Internet Anthropologist Think Tank: Lockheed Martin, Whimps?

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Tuesday, May 31, 2011

    Lockheed Martin, Whimps?


    This weekend Lockheed Martin, a major military contractor, acknowledged that it had been the victim of an infiltration, while playing down its impact.
    The report will also spark a debate over a range of sensitive issues the Pentagon left unaddressed, including whether the U.S. can ever be certain about an attack's origin, and how to define when computer sabotage is serious enough to constitute an act of war. These questions have already been a topic of dispute within the military.
    One idea gaining momentum at the Pentagon is the notion of "equivalence." If a cyber attack produces the death, damage, destruction or high-level disruption that a traditional military attack would cause, then it would be a candidate for a "use of force" consideration, which could merit retaliation.

    Lockheed Martin exemplified real time counter surveillance of its Network.
    Caught them live and got everything closed and locked down.

    So the bad guys didn't get into the house,

    BUT THEY ARE STILL WALKING AROUND IN THE YARD.

    Kudos for LM COWs,
     http://warintel.blogspot.com/2010/02/dont-have-cow-man-cyber-over-watch.html

    but did they go far enough?
    Does any US cyber security paradigm go far enough?

    I endorse HOT PURSUIT, TRACK THEM BUST THE PROXYS,
    TRACK THEM HOME, ROOT THEM , MINE THEM, STEAL
    EVERYTHING, FIND PARTNERS, AND SEND IN COVERT WET
    TEAMS.

    That is deterrence.
    Put the FEAR OF GOD, into anyone hacking a HVT Gov network.
    If they broke into LM street door with intent to steal DOD defense
    secrets, they would be taken into custody, not just shoed out the
    the door.

    If they break into the National elect grid with intent to take
    it down, shut off nuclear plant cooling systems,
    its an intent to kill, take them off line, life line.

    DO SOMETHING, BESIDES JUST LOOK OUT THE WINDOW
    FROM BEHIND CLOSED CURTAINS.

    It is a self defense paradigm.
    They screw with you
    YOU SCREW BACK.

    YOU DON'T JUST SET THERE AND TAKE IT.


    Gerald
    War Anthropologist





     

    1 Comments:

    Anonymous Anonymous said...

    I am sure you already know but in case you didn't L-3 Communications was hacked, similar to LM. http://www.wired.com/threatlevel/2011/05/l-3/

    L-3 recently won some big contracts.
    http://www.businessweek.com/ap/financialnews/D9MVHHQ81.htm

    http://web02.aviationweek.com/aw/generic/story_generic.jsp?channel=mro&id=news/C403127.xml&headline=Navy%20Awards%20L-3%20C-9%20Support%20Contract

    3:49 AM  

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home