Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

China Is Our Number One National Security Threat
Investor's Business Daily ^ | May 29, 2013 | IBD EDITORIALS

Posted on 05/29/2013 4:14:15 PM PDT by raptor22

Cyberwar: Chinese hackers have obtained the designs for more than two dozen major U.S. weapon systems, including the Navy's missile defense system and our latest fighter. Our very national survival may soon be at risk.

When President Barack Obama meets with Chinese President Xi Jinping for the first time on June 7-8 in California, we hope he will not bow but rather demand the Chinese stop their cyberwar against the U.S. that has reaped for them the designs for more than two dozen major weapon systems used by the U.S. military.

According to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board, the Chinese have obtained detailed plans for the advanced Patriot missile system, the Navy's Aegis ballistic missile defense system, the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the F-35 Joint Strike Fighter.

The Defense Science report doesn't directly accuse the Chinese, but it follows a Defense Department condemnation of their activities earlier this month.

"In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military," the Defense Department alleged in a previous report.

Meanwhile, news reports in Australia claim hackers linked to China stole the floor plans of the $630 million headquarters for the Australia Security Intelligence Organization, the country's domestic spy agency. Australia is to play a key role in the administration's attempt to "pivot" our dwindling military assets to the Pacific.

According to a report in the Washington Post, the Chinese now have the know-how to emulate some of the Pentagon's most sophisticated programs.

(Excerpt) Read more at news.investors.com ...


TOPICS: Editorial; Foreign Affairs; Government
KEYWORDS: china; cyber; cyberwarfare; dotcommi; hackers; ibdchina; ibdcyber; unit61398
Navigation: use the links below to view more comments.
first previous 1-2021-36 last
To: raptor22

How many thousands of Americans have been killed by the Chinese compared to those killed by Islamonazis? How much material has been stolen by domestic communists/anarchists/socialists/marxists/but-I-repeat-myself?

The faggot who stole tens of thousands of pages of classified material shared it with those again’ us.

Snooping isn’t the same as leaking. The Chinese are not our friends but there are plenty of treasonous agents born and bred in America.


21 posted on 05/29/2013 5:14:33 PM PDT by a fool in paradise (America 2013 - STUCK ON STUPID)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Trod Upon

The seditious socialists that McCarthy/Cohn tried to oust from the Federal government are still there doing their dirty work from unelected unaccountable positions.


22 posted on 05/29/2013 5:15:37 PM PDT by a fool in paradise (America 2013 - STUCK ON STUPID)
[ Post Reply | Private Reply | To 20 | View Replies]

To: raptor22

Lets stick to Tic-Tac-Toe.


23 posted on 05/29/2013 5:49:07 PM PDT by Sawdring
[ Post Reply | Private Reply | To 1 | View Replies]

To: Still Thinking; StopGlobalWhining; Straight Vermonter; Tampa Caver; TChris; ...

IBD EDITORIAL PING


24 posted on 05/29/2013 6:11:10 PM PDT by raptor22 (Visit my blog at True Conservatives on Twitter: http://t.co/IKpP3cwq)
[ Post Reply | Private Reply | To 1 | View Replies]

To: raptor22
I beg to differ with the title.

Our number one national security threat is an administration more interested in James Rosen’s Mother's telephone conversations - secret chicken soup recipes were at risk - than protecting our national secrets & catching Chinese spies.

In the real world of limited resources, any NSA assets wasted on the Rosens were not available to foil Chinese spying.

25 posted on 05/29/2013 6:15:53 PM PDT by Mister Da (The mark of a wise man is not what he knows, but what he knows he doesn't know!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: raptor22

I beg to differ.

Obama and his administration is our biggest security risk.


26 posted on 05/29/2013 6:21:27 PM PDT by metmom (For freedom Christ has set us free; stand firm therefore & do not submit again to a yoke of slavery)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paladin2

Imagine so many FReepers with the same observation.

See my tagline...


27 posted on 05/29/2013 6:42:39 PM PDT by G Larry (Let his days be few; and let another take his office. Psalms 109:8)
[ Post Reply | Private Reply | To 2 | View Replies]

To: raptor22

They keep all those sensitive designs on unclassified computer networks connected to the internet?

I been saying for 2 years now, IA is the hot career and only getting hotter.


28 posted on 05/29/2013 7:17:52 PM PDT by sickoflibs (To GOP : Any path to US citizenship IS putting them ahead in line. Stop lying about your position.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: raptor22

My list:

1) Obamao
2) Moozlems

Red China probably could have make a #3 but they need to sell their crap somewhere. Who kill his customer and debtor in one?


29 posted on 05/29/2013 7:45:26 PM PDT by cunning_fish
[ Post Reply | Private Reply | To 1 | View Replies]

To: raptor22

Where are the firing squads for those entrusted to guard this information? Why is it anywhere that it could be “hacked” It should reside only on computers, within a safe room, without any outside connections. Further, there should be no way to remove data from these computers, without an act of congress, such as thumb drives and CD’s. I want to know who is accountable, and why are they not being brought up on charges of espionage after the fact? I work in IT, and am a security specialist, and though I don’t know the details of how this was done, I would guess that many of the things I initially listed would suffice. These types of information should reside only on one computer, and only those with a need to know, could connect to that computer, via an intranet, and view the documents. Heads should roll over this, and there should be blood shed. Unless of course, this information was specified in the illegal contributions that the Chinese funneled to the democrats, and this is their part of the bargain.

Negligence, under these circumstances, should be punishable by death. What happens to the sentry, who having been awake for 24 hours, falls asleep at his post during war? None of these supposed IT security specialists who are supposed to be protecting this information have been awake for 24 hours, either.


30 posted on 05/29/2013 8:26:52 PM PDT by krogers58 ())
[ Post Reply | Private Reply | To 1 | View Replies]

To: G Larry

It’s intuitively obvious even to the most casual observer.


31 posted on 05/29/2013 8:28:36 PM PDT by Paladin2 (;-))
[ Post Reply | Private Reply | To 27 | View Replies]

To: Paladin2

IOTETMCO


32 posted on 05/29/2013 8:35:29 PM PDT by Paladin2 (;-))
[ Post Reply | Private Reply | To 31 | View Replies]

To: Paladin2

First heard that phrase as two striper upon arriving at VAFB, CA, in 1972.


33 posted on 05/29/2013 8:55:27 PM PDT by G Larry (Let his days be few; and let another take his office. Psalms 109:8)
[ Post Reply | Private Reply | To 31 | View Replies]

To: G Larry
Common expression at a Great Eastern Institution Paralyzed around Science in the same decade.

(I worked at McClellan AFB in the 70's - now it's gone to real estate development apparently)

34 posted on 05/29/2013 8:59:18 PM PDT by Paladin2 (;-))
[ Post Reply | Private Reply | To 33 | View Replies]

To: G Larry

Most of Life ain’t Rocket Science.


35 posted on 05/29/2013 9:05:31 PM PDT by Paladin2 (;-))
[ Post Reply | Private Reply | To 33 | View Replies]

To: Paladin2

Over 40 years of my life has been!


36 posted on 05/30/2013 4:58:43 AM PDT by G Larry (Let his days be few; and let another take his office. Psalms 109:8)
[ Post Reply | Private Reply | To 35 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-36 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson