Source Code Sharing is a Terrible Idea

February 5, 2018

4 min read

Shoshana Bryen

Source codesĀ are the instructions written by a computer programmer that powers its software. It contains all the secret instructions in a program that, if discovered, would enable the software source to be stolen. Any software, from your games to America’s military systems. For decades, therefore, the U.S. government export control system refused to allow software source code to be shared.

Those days are over. Some of America’s top tech companies – includingĀ McAfee,Ā Symantec, andĀ Hewlett Packard – anxious to make money in foreign markets, have been sharing source code withĀ rival powersĀ including Russia and China. McAfee and Symantec shared anti-virus software, making our armed forces, our strategic systems, our critical infrastructure, and our government even more vulnerable to foreign hacking and penetration. The Pentagon said in aĀ letterĀ to Capitol Hill that source code reviews by Russia and China ā€œmay aid such countries in discovering vulnerabilities in those products.ā€

Some of this is the fault of our own security planners.

American security has become dependent on what is known in the trade as ā€œcommercial off the shelfā€ (COTS) software and hardware. Most of the software comes from American companies, but that doesn’t mean it is foolproof or that it was made entirely in America or by Americans. A lot of software is built elsewhere and assembled in places likeĀ Silicon Valley,Ā and many of the Silicon Valley workers are imported, not necessarily because they are better than Americans, but because they are cheaper. It gets worse: parts of the critical software, such as the Windows operating system that is pervasive in the Pentagon and military, is built out of so-called ā€œcommunity-sourcedā€ code, meaning that no one knows who wrote these segments or whether they are safe.

Hardware is a different, and bigger, headache. Most cell phones and computers are entirely manufactured abroad,Ā mainly in China,Ā or their vital components and systems are produced outside the United States. Sometimes the parts are produced by American-owned companies, but not always. Consider Apple (now in the process of moving investment and jobs back to the United States): it produces the iPhone in China in a large complex owned byĀ Hon Hai Precision, a Taiwanese conglomerate also called the Foxconn Technology Group. Foxconn sources components from other Chinese companies, and of course all the workers are Chinese.

Many world leaders use iPhones. (Former Secretary of StateĀ John KerryĀ was an aficionado.) In a discussion with the Department’s technical gurus about a phone with a secure operating system, they were sympathetic but said there was no hope of getting Mr. Kerry to give up his iPhone.Ā Angela Merkel,Ā Nicolas Sarkozy,Ā Silvio BerlusconiĀ and other foreign leaders use Chinese-origin cellphones and their staff does too.Ā Despite the known security issues, it wasn’t until a few weeks ago that theĀ White House finally banned personal cellphonesĀ from the complex. The president himself was only reluctantly separated from hisĀ Samsung 3 — his tweeting device.

Modern weapons systems also depend on equipment and software made in China or are vulnerable because source codes have been shared or developed abroad. A lot of it is really old software. Obsolete and vulnerable operating systems often are planted inside embedded computers buried inside weapons and command and control systems. There is no way to fix them and half the time no one even knows what is actually there. Instead of a label that says ā€œIntel Inside,ā€ maybe a better one would be ā€œSpy Inside.ā€

The government approach to all this is to try to fix the commercial off the shelf systems and software it originally bought on the cheap. Billions are being spent, but attacks on computer networks and cellphones by foreign and domestic sources continue to rise exponentially and is all but out of control.

In 2015Ā nearly one million new malware threatsĀ occurred every day, both in the government and outside. It’s bad enough if they attack your games or even your e-mail, but when the government uses publicly available, unmodified products for national security purposes the result can be catastrophic. Our national security systems have been deluged by cyber attacks, many of them highly successful.

China is flying a stealth aircraft, theĀ J-20,Ā which almost certainly is a copy of theĀ US F-22. China’s emergingĀ J-31Ā stealth fighter is a copy ofĀ the F-35. How did it happen?Ā China stole gigabytes of F-35 plansĀ from Lockheed Martin’s computer data banks. To be clear, Lockheed has one of the most sophisticated cyber defense programs in the business, but it still suffered massive losses. The $1.5 trillion we will invest in the F-35 program is being shared for free with China, diminishing the value of the plane and exposing its secrets, and giving the Chinese a potent military tool to use against their enemies.

Plowing money into so-called cyber defense is wasted and failed effort. The IT infrastructure that underpins national security needs to be replaced. The government urgently needs a replacement plan – a secret Manhattan Project for Cyber Security. Just as we developed the atomic bomb in a secret program using brilliant scientists and engineers, a cybersecurity program to replace all the commercial hardware and software with secure, secret systems is absolutely a requirement for us to avoid a disaster well along in the making.

Reprinted with author’s permission from Jewish Policy Center

Register to Vote

JOIN MORE THAN

1300

registered voters!

If you would like to stop the threat of a Palestinian State in the heartland of Israel, vote for Israel365 in the upcoming World Zionist Congress elections taking place from March 10-May 4, 2025. Please submit your information and we will remind you to vote during the voting period!
* To be eligible to vote you must be a Jewish US citizen who is 18+ with primary residency in the US.

Share this article

Subscribe

Prophecy from the Bible is revealing itself as we speak. Israel365 News is the only media outlet reporting on it.

Sign up to our free daily newsletter today to get all the most important stories directly to your inbox. See how the latest updates in Jerusalem and the world are connected to the prophecies we read in the Bible. .