The Locked Filing Cabinet
The locked file cabinet in a locked and guarded room. The old fashioned, low-tech way to protect documents from cyber theft by either foreign governments or hackers.
.
But I am just a "crazy" Blogger. What do I know?
.
But I am just a "crazy" Blogger. What do I know?
(WSJ) - Chinese hackers are breaching Navy contractors to steal everything from ship-maintenance data to missile plans, officials and experts said, triggering a top-to-bottom review of cyber vulnerabilities.
A series of incidents in the past 18 months has pointed out the service’s weaknesses, highlighting what some officials have described as some of the most debilitating cyber campaigns linked to Beijing.
Cyberattacks affect all branches of the armed forces but contractors for the Navy and the Air Force are viewed as choice targets for hackers seeking advanced military technology, officials said.
Fucking Idiots Run The Military Generals asks what do you do with top secret military files? I know, let's connect the files to the internet so 16 year old pimple faced hackers can steal it. |
Navy contractors have suffered especially troubling breaches over the past year, one U.S. official said.
The data allegedly stolen from Navy contractors and subcontractors often is highly sensitive, classified information about advanced military technology, according to U.S. officials and security researchers. The victims have included large contractors as well as small ones, some of which are seen as lacking the resources to invest in securing their networks.
One major breach of a Navy contractor, reported in June, involved the theft of secret plans to build a supersonic anti-ship missile planned for use by American submarines, according to officials. The hackers targeted an unidentified company under contract with the Navy’s Naval Undersea Warfare Center in Newport, R.I.
The hackers have also targeted universities with military research labs that develop advanced technology for use by the Navy or other service branches, according to analysis conducted by cyber firms as well as people familiar with the matter.
No comments:
Post a Comment