Skip to comments.
A list of the U.S. weapons designs and technologies compromised by hackers
Washington Post ^
| May 27, 2013
| By Ellen Nakashima
Posted on 05/27/2013 8:31:36 PM PDT by Brad from Tennessee
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-37 last
To: Gene Eric
21
posted on
05/27/2013 10:58:59 PM PDT
by
mylife
(Ted Cruz understands the law, and he does not fear the unlawful.)
To: mylife
Thanks for the necessary correction. Sorry, Raytheon!
22
posted on
05/27/2013 11:07:04 PM PDT
by
Gene Eric
(Don't be a statist!)
To: Brad from Tennessee
as someone that has worked at a number of defense contracting companies, i can assure you all these designs did not come from any one company. the only place all these designs could be found in one location would be DoD systems... even then, the likelihood of finding them from a single entry point would be zer0
of course, speaking of zer0... there are one or two individuals that could have ordered these designs to be delivered on a flash drive...
makes you wonder what ‘arms shipments’ means when it comes to benghazi and why Stevens had to be taken out...
23
posted on
05/28/2013 12:09:32 AM PDT
by
sten
(fighting tyranny never goes out of style)
To: Gene Eric
Raytheon, Loral Space, Lockheed, GE, Hughes and a bunch of other defense contractors were allowed to transfer classified, state of the art products and science to the Chinese. Those kind of transactions were strictly controlled by the State Department. Clinton took the export control authority away from State and gave it to the Commerce Department under Ron Brown (a crook) who green lighted about anything the defense industry laid on his desk. Bernie Schwartz supplied China with the science to advance their space program which is under the same roof as their ballistic missile program. They got technology to develop multiple reentry vehicle warheads and radiation-resistant computer chips—essential to the survivability of ICBMs in a nuclear exchange.
In one incident Schwartz shipped a Loral Space communications satellite to China to be launched there. The missile failed but the Chinese recovered the satellite. When it arrived back in the U.S. the encryption chips had been removed. The encryption chips deny unauthorized communication access to the vehicle. By analyzing the chips the Chinese could potentially communicate with any U.S. satellite in orbit, a huge strategic advantage in war.
Clinton had a principal broker for everything that went to China but I can't remember who that was.
24
posted on
05/28/2013 12:59:26 AM PDT
by
Brad from Tennessee
(A politician can't give you anything he hasn't first stolen from you.)
To: Brad from Tennessee
This admin is thoroughly destroying this country
25
posted on
05/28/2013 1:09:34 AM PDT
by
GeronL
(http://asspos.blogspot.com)
To: sten
The only difference between the last two Democratic administrations and a criminal syndicate is that the Democrats print their own postage stamps. Clinton had a CIA director, John Deutch, who only lasted a year. He kept getting in trouble for security violations. Deutch would use his home computer, an AOL account and his access code to download, from his house, classified data from the CIA and Defense Department. When he resigned he took three government computers home with him. The same day some CIA technicians went to his house and seized the computers because they all had classified files on them. Deutch was investigated. He didn't have a burglar alarm system at his home or any safeguards on his computer. All they did eventually was take his clearance away. But it was obvious—if not provable—to anybody that this guy was at the CIA to steal secrets under the false persona of the absent minded professor.
26
posted on
05/28/2013 1:30:48 AM PDT
by
Brad from Tennessee
(A politician can't give you anything he hasn't first stolen from you.)
To: Brad from Tennessee
he wasn’t the only one
and for some reason, we can’t get anyone to care.
hell, we can’t even get them to properly check an id before handing over the football...
27
posted on
05/28/2013 1:47:08 AM PDT
by
sten
(fighting tyranny never goes out of style)
To: mylife
We are innovators.
We think outside the box Unfortunately while we are outside the box they are inside our boxes messing around with them.
28
posted on
05/28/2013 2:09:03 AM PDT
by
palmer
(Obama = Carter + affirmative action)
To: GeronL
The left has been systematically destroying that country, and all others, since before WWII.
They never even took a break.
29
posted on
05/28/2013 2:41:27 AM PDT
by
Hardraade
(http://junipersec.wordpress.com (Obama equals Osama))
To: Hardraade
bump
Obama was the motherlode this time.
30
posted on
05/28/2013 2:47:34 AM PDT
by
GeronL
(http://asspos.blogspot.com)
To: mylife
This hacking stuff can work both ways. I read that back in the 1980s the Russians stole the plans for a few weapons and copied them exactly. When they tried to build them, however, they found some “problems” (wink, nudge).
Of course, since Obama is in charge, I’m not assuming they got fake ones this time.
31
posted on
05/28/2013 4:05:26 AM PDT
by
rbg81
To: Tzimisce
For them, one’s the enemy and the other isn’t.
32
posted on
05/28/2013 4:16:10 AM PDT
by
1010RD
(First, Do No Harm)
To: Brad from Tennessee
——Global Freight Management System———
The US Army is the best in the business. They learned the trade during the westward expansion. The ruins of forts and depots scattered among the western states is testimony to the learning and success.
The Global Freight Management System is an outgrowth of Fort La Union
33
posted on
05/28/2013 4:21:05 AM PDT
by
bert
((K.E. N.P. N.C. +12 .....Obama Denies Role in Government)
To: Brad from Tennessee
Couldn't happen. Every time someone brings up PLA tech espionage a mass of FReepers who claim to be in-the-know jump on them shouting "Impossible!" So anyone who thinks that any of our weapons systems have been compromised by the PLA is just paranoid.
All is well. All is secure. America could smoke the PLA like a Camel. Sleep tight.
34
posted on
05/28/2013 7:40:47 AM PDT
by
jboot
(It can happen here because it IS happening here.)
To: sten
As someone who has worked at a number of defense contracting companies-all of which were subject to repeated and often long-term security breaches by the PLA-I can assure you that the Chinese often had the designs in their hot little hands before anyone at DoD had seen them.
35
posted on
05/28/2013 7:44:26 AM PDT
by
jboot
(It can happen here because it IS happening here.)
To: rbg81
As much as I despise BO and BJ Clinton, the rape of US defense contractors continued unabated and largely uncontested during the Bush years. I saw a heck of a lot of shady activity from 2005-2009, and all I ever got for pointing it out were trips to the woodshed. As far as management was concerened, nothing was happening, even when we were physically unplugging “secure” SANs to stop someone with a Chinese IP and root access from scraping all the data.
36
posted on
05/28/2013 7:52:09 AM PDT
by
jboot
(It can happen here because it IS happening here.)
To: jboot
"So anyone who thinks that any of our weapons systems have been compromised by the PLA is just paranoid." Stuxnet never existed /sarc
Is Stuxnet the 'best' malware ever?
Stuxnet, which was first reported in mid-June by VirusBlokAda, a little-known security firm based in Belarus, gained notoriety a month later when Microsoft confirmed that the worm was actively targeting Windows PCs that managed large-scale industrial-control systems in manufacturing and utility firms. Those control systems are often referred to using the acronym SCADA, for "supervisory control and data acquisition." They run everything from power plants and factory machinery to oil pipelines and military installations.
37
posted on
05/29/2013 10:36:36 AM PDT
by
uncommonsense
(Liberals see what they believe; Conservatives believe what they see)
Navigation: use the links below to view more comments.
first previous 1-20, 21-37 last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson