Chalk up another win for the bad guys. If you read “Computer spies breach fighter jet project” you’ll find the following:


“In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft.”

Yup, you read that right, 7TB of data. Roughly 7,000GB! Where from? The Pentagon no less. You have also gotta love this:


“The spies inserted technology that encrypts the data as it’s being stolen; as a result, investigators can’t tell exactly what data has been taken”


Talk about a “prefect crime”!


What is clear these days is that the latest developments in technology are not only being used for good but also bad. Like most tools, the Internet is neutral but it provides a platform that can be used in many different ways, which many people seem to overlook in their rush to get systems ‘online’.


As the standard law of computer security goes:


Q. How many vulnerabilities do you have to defend against?



Q. How many vulnerabilities does someone need to find to exploit your system?



The odds are certainly not in your favour. That’s why you have to keep working so hard to keep the bad guys out but with odds like that do we ever really stand a chance? It certainly doesn’t seem so does it?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s