Chinese hackers have stolen the designs for some of the U.S.'s most advanced weapons' systems, a...

Chinese hackers have stolen the designs for some of the U.S.'s most advanced weapons' systems, a study for the Pentagon has reportedly alleged. The programs to have been breached include missile systems from Raytheon (RTN) and Lockheed Martin (LMT), and aircraft made by Boeing (BA), Textron's (TXT) Bell Helicopter and United Technology's (UTX) Sikorsky. Pentagon officials are not surprisingly frustrated by the degree of theft from the contractors.

From other sites
Comments (13)
  • User 353732
    , contributor
    Comments (5158) | Send Message
    So China now aspires not to be a the new global leader but the new global thief? or are these the same in a world where materialism and consumerism are the 2 great idols of all the ruling elites?
    China's model is Internal Exploitation+ Resource Imperialism+ Mercantalism+ Global Piracy.
    Oligarchs who steal without shame from their own people will steal with even less shame from foreigners.
    28 May 2013, 05:30 AM Reply Like
    , contributor
    Comments (214) | Send Message
    What about protecting the designs? Does everything have to be accessible on-line?
    28 May 2013, 05:34 AM Reply Like
  • noob
    , contributor
    Comments (393) | Send Message
    It's a little ironic that foreign companies and/or facilities manufacture many of the components (particularly electronic) that make up these systems and we cry about the plans being stolen.


    If we were to go to war with China we wouldn't have the equipment to wage war with them.
    28 May 2013, 05:45 AM Reply Like
  • PcArCi
    , contributor
    Comments (25) | Send Message
    @JANFA, I totally agree with you. I cannot understand why this option is not being given serious thought.
    28 May 2013, 06:29 AM Reply Like
  • Rope a Dope
    , contributor
    Comments (708) | Send Message
    I heard a proposal a few years ago whereby anonymity would be removed when someone accesses the internet. I don’t know how they planned to accomplish this but it was dismissed by many who felt it was an intrusion onto privacy rights. Personally, I have no problems with the NSA, FBI, or Homeland Security knowing who I am or what I am doing when I am online. At what cost are we protecting anonymity?


    If you follow the link the author provided, that page has a link to another article (right column) titled ‘A list of the U.S. weapons designs and technologies compromised by hackers’. From that list, it appears to me that the only thing the Chinese have not stolen is the Lunch Menu from the Pentagon Cafeteria.
    28 May 2013, 06:32 AM Reply Like
  • Thought Crime
    , contributor
    Comments (60) | Send Message
    Be careful what you wish for especially if your opinions are not the favorites of the some federal bureaucracy.
    28 May 2013, 07:20 AM Reply Like
  • Rope a Dope
    , contributor
    Comments (708) | Send Message
    I have a security clearance with the US Government so they probably know more about me than I do. I value all the freedoms we have but I think we need to take a hard look at the security we're sacrificing to maintain those freedoms.
    28 May 2013, 08:43 AM Reply Like
    , contributor
    Comments (166) | Send Message
    Your ISP knows your IP address already and that info can already be requested by law enforcement. The problem is when your PC is compromised and attacks are launched from it without your knowledge. I don't want DHS to come arrest me for this. I don't wish to give up anymore freedoms online.
    28 May 2013, 12:23 PM Reply Like
  • Rope a Dope
    , contributor
    Comments (708) | Send Message
    Some of the recent arrests of the Anonymous hackers were possible despite their efforts to mount attacks through the use of proxy computers. But it costs a lot of money for forensics to track these people down and is only done in extreme cases.


    But that is the point of the system that was proposed a few years ago; you would not be able to log onto the Internet unless your identity is verified. Your identity would be verified every step of the way and if anything is amiss, your connection is terminated. If you do something malicious on the net, they would know who did it.


    I’m sure everyone has their own viewpoint on personal security or anonymity while surfing the Internet but when it comes to the security of the United States, there should be no compromise. If I remember correctly, I think Al Gore invented the internet primarily for communication between different departments of the US Government, particularly the US Military. Why the Chinese government and Nigerian 419 scammers have been allowed onto the same network is beyond me. I think it is time they put a 2nd secure network in place where only trusted and verified people can use it. Otherwise, we’re liable to see US weaponry flying over our country with a Chinese flag painted on it.
    28 May 2013, 01:34 PM Reply Like
    , contributor
    Comments (166) | Send Message
    Great. Now we can buy them for half the price!
    28 May 2013, 07:35 AM Reply Like
  • joegillam
    , contributor
    Comments (1133) | Send Message
    It's out internet, remember Al Gore invented it. Simply cut the Chinese out. It seems to me that it would be doable.
    28 May 2013, 08:30 AM Reply Like
  • BlueOkie
    , contributor
    Comments (10296) | Send Message
    They cannot sell anything to the sequestored Defense Dept. Let's sell it to China that'll force the US's hand. Maybe N. Korea or Iran could get some stuff!
    28 May 2013, 08:35 AM Reply Like
  • stem23
    , contributor
    Comments (379) | Send Message
    This "unclassified" report was published, January 13, 2013, based on information gathered as of August 2012.



    I have no need to comment on this subject. Through reading the report, I am most sure that readers will come to similar conclusions.
    28 May 2013, 12:41 PM Reply Like
DJIA (DIA) S&P 500 (SPY)
ETF Screener: Search and filter by asset class, strategy, theme, performance, yield, and much more
ETF Performance: View ETF performance across key asset classes and investing themes
ETF Investing Guide: Learn how to build and manage a well-diversified, low cost ETF portfolio
ETF Selector: An explanation of how to select and use ETFs