【Comment】
在台灣,真的要注意並對國防機密人員進行嚴格的安全查核,包括配偶、親友狀況。
The Newport is one,
maybe the most important, of the US Navy core bases.
The major disadvantage
of traditional submarines is that it could not counter the attack of the surface
vessels and anti-submarine aircraft.
Apparently, the US is developing new technology to overcome the shortcoming.
Now China stole the
result without any cost.
Though almost all
countries do similar things, however, “there’s a difference between conducting
espionage in order to protect national security and conduct military
operations, and the theft of intellectual property for the benefit of companies
inside your country.” Chinese do the
latter.
Taiwan is developing
submarines, the related hydrological data is critical to the submarines survivability
of the Taiwan, US as well as Japan. Taiwan
is outsourcing some maritime researches and date collecting to civil research
institutes, say universities. It is very
dangerous if the security check of the institutions and researchers have not
been verified.
The Ministry of
Defense had better make some remedies.
中國駭客又盜! 華郵爆:美水下作戰機密資料遭竊 自由20180609
美國媒體報導,中國政府的駭客入侵美國海軍承包商的電腦,竊取大量有關水下作戰的高敏感數據,其中包括用於美國潛艇的超音速反艦導彈計畫。海軍正在進行這項調查,並由聯邦調查局(FBI)協助。
《華盛頓郵報》援引不具名的美國官員表示,駭客入侵事件發生在今年1、2月,駭客鎖定一間為美國海軍水下作戰中心(Naval Undersea Warfare Center)工作的承包商。這家公司總部位於羅德島州的紐波特(Newport),但這名官員並未透露承包商的公司名字。
據官員透露,被中國駭客竊取的資料容量有614GB,涉及到一項受到嚴密控管、代號為「海龍」(Sea Dragon)的計畫,另外還有訊號、感測數據、與密碼系統有關的海底無線電室信息,以及海軍潛艇研發部門的電子戰資料庫。
《華盛頓郵報》報導提到,「海龍計畫」是五角大廈的一個特別辦公室在2012年提出,計畫整合既有武器系統到現有海軍平台,但相關資訊相當少。從2015年底以來,五角大廈為海龍計畫已使用超過3億美元,預計今年9月前計畫水下測試。
China hacked a Navy contractor and secured a
trove of highly sensitive data on submarine warfare WP 20180608
Chinese
government hackers have
compromised the computers of a Navy contractor, stealing massive amounts of
highly sensitive data related to undersea warfare — including secret plans to
develop a supersonic anti-ship missile for use on U.S. submarines by 2020, according to
American officials.
The breaches occurred in January and February, the officials
said, speaking on the condition of anonymity to discuss an ongoing
investigation. The hackers targeted a
contractor who works for the Naval Undersea Warfare
Center, a military organization headquartered in Newport, R.I., that
conducts research and development for submarines and underwater weaponry.
The officials did not
identify the contractor.
Taken were 614 gigabytes of material relating to a closely
held project known as Sea Dragon, as well as signals and sensor data, submarine
radio room information relating to cryptographic systems, and the Navy
submarine development unit’s electronic warfare library.
The Washington Post
agreed to withhold certain details about the compromised missile project at the
request of the Navy, which argued that their
release could harm national security.
The data stolen was of
a highly sensitive nature despite being housed on the contractor’s unclassified
network. The officials said the
material, when aggregated, could be considered classified, a fact that raises
concerns about the Navy’s ability to oversee contractors tasked with developing
cutting-edge weapons.
The breach is part of
China’s long-running effort to blunt the U.S. advantage in military technology
and become the preeminent power in east Asia. The news comes as
the Trump administration is seeking to secure Beijing’s support in persuading
North Korea to give up nuclear weapons, even as tensions persist between
the United States and China over trade and defense matters.
The Navy
is leading the investigation into the breach with the assistance of the
FBI, officials said. The FBI declined to comment.
