Online: | |
Visits: | |
Stories: |
Story Views | |
Now: | |
Last Hour: | |
Last 24 Hours: | |
Total: |
The United States 5th Generation Fighter has been marred with technical issues and enormous cost overruns costing the U.S. taxpayers damn near $1 TRILLION dollars, and you won’t believe the ridiculous plea deal the man who hacked the designs for the Chinese was just given by the United States. Under the plea deal, Stephen Subin faces a maximum sentence of five years in prison and a fine of $250,000. Only in America right? Whatever he got for the plans, clearly it was worth it! Documents leaked by Edward Snowden reveal that the NSA requested $1 billion in 2013 to prepare for cyber warfare…
I GUESS OBAMA WAS TOO BUSY SPYING ON AMERICANS TO WORRY ABOUT IT…
In the following video, China is set to debut its new Shenyang J-31 stealth fighter at the Zhuhai international airshow. Although the fighter’s exact specifications are unknown, it could be a match for the F-22 and the F-35. This sense of the capabilities of the J-31 are largely based on the successes China has had in industrial espionage against US targets. The article below discusses what information the hacker is known to have taken, and what his plea deal is.
Chinese Stealth From Hacked US Designs
SUBSCRIBE TO THE TOP STORIES OF THE WEEK IN THE NEWSLETTER HERE
FOR MORE NEWS BY VOICE OF REASON CLICK HERE!
In the second video, you’ll learn that Top Secret documents released by former US intelligence contractor Edward Snowden show Chinese cyber spies stole vast amounts of important military data from the US. The documents suggest that Chinese cyber spies stole key design information about Lockheed Martin’s F-35 Lightning II.
The stolen design information include detailed engine schematics, the cooling of exhaust gases and the radar systems the jet uses for tracking targets. Military aviation experts speculated that China’s fighter jet Shenyang J-31 Falcon Hawk, which closely resembles the F-35 in appearance, has been heavily influenced by the US design, the Sydney Morning Herald reported.
Chinese cyber spies also allegedly stole information related to the B-2 stealth bomber, missile designs, nuclear submarines and other military data from the US, UPI reported.
FOR MORE NEWS BY VOICE OF REASON CLICK HERE!
FACEBOOK | GOOGLE+ | TWITTER | PINTEREST | STUMBLE UPON | TUMBLER
Bill Gertz at Free Beacon writes:
A Chinese businessman pleaded guilty this week to conspiracy to hack computer networks of U.S. defense contractors and obtain sensitive data on military aircraft that was passed on to China.
Su Bin, also known as Stephen Su and Stephen Subin, reached a plea deal in U.S. District Court in Los Angeles on Tuesday, following a 2014 criminal complaint and later indictment for illegal computer hacking and theft and transfer of export-controlled data.
The plea deal includes an admission by Su of conspiring with two people in China from October 2008 to March 2014 who broke into U.S. computer networks at Boeing and other defense companies.
The hackers stole large amounts of military information that was supplied to China, according to court documents and a statement by the U.S. Attorney for the Central District of California.
Su Bin
The case is the first successful prosecution of a Chinese hacker for stealing defense secrets. It follows the indictment of five People’s Liberation Army hackers in Pennsylvania in May 2014. The five officers remain in China.
Su was described in court documents as a wealthy Chinese businessman who owned a Beijing aviation technology company called Lode Tech. He was a permanent resident of Canada and owned homes in that country and China.
According to court papers, Su worked with two Chinese hackers who “engaged in clandestine computer and network reconnaissance and intrusion operations.” The two Chinese agents were not identified but were linked to “multiple organizations” in China, according to the court papers.
The two Chinese were listed as unindicted co-conspirators by prosecutors but were not identified by name or agency.
The two Chinese agents emailed Su with stolen defense contractor file directories listing data from U.S. and foreign company networks that China had hacked. Su then advised the two Chinese agents on which specific technologies to target from the companies. The three obtained details on “dozens” of military projects, according to an FBI criminal complaint.
Su also sought to sell the stolen U.S. technology obtained by the China-based hackers to state-owned companies in China.
The operation first gained access to some 630,000 Boeing computer files on the C-17 military transport aircraft technology in early 2009. The C-17 is the U.S. military’s main cargo aircraft. The data included details on the aircraft’s onboard computer.
Other stolen files included data on the F-22 and F-35 aircraft, the military’s most advanced radar-evading stealth fighter jets.
The F-22 data included details of an unspecified “training component” on the stealth jet used to launch missiles.
Other stolen data stolen by the Chinese spies included an unspecified “advanced United States military project” that the three men were attempting to steal blueprints and testing data.
Regarding the F-35, the frontline U.S. jet fighter being developed in both Air Force, Navy, and Marine Corps variants, the Chinese obtained the “Flight Test Plan” for the jet written by a U.S. defense engineer.
According to an FBI agent writing in the criminal complaint, Noel A. Freeman, a report by the spies stated that the stolen data would “allow us to rapidly catch up with U.S. levels” and will allow China to “stand easily on the giant’s shoulders.”
