Page 1 of 2 12 LastLast
Results 1 to 20 of 21

Thread: Report: Chinese hackers breach top weapons designs

  1. #1
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Report: Chinese hackers breach top weapons designs

    Report: Chinese hackers breach top weapons designs

    Doug Stanglin, USATODAY8:46 a.m. EDT May 28, 2013

    The charge by a defense panel comes a month visit by China's president to Calif.


    Chinese hackers have gained access to the designs of many of the nation's most sensitive advanced weapons systems, according to report prepared for the Defense Department and government and defense industry officials,The Washington Post reported Tuesday.


    The compromised weapons designs include, among others, advanced Patriot missile system, the Navy's Aegis ballistic missile defense systems, the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the F-35 Joint Strike Fighter.


    The confidential report was prepared by the Defense Science Board, a senior advisory group of government and civilian experts.


    It does not accuse the Chinese of stealing the designs, but says that the designs of more than two dozen systems were compromised, the Post reported.


    Report: Plans for Australia's top spy HQ hacked by China
    Read: Unclassified report on hacking threat issued in January



    The report comes a month before a President Obama meets with visiting Chinese President Xi Jinping next month in California.


    It also coincides with reports in the Australian media that Chinese hackers had allegedly stolen blueprints for Australian's new spy headquarters.


    An alleged breach of U.S. systems was noted in a public report issued by the advisory panel in January, but the section of the report listing the compromised weapons system remained classified until Tuesday. The public version had warned that the Pentagon is unprepared to counter a full-scale cyber-conflict.


    The Chinese government has insisted that it does not conduct *cyber-espionage on U.S. agencies or companies, and government spokesmen often complain that Beijing is a target of U.S. cyberattacks, the Post notes.
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  2. #2
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    Keep your eyes on this.

    Apparently everything from Aegis to Patriot missiles systems have been COMPROMISED.
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  3. #3
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    Chinese hackers cyberattack Australia Internet US report says major weapons designs compromised by Chinese

    Chinese hackers also stole the blueprints for Australia’s new spy headquarters, according to a media report

    First Published: Tue, May 28 2013. 06 22 PM IST


    A file photo of Patriot missile system at a Turkish military base in Gaziantep. Compromised US designs included those for combat aircraft and ships, as well as missile defences vital for Europe, Asia and the Gulf. Photo: Bulent Kilic/AFP


    Washington/Canberra: Chinese hackers have gained access to designs of more than two dozen major US weapons systems, a US report said on Monday, as Australian media said Chinese hackers had stolen the blueprints for Australia’s new spy headquarters.


    Citing a report prepared for the Defense Department by the Defense Science Board, The Washington Post said the compromised US designs included those for combat aircraft and ships, as well as missile defences vital for Europe, Asia and the Gulf.


    Among the weapons listed in the report were the advanced Patriot missile system, the Navy’s Aegis ballistic missile defense systems, the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the F-35 Joint Strike Fighter.


    The report did not specify the extent or time of the cyber-thefts or indicate if they involved computer networks of the US government, contractors or subcontractors.


    But the espionage would give China knowledge that could be exploited in a conflict, such as the ability to knock out communications and corrupting data, the Post said. It also could speed China’s development of its defence technology.


    In a report to Congress this month, the Pentagon said China was using espionage to modernize its military and its hacking was a serious concern. It said the US government had been the target of hacking that appeared to be “attributable directly to the Chinese government and military.”


    China dismissed the report as groundless
    China also dismissed as without foundation a February report by the US computer security company Mandiant, which said a secretive Chinese military unit was probably behind a series of hacking attacks targeting the United States that had stolen data from 100 companies.


    Australian “security blunder”
    In Australia, a news report said hackers linked to China stole the floor plans of a A$630 million headquarters for the Australia Security Intelligence Organisation, the country’s domestic spy agency.


    The attack through the computers of a construction contractor exposed not only building layouts, but also the location of communication and computer networks, it said.
    Chinese Foreign Ministry spokesman Hong Lei, asked about the Australian report, said China disapproved of hacking.


    “China pays high attention to the cyber security issue and is firmly opposed to all forms of hacker attacks,” Hong said at a daily briefing.


    “Since it is very difficult to find out the origin of hacker attacks, it is very difficult to find out who carried out such attacks,” Hong said. “I don’t know what the evidence is for media to make such kinds of reports.”


    Repeating China’s position that every country was susceptible to cyber attacks, Hong said nations should make joint efforts towards a secure and open Internet.


    Australia security analyst Des Ball told the ABC that such information about the yet to be completed spy headquarters made it vulnerable to cyber attacks.


