It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Chinese hackers hacks USA, steals plan for more than two dozen weapons

page: 1
0

log in

join
share:

posted on May, 28 2013 @ 09:40 PM
link   
Quote:
______beforeitsnews/opinion-conservative/2013/05/china-hacks-us-steals-plans-for-more-than-two-dozen-weapons-systems-2652504.html

Although the report from the Defense Science Board did not identify the hackers, senior military and industry officials with knowledge of the breaches say they come primarily from China, according to Ellen Nakashima of the Post.

A public version of the report released in January warned of an “existential cyber attack” with “potentially spectacular” effects.

Some of the more disturbing leaks include designs for cutting edge jets, missile systems, and electronic warfare technology.

Here’s a partial list of compromised designs:

F-35

V-22

Terminal High Altitude Area Defense (THAAD Missile Defense)

Patriot Advanced Capability-3 (Patriot missile defense system)

AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile)

Global Hawk (high altitude surveillance drone)

PII (email addresses, SSN, credit card numbers, passwords, etc.)

# is embarrassing

news.yahoo.com...



posted on May, 28 2013 @ 09:50 PM
link   
Why would they keep such things on a computer thats connected to the internet?

I sure as hell wouldn't! and I dont believe they would either.

What have they to gain from such a story, thats what we should be looking at.



posted on May, 28 2013 @ 10:05 PM
link   
reply to post by VoidHawk
 


Because the contractor sends emails to their subcontractors when they're working on the program. Then the subcontractor emails changes back to the main contractor, etc. When they take information to the Pentagon they hand carry it on portable disk drives because it has all the information of the project. What goes back and forth is usually just bits of information relating to whatever the subcontractor is working on.



posted on May, 28 2013 @ 10:38 PM
link   
This is the full list of compromised data:

www.washingtonpost.com... 3-11e2-9fe2-6ee52d0eb7c1_story.html

SYSTEM DESIGNS

Terminal High Altitude Area Defense

Patriot Advanced Capability-3

Extended Area Protection and Survivability System (EAPS)

F-35

V-22

C-17

Hawklink

Advanced Harpoon Weapon Control System

Tanker Conversions

Long-term Mine Reconnaissance System

Global Hawk

Navy antenna mechanisms

Global Freight Management System

Micro Air Vehicle

Brigade Combat Team Modernization

Aegis Ballistic Missile Defense System

USMC Tracked Combat Vehicles

Warfighter Information Network-Tactical (WIN-T)

T700 Family of Engines

Full Authority Digital Engine Controller (FADEC)

UH-60 Black Hawk

AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile)

Affordable Weapons System

Littoral Combat Ship

Navy Standard Missile (SM-2,3,6)

P-8A/Multi-Mission Aircraft

F/A and EA-18

RC-135 Detect./Collect.

Mk54 Light Weight Torpedo

TECHNOLOGIES

Directed Energy

UAV video system

Specific Emitter identification

Nanotechnology

Dual Use Avionics

Fuze/Munitions safety and development

Electronic Intelligence Processing

Tactical Data Links

Satellite Communications

Electronic Warfare

Advanced Signal Processing Technologies for Radars

Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor

Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV)

Space Surveillance Telescope

Materials/processing technologies

IR Search and Track systems

Electronic Warfare systems

Electromagnetic Aircraft Launch

Rail Gun

Side Scan sonar

Mode 5 IFF

Export Control, ITAR, Distribution Statement B,C,D Technical Information

CAD drawings, 3D models, schematics

Software code

Critical technology

Vendor/supply chain data

Technical manuals

PII (email addresses, SSN, credit card numbers, passwords, etc.)
edit on 28-5-2013 by icyboy771z because: (no reason given)



posted on May, 28 2013 @ 10:50 PM
link   

Originally posted by VoidHawk
Why would they keep such things on a computer thats connected to the internet?

I sure as hell wouldn't! and I dont believe they would either.



I tend to agree with you. Why are such projects available on the internet?

I'm sure the US military have their own internet to communicate between bases and other sensitive places, so this project should be managed electronically on this network .Terminals could be installed with contractors working on the project.

This seems like slackness on the part of the military.



posted on May, 28 2013 @ 10:51 PM
link   
reply to post by icyboy771z
 


Well, its time to rethink our relationship with China. Ban all of their state-run corporations from doing business in the U.S., allow our intelligence agencies to launch industrial espionage operations against the Chinese, and start a policy whereby the designs of any U.S. weapons systems or patented technology illegally stolen by the Chinese and that are found on Chinese servers, are to be deleted from those servers by the U.S. agency that found them. If the Chinese complain, announce that we were recovering U.S. property. And to those who say that we can't decouple our economy from the ChiComs, I would like to remind everyone that they only hold about 7% of our total debt, as compared to 43% held by American's themselves. That being said, if the Chinese decide to dump the U.S. treasury bonds that they hold all at once, we can team up with the central banks of our allies as well as the Fed and buy back those bonds quickly, before they have a chance to damage our economy too much. At the same time, U.S. companies that produce products in China could easily move that production to India, SE Asia, Africa, Latin America, etc. over the space of a few years, meaning that the U.S.'s "dependence" on China is largely illusory. We don't need them, and its high time we realized this.



posted on May, 28 2013 @ 11:15 PM
link   
I find it hard to believe that their system was hack. How do we not know if someone gave them the information to make out if their system compromised?



posted on May, 28 2013 @ 11:30 PM
link   
Anyone who dabbles in conflict is winning a losing war...good riddance to everyone who supports blood shed.



posted on May, 29 2013 @ 08:55 AM
link   
If you can bend your mind to accepting the half a century of UFO existence, and allow that just maybe we have similar craft in secret in the US arsenal, then you can get a handle of this "problem."

