[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Kamala Harris, reparations, and guaranteed income

Did Mudboy Slim finally kill this place?

"Why Young Americans Are Not Taught about Evil"

"New Rules For Radicals — How To Reinvent Kamala Harris"

"Harris’ problem: She’s a complete phony"

Hurricane Beryl strikes Bay City (TX)

Who Is ‘Destroying Democracy In Darkness?’

‘Kamalanomics’ is just ‘Bidenomics’ but dumber

Even The Washington Post Says Kamala's 'Price Control' Plan is 'Communist'

Arthur Ray Hines, "Sneakypete", has passed away.

No righT ... for me To hear --- whaT you say !

"Walz’s Fellow Guardsmen Set the Record Straight on Veep Candidate’s Military Career: ‘He Bailed Out’ "

"Kamala Harris Selects Progressive Minnesota Governor Tim Walz as Running Mate"

"The Teleprompter Campaign"

Good Riddance to Ismail Haniyeh

"Pagans in Paris"

"Liberal groupthink makes American life creepy and could cost Democrats the election".

"Enter Harris, Stage Lef"t

Official describes the moment a Butler officer confronted the Trump shooter

Jesse Watters: Don’t buy this excuse from the Secret Service

Video shows Trump shooter crawling into position while folks point him out to law enforcement

Eyewitness believes there was a 'noticeable' difference in security at Trump's rally

Trump Assassination Attempt

We screamed for 3 minutes at police and Secret Service. They couldn’t see him, so they did nothing. EYEWITNESS SPEAKS OUT — I SAW THE ASSASSIN CRAWLING ACROSS THE ROOF.

Video showing the Trump Rally shooter dead on the rooftop

Court Just Nailed Hillary in $6 Million FEC Violation Case, 45x Bigger Than Trump's $130k So-Called Violation

2024 Republican Platform Drops Gun-Rights Promises

Why will Kamala Harris resign from her occupancy of the Office of Vice President of the USA? Scroll down for records/details

Secret Negotiations! Jill Biden’s Demands for $2B Library, Legal Immunity, and $100M Book Deal to Protect Biden Family Before Joe’s Exit

AI is exhausting the power grid. Tech firms are seeking a miracle solution.

If you need a Good Opening for black, use this.

"Arrogant Hunter Biden has never been held accountable — until now"

How Republicans in Key Senate Races Are Flip-Flopping on Abortion

Idaho bar sparks fury for declaring June 'Heterosexual Awesomeness Month' and giving free beers and 15% discounts to straight men

Son of Buc-ee’s co-owner indicted for filming guests in the shower and having sex. He says the law makes it OK.

South Africa warns US could be liable for ICC prosecution for supporting Israel

Today I turned 50!

San Diego Police officer resigns after getting locked in the backseat with female detainee

Gazan Refugee Warns the World about Hamas

Iranian stabbed for sharing his faith, miraculously made it across the border without a passport!

Protest and Clashes outside Trump's Bronx Rally in Crotona Park

Netanyahu Issues Warning To US Leaders Over ICC Arrest Warrants: 'You're Next'

Will it ever end?

Did Pope Francis Just Call Jesus a Liar?

Climate: The Movie (The Cold Truth) Updated 4K version

There can never be peace on Earth for as long as Islamic Sharia exists

The Victims of Benny Hinn: 30 Years of Spiritual Deception.

Trump Is Planning to Send Kill Teams to Mexico to Take Out Cartel Leaders

The Great Falling Away in the Church is Here | Tim Dilena

How Ridiculous? Blade-Less Swiss Army Knife Debuts As Weapon Laws Tighten


Status: Not Logged In; Sign In

International News
See other International News Articles

Title: Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies
Source: Washington Post
URL Source: http://www.washingtonpost.com/world ... 9247e8ca_story.html?tid=pm_pop
Published: May 27, 2013
Author: Ellen Nakashima
Post Date: 2013-05-27 23:23:56 by A K A Stone
Keywords: None
Views: 597

Designs for many of the nation’s most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry.

Among more than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat aircraft and ships, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board.

Experts warn that the electronic intrusions gave China access to advanced technology that could accelerate the development of its weapons systems and weaken the U.S. military advantage in a future conflict.

The Defense Science Board, a senior advisory group made up of government and civilian experts, did not accuse the Chinese of stealing the designs. But senior military and industry officials with knowledge of the breaches said the vast majority were part of a widening Chinese campaign of espionage against U.S. defense contractors and government agencies.

The significance and extent of the targets help explain why the Obama administration has escalated its warnings to the Chinese government to stop what Washington sees as rampant cyber­theft.

In January, the advisory panel warned in the public version of its report that the Pentagon is unprepared to counter a full-scale cyber-conflict. The list of compromised weapons designs is contained in a confidential version, and it was provided to The Washington Post.

Some of the weapons form the backbone of the Pentagon’s regional missile defense for Asia, Europe and the Persian Gulf. The designs included those for the advanced Patriot missile system, known as PAC-3; an Army system for shooting down ballistic missiles, known as the Terminal High Altitude Area Defense, or THAAD; and the Navy’s Aegis ballistic-missile defense system.

Also identified in the report are vital combat aircraft and ships, including the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the Navy’s new Littoral Combat Ship, which is designed to patrol waters close to shore.

Also on the list is the most expensive weapons system ever built — the F-35 Joint Strike Fighter, which is on track to cost about $1.4 trillion. The 2007 hack of that project was reported previously.

China, which is pursuing a comprehensive long-term strategy to modernize its military, is investing in ways to overcome the U.S. military advantage — and cyber-espionage is seen as a key tool in that effort, the Pentagon noted this month in a report to Congress on China. For the first time, the Pentagon specifically named the Chinese government and military as the culprit behind intrusions into government and other computer systems.

As the threat from Chinese cyber-espionage has grown, the administration has become more public with its concerns. In a speech in March, Thomas Donilon, the national security adviser to President Obama, urged China to control its cyber-activity. In its public criticism, the administration has avoided identifying the specific targets of hacking.

Click for Full Text!

Post Comment   Private Reply   Ignore Thread  


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com