    “You can start constructing your own wiring diagrams, where the linkages are through telephone connections, through wi-fi connections, which rooms are likely to be the ones that are used for sensitive conversations, how to surreptitiously put devices into the walls of those rooms,” said Ball.


    The building is designed to be part of an electronic intelligence gathering network that includes the United States and Britain. Its construction has been plagued by delays and cost over-runs with some builders blaming late design changes on cyber attacks.


    The ABC report said the Chinese hacking was part of a wave of cyber attacks against business and military targets in the close US ally.


    It said the hackers also stole confidential information from the Department of Foreign Affairs and Trade, which houses the overseas spy agency, the Australian Secret Intelligence Service, and had targeted companies, including steel-manufacturer Bluescope Steel, and military and civilian communications manufacturer Codan Ltd.


    The influential Greens party said the hacking was a “security blunder of epic proportions” and called for an inquiry, but the government did not confirm the breach.
    Prime Minister Julia Gillard said the reports were “inaccurate”, but declined to say how.


    Despite being one of Beijing’s major trade partners, Australia is seen by China as the southern fulcrum of a US military pivot to the Asia-Pacific. In 2011, it agreed to host thousands of US Marines in near-permanent rotation.


    Chinese telecommunications giant Huawei was last year barred from bidding for construction contracts on a new Australian high-speed broadband network amid fears of cyber espionage.


    The Reserve Bank of Australia said in March that it had been targeted by cyber attacks, but no data had been lost or systems compromised amid reports the hackers had tried to access intelligence negotiations among a Group of 20 wealthy nations.
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  4. #4
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    Report: Plans for Australia spy HQ hacked by China
    Print Email
    6 hours ago • Associated Press
    (0) Comments

    Australian officials on Tuesday refused to confirm or deny whether Chinese hackers had stolen the blueprints of a new spy agency headquarters as a news report claims. A tiny party essential to the ruling coalition's government demanded an inquiry into how much damage may have been done.

    Australian Broadcasting Corp. television reported on Monday night that the plans for the 630 million Australian dollar ($608 million) Australian Security Intelligence Organization building had been stolen through a cyberattack on a building contractor. Blueprints that included details such as communications cabling, server locations and security systems had been traced to a Chinese server, the network reported.

    Des Ball, an Australian National University cybersecurity expert, said China could use the blueprints to bug the building, which is nearing completion in Canberra, the capital, after lengthy construction delays.

    Ball told the ABC that given the breach, ASIO would either have to operate with "utmost sensitivity" within its own building or simply "rip the whole insides out and ... start again."

    Attorney General Mark Dreyfus, the minister in charge of the spy agency, on Tuesday refused to confirm or deny the report, citing a longstanding government policy of declining to comment on security matters.

    Questioned about the alleged security breach in Parliament, Prime Minister Julia Gillard described the ABC report as "inaccurate" but refused to go into detail.

    The minor Greens party, which the center-left Labor Party relies on to maintain its minority government, has demanded an inquiry into the future of the troubled building, which has been plagued by cost blowouts from an original budget of AU$460 million.

    "It is time that we had an independent inquiry into the whole sorry history of the ASIO building and the extent to which the current hacking has compromised its capacity to ever be the building and serve the purpose for which it was intended," Greens leader Christine Milne told reporters.

    She said no more money should be spent on the building until an inquiry was held into the truth of the hacking allegation and the extent of the alleged security compromise.

    The alleged hacking would appear to be "an extremely serious breach" to Australia's intelligence-sharing allies, including the United States, Milne said.

    Dreyfus didn't immediately respond to the Greens' call for an inquiry.

    ASIO, Australia's main spy agency, has grown rapidly since the al-Qaida attacks on the United States on Sept. 11, 2001, and is constructing its new headquarters to house its growing staff. Staff numbers have trebled to almost 1,800 in a decade.

    Tobias Feakin, a national security analyst with the Australian Strategic Policy Institute, said that if a security breach has occurred, it could affect intelligence sharing with allies including the United States.

    "There is no doubt that instances like this, if proved true, create a period of difficulty," Feakin said. "But one thing that would happen is that there would be mutual assistance provided to be able to plug that gap and no intelligence agency could possibly allow that kind of breach to continue."

    Foreign Minister Bob Carr refused to discuss the allegations but said the claims do not jeopardize Australia's ties with its most important trading partner, China.

    "It's got absolutely no implications for a strategic partnership," Carr said. "We have enormous areas of cooperation with China."
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  5. #5
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies



    By Ellen Nakashima, Published: May 27 E-mail the writer

    Designs for many of the nation’s most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry.

