You can argue that "Iron Dome is XXX%" effective all day, but it is a layer. Just like infosec, security is best in layers.<p>That is why there are also things like the TROPHY system for Israel's Merkava tanks or lighter APC like vehicles:<p><a href="http://www.youtube.com/watch?v=4eCUCBS1SVk" rel="nofollow">http://www.youtube.com/watch?v=4eCUCBS1SVk</a><p><a href="http://en.wikipedia.org/wiki/Trophy_(countermeasure)" rel="nofollow">http://en.wikipedia.org/wiki/Trophy_(countermeasure)</a><p>Israel is no stranger when it comes to rocket threats and has multiple countermeasures. So far, it seems to work pretty well overall when you look at the number of Israeli casualties due to incoming rocket fire. For the number of shots fired into the country, it is remarkably low even with the horrible accuracy of the rockets being fired.
I don't really know what use they have of such documents.<p>I mean there aren't that many places in the world where you could sell that. I still wonder if any tech developed by iron dome is really useful at all for terrorits, Russia or china.<p>I mean if hamas really has enough resource to build stealth rockets, or rockets than would be able to dodge iron dome, but I don't think they really have the resources to develop such thing.
Chinese hackers have been incredibly good at infiltrating defense contractors around the world. This is just the latest in a very long list. These types of intrusions really do reduce any technical military advantages the "West" has over China.
One way of dealing with intrusions like this is to leak documents with subtle design flaws in them, rather than correct designs. If enough of the stolen material requires checks by skilled engineers before use, it dramatically reduces the value of the stolen material.<p>(Of course, this requires the intrusion to be detected before it is over.)<p>EDIT: See <a href="https://en.wikipedia.org/wiki/Siberian_pipeline_sabotage" rel="nofollow">https://en.wikipedia.org/wiki/Siberian_pipeline_sabotage</a> , with the caveat that it's not clear how real the story is.
If defense firms are constantly under attack then maybe a good counter attack would be to embed exploits in documents that would "phone home" when opened outside the firms networks.
I love this: <i>Five Chinese Military Hackers Charged with Cyber Espionage Against the US</i>. Just 5? On the other side there's an entire entity known to spy/hack/attack virtually everyone.
In light of all these "iron dome doesn't work" articles, this is some great propaganda (intentional or not) that the system is effective enough to be stolen and copied.
If the hackers were after the Iron Dome, it looks like it doesn't work [1] based on analysis by Theodore Postol of MIT [2]<p>1: <a href="http://thebulletin.org/evidence-shows-iron-dome-not-working7318" rel="nofollow">http://thebulletin.org/evidence-shows-iron-dome-not-working7...</a><p>2: <a href="http://web.mit.edu/sts/people/postol.html" rel="nofollow">http://web.mit.edu/sts/people/postol.html</a>