Stonewalling and security…
… are two different things.
Several terabytes of data on the fighter program related to design and electronics systems have been stolen. The most sensitive information about the fighter resides on computers that are not connected to the Internet. The attacks appear to have originated in China, although exact sources of traffic can be easily masked.
Defense Secretary Robert Gates said today that the United States is “under cyberattack virtually all the time, every day,” and that the Defense Department plans to more than quadruple the number of cyber experts it employs, to ward off such attacks.
In hacking the Air Force’s air traffic control system, Internet hackers were able to see the locations of U.S. military aircraft in flight.
Refusing to talk about the security in place and the nature of probing attacks does contribute to security.
Stonewalling occurs after the breach, however. Security occurs before.
-Bill at Cheshire Cat Photo™
You can view higher-resolution photos (*generally* 7-30 megabytes, compressed) at the Cheshire Cat Photo™ Pro Gallery on Shutterfly™, where you can also order prints and gifts decorated with the photos of your choice from the gallery. Apparel and other gifts decorated with some of our most popular photos can be ordered from the Cheshire Cat Photo™ Store on CafePress®. Both Shutterfly™ and CafePress® ship to most international locations worldwide! If you don’t see what you want or would like to receive an email when new photos are up on the site, send us an email at info@cheshirecatphoto.com.