SlideShare uma empresa Scribd logo
1 de 4
The Defense
                                                                        Industry
                                                                         Under Attack




                                                                        Supplemental article to “Cyber Theft of Corporate
                                                                        Intellectual Property: The Nature of the Threat”
                                                                        a Booz Allen Hamilton briefing paper




                                           O n Au g u s t 15, 2011, t h e h ac k t iv is t g r o u p An t iS e c a n n ou n ced
                                           it had broken into the personal e-mail account of Richard Garcia, a senior
                                           vice president of Vanguard Defense Industries. The group stole nearly 4,713
                                           e-mails and thousands of documents.

                                           On the surface, the incident was similar to the thousands of personal account
                                           breaches in cyberspace, except for one factor. Vanguard Defense Industries
                                           makes the Shadowhawk unmanned aerial vehicle, which is used not only for
                                           intelligence, surveillance, and reconnaissance, but can be weaponized with
                                           payloads including grenade launchers, semi-automatic small arms, and signal
                                           intelligence units. Information on Shadowhawk may have existed within Mr.
                                           Garcia’s stolen e-mail messages. If so, that information could now be in very
                                           dangerous hands. What were they trying to achieve?

                                           Theft of intellectual property is troubling, no matter what the victim’s identity.
                                           But theft of IP from the defense industry can be terrifying. IP that falls into the
                                           wrong hands can have devastating security and espionage repercussions,
                                           troublesome competitiveness implications, and can even be used to target
                                           employees and families for blackmail or kidnapping.




An Economist Intelligence Unit research
program sponsored by Booz Allen Hamilton
The worst-case scenario is where theft                    The stolen information could also be used to
    of IP can change the balance of power                     produce knock-off or fake goods–like medicines,
    and introduce severe vulnerabilities into national        integrated circuits, or even bullet-proof vests–that
    defense. If, for example, China were to hack into         are then reintroduced into our markets. According
    French or Israeli defense secrets, it might identify      to US Attorney General Eric Holder (the nation’s top
    vulnerabilities in the target nation’s defenses.          law enforcement official), “Put simply, when fake
    Further, once inside, it also might be possible to        goods find their way into our nation’s marketplace,
    introduce flaws into defense plans and systems that       the health and safety of our people can be
    could go unnoticed for months or even years.              severely compromised.”

    In September 2011, the Japanese-headquartered             The Trend Micro example makes it clear how
    anti-malware firm Trend Micro identified 32 defense       virtually all advanced nations (and the defense
    industry computers that had been compromised              industry companies that serve them) can become
    with remote command-and-control software. Trend           active targets of thieves, terrorists, and other
    Micro reported that eight companies, located in           nation states–including those that may also be
    Japan, Israel, India, and the United States, had          their allies. Intellectual property theft from defense
    been victims of a malicious PDF attachment that           industry contractors may well have broad-ranging
    exploited vulnerabilities in Adobe’s Flash Player and     international implications because companies in the
    Reader software.                                          defense industry often provide services to multiple
                                                              nations. Although most defense companies
                                                              carefully insulate customer organizations servicing
    Although cyber-based IP theft is often                    one country from customer organizations servicing
    perpetrated by nation states, attacks on                  another country, the IP sold to both countries is
    defense industry contractors come from                    often based on similar research. A theft of IP from
    many different actors.                                    a multi-national company could have a chain
                                                              reaction, by introducing vulnerabilities into many
                                                              nations’ defenses all at once.
    Once the computers were penetrated, the attacking
    payload then contacted remote command-and-                Although cyber-based IP theft is often perpetrated
    control servers with detailed information about           by nation states, attacks on defense industry
    where it had “landed,” and then awaited further           contractors come from many different actors.
    instructions. At this point, the attackers not only had   These include state-sponsored organizations,
    the ability to remote-control the victim’s computers,     organizations seeking financial gain (which could
    they were also essentially inside the firewall and had    range from organized crime to terrorists), activist
    the ability to move laterally within each company’s       organizations, and even groups of attackers who
    internal network–and had been able to do so for at        don’t have a formal organizational structure, but
    least four months.                                        who utilize “flash mob” methods to summon and
                                                              incite a large group of participants into carrying out
                                                              an attack or penetration attempt.




