Uncategorized

Hacked By China!

Chinese hackers accessed top secret designs for some of the United States Armed Forces’ most aYou must Subscribe or log in to read the rest of this content.

pentagon.jpg
Chinese hackers accessed top secret designs for some of the United States Armed Forces’ most a
You must Subscribe or log in to read the rest of this content.

Related posts

Uncategorized

Woman is elected president of the world

John
Uncategorized

Man eats a hamburger from 1937

John
Uncategorized

Murdaugh Retrial Hearing: Interview With Bill Young

Will Folks

43 comments

9334eea3e9d34f568e16026f8c38d760?s=100&d=mm&r=r
Smirks May 28, 2013 at 10:03 am

You have to wonder what the government considers the worst part of the leak. My vote would be the missile defense system designs. An enemy that has decent weaponry isn’t as scary to a military superpower as an enemy that can defend itself.

Reply
9334eea3e9d34f568e16026f8c38d760?s=100&d=mm&r=r
Smirks May 28, 2013 at 10:03 am

You have to wonder what the government considers the worst part of the leak. My vote would be the missile defense system designs. An enemy that has decent weaponry isn’t as scary to a military superpower as an enemy that can defend itself.

Reply
35c515fc7d6ceed3d057fe1fcc79adc3?s=100&d=mm&r=r
China May 28, 2013 at 10:04 am

You work for me now, cracker!

Reply
35c515fc7d6ceed3d057fe1fcc79adc3?s=100&d=mm&r=r
China May 28, 2013 at 10:04 am

You work for me now, cracker!

Reply
1acfeaaca5e43c158367d3c7c20cb5a8?s=100&d=mm&r=r
AlgorithmicAnalyst May 28, 2013 at 10:12 am

This is news to anyone?

Reply
1acfeaaca5e43c158367d3c7c20cb5a8?s=100&d=mm&r=r
AlgorithmicAnalyst May 28, 2013 at 10:12 am

This is news to anyone?

Reply
f8d2dcc1860bf0255be2e47a80631626?s=100&d=mm&r=r
Swingline May 28, 2013 at 10:19 am

This is an instance of the mouse being smarter than the trap. It’s going to happen from time to time, and the letter next to the name of the man in the chair is largely irrelevant when it does.

Reply
9334eea3e9d34f568e16026f8c38d760?s=100&d=mm&r=r
Smirks May 28, 2013 at 11:52 am

That’s fairly true to a certain extent. There are a variety of ways to attack networks and high profile targets like the US government’s defense secrets receive no small measure of those attacks on a daily basis. No security is perfect, there’s always going to be that one day where someone manages to find the crack in the armor.

When the inevitable failure happens, the important thing is that it is addressed quickly and efficiently so that something like it doesn’t happen again for a long time.

Of course, incompetence and covering up shit is where that defense fails entirely, as with SC’s leaked SSNs scandal. “We don’t need no stinkin’ encryption!”

Reply
f8d2dcc1860bf0255be2e47a80631626?s=100&d=mm&r=r
Swingline May 28, 2013 at 1:44 pm

Hear, hear.

Reply
f8d2dcc1860bf0255be2e47a80631626?s=100&d=mm&r=r
Swingline May 28, 2013 at 10:19 am

This is an instance of the mouse being smarter than the trap. It’s going to happen from time to time, and the letter next to the name of the man in the chair is largely irrelevant when it does.

Reply
9334eea3e9d34f568e16026f8c38d760?s=100&d=mm&r=r
Smirks May 28, 2013 at 11:52 am

That’s fairly true to a certain extent. There are a variety of ways to attack networks and high profile targets like the US government’s defense secrets receive no small measure of those attacks on a daily basis. No security is perfect, there’s always going to be that one day where someone manages to find the crack in the armor.

When the inevitable failure happens, the important thing is that it is addressed quickly and efficiently so that something like it doesn’t happen again for a long time.

Of course, incompetence and covering up shit is where that defense fails entirely, as with SC’s leaked SSNs scandal. “We don’t need no stinkin’ encryption!”

Reply
f8d2dcc1860bf0255be2e47a80631626?s=100&d=mm&r=r
Swingline May 28, 2013 at 1:44 pm

Hear, hear.

Reply
089f1e1d6bc1771b7accab90d274b0ea?s=100&d=mm&r=r
M326 May 28, 2013 at 10:27 am

It’s depressing that Governor Nikki Haley’s Department of Revenue can’t do something as simple as safeguard MY PERSONAL FINANCIAL INFORMATION. For the rest of my life I will have to worry and try to safeguard my financial integrity. It’s like closing the proverbial barn door after the horses are gone.

Reply
b87163202fc4907a884a5763dcbf33e8?s=100&d=mm&r=r
SC VOTER! May 28, 2013 at 10:46 am

Amen!!!
I had to join life lock for the rest of my life. I’ve already began to get hits.
Talked, at length, with the Secret Service and there is very little they can do because it is coming from foreign countries!!
Screw Haley!!!!!

Reply
089f1e1d6bc1771b7accab90d274b0ea?s=100&d=mm&r=r
M326 May 28, 2013 at 10:27 am

It’s depressing that Governor Nikki Haley’s Department of Revenue can’t do something as simple as safeguard MY PERSONAL FINANCIAL INFORMATION. For the rest of my life I will have to worry and try to safeguard my financial integrity. It’s like closing the proverbial barn door after the horses are gone.

Reply
b87163202fc4907a884a5763dcbf33e8?s=100&d=mm&r=r
SC VOTER! May 28, 2013 at 10:46 am

Amen!!!
I had to join life lock for the rest of my life. I’ve already began to get hits.
Talked, at length, with the Secret Service and there is very little they can do because it is coming from foreign countries!!
Screw Haley!!!!!

Reply
b87163202fc4907a884a5763dcbf33e8?s=100&d=mm&r=r
Colonel May 28, 2013 at 10:43 am

We are in a Cold Technology War and a Hot Religious War. O’s administration refuses to accept the facts. We are vulnerable and getting our asses kicked.

Our Congress and Administration are failing, incompetent and impotent. Focused on partisan back stabbing, denial and gotcha politics.

Our once great country and future generations are going to pay a horrible price.
Future generations will never consider us a GREAT generation.

Reply
b87163202fc4907a884a5763dcbf33e8?s=100&d=mm&r=r
Colonel May 28, 2013 at 10:43 am

We are in a Cold Technology War and a Hot Religious War. O’s administration refuses to accept the facts. We are vulnerable and getting our asses kicked.

Our Congress and Administration are failing, incompetent and impotent. Focused on partisan back stabbing, denial and gotcha politics.

Our once great country and future generations are going to pay a horrible price.
Future generations will never consider us a GREAT generation.

Reply
256f41a9998f191bd76723d3eaad332c?s=100&d=mm&r=r
dangerous games May 28, 2013 at 10:52 am

If we are paying off the Chinese because they held or are holding our debt, or some other services performed, we should at least have some formalized “receipt.”

Does the national coverage of this “news” hold some leverage or is it a pile on for the start of some confrontation? More theatre…like Clinton and his look the other way while I give out State secrets.

Reply
7dd29d0994d4631e7b0cd4c2ab931090?s=100&d=mm&r=r
EJB May 28, 2013 at 10:52 am

While the Chinese steal our secrets and analyze our capabilities we ignore what they do, cut our defense budget and watch them build their military. They now have one aircraft carrier, are building two more and while there is more to having a carrier battle group than attaining ships they will acquire the know how and experience as we atrophy. We are allowing our strength to diminish and we will pay the price. One must rule the seas and skies to control the land (during a war) and we won’t be able to either shortly.

Reply
05a5d191eca259b682b50e3189ebbf26?s=100&d=mm&r=r
CNSYD May 28, 2013 at 11:50 am

No problem EJB. Don’t you read FITSNEWS? What foreign countries do is none of our concern. Sic Willie wants to wait til they are on our shores or in our air space before we even think about it.

Reply
b373f9d36b7bd0233e6c3a5ff261e3d2?s=100&d=mm&r=r
Brigid May 28, 2013 at 11:55 am

When it’ll be too late.

Reply
05a5d191eca259b682b50e3189ebbf26?s=100&d=mm&r=r
CNSYD May 28, 2013 at 11:59 am

Correctamundo!

Reply
05a5d191eca259b682b50e3189ebbf26?s=100&d=mm&r=r
CNSYD May 28, 2013 at 11:50 am

No problem EJB. Don’t you read FITSNEWS? What foreign countries do is none of our concern. Sic Willie wants to wait til they are on our shores or in our air space before we even think about it.

Reply
d087292097597188c08ba65884bb2c77?s=100&d=mm&r=r
RHood2 May 28, 2013 at 3:06 pm

They have an aircraft carrier. Thy don’t have any pilots who can land on an aircraft carrier. Tricky and hard.

Reply
7dd29d0994d4631e7b0cd4c2ab931090?s=100&d=mm&r=r
EJB May 28, 2013 at 3:53 pm

Very true, but four years ago they didn’t have an aircraft carrier and we had eleven, now they have one with two in the pipe and we have nine. Carriers take many years to build, like submarines. If we changed course today we would barely be able to stay ahead.

Reply
256f41a9998f191bd76723d3eaad332c?s=100&d=mm&r=r
dangerous games May 28, 2013 at 10:52 am

If we are paying off the Chinese because they held or are holding our debt, or some other services performed, we should at least have some formalized “receipt.”

Does the national coverage of this “news” hold some leverage or is it a pile on for the start of some confrontation? More theatre…like Clinton and his look the other way while I give out State secrets.

Reply
7dd29d0994d4631e7b0cd4c2ab931090?s=100&d=mm&r=r
EJB May 28, 2013 at 10:52 am

While the Chinese steal our secrets and analyze our capabilities we ignore what they do, cut our defense budget and watch them build their military. They now have one aircraft carrier, are building two more and while there is more to having a carrier battle group than attaining ships they will acquire the know how and experience as we atrophy. We are allowing our strength to diminish and we will pay the price. One must rule the seas and skies to control the land (during a war) and we won’t be able to either shortly.

Reply
05a5d191eca259b682b50e3189ebbf26?s=100&d=mm&r=r
CNSYD May 28, 2013 at 11:50 am

No problem EJB. Don’t you read FITSNEWS? What foreign countries do is none of our concern. Sic Willie wants to wait til they are on our shores or in our air space before we even think about it.

Reply
b373f9d36b7bd0233e6c3a5ff261e3d2?s=100&d=mm&r=r
Brigid May 28, 2013 at 11:55 am

When it’ll be too late.

Reply
05a5d191eca259b682b50e3189ebbf26?s=100&d=mm&r=r
CNSYD May 28, 2013 at 11:59 am

Correctamundo!

Reply
d087292097597188c08ba65884bb2c77?s=100&d=mm&r=r
RHood2 May 28, 2013 at 3:06 pm

They have an aircraft carrier. Thy don’t have any pilots who can land on an aircraft carrier. Tricky and hard.

Reply
7dd29d0994d4631e7b0cd4c2ab931090?s=100&d=mm&r=r
EJB May 28, 2013 at 3:53 pm

Very true, but four years ago they didn’t have an aircraft carrier and we had eleven, now they have one with two in the pipe and we have nine. Carriers take many years to build, like submarines. If we changed course today we would barely be able to stay ahead.

Reply
3112f4a4c0845b593a6bc9a204453b65?s=100&d=mm&r=r
April Jona May 28, 2013 at 11:00 am

China, the land of state-sponsored theft from hard-working people around the world.

Reply
3112f4a4c0845b593a6bc9a204453b65?s=100&d=mm&r=r
April Jona May 28, 2013 at 11:00 am

China, the land of state-sponsored theft from hard-working people around the world.

