Posted on 05/27/2013 8:31:36 PM PDT by Brad from Tennessee
Weapon designs and technologies compromised:
The following is reproduced from the nonpublic version of the Defense Science Board report Resilient Military Systems and the Advanced Cyber Threat:
Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation
SYSTEM DESIGNS
Terminal High Altitude Area Defense
Patriot Advanced Capability-3
Extended Area Protection and Survivability System (EAPS)
F-35
F-35
V-22
C-17
Hawklink
Advanced Harpoon Weapon Control System
Tanker Conversions
Long-term Mine Reconnaissance System
Global Hawk
Navy antenna mechanisms
Global Freight Management System
Micro Air Vehicle
Brigade Combat Team Modernization
Aegis Ballistic Missile Defense System
USMC Tracked Combat Vehicles
Warfighter Information Network-Tactical (WIN-T)
T700 Family of Engines
Full Authority Digital Engine Controller (FADEC)
UH-60 Black Hawk
AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile)
Affordable Weapons System
Littoral Combat Ship. . .
(Excerpt) Read more at washingtonpost.com ...
Loral
Thanks for the necessary correction. Sorry, Raytheon!
as someone that has worked at a number of defense contracting companies, i can assure you all these designs did not come from any one company. the only place all these designs could be found in one location would be DoD systems... even then, the likelihood of finding them from a single entry point would be zer0
of course, speaking of zer0... there are one or two individuals that could have ordered these designs to be delivered on a flash drive...
makes you wonder what ‘arms shipments’ means when it comes to benghazi and why Stevens had to be taken out...
In one incident Schwartz shipped a Loral Space communications satellite to China to be launched there. The missile failed but the Chinese recovered the satellite. When it arrived back in the U.S. the encryption chips had been removed. The encryption chips deny unauthorized communication access to the vehicle. By analyzing the chips the Chinese could potentially communicate with any U.S. satellite in orbit, a huge strategic advantage in war.
Clinton had a principal broker for everything that went to China but I can't remember who that was.
This admin is thoroughly destroying this country
he wasn’t the only one
and for some reason, we can’t get anyone to care.
hell, we can’t even get them to properly check an id before handing over the football...
Unfortunately while we are outside the box they are inside our boxes messing around with them.
The left has been systematically destroying that country, and all others, since before WWII.
They never even took a break.
bump
Obama was the motherlode this time.
This hacking stuff can work both ways. I read that back in the 1980s the Russians stole the plans for a few weapons and copied them exactly. When they tried to build them, however, they found some “problems” (wink, nudge).
Of course, since Obama is in charge, I’m not assuming they got fake ones this time.
For them, one’s the enemy and the other isn’t.
——Global Freight Management System———
The US Army is the best in the business. They learned the trade during the westward expansion. The ruins of forts and depots scattered among the western states is testimony to the learning and success.
The Global Freight Management System is an outgrowth of Fort La Union
All is well. All is secure. America could smoke the PLA like a Camel. Sleep tight.
As much as I despise BO and BJ Clinton, the rape of US defense contractors continued unabated and largely uncontested during the Bush years. I saw a heck of a lot of shady activity from 2005-2009, and all I ever got for pointing it out were trips to the woodshed. As far as management was concerened, nothing was happening, even when we were physically unplugging “secure” SANs to stop someone with a Chinese IP and root access from scraping all the data.
Stuxnet never existed /sarc
Is Stuxnet the 'best' malware ever?
Stuxnet, which was first reported in mid-June by VirusBlokAda, a little-known security firm based in Belarus, gained notoriety a month later when Microsoft confirmed that the worm was actively targeting Windows PCs that managed large-scale industrial-control systems in manufacturing and utility firms.Those control systems are often referred to using the acronym SCADA, for "supervisory control and data acquisition." They run everything from power plants and factory machinery to oil pipelines and military installations.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.