    Among more than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat aircraft and ships, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board.
    A list of the compromised U.S. weapons designs and technologies

    MAY 27

    The systems named in a report by the Defense Science Board includes some critical to U.S. missile defense.

    Experts warn that the electronic intrusions gave China access to advanced technology that could accelerate the development of its weapons systems and weaken the U.S. military advantage in a future conflict.

    The Defense Science Board, a senior advisory group made up of government and civilian experts, did not accuse the Chinese of stealing the designs. But senior military and industry officials with knowledge of the breaches said the vast majority were part of a widening Chinese campaign of espionage against U.S. defense contractors and government agencies.

    The significance and extent of the targets help explain why the Obama administration has escalated its warnings to the Chinese government to stop what Washington sees as rampant cyber*theft.

    In January, the advisory panel warned in the public version of its report that the Pentagon is unprepared to counter a full-scale cyber-conflict. The list of compromised weapons designs is contained in a confidential version, and it was provided to The Washington Post.

    Some of the weapons form the backbone of the Pentagon’s regional missile defense for Asia, Europe and the Persian Gulf. The designs included those for the advanced Patriot missile system, known as PAC-3; an Army system for shooting down ballistic missiles, known as the Terminal High Altitude Area Defense, or THAAD; and the Navy’s Aegis ballistic-missile defense system.

    Also identified in the report are vital combat aircraft and ships, including the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the Navy’s new Littoral Combat Ship, which is designed to patrol waters close to shore.

    Also on the list is the most expensive weapons system ever built — the F-35 Joint Strike Fighter, which is on track to cost about $1.4 trillion. The 2007 hack of that project was reported previously.

    China, which is pursuing a comprehensive long-term strategy to modernize its military, is investing in ways to overcome the U.S. military advantage — and cyber-espionage is seen as a key tool in that effort, the Pentagon noted this month in a report to Congress on China. For the first time, the Pentagon specifically named the Chinese government and military as the culprit behind intrusions into government and other computer systems.

    As the threat from Chinese cyber-espionage has grown, the administration has become more public with its concerns. In a speech in March, Thomas Donilon, the national security adviser to President Obama, urged China to control its cyber-activity. In its public criticism, the administration has avoided identifying the specific targets of hacking.

    But U.S. officials said several examples were raised privately with senior Chinese government representatives in a four-hour meeting a year ago. The officials, who spoke on the condition of anonymity to describe a closed meeting, said senior U.S. defense and diplomatic officials presented the Chinese with case studies detailing the evidence of major intrusions into U.S. companies, including defense contractors.

    In addition, a recent classified National Intelligence Estimate on economic cyber-espionage concluded that China was by far the most active country in stealing intellectual property from U.S. companies.

    The Chinese government insists that it does not conduct *cyber-
    espionage on U.S. agencies or companies, and government spokesmen often complain that Beijing is a victim of U.S. cyberattacks.

    Obama is expected to raise the issue when he meets with Chinese President Xi Jinping next month in California.

    A spokesman for the Pentagon declined to discuss the list from the science board’s report. But the spokesman, who was not authorized to speak on the record, said in an e-mail, “The Department of Defense has growing concerns about the global threat to economic and national security from persistent cyber-intrusions aimed at the theft of intellectual property, trade secrets and commercial data, which threatens the competitive edge of U.S. businesses like those in the Defense Industrial Base.”

    The confidential list of compromised weapons system designs and technologies represents the clearest look at what the Chinese are suspected of targeting. When the list was read to independent defense experts, they said they were shocked by the extent of the cyber-espionage and the potential for compromising U.S. defenses.

    “That’s staggering,” said Mark Stokes, executive director of the Project 2049 Institute, a think tank that focuses on Asia security issues. “These are all very critical weapons systems, critical to our national security. When I hear this in totality, it’s breathtaking.”

    The experts said the cybertheft creates three major problems. First, access to advanced U.S. designs gives China an immediate operational edge that could be exploited in a conflict. Second, it accelerates China’s acquisition of advanced military technology and saves billions in development costs. And third, the U.S. designs can be used to benefit China’s own defense industry. There are long-standing suspicions that China’s theft of designs for the F-35 fighter allowed Beijing to develop its version much faster.

    “You’ve seen significant improvements in Chinese military capabilities through their willingness to spend, their acquisitions of advanced Russian weapons, and from their cyber-espionage campaign,” said James A. Lewis, a cyber-policy expert at the Center for Strategic and International Studies. “Ten years ago, I used to call the PLA [People’s Liberation Army] the world’s largest open-air military museum. I can’t say that now.”

    The public version of the science board report noted that such cyber-espionage and cyber-sabotage could impose “severe consequences for U.S. forces engaged in combat.” Those consequences could include severed communication links critical to the operation of U.S. forces. Data corruption could misdirect U.S. operations. Weapons could fail to operate as intended. Planes, satellites or drones could crash, the report said.