On Friday, the
Pentagon inspector general’s office said that Defense Secretary Jim Mattis had
asked it to review contractor cybersecurity issues arising from The Post’s
story.
Navy spokesman Cmdr.
Bill Speaks said, “There are measures in place that require companies to notify
the government when a ‘cyber incident’ has occurred
that has actual or potential adverse effects on their networks that
contain controlled unclassified information.”
Speaks said “it would be inappropriate to discuss further details at
this time.”
Altogether, details on hundreds of mechanical and software systems
were compromised — a significant breach in a critical area of warfare
that China has identified as a priority, both for building its own capabilities
and challenging those of the United States.
“It’s very
disturbing,” said former Sen. James M. Talent (R-Mo.), who is a member of the
U.S.-China Economic and Security Review Commission. “But it’s of a
piece with what the Chinese have been doing. They are completely focused on getting
advanced weapons technology through all kinds of means. That includes stealing secrets from our
defense contractors.” Talent had no
independent knowledge of the breach.
Undersea priority
The Sea Dragon project
is an initiative of a special Pentagon office stood up in 2012 to adapt
existing U.S. military technologies to new
applications. The Defense
Department, citing classification levels, has released little information about
Sea Dragon other than to say that it will introduce a “disruptive offensive
capability” by “integrating an existing weapon system with an existing Navy
platform.” The Pentagon has requested or
used more than $300 million for the project since late 2015 and has said it plans to start underwater testing by September.
Military experts fear
that China has developed capabilities that could complicate the Navy’s ability
to defend U.S. allies in Asia in the event of a conflict with China.
The Chinese are
investing in a range of platforms, including quieter submarines armed with
increasingly sophisticated weapons and new sensors, Adm. Philip S. Davidson
said during his April nomination hearing to lead U.S. Indo-Pacific Command. And what they
cannot develop on their own, they steal — often through cyberspace,
he said.
“One of the main
concerns that we have,” he told the Senate Armed Services Committee, “is cyber and penetration of the dot-com networks, exploiting technology from our defense contractors,
in some instances.”
In February, Director
of National Intelligence Daniel Coats testified
that most of the detected Chinese cyber-operations against U.S. industry focus on defense contractors or tech firms supporting
government networks.
In recent years, the
United States has been scrambling to develop new weapons or systems that can counter
a Chinese naval buildup that has targeted perceived weaknesses in the U.S.
fleet. Key to the American advantage in
any faceoff with China on the high seas in Asia will be its submarine fleet.
“U.S. naval forces are going to have a really hard time
operating in that area, except for submarines, because the Chinese don’t
have a lot of anti-submarine warfare capability,” said Bryan Clark, a naval
analyst at the Center for Strategic and Budgetary Assessments. “The idea is that
we are going to rely heavily on submarines in the early effort of any conflict with
the Chinese.”
China has made closing
the gap in undersea warfare one of its three top military priorities, and
although the United States still leads the field, China is making a concerted
effort to diminish U.S. superiority.
“So anything that
degrades our comparative advantage in undersea warfare is of extreme
significance if we ever had to execute our war plans for dealing with China,”
said James Stavridis, dean of the Fletcher School of Law and Diplomacy at Tufts
University and a retired admiral who served as supreme allied commander at
NATO.
The U.S. military let
its anti-ship weaponry languish after the Cold War ended because with the
Soviet Union’s collapse, the Navy no longer faced a peer competitor on the
seas. But the rapid modernization and
buildup of the Chinese navy in recent years, as well as Russia’s resurgent
forces at sea, have prompted the Pentagon to renew heavy investment in
technologies to sink enemy warships.
The introduction of a
supersonic anti-ship missile on U.S. Navy submarines would make it more
difficult for Chinese warships to maneuver. It also would augment a suite of other
anti-ship weapons that the U.S. military has been developing in recent years.
