It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Chinese hackers access major weapons systems

page: 4
18
<< 1  2  3    5 >>

log in

join
share:

posted on May, 28 2013 @ 07:21 PM
link   
reply to post by bigwig22
 


The subcontractor has only the plans for what they're working on, but sometimes that's enough to lead to an increase in technologies for whoever is hacking them. If you look at the F-22, you have 1,000 subcontractors building each aircraft, with Boeing, Lockheed, and Pratt and Whitney doing the major structures and engines, and the rest doing the substructures of the aircraft.

The F-35 has 1300 contractors across 45 states, and more in other countries (9 of them).

Even if someone hacks, and all they get is the engine technology, if they have problems with their own engines, as many other countries do, then they can find out how to improve their own engines and bring them up to a higher standard. There are many different areas that they can improve indigenous technologies through just about any of those contractors.




posted on May, 28 2013 @ 07:22 PM
link   
Uh oh...gosh guess they better pass CISPA. We need safety. Things are really dangerous out there. Congress will just have to pay attention now.


/end sarcasm.



posted on May, 28 2013 @ 07:55 PM
link   
reply to post by bigwig22
 


OT means over time. Here in the U.S. it means hourly pay plus 1/2 per hour. Its a way to to make more than decent wages.
edit on 28-5-2013 by TDawgRex because: Spelling



posted on May, 28 2013 @ 09:59 PM
link   

Originally posted by boncho
I just picture an office building housing 20,000 Chinese hackers who work 18 hours a day with limited coffee breaks and pictures of Cecilia Cheung as their desktop background.

Nah. It's more like 30 hackers and they're here: The Chinese Army Is Hacking the United States From This Building

And, inb4 I already posted this 2 days ago (...but, seemingly, didn't include enough "MERRICU!!" in the title to attract interest
)



posted on May, 28 2013 @ 10:05 PM
link   
i watched the four corners story on the abc on monday night and this is very serious.

if ever the shtf and there is a war, it will be fought on so many fronts its not funny. while our men are overseas being shot at, we will be here having our water, electricty, bank accounts etc turned off.

it will be chaos world wide and people had better start taking these cyber threats seriously.



posted on May, 28 2013 @ 11:03 PM
link   
Seems likely either one of two scenarios lead to it,
Why was such classified info as such accessible over the net? I should have been in "cold storage"(Bitcoin terms that means offline)... knowing these days with so many back doors built in to an OS(depending on what they use).

Allowed as setup to catch the ones who planned do such a thing, but they messed up. More negligence, wouldn't put it past 'em. Which will make them call for cyber security, namely CISPA.
Or
Likely the systems were just not protected-see above.



Older news on hacking from China, blaming the US on it...

"Related AboveTopSecret.com Discussion Threads:
Chinese Military Hacked into Pentagon"...

www.abovetopsecret.com...

edit on 28-5-2013 by dreamingawake because: added more...



posted on May, 28 2013 @ 11:13 PM
link   
reply to post by dreamingawake
 


Because if it was all kept offline it would add to the time and money involved in the project. That would mean that any time they made a tiny little change to a design, they'd have to put it on hard drive, hand fly it to the subcontractor (keep in mind that the last two major projects for the military had a total of 2,300 subcontractors between them), go over the changes, then fly back with any corrections that they make, then fly back to them again with any changes that are made to the changes, etc.

It's faster, cheaper, and easier to email, but it's also less secure.



posted on May, 28 2013 @ 11:16 PM
link   
reply to post by Echo007
 


What's so hard to believe? IT majors aren't heading the defense department, lol. The oldsters in positions of power don't understand these things.



posted on May, 28 2013 @ 11:19 PM
link   
I mentioned yesterday how China, through espionage, got the complete plans for the F-35 fighter jet some time ago. In this day and age, where so much information can be transferred digitally, espionage has changed its face completely. And although some may think China is an ally of the United States, they are sorely mistaken. Even though we started a trade agreement a few decades ago, China still views the US as its enemy. I am convinced that if given the opportunity, China would strike the US. But the opportunity would have to be a good one. More likely a war would ensue through actions in smaller, satellite states, like North Korea.

The US has gained experience about Chinese tactics both in Korea and Vietnam, and they will do something quite similar to what the USSR did during WWII. Their casualties will be astronomical, but they will keep throwing men at the problem, eventually overcoming obstacles by sheer manpower. If a nation is willing to incur millions of casualties, they are very dangerous. Even Japan, who did not have as many soldiers as Russia or China, showed just how dangerous fanatical fighters can be. The US learned this the hard way during WWII's fight in the Pacific.

My point is that China's gaining technology on par with that of the US means that the US would have an even harder time defeating them in a war, if it ever comes to that. History has shown us that it probably will, but it could be decades down the road. Or it could be next month. A lot can happen in a short period of time when it comes to international diplomacy. And even allies of the US, especially Israel, attempt to steal US secrets. China has spies in our universities, in businesses, in the government, police force, etc. And Israel does as well. I would be willing to bet that the US is the most highly infiltrated country when it comes to espionage agents.

