Posted on 05/29/2013 4:14:15 PM PDT by raptor22
Cyberwar: Chinese hackers have obtained the designs for more than two dozen major U.S. weapon systems, including the Navy's missile defense system and our latest fighter. Our very national survival may soon be at risk.
When President Barack Obama meets with Chinese President Xi Jinping for the first time on June 7-8 in California, we hope he will not bow but rather demand the Chinese stop their cyberwar against the U.S. that has reaped for them the designs for more than two dozen major weapon systems used by the U.S. military.
According to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board, the Chinese have obtained detailed plans for the advanced Patriot missile system, the Navy's Aegis ballistic missile defense system, the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the F-35 Joint Strike Fighter.
The Defense Science report doesn't directly accuse the Chinese, but it follows a Defense Department condemnation of their activities earlier this month.
"In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military," the Defense Department alleged in a previous report.
Meanwhile, news reports in Australia claim hackers linked to China stole the floor plans of the $630 million headquarters for the Australia Security Intelligence Organization, the country's domestic spy agency. Australia is to play a key role in the administration's attempt to "pivot" our dwindling military assets to the Pacific.
According to a report in the Washington Post, the Chinese now have the know-how to emulate some of the Pentagon's most sophisticated programs.
(Excerpt) Read more at news.investors.com ...
How many thousands of Americans have been killed by the Chinese compared to those killed by Islamonazis? How much material has been stolen by domestic communists/anarchists/socialists/marxists/but-I-repeat-myself?
The faggot who stole tens of thousands of pages of classified material shared it with those again’ us.
Snooping isn’t the same as leaking. The Chinese are not our friends but there are plenty of treasonous agents born and bred in America.
The seditious socialists that McCarthy/Cohn tried to oust from the Federal government are still there doing their dirty work from unelected unaccountable positions.
Lets stick to Tic-Tac-Toe.
IBD EDITORIAL PING
Our number one national security threat is an administration more interested in James Rosen’s Mother's telephone conversations - secret chicken soup recipes were at risk - than protecting our national secrets & catching Chinese spies.
In the real world of limited resources, any NSA assets wasted on the Rosens were not available to foil Chinese spying.
I beg to differ.
Obama and his administration is our biggest security risk.
Imagine so many FReepers with the same observation.
See my tagline...
They keep all those sensitive designs on unclassified computer networks connected to the internet?
I been saying for 2 years now, IA is the hot career and only getting hotter.
My list:
1) Obamao
2) Moozlems
Red China probably could have make a #3 but they need to sell their crap somewhere. Who kill his customer and debtor in one?
Where are the firing squads for those entrusted to guard this information? Why is it anywhere that it could be “hacked” It should reside only on computers, within a safe room, without any outside connections. Further, there should be no way to remove data from these computers, without an act of congress, such as thumb drives and CD’s. I want to know who is accountable, and why are they not being brought up on charges of espionage after the fact? I work in IT, and am a security specialist, and though I don’t know the details of how this was done, I would guess that many of the things I initially listed would suffice. These types of information should reside only on one computer, and only those with a need to know, could connect to that computer, via an intranet, and view the documents. Heads should roll over this, and there should be blood shed. Unless of course, this information was specified in the illegal contributions that the Chinese funneled to the democrats, and this is their part of the bargain.
Negligence, under these circumstances, should be punishable by death. What happens to the sentry, who having been awake for 24 hours, falls asleep at his post during war? None of these supposed IT security specialists who are supposed to be protecting this information have been awake for 24 hours, either.
It’s intuitively obvious even to the most casual observer.
IOTETMCO
First heard that phrase as two striper upon arriving at VAFB, CA, in 1972.
(I worked at McClellan AFB in the 70's - now it's gone to real estate development apparently)
Most of Life ain’t Rocket Science.
Over 40 years of my life has been!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.