+ 1 (800) 764 5273

This section of the article is only available for our subscribers. Please click here to subscribe to a subscription plan to view this part of the article.

As cyber-attacks grow in scale and scope, the United States struggles to defend the IT infrastructure of the government network complex against this clear and present danger. America’s power consist of Economic, Kinetic, Cybernetic, and Diplomatic. All critical information is compromised in the name of information-sharing, which

that the US Government is demanding. On April 21, 2015, Michael Lumpkin, ASD (SO/LIC), said before the Congressional Subcommittee on Emerging Threats and Capabilities, “the current security environment is rapidly evolving with new threats and challenging dynamics.”

On September 23, 2015, the largest breaches in US history was directed at the Officer of Personnel Management (OPM) in Washington DC.  The OPM said “hackers were able to steal the fingerprints of 5.6 million people, up from the 1.1 million estimate it offered more than a month ago. More than (21.5) million people lost their records as part of the breach, and OPM’s new estimate means that roughly one-quarter of all those affected lost fingerprint data, in addition to information about their health, financial history and families. The fingerprint records were collected as part of background checks conducted since at least 2000 for some of the most sensitive government posts, including law enforcement, military, foreign service and judicial positions. Congressional lawmakers have alleged Chinese hackers were behind the attack.” According to the USAF Times, “troops, civilians, contractors subjected to background checks since the year of 2000 were exposed in the breach (social security numbers, residency and education information, employment history, health information, criminal and financial information, notes and data from investigators).” Also during the same period, US health insurers and other companies were hacked.  It is naïve to believe that the data stolen will not be traded or shared with other nations. The result is clear that future harassment, surveillance, hacking, retaliation, recruitment and identity theft will be occurring outside of the U.S. as well as here in the U.S. homeland. In this case, the U.S. Government proved that it is powerless to stop the level of sophisticated global hacking. Edward Snowden was the easiest hacker as all he had to do was take a memory storage stick and just download what he wanted.  Today, he is being elevated by the media as a technology genius who stole NSA data to protect the world.

This section of the article is only available for our subscribers. Please click here to subscribe to a subscription plan to view this part of the article.

 

 

GMC stream subscribe now

Mobile Applications

Request for writers

SSL Smart Seal

Ssl seal 1

About GMCstream

GMCStream, a Delaware LLC -is an American Veteran Owned print and digital publication that tracks the trends, drivers, and technologies that fuel the Aerospace and Defense communication sectors. Established in 2013 as a technology driven digital on-line publishing organization - We research, analyze, and highlight MILCOM problems and solutions that may affect Global National Security.

GMCStream based in Raleigh NC High-tech Triangle with Management and Support staff in Silicon Valley California. GMCStream was founded by Richard Theodor Kusiolek, an expert in Satellite Communications, Cyber Security, Defense, and Aerospace platforms with private sector experience and expertise in international business development and strategy, particularly in America, China, Japan, Ukraine, and Russia. The company is growing organically into a specialized niche media and technology company providing real-time streaming face-to-face video interviews and coverage on a variety of topics including Government Policy, Space and Missile systems, cyber-warfare, Defense Networks. Artificial Intelligence, STEM career webinars, and Moon-Mars explorations.