The reason for this is that here in America, we accept all different kinds of people. A Chinese person does not look out of place, because there are so many different races here. In other countries however, a foreigner stands out immensely, and thus it is extremely hard for the US to insert very many agents into foreign intelligence circles, or even the country in general. For example, we had virtually no spies in Vietnam during the war, because our cultures were so different. And those we do have in countries like that are usually double agents, or have been convinced to spy on their own country in exchange for something...Usually money, maybe citizenship. It is a murky world, espionage I mean, and electronic espionage is the new "spy game." This is why US intelligence networks are not supposed to have access to any outside network. The risk of having intelligence secrets stolen, or other important things such as technology, is too great.



posted on May, 28 2013 @ 11:25 PM
link   

Originally posted by JiggyPotamus
My point is that China's gaining technology on par with that of the US means that the US would have an even harder time defeating them in a war, if it ever comes to that.


Technology only gets you so far. You have to know how to use the technology as well. It's like the Chinese aircraft carrier. Everyone made a big deal about them landing a plane on the deck, but they still have to train an air wing, work out what ships will sail with her, what their escort doctrine will be, etc. They have developed the technology, but are easily 10+ years away from being able to effectively use that technology.



posted on May, 28 2013 @ 11:29 PM
link   
The way the ruskies got the bomb etc...from us it seems we are equipping our new cold war enemy



posted on May, 29 2013 @ 12:53 AM
link   

"We're still militarily superior to China, but the gap is closing... fast "

-Military analyst on China's incessant hacking of Western secrets


Originally posted by Zaphod58
They have developed the technology, but are easily 10+ years away from being able to effectively use that technology.

And in 10+ years how much more will they have caught up in all departments?
edit on 29-5-2013 by Dumbspiracy because: (no reason given)



posted on May, 29 2013 @ 04:05 AM
link   
Who's stupid enough to put classified blueprints on a machine that connects to the internet?

I used to join engineering competitions and do all my work on a machine with no internet connection whatsoever.

For my really classified work, I don't use a computer at all. Maybe use the computer to aid in calculations but I delete the files immediately after use without making any back ups.

If collaborative effort is required, you could perhaps have engineers work under the same location under a LAN with no internet access, no wifi, and with computers with no connectivity apart from cat-5 ports. But still, those measures cannot prevent an inside job.

Isn't it an act of war what the Chinese did??



posted on May, 29 2013 @ 04:16 AM
link   
Why go to all the bother, when the Israelis will sell them all the stolen US tech.


When I say stolen, I do of course mean handed to them on a plate!



posted on May, 29 2013 @ 04:32 AM
link   
When have you ever known the government to allow its screw ups to be publically released in a report ... This is propaganda used to justify an increase in some three lettered branch of the government soon too be released budget. Weapons systems designs are not open to the internet, they're within closed systems.



posted on May, 29 2013 @ 05:01 AM
link   
First thought was how do the US Gov and and Aussies know it was Chinese hackers to begin with? I mean did they leave a comment or a memento from China to symbolize the hack job? Or they were as so foolish as to use their own ip addresses like "Doh! forgot to use seven proxies"


Like I will buy the idea our government's security is open to get hacked by anyone yet these governements in turn can back trace you even when they violate security measures... yeah right!

Sounds like these unsecured supposed incompetent .gov servers are a honeypot with disinfo and fake schematics to maybe trap hackers and perhaps sabotage them in the process.

Or it is all a ruse it never really happened and was a story made up to further these fascist agendas to clamp down on our internet privacy again. Because whenever our government's goof it is us the people that end up suffering the consequences hence more legislation used against US!


Because this story does not make any sense what so ever. Because we are all suspects being watched by cameras on every corner, spied on by supercomputers underground in Langley VA. And made to believe these false events all the while being more then willing to turn the other cheek.


Either way we are being taken for a ride imho
edit on 29-5-2013 by DarthFazer because: (no reason given)



posted on May, 29 2013 @ 06:22 AM
link   
reply to post by Dumbspiracy
 


But in 10+ years how much will we have moved forward with other systems and technologies?



posted on May, 29 2013 @ 06:29 AM
link   
reply to post by TDawgRex
 


Okok thank you for the precision. I know what over time is. We have the same up here in Quebec. I just didnt make the link


Peace out



posted on May, 29 2013 @ 07:18 AM
link   
reply to post by Zaphod58
 


So, we are basically saying the same thing. If this is what happened, they couldnt get the whole blueprints as the article seems to say. But you gave more precise information than me


Peace out



posted on May, 29 2013 @ 07:30 AM
link   

Originally posted by Zaphod58
reply to post by bigwig22
 


It happens all the time. You have a subcontractor that works on an actuator, or just on one part of the aircraft. The main contractor finds a problem with the part they're working on, and since that subcontractor only needs the details for that small part, they simply send an email with the pertinent information about the part they are working on. Anything that goes to the Pentagon or deals with the entire project is hand carried to the Pentagon.

The emails are sent over a secured VPN network, but RSA, which is one of the biggest VPN key suppliers, was hacked and something like 45 million keys were stolen from them, which allowed Lockheed to be hacked. They've since upgraded their security.


Yeah i know about RSA. But i just don't get why they would use emails instead of other file-transfer methods. If they use emails, to make sure its secure they must have separate email server dedicated only to this tranfer to make sure it doesnt leave traces on a server that can be used by other employees to send external emails IMO. Wouldnt it be more secure to maybe just send it via FTP over that VPN link? Or even map a network drive?

They could also encrypt the file itself to add even more security (but i guess if the hackers put their hands on the file, this wont last long
)

Anyway, we seem to be on the same page on the subject.

Peace out



new topics

top topics



 
18
<< 1  2  3    5 >>

log in

join