Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

A list of the U.S. weapons designs and technologies compromised by hackers
Washington Post ^ | May 27, 2013 | By Ellen Nakashima

Posted on 05/27/2013 8:31:36 PM PDT by Brad from Tennessee

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-37 last
To: Gene Eric

Loral


21 posted on 05/27/2013 10:58:59 PM PDT by mylife (Ted Cruz understands the law, and he does not fear the unlawful.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: mylife

Thanks for the necessary correction. Sorry, Raytheon!


22 posted on 05/27/2013 11:07:04 PM PDT by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 21 | View Replies]

To: Brad from Tennessee

as someone that has worked at a number of defense contracting companies, i can assure you all these designs did not come from any one company. the only place all these designs could be found in one location would be DoD systems... even then, the likelihood of finding them from a single entry point would be zer0

of course, speaking of zer0... there are one or two individuals that could have ordered these designs to be delivered on a flash drive...

makes you wonder what ‘arms shipments’ means when it comes to benghazi and why Stevens had to be taken out...


23 posted on 05/28/2013 12:09:32 AM PDT by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gene Eric
Raytheon, Loral Space, Lockheed, GE, Hughes and a bunch of other defense contractors were allowed to transfer classified, state of the art products and science to the Chinese. Those kind of transactions were strictly controlled by the State Department. Clinton took the export control authority away from State and gave it to the Commerce Department under Ron Brown (a crook) who green lighted about anything the defense industry laid on his desk. Bernie Schwartz supplied China with the science to advance their space program which is under the same roof as their ballistic missile program. They got technology to develop multiple reentry vehicle warheads and radiation-resistant computer chips—essential to the survivability of ICBMs in a nuclear exchange.

In one incident Schwartz shipped a Loral Space communications satellite to China to be launched there. The missile failed but the Chinese recovered the satellite. When it arrived back in the U.S. the encryption chips had been removed. The encryption chips deny unauthorized communication access to the vehicle. By analyzing the chips the Chinese could potentially communicate with any U.S. satellite in orbit, a huge strategic advantage in war.

Clinton had a principal broker for everything that went to China but I can't remember who that was.

24 posted on 05/28/2013 12:59:26 AM PDT by Brad from Tennessee (A politician can't give you anything he hasn't first stolen from you.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Brad from Tennessee

This admin is thoroughly destroying this country


25 posted on 05/28/2013 1:09:34 AM PDT by GeronL (http://asspos.blogspot.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sten
The only difference between the last two Democratic administrations and a criminal syndicate is that the Democrats print their own postage stamps. Clinton had a CIA director, John Deutch, who only lasted a year. He kept getting in trouble for security violations. Deutch would use his home computer, an AOL account and his access code to download, from his house, classified data from the CIA and Defense Department. When he resigned he took three government computers home with him. The same day some CIA technicians went to his house and seized the computers because they all had classified files on them. Deutch was investigated. He didn't have a burglar alarm system at his home or any safeguards on his computer. All they did eventually was take his clearance away. But it was obvious—if not provable—to anybody that this guy was at the CIA to steal secrets under the false persona of the absent minded professor.
26 posted on 05/28/2013 1:30:48 AM PDT by Brad from Tennessee (A politician can't give you anything he hasn't first stolen from you.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Brad from Tennessee

he wasn’t the only one

and for some reason, we can’t get anyone to care.

hell, we can’t even get them to properly check an id before handing over the football...


27 posted on 05/28/2013 1:47:08 AM PDT by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 26 | View Replies]

To: mylife
We are innovators.
We think outside the box

Unfortunately while we are outside the box they are inside our boxes messing around with them.

28 posted on 05/28/2013 2:09:03 AM PDT by palmer (Obama = Carter + affirmative action)
[ Post Reply | Private Reply | To 16 | View Replies]

To: GeronL

The left has been systematically destroying that country, and all others, since before WWII.

They never even took a break.


29 posted on 05/28/2013 2:41:27 AM PDT by Hardraade (http://junipersec.wordpress.com (Obama equals Osama))
[ Post Reply | Private Reply | To 25 | View Replies]

To: Hardraade

bump

Obama was the motherlode this time.


30 posted on 05/28/2013 2:47:34 AM PDT by GeronL (http://asspos.blogspot.com)
[ Post Reply | Private Reply | To 29 | View Replies]

To: mylife

This hacking stuff can work both ways. I read that back in the 1980s the Russians stole the plans for a few weapons and copied them exactly. When they tried to build them, however, they found some “problems” (wink, nudge).

Of course, since Obama is in charge, I’m not assuming they got fake ones this time.


31 posted on 05/28/2013 4:05:26 AM PDT by rbg81
[ Post Reply | Private Reply | To 16 | View Replies]

To: Tzimisce

For them, one’s the enemy and the other isn’t.


32 posted on 05/28/2013 4:16:10 AM PDT by 1010RD (First, Do No Harm)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Brad from Tennessee

——Global Freight Management System———

The US Army is the best in the business. They learned the trade during the westward expansion. The ruins of forts and depots scattered among the western states is testimony to the learning and success.

The Global Freight Management System is an outgrowth of Fort La Union


33 posted on 05/28/2013 4:21:05 AM PDT by bert ((K.E. N.P. N.C. +12 .....Obama Denies Role in Government)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Brad from Tennessee
Couldn't happen. Every time someone brings up PLA tech espionage a mass of FReepers who claim to be in-the-know jump on them shouting "Impossible!" So anyone who thinks that any of our weapons systems have been compromised by the PLA is just paranoid.

All is well. All is secure. America could smoke the PLA like a Camel. Sleep tight.

34 posted on 05/28/2013 7:40:47 AM PDT by jboot (It can happen here because it IS happening here.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sten
As someone who has worked at a number of defense contracting companies-all of which were subject to repeated and often long-term security breaches by the PLA-I can assure you that the Chinese often had the designs in their hot little hands before anyone at DoD had seen them.
35 posted on 05/28/2013 7:44:26 AM PDT by jboot (It can happen here because it IS happening here.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: rbg81

As much as I despise BO and BJ Clinton, the rape of US defense contractors continued unabated and largely uncontested during the Bush years. I saw a heck of a lot of shady activity from 2005-2009, and all I ever got for pointing it out were trips to the woodshed. As far as management was concerened, nothing was happening, even when we were physically unplugging “secure” SANs to stop someone with a Chinese IP and root access from scraping all the data.


36 posted on 05/28/2013 7:52:09 AM PDT by jboot (It can happen here because it IS happening here.)
[ Post Reply | Private Reply | To 31 | View Replies]

To: jboot
"So anyone who thinks that any of our weapons systems have been compromised by the PLA is just paranoid."

Stuxnet never existed /sarc

Is Stuxnet the 'best' malware ever?

Stuxnet, which was first reported in mid-June by VirusBlokAda, a little-known security firm based in Belarus, gained notoriety a month later when Microsoft confirmed that the worm was actively targeting Windows PCs that managed large-scale industrial-control systems in manufacturing and utility firms.

Those control systems are often referred to using the acronym SCADA, for "supervisory control and data acquisition." They run everything from power plants and factory machinery to oil pipelines and military installations.


37 posted on 05/29/2013 10:36:36 AM PDT by uncommonsense (Liberals see what they believe; Conservatives believe what they see)
[ Post Reply | Private Reply | To 34 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-37 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson