia, though the attacks could be just routed through Russian computers from another location.

- by Drew Clark

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care


When you download a report, your information may be shared with the underwriters of that document.