“Australia Hack Nets Data on U.S. Arms,” The Wall Street Journal, October 13, 2017 A6. Hacker hacks a defense contractor’s computers and carried off “commercially sensitive data on sophisticated U.S. weapons systems.” The ease of the hack is mind-boggling.
Is there a common scheme here? Or otherwise solve this equation for X.