TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense

70 点作者 PaulSec将近 11 年前

8 条评论

SEJeff将近 11 年前
You can argue that &quot;Iron Dome is XXX%&quot; effective all day, but it is a layer. Just like infosec, security is best in layers.<p>That is why there are also things like the TROPHY system for Israel&#x27;s Merkava tanks or lighter APC like vehicles:<p><a href="http://www.youtube.com/watch?v=4eCUCBS1SVk" rel="nofollow">http:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=4eCUCBS1SVk</a><p><a href="http://en.wikipedia.org/wiki/Trophy_(countermeasure)" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Trophy_(countermeasure)</a><p>Israel is no stranger when it comes to rocket threats and has multiple countermeasures. So far, it seems to work pretty well overall when you look at the number of Israeli casualties due to incoming rocket fire. For the number of shots fired into the country, it is remarkably low even with the horrible accuracy of the rockets being fired.
jokoon将近 11 年前
I don&#x27;t really know what use they have of such documents.<p>I mean there aren&#x27;t that many places in the world where you could sell that. I still wonder if any tech developed by iron dome is really useful at all for terrorits, Russia or china.<p>I mean if hamas really has enough resource to build stealth rockets, or rockets than would be able to dodge iron dome, but I don&#x27;t think they really have the resources to develop such thing.
评论 #8097689 未加载
评论 #8097686 未加载
评论 #8097584 未加载
评论 #8097517 未加载
bhouston将近 11 年前
Chinese hackers have been incredibly good at infiltrating defense contractors around the world. This is just the latest in a very long list. These types of intrusions really do reduce any technical military advantages the &quot;West&quot; has over China.
评论 #8097376 未加载
评论 #8097498 未加载
评论 #8097151 未加载
trothamel将近 11 年前
One way of dealing with intrusions like this is to leak documents with subtle design flaws in them, rather than correct designs. If enough of the stolen material requires checks by skilled engineers before use, it dramatically reduces the value of the stolen material.<p>(Of course, this requires the intrusion to be detected before it is over.)<p>EDIT: See <a href="https://en.wikipedia.org/wiki/Siberian_pipeline_sabotage" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Siberian_pipeline_sabotage</a> , with the caveat that it&#x27;s not clear how real the story is.
评论 #8097805 未加载
评论 #8097479 未加载
caruana将近 11 年前
If defense firms are constantly under attack then maybe a good counter attack would be to embed exploits in documents that would &quot;phone home&quot; when opened outside the firms networks.
评论 #8097048 未加载
评论 #8097135 未加载
评论 #8098829 未加载
评论 #8097180 未加载
atmosx将近 11 年前
I love this: <i>Five Chinese Military Hackers Charged with Cyber Espionage Against the US</i>. Just 5? On the other side there&#x27;s an entire entity known to spy&#x2F;hack&#x2F;attack virtually everyone.
brandonmenc将近 11 年前
In light of all these &quot;iron dome doesn&#x27;t work&quot; articles, this is some great propaganda (intentional or not) that the system is effective enough to be stolen and copied.
评论 #8097764 未加载
salimmadjd将近 11 年前
If the hackers were after the Iron Dome, it looks like it doesn&#x27;t work [1] based on analysis by Theodore Postol of MIT [2]<p>1: <a href="http://thebulletin.org/evidence-shows-iron-dome-not-working7318" rel="nofollow">http:&#x2F;&#x2F;thebulletin.org&#x2F;evidence-shows-iron-dome-not-working7...</a><p>2: <a href="http://web.mit.edu/sts/people/postol.html" rel="nofollow">http:&#x2F;&#x2F;web.mit.edu&#x2F;sts&#x2F;people&#x2F;postol.html</a>
评论 #8097509 未加载
评论 #8097432 未加载