2
“By blunting our edge in military technology,
                              and enabling foreign competitors to copy the
                              fruits of our commercial innovation, it has a
                              deeply corrosive effect over the long-term.”

A number of leading US defense                         past decade and that 24,000 files were stolen in
contractors detailed the relentless                    a single intrusion in March 2011. “By blunting our
threats they face at the Reuters Aerospace and         edge in military technology, and enabling foreign
Defense Summit in September 2011. “Every defense       competitors to copy the fruits of our commercial
company is constantly under attack,” said Northrop     innovation, it has a deeply corrosive effect over the
Grumman CEO Wes Bush. “It is a threat that is broad-   long-term,” Lynn said.
based. It’s not just from one source...and it’s
                                                       One approach to defending against the theft of IP is
just unceasing.”
                                                       being tested by Boeing. The company is exploring
David Hess, president of Pratt & Whitney, added,       Extensible Access Control Markup Language
“It’s not the result of some guy with sneakers in      (XACML) 3.0 and an extension called the Intellectual
his cubicle hacking away at a computer screen.”        Property Control (IPC) profile. The purpose of this
BAE Systems President Linda Hudson called the          is to protect intellectual property as it transits
attacks “a very real daily threat to what we do and    between Boeing and its partners.
something we spend a lot of our own money on.”
                                                       According to Boeing Information Security Specialist
The losses thus far have been enormous. In a July      Richard Hill, “What we are getting is a common
2011 speech at the National Defense University,        vocabulary for intellectual property.” Boeing’s
US Deputy Secretary of Defense William Lynn            Internal Compliance Specialist, Crystal Hayes,
admitted that terabytes of sensitive data have         continues, “If we are speaking the same language
already been extracted by foreign intruders from       we are better able to control the movement and
corporate networks of defense companies over the       release of IP.”




If this sounds a lot like a cold war–one where the spies operate over
the Internet rather than through notes hidden in magnetized boxes
attached to lamp posts–you are not mistaken. Spying and espionage go back
thousands of years in human history and will probably continue, in new and interesting
forms, for thousands of years into our future. Like governments and warriors throughout
history, it’s imperative that our modern governments – and the companies that serve
and service them–develop defenses against penetration and practice vigilance to ensure
those defenses are used to their best effect.




                                                                                                               3
Intellectual property that falls into the wrong hands can
                                 have devastating security and espionage repercussions,
                                 troublesome competitiveness implications, and can
                                 even be used to target employees and families for
                                 blackmail or kidnapping.




An Economist Intelligence Unit research
program sponsored by Booz Allen Hamilton

©2012 Booz Allen Hamilton Inc.

Mais conteúdo relacionado

Mais procurados

Mais procurados (19)

About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email Threats
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
RSA 2010 Francis De Souza
RSA 2010 Francis De SouzaRSA 2010 Francis De Souza
RSA 2010 Francis De Souza
 
Cyber war
Cyber warCyber war
Cyber war
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
14 june
14 june14 june
14 june
 
Retail
Retail Retail
Retail
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 

Destaque

Enabling Cloud Analytics with Data-Level Security
Enabling Cloud Analytics with Data-Level SecurityEnabling Cloud Analytics with Data-Level Security
Enabling Cloud Analytics with Data-Level SecurityBooz Allen Hamilton
 
Methodology for Platform Modernization
Methodology for Platform ModernizationMethodology for Platform Modernization
Methodology for Platform ModernizationBooz Allen Hamilton
 
RightIT™ Maximizing Government IT Efficiency
RightIT™ Maximizing Government IT EfficiencyRightIT™ Maximizing Government IT Efficiency
RightIT™ Maximizing Government IT EfficiencyBooz Allen Hamilton
 
Mitigating Our Nation’s Risks – Calling Upon the Whole Community
Mitigating Our Nation’s Risks – Calling Upon the Whole CommunityMitigating Our Nation’s Risks – Calling Upon the Whole Community
Mitigating Our Nation’s Risks – Calling Upon the Whole CommunityBooz Allen Hamilton
 
