It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
www.breitbart.com
Dec 12 5:56 PM US/Eastern
A systematic effort by hackers to penetrate US government and industry computer networks stems most likely from the Chinese military, the head of a leading security institute said.
"These attacks come from someone with intense discipline. No other organization could do this if they were not a military organization," Paller said
In the attacks, Paller said, the perpetrators "were in and out with no keystroke errors and left no fingerprints, and created a backdoor in less than 30 minutes. How can this be done by anyone other than a military organization?"
Paller said the US government strategy appears to be to downplay the attacks, which has not helped the situation.
Although Paller said the hackers probably have not obtained classified documents from the Pentagon, which uses a more secure network, it is possible they stole "extremely sensitive" information.
He said it has been documented that US military flight planning software from its Redstone Arsenal was stolen.
A terrorist isn't just an Arab with a towel on his head, & a bomb in his backpack, at least not what the US will use as the only definition. They will eventually use that as a definition of terrorism, along with bank robbery, computer hacking, peaceful protest marches, you name it, it will be defined as a "terrorist action".
Originally posted by orangetom1999
Do you folks actually have any idea how much or what projects have been hacked by people looking for intelligence information?? Whether Chinese or others?? Curious about this here??
Foreign buyers are purchasing many of the Pentagon's high-tech surplus military parts and shipping them overseas, hiding them in seagoing containers under tons of metal scrap, seizure records show. Customs officials say Iran and Iraq are active buyers, but by far the biggest customer is China. Among the items seized from Chinese "scrap dealers" were fully operational encryption devices, submarine propulsion parts, radar systems, electron tubes for Patriot guided missiles, even F-117A Stealth fighter parts. Many of these parts, sold as "surplus," were brand new.
What they found were thousands of top-secret encryption devices, hard-cased field computers used for sending coded communications, as well as classified radio transmitter-receivers. None had been properly demilitarized. There was also a pile of banged-up Wang computers, but many still had their hard drives, and two had 5¼-inch floppy disks in them. One disk was marked "Classified SCI" (special compartmented information). The other was marked "Top Secret, SCI. Contains Special Intelligence." Murphree checked and found that the equipment had come from the most secure sector of Kelly Air Force Base, known as "Security Hill." "None of this material," Murphree said, "should have ever left the DRMO." The equipment's intended destination was Hong Kong, a common transshipment point for goods bound for China. Kelly Air Force Base took it all back. No charges were filed against Cal Industries, which had bought the stuff legally. "Candidly," says former U.S. Attorney Wiggins, "the way we handle this stuff so recklessly, it's hard to pin anyone down or hold them liable."
Of the many countries pursuing Pentagon surplus weapons, China is clearly running hardest. "China is the most aggressive country worldwide in the acquisition of military hardware," says customs agent Hensley. "Anything that seems to us to be mid-tech, or slightly out of date, is high tech to them. They can leapfrog R&D costs. They either reverse-engineer this stuff, or if they get enough, they just use them."
Operations. Customs agents are now convinced that a Chinese surplus-smuggling operation began as many as 15 years ago, when a flood of Chinese men and women entered the United States, established themselves as residents and then set up shop. Operating with little more than a fax machine and a bank account, they apparently form the lowest tier of the Chinese espionage network, agents say.
Originally posted by ufia
Here's an old article that relate to this topic. China are roaming DRMO surplus to buy weapons parts, encryption devices, and classified hard drives auctionned as scrap metal not properly demilitarized.
This goes to show that China will do anything to gain secrets, whether by computer hacking or smuggling military surplus.
U.S. News Weapons Bazaar
www.usnews.com...
Foreign buyers are purchasing many of the Pentagon's high-tech surplus military parts and shipping them overseas, hiding them in seagoing containers under tons of metal scrap, seizure records show. Customs officials say Iran and Iraq are active buyers, but by far the biggest customer is China. Among the items seized from Chinese "scrap dealers" were fully operational encryption devices, submarine propulsion parts, radar systems, electron tubes for Patriot guided missiles, even F-117A Stealth fighter parts. Many of these parts, sold as "surplus," were brand new.
What they found were thousands of top-secret encryption devices, hard-cased field computers used for sending coded communications, as well as classified radio transmitter-receivers. None had been properly demilitarized. There was also a pile of banged-up Wang computers, but many still had their hard drives, and two had 5¼-inch floppy disks in them. One disk was marked "Classified SCI" (special compartmented information). The other was marked "Top Secret, SCI. Contains Special Intelligence." Murphree checked and found that the equipment had come from the most secure sector of Kelly Air Force Base, known as "Security Hill." "None of this material," Murphree said, "should have ever left the DRMO." The equipment's intended destination was Hong Kong, a common transshipment point for goods bound for China. Kelly Air Force Base took it all back. No charges were filed against Cal Industries, which had bought the stuff legally. "Candidly," says former U.S. Attorney Wiggins, "the way we handle this stuff so recklessly, it's hard to pin anyone down or hold them liable."
Of the many countries pursuing Pentagon surplus weapons, China is clearly running hardest. "China is the most aggressive country worldwide in the acquisition of military hardware," says customs agent Hensley. "Anything that seems to us to be mid-tech, or slightly out of date, is high tech to them. They can leapfrog R&D costs. They either reverse-engineer this stuff, or if they get enough, they just use them."
Operations. Customs agents are now convinced that a Chinese surplus-smuggling operation began as many as 15 years ago, when a flood of Chinese men and women entered the United States, established themselves as residents and then set up shop. Operating with little more than a fax machine and a bank account, they apparently form the lowest tier of the Chinese espionage network, agents say.
Another problem is that the Chinese dont have anything of value for us to steal, other than troop placements and reports..
Originally posted by Classified Info
This doesn't surprise me at all, I don't trust the Chinese any farther than I could throw them. Just more proof that they are at war with us and Americans and their government need to wake up to this fact.
[edit on 19-1-2006 by UK Wizard]
Originally posted by Classified Info
This isnt a question about morals or playing nicely. It is about the need for Americans to get their heads out of the sand and wake up and realise who our real enemies are.
[edit on 12/14/2005 by Classified Info]