Posted on 05/27/2013 8:19:32 PM PDT by Brad from Tennessee
Designs for many of the nations most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry.
Among more than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat aircraft and ships, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board.
Experts warn that the electronic intrusions gave China access to advanced technology that could accelerate the development of its weapons systems and weaken the U.S. military advantage in a future conflict.
The Defense Science Board, a senior advisory group made up of government and civilian experts, did not accuse the Chinese of stealing the designs. But senior military and industry officials with knowledge of the breaches said the vast majority were part of a widening Chinese campaign of espionage against U.S. defense contractors and government agencies.
The significance and extent of the targets help explain why the Obama administration has escalated its warnings to the Chinese government to stop what Washington sees as rampant cybertheft. . .
(Excerpt) Read more at washingtonpost.com ...
That's not even the worst of it. I read recently that in some rural areas of China, thoughtless peasants hunt, fish and harvest wild fruits, oblivious to the danger they could be preying on any number of critically endangered species.
While I would like to think that our counter-intelligence people would plant sleeper programs in the stuff that the Red Chinese are stealing, I just don’t think that our military leadership, and certainly not our political leadership, is smart enough to do it, or don’t have the balls to do it.
The communists have a goal, world domination (direct and indirect influence/power). They have a plan for it, and always have.
We have Obama, Holder, Clapper, Brennan, Biden and Dempsey.
In other words, we are up Shit’s Creek with the paddle shoved up our butt.
We got a major preview of the Red Chinese espionage and influence-buying offensive during the Clinton administration, but did we learn anything? Nope, and Al Gore got fat on Red Chinese money, as did the Democrat Party.
About the same time as the Democrats and the Clintons were getting millions from the Mafia, esp. their controlled Laborers International Union of North America.
And the corruption continues unabated and unchallenged. WHY?????
Your findings have been reported to the IRS, OSHA (because I am sure they do not wear appropriate PPE), PETA, and Al Gore.
* What, have they no cake?
Michelle Robinson Obama
I don’t know any Maine jokes but I know a Vermont joke which you have probably heard.
A partially deaf man was in the habit of
attending town meetings, auctions and such with
a neighbor would yell a running narrative of the
proceedings into the man’s ear. One afternoon at
a political rally a man running for state office
rose to the podium and launched into a speech.
The speaker went on for several minutes before
the man nudged his neighbor and asked, “What’s he
saying?” The neighbor gave a shrug then yelled
in the man’s ear: “He don’t say!”
BTTT!
China makes a lot of the parts for these systems already. We know they have put extra devices in some of the guidance chips.
We will not have a war with China, because we can’t afford to.
No such thing.
I feel I owe you an explanation. Vermont has the same relationship with Maine as Boston has with Connecticut.
In Boston they eats lots of beans. In Connecticut they live on the Sound.
I'm not surprised. This may be reciprocal and serve as a fail-safe. The U.S. is as deeply embedded or more in China's defense infrastructure, particularly on the R&D end. When Nixon went to China he wasn't just visiting the Great Wall and kissing babies. Something profound happened between Nixon and Mao that goes on today.
I knew an individual, an aeronautical engineer, who was working in China on their missile program in the early 1970’s. He said he worked mostly in a complex at the bottom of a deep gorge. The gorge offered protection from Soviet missiles because of the limits of their ballistic trajectories. He said at that time the Chinese believed an overt strike against their missile and nuclear weapons program by the Soviets was imminent. Later on I read where H.R. Haldeman said the Russians approached the State Department asking the U.S. to sign off on surgical strikes against these programs but Nixon said no.
The conflict between the U.S. and USSR evolved a balancing mechanism which was mutually assured destruction. Beginning with Nixon and Kissinger the formula for developing the balance with China evolved into a symbiotic relationship whose highlight might have been Clinton signing the treaty giving China Most Favored Nation trade status. It's not possible to put any of this on a bumper sticker.
I agree.
Duh, but it’s soooo convenient to have it on a private network connected to the internet because you can share information faster.
In this case, security beats convenience.
Was Wahids (Wahid Hamid - Obamas Pakistan roomie at Occidental who was put on the Denfense Board within weeks of Obama being voted into office) new company HAND IT really the implementation of EPA 211 or access to our defense intelligence or both?
That’s what I was asking in 2009/2010 - today they’re blaming it on hackers. Personally I don’t think they needed hackers because we handed all of it to them via cojoined software set-up by Hamid and a Chinese elite professor.
Here’s some of the info I had on Libre and have now transferred onto my blog which I use for odd stuff. Youll find links at the bottom of the following site (sorry it’s a bit of a mess but don’t have time to fix it though it’s still readable:
http://mediachecker.wordpress.com/2011/04/19/25/
It’s interesting that Hamid called his IT company “HAND” as the history and name “China Hands” were from the State Department’s Asian division who worked so diligently with the Chinese for decades...
http://www.commentarymagazine.com/viewarticle.cfm/china-hands-by-james-lilley-9946
Thanks. I’ll check in with you.
There’s not much information on China Hands pre-1900 as the records were apparently destroyed, the University of Bristol has some records... http://www.bristol.ac.uk/history/customs/resources/archive.html
...but if one tracks the corporate china tea project the exploitation is clear...the banksters (Rothchilds et al) did then what they continue to do today, i.e., steal the countries resources via blackmail...(Bush Sr. - a very evil man) but mainly the obnoxious Clintonites decided to destroy Serbia - a clear template of all their shenanigans thereafter including Georgia and all between until one leaps to Benghazi where one sees clearly that these jihadists were being used to insigate. Soros, and his university professor buddies made their debut in the Balkans. How anyone can destroy the Balkans with a history of the Battle of Leopanto would only make sense to the banksters and their cohorts, the sword of mohammedan - the jihadist assassins who, imo, are hired by the banksters to instigate chaos can be found if one researches Feb17 (controlled by the mullahs as assassins for hire).
We have never severed ties to the English - if this sounds farfetched albeit but it’s the only thing that made sense when doing some research which included the attempted bombing at NY Times Square but that’s a whole other story...
http://www.yeefow.com/past/1848.html
“There is some downside to electing a “rock star” as president.”
We were educating Red Chinese spies in our colleges long before Barry could spell “China”; our colleges reach out to them (and our government allows it). The creepiest thing is when you talk to them, and they completely defend their government’s policies.
Paging Mitch Rapp.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.