When I was an analyst in the Defense Intelligence Agency in the early 1980s we used to say that if grains of sand on a beach were bits of intelligence information Moscow would send a large bulldozer onto the beach and scoop up as much as it could. Beijing, on the other hand, would send a million Chinese and each person would put a handful of sand in their pocket. The Chinese, for all their progress, haven’t changed; that’s how they hack into U.S. networks and steal U.S. military and trade secrets. (Read the full column at EWRoss.com)
Filed under: China-Taiwan, advanced U.S. weapons systems compromised by Chinese hackers, anti-intrusion software, atomic bomb secrets, B-29 bomber, Beijing, Chairman Mike Rogers, china, Chinese cyber-attacks, CISPA, civilian networks, cold war, command and control, communications system, companies in America, confidential, Cyber Intelligence Sharing and Protection Act, cyber-espionage, cyber-Pearl Harbor, cyber-security experts, Defense Intelligence Agency, Defense Science Board, design and manufacturing technology, Ed Ross, Elizabethan England, ewross, Gen. Keith Alexander, GRU, helicopters, House Intelligence Committee, human spies, information. Software is the heart and soul of the U.S. technological advantage. Every advanced weapon, KGB, letters of marque, MAD, missiles, Moscow, mutually assured destruction, naval ships, nuclear tipped ballistic missiles, Patriot missiles, placement and access, Russians, software, software source code, Soviet fighter aircraft, soviet union, stealth fighter jets, Stuxnet virus, U.S. Cyber Command, U.S. intellectual property, U.S. military, U.S. military and trade secrets, U.S. national security, U.S. networks, U.S. technological advantage, U.S. unclassified military and diplomatic networks