The Chinese are allowed to steal the plans for weapon programs because, it ties up their resources of funding, materials, research and manpower.

Our marketing of the F-22, F-35, etc. abroad keeps the US military-industrial complex in the business-as-usual mode. The Chinese must copy these systems or build their own versions as deterrents against potential enemies that will own that equipment. (And who's to know if those plans are not sabotaged?)

Meanwhile, we build the so-called black triangles that are the most potent war weapon every conceived.

Get the picture?



posted on May, 30 2013 @ 06:41 AM
link   
reply to post by Zaphod58
 


Zaphod, while I understand what you are saying about subcontractors having to be able to access data and share it with departments for whom they are working, would you agree that the best way to do that, would be for the government to co-opt all required staffing for a project, and sequester them until such time as the project is over?

I respect that in a capitalist society, expertise is shared amongst various companies, and that the government of such a society cannot expect to be the sole employer of all the persons it would require to do a job. But, that is no excuse to store data in a medium which is connected to the internet. There is literally no way of completely securing data which is attached to the net, because all it takes is for one boffin with aching fingers to figure a way past your latest firewall, and all of a sudden your data is being sold to fifteen nations, eight terror groups, and one lone, mad scientist with a bee in his bonnet about blowing up the moon !

So, why is it that data sharing is required across the internet for these projects? Surely, until the project has been completed, it would be more sensible to keep all the people who work on that project, within easy reach of the components upon which they are working, and any people with whom they are collaberating, in a totally secure environment , isolated from the net, and any other source of observation or espionage?



posted on May, 30 2013 @ 09:27 AM
link   
reply to post by TrueBrit
 


While it would be more secure, it's not really practicle. Unlike when Kelly Johnson was building aircraft, you have projects now taking fifteen and twenty years to complete. The timeframes involved mean you have people constantly coming and going. Lockheed is on their third or fourth head of the F-35 program in the last five years or so.



posted on May, 30 2013 @ 10:40 AM
link   

Originally posted by VoidHawk
Why would they keep such things on a computer thats connected to the internet?





DOD used to have an internal network, but connected to the World Wide Web putting everything on the public internet.

They WANTED people to hack and steal their data. It then enables the Pentagon to get Trillions more to develop new weapons systems.....its how the Defense Industry steals from the Treasury.

They actually bring in foreignors to work in Top Secret projects in the Department of Energy Research Labs, DOD Research Labs......knowing full well those foreignors will rob and pillage....

Allows the robbery of the US Treasury by the Defense Industry.



posted on May, 30 2013 @ 11:27 AM
link   

Originally posted by Pervius

Originally posted by VoidHawk
Why would they keep such things on a computer thats connected to the internet?





DOD used to have an internal network, but connected to the World Wide Web putting everything on the public internet.

They WANTED people to hack and steal their data. It then enables the Pentagon to get Trillions more to develop new weapons systems.....its how the Defense Industry steals from the Treasury.

They actually bring in foreignors to work in Top Secret projects in the Department of Energy Research Labs, DOD Research Labs......knowing full well those foreignors will rob and pillage....

Allows the robbery of the US Treasury by the Defense Industry.


I'm just not devious enough to think like that, but I think your probably spot on with that.



posted on May, 30 2013 @ 01:48 PM
link   
reply to post by Pervius
 


They still have multiple internal networks that aren't connected anywhere near the internet. These hackings are of contractors that work for the DoD that have project plans on their computers.



posted on May, 30 2013 @ 07:51 PM
link   
China has dismissed US claims hackers procured blueprints for America's most advanced weaponry. Beijing stated the allegations underestimate the Chinese people's intellect and that China is perfectly capable of producing its own weapons.

A US Science Board report leaked this week alleged the Chinese hackers had obtained access to the designs of two dozen major US weapons systems in what amounted to "billions of dollars of combat advantage to China."

The Washington Post, who saw a copy of the report, intimated that such information could be used by the Chinese government to speed up the development of their military. An unnamed official told the Post that China had saved themselves "25 years of research and development" by stealing the plans.

Beijing reacted with ire, with Chinese Defense Ministry spokesman Geng Yansheng dismissing the report as ridiculous.

"It both underestimates the Pentagon's defensive security abilities and the Chinese people's intelligence," said Geng in a news briefing.

He stressed that China had demonstrated on numerous occasions it has the ability "to build the weapons needed for national security."

"Recently China's aircraft carrier, new fighter jets and transport aircraft ... have clearly shown this," concluded Geng.

rt.com...




posted on Jun, 1 2013 @ 05:45 PM
link   
reply to post by icyboy771z
 


isn't it known that the US was using fake Chinese computer components in their systems to save money?
so in essence they already gave china backdoor to access most US systems as they were compromised from the start.

also welcome to the digital age



posted on Jun, 1 2013 @ 05:56 PM
link   

Originally posted by VoidHawk
Why would they keep such things on a computer thats connected to the internet?

I sure as hell wouldn't! and I dont believe they would either.

What have they to gain from such a story, thats what we should be looking at.



Thank you! If secrets were kept on computers with internet access then they deserve to be stolen. Jeez!



new topics

top topics



 
0

log in

join