The development of United State cyber command was a result of the 2008 Cyber-attack on the United States. This attack was rated as one of the worst breaches of U.S. military computers ever recorded in history.  The attack commenced with the use of USB flash drive infected with malicious code on one of the computers connected to the United States central command.

Victim, attacker, and motivation for the attack

The United States of America was the victim in the 2008 Cyber-attack on the United States and in particular, the attack was made on the U.S. Department of military classified and unclassified files. The aim of the attack was to transfer data from the military computers to unknown under foreign control and brake into the USA network. Some of the data of interest to the attackers included weapons blueprints, surveillance data, and operational plans all falling under classified and unclassified systems. Basing on the location of the servers the US government reported that it was possible that the attack was initiated in Russia. Although the actual individuals involved in the activities were not revealed because it remained classified.
Nature and sophistication of the attack

The attackers had a high level of sophistication to allow them to spread the global worm or virus through military classified and unclassified systems undetected by using an infected USB flash drive plugged into one U.S. military laptop. Furthermore, they gained access to the files without being caught and clear track. The attackers used the global worm or virus on the classified and unclassified and create a digital beachhead which was used to transfer data from US servers to the foreign-controlled servers.

Also Read...  Maasai Mara National Park: Where the Wild Roams Free

The desired outcome of the attack

The first intention of the attacker was to introduce the global worm or global worm or virus in the U.S. servers to provide them with access. The attackers also had an intention of accessing US military classified and unclassified systems and communicate with the US military servers. They also wanted to go ahead and transfer files for the US military servers into their own servers.

Success level

The attacker had a high success rate, first of all in the introduction of the global worm or global worm or virus into the US servers. The second step involved the spread of the global worm or global worm or virus to other military networks without any detection and attach itself to the military classified and unclassified systems from a single military laptop connected to the system. The last step after access to the classified and unclassified information was the transfer of the information to the server that they operated.  Hence the attack resulted in dangerous cyber-attack in the history of the U.S.  Both hence the attackers were able to communicate the classified and unclassified infected systems to their own foreign servers and mine out the information contained in them. Although the extent of the information obtained by the attackers was not disclosed however it was assumed to be of substance to attract the attention of the official. The attack was launched on the computers in US Central Command use to monitor Iraq and Afghanistan regions.

Also Read...  Nairobi Senator Calls for Three-Day Protest, Demanding Government Accountability

Effectiveness of attackers in covering their tracks

Defense Secretary Lynn indicated that the infected USB flash drive was able to spread the infection just through one computer connected to the server without detection. The global worm or virus-infected and allowing the foreign servers to communicate, expose, and share the classified and unclassified information undetected. The attackers use one of the service members to input the global worm or virus into the US system through the flash drive. The attack cause was informed of a global worm or global worm or virus that spread so fast to other military networks.

Response of the victim

When the attack was detected the Pentagon’s operation was launched to counter it this operation was known as Operation Buckshot Yankee. The quick response to the attack included a ban on the use of external hardware such as recordable DVDs, CDs, and portable flash drives on the military computers although this was later modified. This operation was the turning point for the U.S on the cyber defense strategy and was a landmark. To respond to the attack the Pentagon created a layered and strong defense all-round the military networks to prevent against any future attack. In addition, the country also inaugurated a new body in charge of the cybercrime which was fitted to be part of the military operation the body was named as U.S. Cyber Command.

Also Read...  Henry Kissinger a highly influential and controversial figure in American politics dies at 100.

The U.S secretary of defense Robert Gates tasked the merging of the task forces to form a single four-star command named the U.S. Cyber Command. U.S. Cyber Command as part of the government Strategic began operations in May 2010. October.  Another long term strategy involved the Department of Homeland Security assist in the protection of government networks and critical infrastructure. The U.S also expanded to work with the close allies to expand the protection against the cyber-attack and improve defense internationally. After the attack country effort began to be focused more on active defense systems to prevent an attack from occurring rather than waiting for an attack and conducting a counter-attack. The Cyber Command is on watch for any malware or trial to connect to any untrusted servers.

1 Comment


Leave a Reply

Your email address will not be published. Required fields are marked *