By Lewis Z. Koch
RAW STORY COLUMNIST
If anyone required needed solid evidence that there has been no increase in our ability to secure vital elements of our nation with the creation of the Department of Homeland Security or by the cosmetic revamps of the FBI headquarters hierarchy, one only need look at the recent hacking of this nation’s powerful supercomputers at colleges, universities and research institutions across the country.
America’s precious and powerful supercomputers are bound together by the “Grid/TeraGrid” which has now been proven to be extraordinarily vulnerable to intrusion. The recent hack of the Grid was most likely accomplished by a small group of young U.S. hackers.
What we — the public — do not know is if the hackers were able to access information pertaining to national security — the “crown jewels,” so to speak.
What we do know is that one member of the Grid is Argonne National Laboratory outside of Chicago which supports upwards of 200 research projects, ranging from studies of the atomic nucleus to global climate change research. But classified, secret projects are also being undertaken at Argonne. The question now becomes — was any information dealing with national security projects obtained by the hackers.
The designated spokesperson for the TeraGrid, Peter Beckman, refuses to respond to inquiries.
In all likelihood, the silence comes from an unreasoned, reflexive insistence by those ultimately responsible for securing computer infrastructure, the Department of Homeland Security and agents of the FBI. They have silenced computer scientists and quasi-governmental agencies like the National Science Foundation from discussing the intrusion.
Scientists, who are supposed to thrive on a full, open and free exchange of information, have been prevented (have allowed themselves to be prevented) from discussing the dangers inherent in their very crackable computers. In doing so, they are engaging in a cover-up of the problem and allowing it to happen again. Once hacked, a prized target will be hit again, as night follows day.
A really interesting, detailed piece -- Full story at The Raw Story:
http://www.rawstory.com/exclusives/koch/vulnerable_computer_grid.htm