{"id":660494,"date":"2013-05-28T08:59:33","date_gmt":"2013-05-28T12:59:33","guid":{"rendered":"http:\/\/gigaom.com\/?p=649655"},"modified":"2013-05-28T08:59:33","modified_gmt":"2013-05-28T12:59:33","slug":"chinese-compromise-of-u-s-weapon-designs-drives-home-painful-lesson-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/660494","title":{"rendered":"Chinese compromise of U.S. weapon designs drives home painful lesson in cybersecurity"},"content":{"rendered":"<p>For anyone paying attention, the fact that Chinese hackers apparently accessed key U.S. weapons designs may be unsettling but hardly surprising. Previously undisclosed findings by the Defense Science Board show that more than two dozen major weapons designs were breached, according to a\u00a0<em><a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/confidential-report-lists-us-weapons-system-designs-compromised-by-chinese-cyberspies\/2013\/05\/27\/a42c3e1c-c2dd-11e2-8c3b-0b5e9247e8ca_story.html?wpisrc=nl_headlines\">Washington Post<\/a><\/em>\u00a0report on Tuesday.\u00a0Affected projects range from U.S. missile defenses to combat aircraft &#8212; including the F-35 Joint Strike Fighter &#8212; and ships.\u00a0(The <em>Post<\/em> compiled a list of the affected weapons\u00a0<a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/a-list-of-the-us-weapons-designs-and-technologies-compromised-by-hackers\/2013\/05\/27\/a95b2b12-c483-11e2-9fe2-6ee52d0eb7c1_story.html?wpisrc=nl_headlines\">here<\/a>.)<\/p>\n<p><a href=\"http:\/\/en.wikipedia.org\/wiki\/Dan_Geer\">Dan Geer,<\/a> a superstar among computer security and risk management experts,\u00a0spoke to me about just this sort of risk last week. The most sobering part of the conversation was Geer&#8217;s stated belief that the game has definitively shifted from prevention of attacks to mitigation of their consequences.<\/p>\n<p>In short: if you have something worth accessing, it will be accessed. The only realistic goal now is to make sure you know when that breach happens as fast as possible.\u00a0<a href=\"http:\/\/gigaom.com\/2013\/05\/26\/the-week-in-cloud-fud-and-loathing-edition-2\/\">\u00a0I quoted him on this topic earlier<\/a>, but his words ring even more eerily true now:<\/p>\n<blockquote id=\"quote-%e2%80%9cif-your%c2%\">\n<p>\u201cIf your\u00a0enemy really is the\u00a0<a href=\"http:\/\/theweek.com\/article\/index\/244654\/chinas-surprisingly-open-hacking-culture\">People\u2019s Liberation Army<\/a>, what can you do? We can sputter about it but they\u2019re serious and they\u2019re good &#8230; The most serious attackers will probably get in no matter what you do. At this point, the design principal, if you\u2019re a security person working inside a firm, is not no failures, but no silent failures.\u201d<\/p>\n<\/blockquote>\n<p>Of course security vendors have latched onto these threats as a way to sell more stuff and are increasingly <a href=\"http:\/\/gigaom.com\/2013\/01\/30\/bringing-big-data-to-bear-on-big-security\/\">glomming onto big data analysis<\/a> as a way to shorten the time between an attack and stopping it in a high-stakes game of whack-a-mole.<\/p>\n<p>As RSA executive chairman Art Coviello said a few months ago: &#8220;It&#8217;s not about perfect security; its all about ratcheting down risk as much as you can.\u201d<\/p>\n<p>And it&#8217;s not just huge government contractors, agencies and suppliers at risk. &#8220;No industry is immune,&#8221; \u00a0cautioned <a href=\"http:\/\/en.wikipedia.org\/wiki\/Dan_Geer\">Geer<\/a>, who is also\u00a0an advisor to\u00a0<a href=\"http:\/\/www.iqt.org\/\">In-Q-Tel<\/a>, the investment arm of the CIA and other security agencies, and to Verdasys, a security vendor.