Drone feeds: A loose rule set until exploited and thus popularly revealed

FRONT PAGE: "Insurgents Hack U.S. Drones: $26 Software Is Used to Breach Key Weapons in Iraq; Iranian Backing Suspected," by Siobhan Gorman, Yochi J. Dreazen and August Cole, Wall Street Journal, 17 December 2009.
FRONT PAGE: "Officers Warned of Flaw In U.S. Drones in 2004," by Yochi J. Dreazen, August Cole and Siobhan Gorman, Wall Street Journal, 18 December 2009.
U.S. NEWS: "Drone Breach Stirs Calls to Fill Cyber Post, By Siobhan Gorman, Yochi J. Dreazen and August Cole , Wall Street Journal, 19-20 December 2009.
ARTICLE: Obama to Name Chief of Cybersecurity, By JOHN MARKOFF, New York Times, December 21, 2009
A wonderfully predictable series of stories. I waited until the shoes stopped dropping before commenting.
As soon as you see the story, you know we went cheap until our cheapness was found out and exploited.
Then you just knew there'd be somebody X years ago warning about this in some memo, because THERE ALWAYS IS SOMEBODY!
Then the political reaction: blame Obama for not having a cyber czar, because this is America, and we love and trust czars!
So Obama acts.
It's almost like haiku in its predictable strokes.
Reader Comments (7)
And no cyberczar can fix the procurement system; it's doubtful any cyberczar will even get a vote in DoD/Intel Community policies and acquisitions.
But in some respects it's appropriate to have a former employee of Microsoft as cyberczar, given how -much- Microsoft has contributed to our current state of insecurity.
But some of the insecurity is incredible. When I first got cable internet back in 1999, Windows had "easy networking" that was so easy that if you clicked two checkmarks in a setting in Windows 98...basically all your files were accessible on the net like a server...and some police departments made this mistake...I called TCI (cable company) at the time and they yelled at ME! No good deed goes unpunished...The context is that all consumer Windows before Windows 2000 was designed for closed networks, not the internet...sometimes it is by design and not by goof!
Quantum jumps in technology are in the marketplace in less than six months from discovery today. Just a few years ago, it took "a few years" . . to get to the same marketplace . . And the time it takes to take a military application from plan to dispersal is horrendously slow, still . .
On the procurement business, I see a lot of schizophrenia on the part of the procurement world. Half the time they set requirements that can't be met, and the other half they just say "go buy COTS; we have no unique requirements." But the big enemy of big systems, COTS or custom, is schedule pressure. More than anything else, that's what causes our problems on the acquisition side. We don't allow the time to do it right the first time (including tech maturation), and when the overly compressed program fails, we jump the other direction and just buy a bunch of stuff and throw at Soldiers, etc, to integrate. In the end, it takes more time and money to fix that approach, than it would to have spent a bit more time and money to get it right the first time.
http://secunia.com/advisories/product/96/?task=advisorieshttp://secunia.com/advisories/product/13223/?task=advisories