Ongoing breaches
For years, Chinese
government hackers have siphoned information on the U.S. military, underscoring
the challenge the Pentagon faces in safeguarding details of its technological
advances. Over
the years, the Chinese have snatched designs for the F-35 Joint Strike Fighter;
the advanced Patriot PAC-3 missile system; the Army system for shooting down
ballistic missiles known as Terminal High Altitude Area Defense; and the Navy’s
new Littoral Combat Ship, a small surface vessel designed for near-shore
operations, according to previous reports prepared for the Pentagon.
In some cases,
suspected Chinese breaches appear to have resulted in copycat
technologies, such as the drones China has produced that mimic U.S.
unmanned aircraft.
Speaks, the Navy
spokesman, said: “We treat the broader issue of cyber intrusion against our
contractors very seriously. If such an
intrusion were to occur, the appropriate parties would be looking at the
specific incident, taking measures to protect current information, and
mitigating the impacts that might result from any information that might have
been compromised.”
The Pentagon’s Damage Assessment Management Office has conducted
an assessment of the damage, according to the U.S. officials. The Office of the Secretary of Defense
declined to comment.
Theft of an electronic
warfare library, Stavridis said, could give the
Chinese “a reasonable idea of what level of knowledge we have about
their specific [radar] platforms, electronically and potentially acoustically, and that deeply reduces our level of comfort if we were
in a close undersea combat situation with China.”
Signals and sensor
data is also valuable in that it presents China with the opportunity to “know when we would know at what distance we would be
able to detect their submarines,” he said — again a key factor in
undersea battles.
Investigators say the
hack was carried out by the Chinese Ministry of State Security, a civilian spy
agency responsible for counterintelligence, foreign intelligence and domestic
political security. The hackers operated out of an MSS division in the
province of Guangdong, which houses a major foreign hacking
department.
Although the Chinese
People’s Liberation Army is far better-known than the MSS when it comes to
hacking, the latter’s personnel are more skilled and much better at hiding
their tracks, said Peter Mattis, a former analyst in the CIA
counterintelligence center. The MSS, he said, hack for all forms of intelligence:
foreign, military and commercial.
In September 2015, in
a bid to avert economic sanctions, Chinese President Xi Jinping pledged to
President Barack Obama that China would refrain from conducting commercial
cyberespionage against the United States. Following the pact, China appeared to have
curtailed much, although not all, of its hacking activity against U.S. firms,
including by the People’s Liberation Army.
Both China and the
United States consider spying on military technology to fall outside the pact. “The distinction we’ve always made is there’s a difference between conducting espionage in order
to protect national security and conduct military operations, and the theft of
intellectual property for the benefit of companies inside your country,”
said Michael Daniel, the White House cybersecurity coordinator under Obama.
才剛提及錯怪"對岸"駭客, 虛驚一場, 哪知中方(解放軍?)駭客轉眼間已於另處幹下如此滔天鉅案!!
回覆刪除被中國駭客竊取的資料容量竟高達614GB, 天啊 !! 這簡直是....... 無言以對 !
潛艦聲納、電戰、水文、潛射飛彈....等等"機密參數"乃無價之寶 !! 戰場最終勝敗、生死存亡之所繫啊 !!
此事件超級嚴重, 對今後美國海軍戰力影響至鉅(甚至會危及北約盟邦與台日).
目前進行中的美中貿易戰, 美國必須對中國痛下殺手以示懲罰, 如果國美國再不採取其他配套之強悍報復制衡行動, 繼續再對中國這樣姑息下去, 最後整個自由民主陣營都會一起陷入險境.
名門正派武功、正面對決打不過, 就來陰的, 這陰險狡詐的死老共, 簡直讓人片刻鬆弛不得 (心中石頭才剛放下, 突然驚見雲大貼出此一最新消息, 內心極度震驚!! 心中石頭又再舉起, 唉! 今晚我又要輾轉難眠了)
from 卸甲楓鷹