The outlet also reports that more than a dozen government officials and experts said the government effort to track down and eliminate the malware has been “under way for some time”, although the full extent of the code’s presence across various networks remains unknown due to how deeply it is hidden. The malware is a “ticking timebomb” that could allow China to interrupt or hinder American military deployments by cutting off power, water and various communication channels to US military bases, according to one congressional official speaking to the New York Times. In another potential security issue facing the government, the New York Times reported on Saturday that the Joe Biden White House was hunting alleged Chinese malware that it believes is hidden across various American facilities. He has since been charged under the Espionage Act. In that case, 21-year-old Jack Teixeira, an air national guardsman at the time, was arrested on suspicion of leaking hundreds of Pentagon documents. The Forbes report comes only three months after one of the worst leaks in US intelligence in over a decade. “He claims to have carried out numerous tests of the Arnold air force base’s security, improved protection of radio communications on the site and had knowledge of the encryption used on government data,” Forbes reported. However, the outlet reported that according to his LinkedIn page, the engineer has an extensive history in cybersecurity and radio communications. The FBI is working alongside the air force on the investigation, according to the outlet.įorbes has not yet disclosed the engineer’s name as he has not been charged. Investigators also reported to have found evidence which indicated that the searched contractor had possible access to FBI communications, as well as Tennessee state agencies, Forbes reported. It added that a colleague had reported him twice due to “insider threat indicators” as well as unauthorized possession of air force equipment, according to investigators. The warrant also recounted how witnesses and co-workers informed investigators that the engineer had allegedly “sold radios and radio equipment, worked odd hours, was arrogant, frequently lied, displayed inappropriate workplace behavior and sexual harassment, had financial problems, and possessed equipment”. Installer files which were recovered in the search opened with a “CONFIDENTIAL RESTRICTED” pop-up, according to Forbes. Other items seized included flash drives that contained “local law enforcement radio programming files” and “Motorola radio programming files” which presented a warning banner that indicated they were government property. The outlet also reported that, according to the warrant, a document detailing the forensics on technologies seized from the engineer’s home revealed that he had a USB which contained “administrative passwords and electronic system keys” for the AETC radio network. According to the warrant, the software “contained the entire Arnold air force base (AAFB) communications system”, Forbes reported. Investigators also found an open computer screen that showed the engineer running a Motorola radio programming software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |