UPDATED 06:46 EDT / MAY 31 2011

Lockheed Martin Network Disruption Connected to RSA SecurID

sr71-blackbird Last Friday, the network of Lockheed Martin, the largest U.S. defense contractor, suffered a disruption that has reportedly been connected to RSA SecurID tokens—little keychain fob dongles that use a crypto algorithm to cycle a numerical token every 60 seconds, a sort of rotating password, if you will. Lockheed themselves declined to discuss any specifics with Reuters, but this news is still making the rounds.

Best known for their aeronautics work on the F-22 and F-35 fighter planes and other U.S. weapon systems, such a disruption or even penetration of Lockheed’s network brings with it a lot of grim speculation. The network hack manifested itself as a disruption (or a slowing down of queries) when security personnel first noticed suspicious activity amid the employee connections. As a result, Lockheed intentionally took their VPN offline in order to investigate.

As we might recall, EMC’s security division, RSA, suffered a hack in March that exposed some cryptographic information directly related to the SecurID dongles. This fact already generated some storms in the politics of security in the cloud as many companies use RSA’s crypto technology to protect themselves from cyber threats and discourage intrusions.

The slowdown began on Sunday after security experts for the company detected an intrusion to the network, according to technology blogger Robert Cringely. He said it involved the use of SecurID tokens that employees use to access Lockheed’s internal network from outside its firewall.

A spokesman for EMC Corp (EMC.N), whose RSA division makes the tokens, declined to comment, saying it is company policy to never discuss security issues affecting specific customers.

No doubt, if they are connected it will be a black-eye for EMC and RSA’s security credibility. Even if it’s not, they’re deploying damage control because the possibility that the hack was involved does not portray them in a good light. However, as they do act as a security vendor for Lockheed Martin, they will probably be deeply involved in assisting the investigation, which means they might come out the hero in this if they can turn this crisis into a learning experience for everyone who uses dongle-based crypto-security.

Step one, according to Steve Winterfeld of TASC, a company spun off from Northrop Grumman, will be for RSA to release further information about the facts and disposition of the intrusion they suffered in March. The communication blackout concerning their role (and what may have been lost) is generating a lot of negative sentiment and paranoia about the reliability of their products in the wake of these new revelations.

“You have no idea how many people are freaked out right now,” Winterfeld told Reuters. “TASC is no longer treating the RSA device as if it were as secure as it was beforehand.”

EMC says that after they revealed the breach in March they immediately worked with the Department of Homeland Security to publish a note on the March attack. They also addressed the situations of individual customers on their security—which hopefully involved releasing new cryptographic keys, although the outcome has been characterized as “advice” in the media. Also those meetings have been covered with nondisclosure agreements so they’re opaque to observation of exactly what was done.

Right now it’s hard to say exactly what’s going on with the Lockheed Martin network disruption and its connection to SecurID. All of the players involved aren’t discussing the matter, the bloggers in question are making connections based on correlation rather than detailed evidence of causation, and security is a hot-button issue that tends to cause people to react before they think.


Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.