Using Advanced Analytics for Data-Driven Decision Making
Using Advanced Analytics for Data-Driven Decision MakingUsing Advanced Analytics for Data-Driven Decision Making
Using Advanced Analytics for Data-Driven Decision MakingBooz Allen Hamilton
 
What's Ahead for EHRs: Experts Weigh In
What's Ahead for EHRs: Experts Weigh InWhat's Ahead for EHRs: Experts Weigh In
What's Ahead for EHRs: Experts Weigh InBooz Allen Hamilton
 
Digital Forensics: Digital Evidence That Endures
Digital Forensics: Digital Evidence That EnduresDigital Forensics: Digital Evidence That Endures
Digital Forensics: Digital Evidence That EnduresBooz Allen Hamilton
 
Miles To Go Before They Are Green
Miles To Go Before They Are GreenMiles To Go Before They Are Green
Miles To Go Before They Are GreenBooz Allen Hamilton
 
Mission Engineering Solution Infographic
Mission Engineering Solution InfographicMission Engineering Solution Infographic
Mission Engineering Solution InfographicBooz Allen Hamilton
 
Improving Intelligence Analysis Through Cloud Analytics
Improving Intelligence Analysis Through  Cloud AnalyticsImproving Intelligence Analysis Through  Cloud Analytics
Improving Intelligence Analysis Through Cloud AnalyticsBooz Allen Hamilton
 

Destaque (20)

Sais.34.1
Sais.34.1Sais.34.1
Sais.34.1
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 
Polaris Product Fact Sheet
Polaris Product Fact SheetPolaris Product Fact Sheet
Polaris Product Fact Sheet
 
Bah risk-ecosystem-survey[1]
Bah risk-ecosystem-survey[1]Bah risk-ecosystem-survey[1]
Bah risk-ecosystem-survey[1]
 
Enabling Cloud Analytics with Data-Level Security
Enabling Cloud Analytics with Data-Level SecurityEnabling Cloud Analytics with Data-Level Security
Enabling Cloud Analytics with Data-Level Security
 
The Biggest Bang Theory
The Biggest Bang TheoryThe Biggest Bang Theory
The Biggest Bang Theory
 
IP Theft
IP TheftIP Theft
IP Theft
 
Methodology for Platform Modernization
Methodology for Platform ModernizationMethodology for Platform Modernization
Methodology for Platform Modernization
 
RightIT™ Maximizing Government IT Efficiency
RightIT™ Maximizing Government IT EfficiencyRightIT™ Maximizing Government IT Efficiency
RightIT™ Maximizing Government IT Efficiency
 
When Disaster Strikes
When Disaster StrikesWhen Disaster Strikes
When Disaster Strikes
 
Cloud Brokering Brochure
Cloud Brokering BrochureCloud Brokering Brochure
Cloud Brokering Brochure
 
Mitigating Our Nation’s Risks – Calling Upon the Whole Community
Mitigating Our Nation’s Risks – Calling Upon the Whole CommunityMitigating Our Nation’s Risks – Calling Upon the Whole Community
Mitigating Our Nation’s Risks – Calling Upon the Whole Community
 
Technology Injection
Technology InjectionTechnology Injection
Technology Injection
 
Using Advanced Analytics for Data-Driven Decision Making
Using Advanced Analytics for Data-Driven Decision MakingUsing Advanced Analytics for Data-Driven Decision Making
Using Advanced Analytics for Data-Driven Decision Making
 
What's Ahead for EHRs: Experts Weigh In
What's Ahead for EHRs: Experts Weigh InWhat's Ahead for EHRs: Experts Weigh In
What's Ahead for EHRs: Experts Weigh In
 
Digital Forensics: Digital Evidence That Endures
Digital Forensics: Digital Evidence That EnduresDigital Forensics: Digital Evidence That Endures
Digital Forensics: Digital Evidence That Endures
 
Miles To Go Before They Are Green
Miles To Go Before They Are GreenMiles To Go Before They Are Green
Miles To Go Before They Are Green
 
Mission Engineering Solution Infographic
Mission Engineering Solution InfographicMission Engineering Solution Infographic
Mission Engineering Solution Infographic
 