Reply
37058ae726dd9326277640a11490409a?s=100&d=mm&r=r
? May 28, 2013 at 11:09 am

A $100 used laptop with a competent software engineer can pilfer billions, actually trillions of dollars worth of technology information/know how….

Amazing times.

Maybe it’s time to focus on protecting our own borders instead of being the world’s police.

Reply
9334eea3e9d34f568e16026f8c38d760?s=100&d=mm&r=r
Smirks May 28, 2013 at 11:55 am

Doesn’t take much to run Linux, or to do command-line stuff, after all.

Reply
f50d888b41f955a5c9516c247e44aed8?s=100&d=mm&r=r
Bubbas Brother May 28, 2013 at 12:55 pm

Linux isn’t the answer – as soon as enough people switch to the system, hackers will start hacking away. Apple’s once vaunted “we don’t get viruses” status has not existed for years.

The answer is encryption, PKI physical keys combined with complex passwords and fixed limited networks for really sensitive materials. There is no excuse for some of the material that was hacked to have been on a NIPR network

Reply
37058ae726dd9326277640a11490409a?s=100&d=mm&r=r
? May 28, 2013 at 11:09 am

A $100 used laptop with a competent software engineer can pilfer billions, actually trillions of dollars worth of technology information/know how….

Amazing times.

Maybe it’s time to focus on protecting our own borders instead of being the world’s police.

Reply
9334eea3e9d34f568e16026f8c38d760?s=100&d=mm&r=r
Smirks May 28, 2013 at 11:55 am

Doesn’t take much to run Linux, or to do command-line stuff, after all.

Reply
f50d888b41f955a5c9516c247e44aed8?s=100&d=mm&r=r
The Colonel (R) May 28, 2013 at 12:55 pm

Linux isn’t the answer – as soon as enough people switch to the system, hackers will start hacking away. Apple’s once vaunted “we don’t get viruses” status has not existed for years.

The answer is encryption, PKI physical keys combined with complex passwords and fixed limited networks for really sensitive materials. There is no excuse for some of the material that was hacked to have been on a NIPR network

Reply
f50d888b41f955a5c9516c247e44aed8?s=100&d=mm&r=r
Bubbas Brother May 28, 2013 at 12:47 pm

The Chinese having been hacking DoD for years, this is nothing new. They’ve already hacked peripheral networks like DoDMERB – the medical clearing house for new soldiers and officers. We think they stole information from the medical database to use in creating false identities.

There is evidence that they have infiltrated the electrical power routing an distribution networks.

They stole the technology they’ve used to become world leaders in wind energy and computers (Google Sinovel).

They had access to Nortel for almost 10 years before someone in the IT department figured it out.

They’ve gone after Australia’s defense networks as well, stealing the plans for Oz’s latest spy plane.

It’s time we stole (bought) a Chinese nuclear weapon and then experimented with a low yield EMP explosion on the Asian land mass and then blamed the whole thing on rouge elements of the oddly named Chinese People’s Liberation Army Navy

Reply
f50d888b41f955a5c9516c247e44aed8?s=100&d=mm&r=r
The Colonel (R) May 28, 2013 at 12:47 pm

The Chinese having been hacking DoD for years, this is nothing new. They’ve already hacked peripheral networks like DoDMERB – the medical clearing house for new soldiers and officers. We think they stole information from the medical database to use in creating false identities.

There is evidence that they have infiltrated the electrical power routing an distribution networks.

They stole the technology they’ve used to become world leaders in wind energy and computers (Google Sinovel).

They had access to Nortel for almost 10 years before someone in the IT department figured it out.

They’ve gone after Australia’s defense networks as well, stealing the plans for Oz’s latest spy plane.

It’s time we stole (bought) a Chinese nuclear weapon and then experimented with a low yield EMP explosion on the Asian land mass and then blamed the whole thing on rouge elements of the oddly named Chinese People’s Liberation Army Navy

Reply

Leave a Comment