    In other words, Stokes said, “if they have a better sense of a THAAD design or PAC-3 design, then that increases the potential of their ballistic missiles being able to penetrate our or our allies’ missile defenses.”

    Winslow T. Wheeler, director of the Straus Military Reform Project at the Project on Government Oversight, made a similar point. “If they got into the combat systems, it enables them to understand it to be able to jam it or otherwise disable it,” he said. “If they’ve got into the basic algorithms for the missile and how they behave, somebody better get out a clean piece of paper and start to design all over again.”

    The list did not describe the extent or timing of the penetrations. Nor did it say whether the theft occurred through the computer networks of the U.S. government, defense contractors or subcontractors.

    Privately, U.S. officials say that senior Pentagon officials are frustrated by the scale of cybertheft from defense contractors, who routinely handle sensitive classified data. The officials said concerns have been expressed by Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, and Adm. James A. Winnefeld Jr., the vice chairman, as well as Gen. Keith Alexander, director of the National Security Agency.

    “In many cases, they don’t know they’ve been hacked until the FBI comes knocking on their door,” said a senior military official who was not authorized to speak on the record. “This is billions of dollars of combat advantage for China. They’ve just saved themselves 25 years of research and development. It’s nuts.”

    In an attempt to combat the problem, the Pentagon launched a pilot program two years ago to help the defense industry shore up its computer defenses, allowing the companies to use classified threat data from the National Security Agency to screen their networks for malware. The Chinese began to focus on subcontractors, and now the government is in the process of expanding the sharing of threat data to more defense contractors and other industries.

    An effort to change defense contracting rules to require companies to secure their networks or risk losing Pentagon business stalled last year. But the 2013 Defense Authorization Act has a provision that requires defense contractors holding classified clearances to report intrusions into their networks and allow access to government investigators to analyze the breach.

    The systems on the science board’s list are built by a variety of top defense contractors, including Boeing, Lockheed Martin, Raytheon and Northrop Grumman. None of the companies would comment about whether their systems have been breached.

    But Northrop Grumman spokes*man Randy Belote acknowledged the company “is experiencing greater numbers of attempts to penetrate its computer networks” and said the firm is “vigilant” about protecting its networks.

    A Lockheed Martin official said the firm is “spending more time helping deal with attacks on the supply chain” of partners, subcontractors and suppliers than dealing with attacks directly against the company. “For now, our defenses are strong enough to counter the threat, and many attackers know that, so they go after suppliers. But of course they are always trying to develop new ways to attack.”

    The Defense Science Board report also listed broad technologies that have been compromised, such as drone video systems, nanotechnology, tactical data links and electronic warfare systems — all areas where the Pentagon and Chinese military are investing heavily.

    “Put all that together — the design compromises and the technology theft — and it’s pretty significant,” Stokes said.
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  6. #6
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    Chinese hackers compromise U.S. missile systems, jets, ships: report

    Reuters

    Published Tuesday, May. 28 2013, 2:26 AM EDT

    Last updated Tuesday, May. 28 2013, 9:32 AM EDT


    Designs for more than two dozen major U.S. weapons systems have been compromised by Chinese hackers, a U.S report said on Monday, as a news report in Australia said Chinese hackers had stolen the blueprints for Australia’s new spy headquarters.

    Citing a report prepared for the Defense Department by the Defense Science Board, the Washington Post reported that compromised U.S. designs included combat aircraft and ships, as well as missile defenses vital for Europe, Asia and the Gulf.

    Among the weapons listed in the report were the advanced Patriot missile system, the Navy’s Aegis ballistic missile defense systems, the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the F-35 Joint Strike Fighter.

    The report did not specify the extent or time of the cyber-thefts or indicate if they involved computer networks of the U.S. government, contractors or subcontractors.

    But the espionage would give China knowledge that could be exploited in a conflict, such as knocking out communications and corrupting data, the Post said. It also could speed Beijing’s development of Chinese defense technology.

    In a report to Congress earlier this month, the Pentagon said China was using espionage to modernize its military and that its hacking was a serious concern. It said the U.S. government had been the target of hacking that appeared to be “attributable directly to the Chinese government and military.” China dismissed the report as groundless.

    China has dismissed as groundless both the Pentagon report and a February report by the U.S. computer security company Mandiant, which said a secretive Chinese military unit was probably behind a series of hacking attacks targeting the United States that had stolen data from 100 companies.

    AUSTRALIAN SPY HQ PLANS STOLEN

    In Australia, a news report said hackers linked to China stole the floorplans of a A$630 million headquarters for the Australia Security Intelligence Organisation, the country’s domestic spy agency.

    The attack through the computers of a construction contractor exposed not only building layouts, but also the location of communication and computer networks.

    Australia security analyst Des Ball told the ABC in the report that such information made the yet to be completed spy headquarters vulnerable to future cyber attacks.

    “You can start constructing your own wiring diagrams, where the linkages are through telephone connections, through wi-fi connections, which rooms are likely to be the ones that are used for sensitive conversations, how to surreptitiously put devices into the walls of those rooms,” said Ball.

    The building is designed to be part of a global electronic intelligence gathering network which includes the United States and the UK, but its construction has been plagued by delays and cost blowouts, with some builders blaming late design changes on cyber attacks.

    The ABC report said the Chinese hacking was part of a growing wave of cyber attacks against business and military targets in the close U.S. ally.

    It said the hackers also stole confidential information from the Department of Foreign Affairs and Trade, which houses the overseas spy agency the Australian Secret Intelligence Service and had targeted local companies, including steel-manufacturer Bluescope Steel, and military and civilian communications manufacturer Codan Ltd.

    The influential Greens party said the hacking was a “security blunder of epic proportions” and called for an inquiry, but the government refused to confirm the breach.

    Prime Minister Julia Gillard said the reports were “inaccurate”, but declined to say how.

    Australian officials, like those in the United States and other Western nations, have made cyber attacks a security priority following a growing number of attacks of the resource rich country, mostly blamed on China.

    Despite being one of Beijing’s major trade partners, the country is seen by China as the southern fulcrum of the U.S. military pivot to the Asia-Pacific and in 2011 agreed to host thousands of U.S. Marines in near-permanent rotation.

    Australia is a major buyer for U.S. weapons systems and is one of the largest overseas customers for the Lockheed Martin manufactured F-35, as well as for Boeing’s F/A-18 Super Hornet and associated weapons systems.

    Chinese telecommunications giant Huawei was last year barred from bidding for construction contracts on a new Australian high-speed broadband network amid fears of cyber espionage.

    The Reserve Bank of Australia said in March that it had been targeted by cyber attacks, but no data had been lost or systems compromised amid reports the hackers had tried to access intelligence on Group of 20 wealthy nations negotiations.
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  7. #7
    Postman vector7's Avatar
    Join Date
    Feb 2007
    Location
    Where it's quiet, peaceful and everyone owns guns
    Posts
    21,663
    Thanks
    30
    Thanked 73 Times in 68 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    Meanwhile at our southern border...



    Quote Originally Posted by vector7 View Post
    The Administration is helping China penetrate our southern border - They Come to America

    Chinese are getting help penetrating our southern border

    Published on May 2, 2013

    Congressman Peter King and DML speak about President Obama and his attitude towards the war on terror.



    c17360 1 week ago
    The two Chinese women who paid $ 50,000 to cross the border are either very dumb or extremely dangerous. Why? If you have that kind of money, you can get a passport and walk to a travel agency and fly here on a luxury jet. Why dangerous? They want their identity to be completely hidden.

    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.


    Nikita Khrushchev: "We will bury you"
    "Your grandchildren will live under communism."
    “You Americans are so gullible.
    No, you won’t accept
    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.
    outright, but we’ll keep feeding you small doses of
    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.
    until you’ll finally wake up and find you already have communism.

    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.
    ."
    We’ll so weaken your
    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.
    until you’ll
    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.
    like overripe fruit into our hands."



  8. #8
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: Report: Chinese hackers breach top weapons designs


  9. #9
    Senior Member Toad's Avatar
    Join Date
    Dec 2007
    Location
    Minot, ND
    Posts
    1,409
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    http://www.washingtonpost.com/world/...7c1_story.html

    A list of the U.S. weapons designs and technologies compromised by hackers
    Published: May 27

    Weapon designs and technologies compromised

    The following is reproduced from the nonpublic version of the
    Defense Science Board report “Resilient Military Systems and the Advanced Cyber Threat”:

    Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation

    SYSTEM DESIGNS

    Terminal High Altitude Area Defense
    Patriot Advanced Capability-3
    Extended Area Protection and Survivability System (EAPS)
    F-35
    V-22
    C-17
    Hawklink
    Advanced Harpoon Weapon Control System
    Tanker Conversions
    Long-term Mine Reconnaissance System

    Global Hawk
    Navy antenna mechanisms
    Global Freight Management System
    Micro Air Vehicle
    Brigade Combat Team Modernization
    Aegis Ballistic Missile Defense System
    USMC Tracked Combat Vehicles
    Warfighter Information Network-Tactical (WIN-T)
    T700 Family of Engines
    Full Authority Digital Engine Controller (FADEC)
    UH-60 Black Hawk
    AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile)
    Affordable Weapons System
    Littoral Combat Ship
    Navy Standard Missile (SM-2,3,6)
    P-8A/Multi-Mission Aircraft
    F/A and EA-18
    RC-135 Detect./Collect.
    Mk54 Light Weight Torpedo
    TECHNOLOGIES
    Directed Energy
    UAV video system
    Specific Emitter identification
    Nanotechnology
    Dual Use Avionics
    Fuze/Munitions safety and development
    Electronic Intelligence Processing
    Tactical Data Links
    Satellite Communications
    Electronic Warfare
    Advanced Signal Processing Technologies for Radars
    Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor
    Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV)
    Space Surveillance Telescope
    Materials/processing technologies
    IR Search and Track systems
    Electronic Warfare systems
    Electromagnetic Aircraft Launch
    Rail Gun
    Side Scan sonar
    Mode 5 IFF
    Export Control, ITAR, Distribution Statement B,C,D Technical Information
    CAD drawings, 3D models, schematics
    Software code
    Critical technology
    Vendor/supply chain data
    Technical manuals
    PII (email addresses, SSN, credit card numbers, passwords, etc.)
    Last edited by Toad; May 28th, 2013 at 18:09.

  10. #10
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    Wow... nothing too important on THAT list, huh?
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  11. #11
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    WTF do our counter-intel people do anyway???????????????????????????????
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  12. #12
    Senior Member Toad's Avatar
    Join Date
    Dec 2007
    Location
    Minot, ND
    Posts
    1,409
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    We seriously need to address the full on cyber-war we are balls deep in right now. This is not acceptable to the Nth degree.

  13. #13
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    Quote Originally Posted by Rick Donaldson View Post
    WTF do our counter-intel people do anyway???????????????????????????????
    Watch PowerPoint presentations and attend diversity/sensitivity training.

  14. #14
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    Oh... well, that certainly helps.....


    /rolls_eyes.



    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  15. #15
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    Sorry couldn't find one for "Counter Intelligence".

    LOL
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  16. #16
    Senior Member Toad's Avatar
    Join Date
    Dec 2007
    Location
    Minot, ND
    Posts
    1,409
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    http://www.reuters.com/article/2013/...94T08C20130530

    China says has no need to steal U.S. military secrets



    BEIJING | Thu May 30, 2013 4:04am EDT


    BEIJING (Reuters) - China's Defense Ministry dismissed as ridiculous on Thursday a U.S. report that Chinese hackers have gained access to designs of more than two dozen major U.S. weapons systems, saying the country needed no outside help for its military development.
    The Washington Post cited a U.S. Defense Science Board report as saying that the compromised U.S. designs included those for combat aircraft and ships, as well as missile defenses vital for Europe, Asia and the Gulf.

    Chinese Defense Ministry spokesman Geng Yansheng dismissed the report, which the Pentagon and other U.S. defense officials have downplayed as outdated and overstated.

    "It both underestimates the Pentagon's defensive security abilities and the Chinese people's intelligence," Geng told a monthly news briefing, according to a transcript on the ministry's website (www.mod.gov.cn).

    "China absolutely has the ability to build the weapons needed for national security," he said. "Recently China's aircraft carrier, new fighter jets and transport aircraft ... have clearly shown this."
    China routinely denies hacking allegations leveled at it.


    President Barack Obama will discuss cyber security with Chinese President Xi Jinping during a meeting in California next week, as Washington becomes increasingly worried about Chinese hacking of U.S. military networks.

    (Reporting by Ben Blanchard; Editing by Robert Birsel)

  17. #17
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    China routinely denies hacking allegations leveled at it and routinely does it anyway....
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  18. #18
    Senior Member Toad's Avatar
    Join Date
    Dec 2007
    Location
    Minot, ND
    Posts
    1,409
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    http://www.nbcnews.com/technology/ch...ing-6C10218978

    China says it has 'mountains of data' pointing to US hacking

    China's Internet security chief complained that Washington used the news media to raise cybersecurity concerns which would be better settled through communication, not confrontation.

    "We have mountains of data, if we wanted to accuse the U.S., but it's not helpful in solving the problem," said Huang Chengqing, director of the National Computer Network Emergency Response Technical Team/Coordination Center of China, known as CNCERT.

    "They advocated cases that they never let us know about," Huang said in comments on Tuesday and carried by the government-run China Daily newspaper on Wednesday.

    "Some cases can be addressed if they had talked to us, why not let us know? It is not a constructive train of thought to solve problems."