Dynamic Defense
Dynamic DefenseDynamic Defense
Dynamic Defense
 
Improving Intelligence Analysis Through Cloud Analytics
Improving Intelligence Analysis Through  Cloud AnalyticsImproving Intelligence Analysis Through  Cloud Analytics
Improving Intelligence Analysis Through Cloud Analytics
 

Semelhante a The Defense Industry Under Attack: IP Theft Poses Grave Risks

Butterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial GainButterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial GainSymantec
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataLindsey Landolfi
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxjmiham
 
A Cyber Security Review
A Cyber Security ReviewA Cyber Security Review
A Cyber Security ReviewSimon Moffatt
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadRocco Magnotta
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...IJNSA Journal
 
Chapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxChapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxbartholomeocoombs
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Top 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityTop 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityHeritageCyberworld
 
Cyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatCyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatIBM Government
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023Bernard Marr
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 

Semelhante a The Defense Industry Under Attack: IP Theft Poses Grave Risks (20)

Butterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial GainButterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial Gain
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptx
 
A Cyber Security Review
A Cyber Security ReviewA Cyber Security Review
A Cyber Security Review
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-dead
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
14 aug
14 aug14 aug
14 aug
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Chapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxChapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docx
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Top 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityTop 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber security
 
Cyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatCyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the Threat
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 

Mais de Booz Allen Hamilton

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesBooz Allen Hamilton
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsBooz Allen Hamilton
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowBooz Allen Hamilton
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsBooz Allen Hamilton
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingBooz Allen Hamilton
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereBooz Allen Hamilton
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceBooz Allen Hamilton
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesBooz Allen Hamilton
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Hamilton
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Hamilton
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksBooz Allen Hamilton
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Booz Allen Hamilton
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Hamilton
 

Mais de Booz Allen Hamilton (20)

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working Moms
 
The True Cost of Childcare
The True Cost of ChildcareThe True Cost of Childcare
The True Cost of Childcare
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 
Military Spouse Career Roadmap
Military Spouse Career Roadmap Military Spouse Career Roadmap
Military Spouse Career Roadmap
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and Tomorrow
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment Models
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile Coaching
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is Here
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving Performance
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join Forces
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile Development
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
 
CITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICESCITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICES
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military Networks
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
Women On The Leading Edge
Women On The Leading Edge Women On The Leading Edge
Women On The Leading Edge
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

