White House says “no operational impact” in cyber-vandalism

If we’re going to be connected, we have to be protected

says President Obama earlier today as he unveiled a slew of bills designed to protect privacy. The President’s message was right on time in so many ways. In the wake of the Sony hacks, companies, consumers and individuals seem to be very concerned about the invasion of privacy. Ironically, as Obama revealed his intent on releasing the legislative language for its consumer privacy bill of rights, hackers appeared to have seized control of the US Military Twitter and YouTube accounts. One message on CentCom read,

American soldiers we are coming watch your back.

The hackers presented themselves as ISIS sympathizers and grabbed information about retired senior officers.

Pentagon Spokesperson, Colonel Steve Warren is downplaying the cyber-attack stating that,

This is little more than a prank or vandalism. It’s inconvenient and it’s an annoyance but that’s all it is.

The White House said it was monitoring the extent of the attacks. White House spokesperson Josh Earnest told the Associated Press that this attack is not to be compared with the magnitude of the Sony hacking which was an actual data breach not a twitter account hack.

Meanwhile, this latest hack is another confirmation to the public that when it comes to invasion of privacy everyone is at risk and it appears that no one has the direct answer on how we can be safe and secure.

Cybernetics Technology CEO Donnell Bobo says that,

No matter how much we try to protect ourselves, hackings such as this can and will happen. It’s beyond the naive idea of creating strong and secure passwords because it appears that there is software that apparently allows people to bypass all of this.

Cybernetics Senior Tech Leader, Sundar Shresta added that, “vulnerabilities exist in every system and hopefully with the new measures to protect privacy, more funding will be put into researching how we can truly become more secure and protected,” said Shresta. The military central command has confirmed that there was “no operational impact on the military networks.” The Pentagon is focusing its efforts on how the hackers managed to bypass a secured military site. The hacking is currently being investigated by the F.B.I.

-Abesi Manyando(@abesipr)