![]() ![]() Other losses to Chinese cyber spies included the air refueling schedules of the U.S. More than 1,600 network computers were penetrated and at least 600,000 user accounts were compromised, the undated slide stated, noting that the damage from the Chinese cyber spying was assessed to be more than $100 million, mainly in costs for rebuilding networks. ![]() The NSA estimated in the briefing slide that the Chinese had conducted more than 30,000 cyber attacks as part of the massive defense industrial espionage, and that more than 500 attacks were "significant intrusions in DoD systems." The secret also could allow Chinese air defenses to target the F-35 in a future conflict. On F-35 engine schematics, the Chinese stole data on the methods used by the turbine to cool gases, along with leading and trailing edge engine treatments and engine heat reduction data-also key elements of its stealth design.īy learning the secrets, the Chinese were able to include the design and technology in Beijing’s new stealth jet, the J-20. The high-tech radar uses small, solid-state transmitter and receiver modules that allow the jet to avoid detection by enemy radar, a key stealth feature.Īnother Northrop radar on the F-35 is the AN/AAS-37 electro-optical distributed aperture system the company says provides pilots with "unique protective sphere around the aircraft for missile warning, navigation support, and night operations," according to Northrop’s website. ![]() Northrop Grumman, the jet’s manufacturer, built the AN/APG-81 active, electronically scanned array radar for the F-35. The unique capability of spying on the spies was described in a series of documents that were stolen in 2013 by former NSA contractor Edward Snowden, currently a fugitive in Russia.įor the F-35, according to NSA the Chinese were able to obtain digital design information on several different types of radar modules used by the fighter. The document was made public by the German magazine Der Spiegel in a two articles detailing how NSA in the mid-2000s was capable of conducting global cyber intelligence-gathering by tapping into the networks of foreign intelligence services and stealing the data they were collecting from others. A NSA briefing slide labeled "Top Secret" and headlined "Chinese Exfiltrate Sensitive Military Data," states that the Chinese have stolen a massive amount of data from U.S. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |