http://www.aviationweek.com/aw/generic/story.jsp?id=news/awst/2012/02/06/AW_02_06_2012_p30-419987.xml&channel=defenseChinese hackers actually sat in on what were supposed to have been secure, online program-progress conferences, the officials say.
there is consensus that escalating costs, reduced annual purchases and production stretch-outs are a reflection to some degree of the need for redesign of critical equipment. Examples include specialized communications and antenna arrays for stealth aircraft, as well as significant rewriting of software to protect systems vulnerable to hacking.
It is only recently that U.S. officials have started talking openly about how data losses are driving up the cost of military programs and creating operational vulnerabilities.
These people should read my emails. They would have known about this issue in 2003.
James Clapper, director of national intelligence, says that Internet technology has “led to egregious pilfering of intellectual capital and property. The F-35 was clearly a target,” he confirms. “Clearly the attacks . . . whether from individuals or nation-states are a serious challenge and we need to do something about it.”
They should start by reading my emails. Doing so could have saved them Billions. The next thing they should do is go to Bill Gates mansion and arrest him for Treason. Blind fold him. Put him in an orange jump suit. Cover his ears. Throw him in the back of a cargo plane and fly him down to Gitmo to be held with the other the enemy combatants. Give him a military trial and hang him. Then seize all his bank accounts to help pay for the carnage he has brought. Next ban all government and government contractors from ever using a Microsoft product ever again. Anyone caught using Microsoft is going to Gitmo.
In July 2011, then-Deputy Defense Secretary William Lynn pointed out that a foreign intelligence agency had victimized a major defense contractor and
extracted 24,000 files concerning a developmental system.
the lost information would help the intruder develop similar systems and generate methods of attack and defense. Some U.S. officials have pegged the costs at
tens of billions of dollars.
Lockheed Martin officials now admit that subcontractors (6-8 in 2009 alone, according to company officials) were hacked and
“totally compromised.” In fact, the stealth fighter program probably has the biggest “attack surface” or points that can be attacked owing to the vast number of
international subcontractors.
Not only could intruders extract data, but they became
invisible witnesses to online meetings and technical discussions, say veteran U.S. aerospace industry analysts. After the break-in was discovered, the classified program was halted and not restarted until a completely new, costly and cumbersome security system was in place.