    CNCERT has instead co-operated with the United States, receiving 32 Internet security cases from the United States in the first four months of 2013, and handling most promptly, except for a few that lacked sufficient proof, Huang said.

    Designs for more than two dozen major U.S. weapons systems have been compromised by Chinese hackers, the Washington Post reported late last month.

    The compromised designs included combat aircraft and ships, as well as missile defense systems vital for Europe, Asia and the Gulf, the newspaper said, citing a report prepared for the U.S. Defense Department by the Defense Science Board.

    Huang did not deny the report, but suggested that if the U.S. government wants to keep weapons programmes secure, it should not allow them to be accessed online.

    "Even following the general principle of secret-keeping, it should not have been linked to the Internet," Huang said.

    Cyber attacks from the United States have been as serious as the accusations from Washington, Huang said

    CNCERT, which issues a weekly report on cyber attacks against China, says that 4,062 U.S.-based computer servers hijacked 2.91 million mainframe computers in China.


    Toad~ LULZ! "Mountains of data" - They hacked us to steal our data on how much they've been hacking us.

  19. #19
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Report: Chinese hackers breach top weapons designs

    I don't doubt it now. LOL
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  20. #20
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: Report: Chinese hackers breach top weapons designs


    Hacking U.S. Secrets, China Pushes for Drones

    September 20, 2013

    For almost two years, hackers based in Shanghai went after one foreign defense contractor after another, at least 20 in all. Their target, according to an American cybersecurity company that monitored the attacks, was the technology behind the United States’ clear lead in military drones.

    “I believe this is the largest campaign we’ve seen that has been focused on drone technology,” said Darien Kindlund, manager of threat intelligence at the company, FireEye, based in California. “It seems to align pretty well with the focus of the Chinese government to build up their own drone technology capabilities.”

    The hacking operation, conducted by a group called “Comment Crew,” was one of the most recent signs of the ambitions of China’s drone development program. The government and military are striving to put China at the forefront of drone manufacturing, for their own use and for export, and have made an all-out push to gather domestic and international technology to support the program.

    Foreign Ministry officials have said China does not sanction hacking, and is itself a victim, but another American cybersecurity company has tracked members of Comment Crew to a building of the People’s Liberation Army outside Shanghai.

    China is now dispatching its own drones into potential combat arenas. Every major arms manufacturer in China has a research center devoted to drones, according to Chinese and foreign military analysts. Those companies have shown off dozens of models to potential foreign buyers at international air shows.

    Chinese officials this month sent a drone near disputed islands administered by Japan; debated using a weaponized drone last year to kill a criminal suspect in Myanmar; and sold homemade drones resembling the Predator, an American model, to other countries for less than a million dollars each. Meanwhile, online photographs reveal a stealth combat drone, the Lijian, or Stealth Sword, in a runway test in May.

    Military analysts say China has long tried to replicate foreign drone designs. Some Chinese drones appearing at recent air shows have closely resembled foreign ones. Ian M. Easton, a military analyst at the Project 2049 Institute in Virginia, said cyberespionage was one tool in an extensive effort over years to purchase or develop drones domestically using all available technology, foreign and domestic.

    Chinese engineers and officials have done reverse engineering, studied open source material and debriefed American drone experts who attend conferences and other meetings in China. “This can save them years of design work and mistakes,” Mr. Easton said.

    The Chinese military has not released statistics on the size of its drone fleet, but a Taiwan Defense Ministry report said that as of mid-2011, the Chinese Air Force alone had more than 280 drone units, and analysts say the other branches have thousands, which means China’s fleet count is second only to the 7,000 or so of the United States. “The military significance of China’s move into unmanned systems is alarming,” said a 2012 report by the Defense Science Board, a Pentagon advisory committee.

    China’s domestic security apparatus, whose $124 billion official budget this year is larger than that of the military, is also keenly interested in drones, which raises questions about the potential use of drones for surveillance and possibly even attacks inside China, including in restive areas of Xinjiang and Tibet. Drone technology conferences here are attended by both military and domestic security officials. An international conference on nonmilitary drones is scheduled to take place in Beijing from Sept. 25 to 28.

    A signal moment in China’s drone use came on Sept. 9, when the navy sent a surveillance drone near the disputed Diaoyu Islands, which Japan administers and calls the Senkakus. Japanese interceptor jets scrambled to confront it. This was the first time China had ever deployed a drone over the East China Sea. The Chinese Defense Ministry said “regular drills” had taken place “at relevant areas in the East China Sea, which conform to relevant international laws and practices.”

    The drone appeared to be a BZK-005, a long-range aircraft used by the Chinese Navy that made its public debut in 2006 at China’s air show in Zhuhai, said an American official.