The Defense Industry Under Attack: IP Theft Poses Grave Risks

  • 1. The Defense Industry Under Attack Supplemental article to “Cyber Theft of Corporate Intellectual Property: The Nature of the Threat” a Booz Allen Hamilton briefing paper O n Au g u s t 15, 2011, t h e h ac k t iv is t g r o u p An t iS e c a n n ou n ced it had broken into the personal e-mail account of Richard Garcia, a senior vice president of Vanguard Defense Industries. The group stole nearly 4,713 e-mails and thousands of documents. On the surface, the incident was similar to the thousands of personal account breaches in cyberspace, except for one factor. Vanguard Defense Industries makes the Shadowhawk unmanned aerial vehicle, which is used not only for intelligence, surveillance, and reconnaissance, but can be weaponized with payloads including grenade launchers, semi-automatic small arms, and signal intelligence units. Information on Shadowhawk may have existed within Mr. Garcia’s stolen e-mail messages. If so, that information could now be in very dangerous hands. What were they trying to achieve? Theft of intellectual property is troubling, no matter what the victim’s identity. But theft of IP from the defense industry can be terrifying. IP that falls into the wrong hands can have devastating security and espionage repercussions, troublesome competitiveness implications, and can even be used to target employees and families for blackmail or kidnapping. An Economist Intelligence Unit research program sponsored by Booz Allen Hamilton
  • 2. The worst-case scenario is where theft The stolen information could also be used to of IP can change the balance of power produce knock-off or fake goods–like medicines, and introduce severe vulnerabilities into national integrated circuits, or even bullet-proof vests–that defense. If, for example, China were to hack into are then reintroduced into our markets. According French or Israeli defense secrets, it might identify to US Attorney General Eric Holder (the nation’s top vulnerabilities in the target nation’s defenses. law enforcement official), “Put simply, when fake Further, once inside, it also might be possible to goods find their way into our nation’s marketplace, introduce flaws into defense plans and systems that the health and safety of our people can be could go unnoticed for months or even years. severely compromised.” In September 2011, the Japanese-headquartered The Trend Micro example makes it clear how anti-malware firm Trend Micro identified 32 defense virtually all advanced nations (and the defense industry computers that had been compromised industry companies that serve them) can become with remote command-and-control software. Trend active targets of thieves, terrorists, and other Micro reported that eight companies, located in nation states–including those that may also be Japan, Israel, India, and the United States, had their allies. Intellectual property theft from defense been victims of a malicious PDF attachment that industry contractors may well have broad-ranging exploited vulnerabilities in Adobe’s Flash Player and international implications because companies in the Reader software. defense industry often provide services to multiple nations. Although most defense companies carefully insulate customer organizations servicing Although cyber-based IP theft is often one country from customer organizations servicing perpetrated by nation states, attacks on another country, the IP sold to both countries is defense industry contractors come from often based on similar research. A theft of IP from many different actors. a multi-national company could have a chain reaction, by introducing vulnerabilities into many nations’ defenses all at once. Once the computers were penetrated, the attacking payload then contacted remote command-and- Although cyber-based IP theft is often perpetrated control servers with detailed information about by nation states, attacks on defense industry where it had “landed,” and then awaited further contractors come from many different actors. instructions. At this point, the attackers not only had These include state-sponsored organizations, the ability to remote-control the victim’s computers, organizations seeking financial gain (which could they were also essentially inside the firewall and had range from organized crime to terrorists), activist the ability to move laterally within each company’s organizations, and even groups of attackers who internal network–and had been able to do so for at don’t have a formal organizational structure, but least four months. who utilize “flash mob” methods to summon and incite a large group of participants into carrying out an attack or penetration attempt. 2
  • 3. “By blunting our edge in military technology, and enabling foreign competitors to copy the fruits of our commercial innovation, it has a deeply corrosive effect over the long-term.” A number of leading US defense past decade and that 24,000 files were stolen in contractors detailed the relentless a single intrusion in March 2011. “By blunting our threats they face at the Reuters Aerospace and edge in military technology, and enabling foreign Defense Summit in September 2011. “Every defense competitors to copy the fruits of our commercial company is constantly under attack,” said Northrop innovation, it has a deeply corrosive effect over the Grumman CEO Wes Bush. “It is a threat that is broad- long-term,” Lynn said. based. It’s not just from one source...and it’s One approach to defending against the theft of IP is just unceasing.” being tested by Boeing. The company is exploring David Hess, president of Pratt & Whitney, added, Extensible Access Control Markup Language “It’s not the result of some guy with sneakers in (XACML) 3.0 and an extension called the Intellectual his cubicle hacking away at a computer screen.” Property Control (IPC) profile. The purpose of this BAE Systems President Linda Hudson called the is to protect intellectual property as it transits attacks “a very real daily threat to what we do and between Boeing and its partners. something we spend a lot of our own money on.” According to Boeing Information Security Specialist The losses thus far have been enormous. In a July Richard Hill, “What we are getting is a common 2011 speech at the National Defense University, vocabulary for intellectual property.” Boeing’s US Deputy Secretary of Defense William Lynn Internal Compliance Specialist, Crystal Hayes, admitted that terabytes of sensitive data have continues, “If we are speaking the same language already been extracted by foreign intruders from we are better able to control the movement and corporate networks of defense companies over the release of IP.” If this sounds a lot like a cold war–one where the spies operate over the Internet rather than through notes hidden in magnetized boxes attached to lamp posts–you are not mistaken. Spying and espionage go back thousands of years in human history and will probably continue, in new and interesting forms, for thousands of years into our future. Like governments and warriors throughout history, it’s imperative that our modern governments – and the companies that serve and service them–develop defenses against penetration and practice vigilance to ensure those defenses are used to their best effect. 3
  • 4. Intellectual property that falls into the wrong hands can have devastating security and espionage repercussions, troublesome competitiveness implications, and can even be used to target employees and families for blackmail or kidnapping. An Economist Intelligence Unit research program sponsored by Booz Allen Hamilton ©2012 Booz Allen Hamilton Inc.