Posted on Jun 9, 2015
LTC Ed Ross
16.4K
83
36
5
5
0
Img 0303
Posted in these groups: 987f343c HackingImages %2831%29 CyberImages Security
Avatar feed
See Results
Responses: 31
SFC Christopher Perry
3
3
0
We must have better hackers than do our enemies.
(3)
Comment
(0)
Avatar small
PO1 John Miller
2
2
0
Until we completely disable Internet surfing, except for .mil and .gov websites, there's always going to be a risk no matter how stringent measures we take.

A plausible start though would be to let those charged with the cyber security of our networks actually do their jobs, and give better training to the systems and network administrators.
(2)
Comment
(0)
Avatar small
SGT John Wesley
2
2
0
I say we go to the source and screw up their networks!

Cyberwars are a reality, and we best get our sh*t together, before they hit our infrastructure via networks.

If that happens, we've only got ourselves to blame.

Computers were created in America, by Americans, and yet some third world weenie can circumvent our security protocols? Our guys must be dense!
(2)
Comment
(0)
Avatar small
Avatar feed
What should the military services and DoD do about hacking official networks?
See Results
LTC Jason Mackay
2
2
0
Would really like to see Direct Action Raids against hackers, especially where host governments are unwilling or unable to deter them. Would also like to see financial action taken against their backers and benefactors. Nothing says punitive quite like dudes with beards fast roping into a Hacker's (Mom's Basement) house, snatching him up in flex cuffs, exploiting all their stuff.

I am on a .mil network with a CAC, how would a strong password do anything more? Strength of password is at direct odds with ass-pain of entering it correctly, remembering it, and relative anemia of it against a key stroke stealing virus.
(2)
Comment
(0)
Avatar small
SSgt Geospatial Intelligence
2
2
0
I had to choose the best option. There will always be the threat of an attack getting through because tech is constantly getting better. Cyber security is a cat and mouse game. You build your security, & they keep at it until they crack it, making you build better security.
(2)
Comment
(0)
SSG Lloyd Becker BSBA-HCM, MBA
SSG Lloyd Becker BSBA-HCM, MBA
>1 y
This was a proposed dissertation of mine when I was in the doctorate program. Mine was not computer science, it was healthcare management.

I have been saying all along that the best security is to disconnect the computer from the internet and return to paper. True, there are always spies, but spies are easily more handled when they are in range of someone grabbing them.

Just like during the Clinton Administration when our nuclear warhead technology was stolen by the Chinese who was cleared to work in a secured area. Compliments of Clinton himself.

If we have something that requires security with computers, put them behind locked doors, inaccessible to the internet. No lunchboxes and no traveling coffee cups. Glass or paper cups are allowed in the secured room. Metal detectors or high energy magnets that are at the entrance to the room. High energy magnets will destroy the capabilities of any flash drives and no CDs. And, any worker has no idea where those magnets are at.

People are to sign in and sign out. No one has keys to the secured room. One guard on duty at all times and the guard is the only one who can open the door. Also, the door can freely be opened from the inside so the worker can leave and they will undergo a 100% inspection.

This is only the beginning.
(1)
Reply
(0)
SSgt Geospatial Intelligence
SSgt (Join to see)
>1 y
I agree, SSG Lloyd Becker BSBA-HCM, MBA. The only true way to secure a computer system is to have it on an intranet system - no outside lines or connections other than the outlet it is plugged into for electricity. I think that sensitive material should still be stored on hard copy, locked away & guarded. I mean, computer security programs find hackers & pay them ginormous amounts of money to crack their system so that they can build a better system.
(0)
Reply
(0)
Avatar small
CPT Arch Nissel
1
1
0
There has to be some fear of retribution to stop an action.  
(1)
Comment
(0)
Avatar small
SGM Steve Wettstein
1
1
0
IMO they need to cough up the money and get the very best IT people to defend against attacks.
(1)
Comment
(0)
Avatar small
CW5 Regimental Chief Warrant Officer
1
1
0
Perhaps we should realize that the US invented the internet and give the CIC buttons to turn it off in places that take efforts to attack us. We have the smarts to construct the thing, we should have the ability to craft the routing tables.

It may have diplomatic, economic and political fall-outs but it would definitely send a message if used conservatively.
(1)
Comment
(0)
Avatar small
SGT Team Leader
1
1
0
The best option is paying China to hack for us rather than against us. Hell, every other U.S. business is outsourcing.
(1)
Comment
(0)
Avatar small
Capt Seid Waddell
1
1
0
Edited >1 y ago
Clearly they should prosecute where possible, and they should retaliate against those not within our legal grasp.
(1)
Comment
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close