    Mr. Easton said deploying the drone near disputed waters and islands “was very much a first” for China and had caught Japanese officials off guard.

    “I think this is really just the beginning of a much broader trend we’re going to see — for China to increase its ability to monitor the East China Sea and the Western Pacific, beyond the Philippines, and to increase the operational envelope of their strike capabilities,” he said.

    The Chinese military, with its constant focus on potential war over Taiwan and an eye on China’s growing territorial disputes, is at the vanguard of preparing drones for use in maritime situations. That is unlike the United States, which has used drones to hunt and kill suspected terrorists and guerrilla fighters, mostly in Pakistan and Afghanistan.

    American drones “are not designed to enter into contested or denied air space,” Mr. Easton said. “So they would be unable to fight in any conflict with China.”

    China, on the other hand, is building drones, also called unmanned aerial vehicles, precisely to operate in contested spaces. “It’s a very useful instrument for safeguarding maritime sovereignty,” said Xu Guangyu, a retired major general and director of the China Arms Control and Disarmament Association. “China will gradually step up its use of U.A.V.’s in this area.”

    Chinese strategists have discussed using drones in attack situations if war with the United States were to break out in the Pacific, according to the Project 2049 report. Citing Chinese military technical material, the report said the People’s Liberation Army’s “operational thinkers and scientists envision attacking U.S. aircraft-carrier battle groups with swarms of multimission U.A.V.’s in the event of conflict.”

    University research centers are at the core of China’s drone program. The oldest research and production center for drones is the Northwestern Polytechnical University in Xi’an, where design work began in 1958. The ASN Technology Group, linked to the school, said on its Web site that it produces 90 percent of Chinese drones.

    At the program’s start, China reverse-engineered drones it had acquired from the Soviet Union in the 1950s. It also got its hands on American drones that crashed in Vietnam in the 1960s and in China while monitoring China’s nuclear weapons program. China bought 100 Harpy armed drones from Israel in the 1990s — its only significant purchase of foreign-made drones — and the Pentagon later pressured Israel not to upgrade those drones for China.

    In recent years, China has continued to acquire foreign drone technology and is especially focused on studying American models. “American U.A.V. technology is very sophisticated,” Mr. Xu said. “We can only envy their technology. Right now, we’re learning from them.”

    For the Obama administration and American business executives, no method of Chinese technology acquisition is more worrisome than cyberespionage. An American official confirmed that drone technology had been stolen by hackers.

    FireEye, the cybersecurity company in California, called the drone theft campaign Operation Beebus, traced back to a command-and-control node at bee.businessconsults.net. Cybersecurity experts say that general address and tools linked to it are associated with the Comment Crew, the Chinese hacker unit that Mandiant, another cybersecurity company, discussed in a report in February. Mandiant said the group was part of Unit 61398 of the People’s Liberation Army, based in Shanghai.

    Though the initial victims in Operation Beebus were large defense contractors, the hackers began to pick out companies that specialized in drone technology, said Mr. Kindlund, FireEye’s threat intelligence manager. They then alternated between large companies that made a wide range of military technology and boutique firms that focused on drones.

    In China, it is not just the military that is looking at uses for drones. In February, Liu Yuejin, the director of the antidrugs bureau in the Ministry of Public Security, which is responsible for domestic security, told Global Times, a state-run newspaper, that the ministry had considered using a drone armed with 44 pounds of explosives to kill a Burmese man in northern Myanmar suspected of ordering the murders of 13 Chinese sailors on the Mekong River. In the end, the idea was shelved because senior Chinese officials wanted the suspect, Naw Kham, captured alive.

    Chinese drones are increasingly appearing in the arsenals of other nations. The Chinese version of the Predator, the Wing Loong, or Pterodactyl, was first exported in 2011, according to People’s Daily. At the Paris Air Show in June, the president of a Chinese aeronautics company told Global Times that the drone could carry two laser-guided missiles and was the equal of the Predator in endurance and flight range, but was much cheaper.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Replies: 0
    Last Post: March 2nd, 2012, 13:37
  2. Report: Hackers Steal S. Korean Defense Documents
    By American Patriot in forum Southeast Asia
    Replies: 0
    Last Post: October 15th, 2010, 15:14
  3. Replies: 0
    Last Post: December 3rd, 2007, 20:10
  4. China Finalizes Designs Of New Weapons
    By Ryan Ruck in forum China
    Replies: 0
    Last Post: January 20th, 2007, 20:47
  5. Hackers Attack Via Chinese Web Sites
    By Ryan Ruck in forum China
    Replies: 0
    Last Post: September 14th, 2005, 22:28

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •