May 30, 2009 4:11 PM PDT

Contractors vie for plum work, hacking for the U.S.

Related Blogs

Obama on cybersecurity: We're not that prepared


May 29, 2009

The Cold War moves to cyberspace


April 22, 2009

The government's urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts.
(From The New York Times)

The story "Contractors vie for plum work, hacking for the U.S." published May 30, 2009 at 4:11 PM is no longer available on CNET News.

Content from The New York Times expires after 7 days.

9 comments

Join the conversation!
Add your comment
Re: "The changes are manifesting themselves in highly classified laboratories, where computer geeks in their 20s like to joke that they are hackers with security clearances...."

Wow! How about establishing the "Beterverwagting" (Dutch) Vertex where the would-be intruders enter easily; and, its hell to escape the "Raptors".....!

Cool!
Posted by Commander_Spock (3123 comments )
Reply Link Flag
Wow

Does what you type make any sense to you? It doesn't to anyone else, and it is frightening to think your insanity just might make sense to you.
Posted by pentest (2202 comments )
Link Flag
Holy "Raptor's" Smoke "pentest" what do ya call this - "ADS"; or, what. Can't you for once stay on the "topic" on hand!!! Can't you remember to simply just pull up (skip reading) when approaching a mountainous region when your are flying or is it that you prefer the outcome.
Posted by Commander_Spock (3123 comments )
Link Flag
Btw, "pentest"! Here, I did some research for you.

http://en.wikipedia.org/wiki/Beterverwagting

"Better-fuh-walk-in, bad-fuh-walk-out
A parody of Beterverwagting"

http://www.landofsixpeoples.com/news403/nk407117.htm

Just don't get "lost" again as this may not be the place for your geography, history or reading comprehension lessons.
Posted by Commander_Spock (3123 comments )
Link Flag
Re: "The exotic nature of the work, coupled with the deep recession, is enabling the companies to attract top young talent that once would have gone to Silicon Valley. And the race to develop weapons that defend against, or initiate, computer attacks has given rise to thousands of "hacker soldiers" within the Pentagon who can blend the new capabilities into the nation's war planning...."

That, it is said that "It is around the economic superstructure that the social, educational, financial, military, scientific.... superstructures revolve"; therefore, is it still "The Economy - Stupid"!

"Mission Accomplished"!
Posted by Commander_Spock (3123 comments )
Reply Link Flag
Re: "The exotic nature of the work, coupled with the deep recession, is enabling the companies to attract top young talent that once would have gone to Silicon Valley. And the race to develop weapons that defend against, or initiate, computer attacks has given rise to thousands of "hacker soldiers" within the Pentagon who can blend the new capabilities into the nation's war planning...."

That, it is said that "It is around the economic superstructure that the social, educational, financial, military, scientific.... superstructures revolve"; therefore, is it still "The Economy - Stupid"!

"Mission Accomplished"!
Posted by Commander_Spock (3123 comments )
Reply Link Flag
Maybe this is the answer to spam, viruses, malware, spyware, phishing, etc. I hope so. If this initiative can backtrack the attackers, maybe they can also backtrack and arrest all the others that are making the Internet nearly useless.
Posted by Been_there_Saw_it_before (465 comments )
Reply Link Flag
There is no way the top hacking talent would work for the US government and its corporate masters. They are getting the third tier while the first tier can still hack circles against any defenses the third tier can come up with.
Posted by pentest (2202 comments )
Reply Link Flag
We must push ourselves at every level . Working around world on computer systems we have a big learning curve many core people that deal with core software now put us at risk for easy money .
Take time just look at SQL hacking risks and Ming algorithms in C++ . Hack and crack code to find
weakness . It better we find it than our enemies
Posted by cohaver (189 comments )
Reply Link Flag
 

Join the conversation

Add your comment

The posting of advertisements, profanity, or personal attacks is prohibited. Click here to review our Terms of Use.

What's Hot

Discussions

Shared

RSS Feeds

Add headlines from CNET News to your homepage or feedreader.