Stories
Slash Boxes
Comments

SoylentNews is people

posted by mrpg on Wednesday June 13, @06:00AM   Printer-friendly
from the 600GB-of-txt-files-is-massive dept.

Nation-state attackers affiliated with the Chinese government have made off with a trove of undersea military secrets, according to a report.

Hackers were able to mount a lateral attack after compromising the networks of a Navy contractor working for the Naval Undersea Warfare Center in Rhode Island, according to a Washington Post report, citing American officials.

The result? “Massive amounts of highly sensitive data” flowed into the hands of China, unnamed officials told the paper, including “secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020.”

The incident happened January and February, the sources said, and resulted in 614 gigabytes of data, most of it highly sensitive info related to American offensive and defensive systems, including cryptography systems for secure communication, signals and sensor data, and the Navy’s electronic submarine warfare library, which contains information about adversary radar platforms.


Original Submission

 

Reply to: Re:"secure computing platform"

    (Score: 1) by anubi on Wednesday June 13, @09:43AM

    by anubi (2828) on Wednesday June 13, @09:43AM (#692282)

    There are definitely two levels of security there... whether or not you have access to the physical box.

    Most everything I work on, if you have access to the box, you are God. Well, if its my box and I am responsible for it, I better know what its doing, and be able to GodMode to it.

    But, I know there are things like ATM's, where the box is not in my physical possession, and securing something like that is an order of magnitude more complex and difficult to administer. Like how do I prove to my remote who I am, knowing at any time my communications may be compromised? There are ways of doing it... rotating codes and the like... but if I copy someone else's design, I am already compromised. Even if I don't, if they are determined enough, I don't know a thing I can design that someone else ( who I will assume is smarter than me ) can't work around.

    Consider DVD Jon. That was one helluva insight that kid had on how to undo all that DVD-CCA consortium design.

Post Comment

Edit Comment You are not logged in. You can log in now using the convenient form below, or Create an Account, or post as Anonymous Coward.

Public Terminal

Anonymous Coward [ Create an Account ]

Use the Preview Button! Check those URLs!


Logged-in users aren't forced to preview their comments. Create an Account!

Allowed HTML
<b|i|p|br|a|ol|ul|li|dl|dt|dd|em|strong|tt|blockquote|div|ecode|quote|sup|sub|abbr|sarc|sarcasm|user|spoiler|del|s|strike>

URLs
<URL:http://example.com/> will auto-link a URL

Important Stuff

  • Please try to keep posts on topic.
  • Try to reply to other people's comments instead of starting new threads.
  • Read other people's messages before posting your own to avoid simply duplicating what has already been said.
  • Use a clear subject that describes what your message is about.
  • Offtopic, Inflammatory, Inappropriate, Illegal, or Offensive comments might be moderated. (You can read everything, even moderated posts, by adjusting your threshold on the User Preferences Page)
  • If you want replies to your comments sent to you, consider logging in or creating an account.

If you are having a problem with accounts or comment posting, please yell for help.