The court case provides additional clues to Chinese cyber theft of U.S. aircraft data disclosed last year in National Security Agency documents made public by former NSA contractor Edward Snowden.
An NSA document states that China obtained more than 50 terabytes—a huge amount of data—from U.S. defense and government networks, including the F-35 radar and engine secrets. The data included numbers and types of F-35 radar modules, and detailed engine schematics for the Northrop Grumman aircraft.
Chinese cyber spies also obtained export-restricted data through defense industrial espionage on the B-2 bomber, F-22, F-35, Space-based Laser, and other weapons.
According to court papers in the Su case, the Chinese cyber espionage operation to obtain U.S. military technology used “hop points” for the cyber attacks in the United States, France, Japan and Hong Kong, and was funded with the Chinese equivalent of more than $500,000.
Court papers did not disclose how the three cyber spies were detected.
FOR MORE NEWS BY VOICE OF REASON CLICK HERE!
SUBSCRIBE TO THE TOP STORIES OF THE WEEK IN THE NEWSLETTER HERE
However, one court document said the case may be related to the arrest of a Boeing aerospace engineer Keith Gartenlaub, who was arrested in August 2014 on child pornography charges.
A court document in the case said the Su case may be related to the Gartenlaub case because “the cases arise out of the same conspiracy, common scheme, transaction, series of transactions, or events.”
No details were given on the links between the two cases but the Orange County Register reported that Gartenlaub had been the target of Foreign Intelligence Surveillance Court monitoring.
Prosecutors stated during a detention hearing in 2014 that they were concerned Gartenlaub would flee to China, where his wife was born and where the couple owned property and traveled frequently.
Assistant Attorney General John Carlin said in a statement that Su admitted to playing an important role in the China-based conspiracy “to illegally access sensitive military data, including data relating to military aircraft that are indispensable in keeping our military personnel safe.”
“This plea sends a strong message that stealing from the United States and our companies has a significant cost; we can and will find these criminals and bring them to justice,” Carlin said.
U.S. Attorney Eileen M. Decker said in a statement that cyber crime “represents one of the most serious threats to our national security.”
“Today’s guilty plea and conviction demonstrate that these criminals can be held accountable no matter where they are located in the world and that we are deeply committed to protecting our sensitive data in order to keep our nation safe,” Decker said.
“Our adversaries’ capabilities are constantly evolving, and we will remain vigilant in combating the cyber threat,” said FBI Assistant Director Jim Trainor.
Under the plea deal, Su faces a maximum sentence of five years in prison and a fine of $250,000. Sentencing is scheduled for July 13.
PROTECT YOUR FAMILY BEFORE THE CRASH!
STOCK UP ON FOOD SUPPLIES WHILE THERE IS STILL TIME!
SUBSCRIBE TO THE TOP STORIES OF THE WEEK IN THE NEWSLETTER HERE
FOR MORE ON OBAMA’S ONGOING SUCCESS WITH CHINA:
Chinese Setting the Stage For a Military Invasion of the U.S. West Coast
Chinese Govts US Nuke Attack Plans Published With Chilling Details…
Report: Chinese Navy’s Fleet Will Outnumber U.S. by 2020
U.S. Military Readiness For War, Competitive Edge WORSENING!
SPACE: Russia, China and the U.S. All Working on ‘Satellite Killers’
Roadmap To World War 3: “Playtime Between the East and West Is Over”
Amazing Photos Of China’s Newest Stealth Jet
Thanks To Espionage, Chinese Stealth Fighters Could Match The F-35
China Ramping Up J-15 Fighter and HK6 Bomber With Cruise Missiles
Chinese Submarines Just Reached Another Alarming Milestone
Russia And China Are Sprinting To Catch US’s Advanced Submarine Fleet
As China Deploys Nuclear Submarines, U.S. P-8 Poseidon Jets Snoop
THE VOICE OF REASON: | |
Facebook: | https://www.facebook.com/LastGreatStand |
Google + | https://plus.google.com/+Thelastgreatstandconspirator/posts |
https://twitter.com/#!/LastGreatStand | |
Seen.Life | http://www.seen.life/profile/21900069-voice-of-reason |
Grassfire | http://grassfire.com/users/voiceofreason/profile/ |
Tea Party Community | https://www.teapartycommunity.com/profile-151600/ |
Right.IS | http://right.is/contributor/pages/351/169/bio.html |
PROTECT YOUR FAMILY BEFORE THE CRASH!
STOCK UP ON FOOD SUPPLIES WHILE THERE IS STILL TIME!
FACEBOOK | GOOGLE+ | TWITTER | PINTEREST | STUMBLE UPON | TUMBLER
DONATIONS ACCEPTED VIA PAYPAL TO GET THE RADIO SHOW RUNNING…
AND THEN TO HELP KEEP SPREADING THE MESSAGE!
COMING SOON TO INTERNET RADIO!
STAY TUNED!
FACEBOOK | GOOGLE+ | TWITTER | PINTEREST | STUMBLE UPON | TUMBLER