\u00a0Almost anyone can see why hackers target gigantic players like Boeing that spend billions on designs which could be used to build similar products at much lower cost. But don&#8217;t forget that any grocery store chain that uses credit cards is also a target for someone, Geer said.<\/p>\n<p><em><a id=\"yui_3_7_3_3_1369743114034_1227\" href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/deed.en\" rel=\"license cc:license\">Feature photo courtesy of<\/a>\u00a0 Flickr user\u00a0<a id=\"yui_3_7_3_3_1369743114034_1180\" href=\"http:\/\/www.flickr.com\/photos\/dysanovic\/\">Dysanovic<\/a><\/em><\/p>\n<p>  <img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/stats.wordpress.com\/b.gif?host=gigaom.com&#038;blog=14960843&#038;%23038;post=649655&#038;%23038;subd=gigaom2&#038;%23038;ref=&#038;%23038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n<p><a href=\"http:\/\/pubads.g.doubleclick.net\/gampad\/jump?iu=\/1008864\/GigaOM_RSS_300x250&#038;sz=300x250&#038;%23038;c=858908\"><img decoding=\"async\" src=\"http:\/\/pubads.g.doubleclick.net\/gampad\/ad?iu=\/1008864\/GigaOM_RSS_300x250&#038;sz=300x250&#038;%23038;c=858908\" \/><\/a><\/p>\n<p><strong>Related research and analysis from GigaOM Pro:<\/strong><br \/>Subscriber content. <a href=\"http:\/\/pro.gigaom.com\/?utm_source=tech&#038;utm_medium=editorial&#038;utm_campaign=auto3&#038;utm_term=649655+chinese-compromise-of-u-s-weapon-designs-drives-home-painful-lesson-in-cybersecurity&#038;utm_content=gigabarb\">Sign up for a free trial<\/a>.<\/p>\n<ul>\n<li><a href=\"http:\/\/pro.gigaom.com\/2012\/05\/the-importance-of-putting-the-u-and-i-in-visualization\/?utm_source=tech&#038;utm_medium=editorial&#038;utm_campaign=auto3&#038;utm_term=649655+chinese-compromise-of-u-s-weapon-designs-drives-home-painful-lesson-in-cybersecurity&#038;utm_content=gigabarb\">The importance of putting the U and I in visualization<\/a><\/li>\n<li><a href=\"http:\/\/pro.gigaom.com\/2012\/04\/aws-storage-gateway-jolts-cloud-storage-ecosystem\/?utm_source=tech&#038;utm_medium=editorial&#038;utm_campaign=auto3&#038;utm_term=649655+chinese-compromise-of-u-s-weapon-designs-drives-home-painful-lesson-in-cybersecurity&#038;utm_content=gigabarb\">AWS Storage Gateway jolts cloud-storage ecosystem<\/a><\/li>\n<li><a href=\"http:\/\/pro.gigaom.com\/2012\/03\/a-near-term-outlook-for-big-data\/?utm_source=tech&#038;utm_medium=editorial&#038;utm_campaign=auto3&#038;utm_term=649655+chinese-compromise-of-u-s-weapon-designs-drives-home-painful-lesson-in-cybersecurity&#038;utm_content=gigabarb\">A near-term outlook for big data<\/a><\/li>\n<\/ul>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/OmMalik?a=Mh-SNFcjfV8:I8ZLAAV-dqQ:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/OmMalik?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/OmMalik\/~4\/Mh-SNFcjfV8\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For anyone paying attention, the fact that Chinese hackers apparently accessed key U.S. weapons designs may be unsettling but hardly surprising. Previously undisclosed findings by the Defense Science Board show that more than two dozen major weapons designs were breached, according to a\u00a0Washington Post\u00a0report on Tuesday.\u00a0Affected projects range from U.S. missile defenses to combat aircraft [&hellip;]<\/p>\n","protected":false},"author":7419,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-660494","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/660494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/7419"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=660494"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/660494\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=660494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=660494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=660494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}