{"id":245,"date":"2013-05-28T19:03:08","date_gmt":"2013-05-28T19:03:08","guid":{"rendered":"https:\/\/backgroundpropaganda.com\/wp\/?p=245"},"modified":"2023-12-01T19:03:45","modified_gmt":"2023-12-01T19:03:45","slug":"pentagon-report-chinese-hackers-accessed-f-35b-and-other-advanced-us-weapons-systems","status":"publish","type":"post","link":"https:\/\/backgroundpropaganda.com\/wp\/?p=245","title":{"rendered":"Pentagon report: Chinese hackers accessed F-35B and other advanced US weapons systems"},"content":{"rendered":"<p style=\"text-align:center\"><a href=\"http:\/\/www.engadget.com\/2013\/05\/28\/china-hacking-advanced-us-weapons\/?utm_source=Feed_Classic&amp;utm_medium=feed&amp;utm_campaign=Engadget\"><img decoding=\"async\" alt=\"Pentagon report China hacked F35B and other advanced US weapons systems\" src=\"http:\/\/www.blogcdn.com\/www.engadget.com\/media\/2013\/05\/f-35b-vertical-takeoff-05-28-13-01.jpg\"><\/a><\/p>\n<p>Many of the Pentagon&#8217;s most advanced weapon systems &#8212; including the <a href=\"http:\/\/www.engadget.com\/2013\/05\/21\/production-f-35b-performs-first-vertical-takeoff-wont-be-used\/?utm_source=Feed_Classic&amp;utm_medium=feed&amp;utm_campaign=Engadget\">F-35 Joint Strike Fighter<\/a> and PAC-3 Patriot missile system &#8212; were compromised by <a href=\"http:\/\/www.engadget.com\/tag\/china,hacking\/?utm_source=Feed_Classic&amp;utm_medium=feed&amp;utm_campaign=Engadget\">Chinese hackers<\/a>, according to a classified document obtained by the <em>Washington Post<\/em>. The list of weapons was part of an earlier DoD report condemning Chinese cyber-espionage activities, but had been confidential until now. Other systems hacked are said to include the Terminal High Altitude Area Defense (THAAD), the Navy&#8217;s Aegis ballistic-missile defense system, the F\/A-18 fighter, V-22 Osprey and the Littoral Combat Ship used for shore patrol. Many of these form the foundation of defense systems from Europe to the Persian Gulf &#8212; and their breach goes a long way toward explaining Washington&#8217;s unprecedented <a href=\"http:\/\/www.engadget.com\/2013\/05\/07\/us-department-of-defense-chinese-cyber-espionage\/?utm_source=Feed_Classic&amp;utm_medium=feed&amp;utm_campaign=Engadget\">dressing-down<\/a> of China.<\/p>\n<p>Filed under: <a href=\"http:\/\/www.engadget.com\/category\/misc\/?utm_source=Feed_Classic&amp;utm_medium=feed&amp;utm_campaign=Engadget\" rel=\"tag\">Misc<\/a><\/p>\n<p><strong><a href=\"http:\/\/www.engadget.com\/2013\/05\/28\/china-hacking-advanced-us-weapons\/?utm_source=Feed_Classic&amp;utm_medium=feed&amp;utm_campaign=Engadget#comments\">Comments<\/a><\/strong><\/p>\n<p><strong>Via:<\/strong> <a href=\"http:\/\/www.theverge.com\/2013\/5\/27\/4371528\/chinese-hackers-reportedly-accessed-designs-for-advanced-us-weapons\">The Verge<\/a><\/p>\n<p><strong>Source:<\/strong> <a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/confidential-report-lists-us-weapons-system-designs-compromised-by-chinese-cyberspies\/2013\/05\/27\/a42c3e1c-c2dd-11e2-8c3b-0b5e9247e8ca_story.html\">Washington Post<\/a><\/p>\n<div>\n<a href=\"http:\/\/feeds.engadget.com\/~ff\/weblogsinc\/engadget?a=nlOdA5ALYFk:52q225Y9z3c:wF9xT3WuBAs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/weblogsinc\/engadget?i=nlOdA5ALYFk:52q225Y9z3c:wF9xT3WuBAs\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.engadget.com\/~ff\/weblogsinc\/engadget?a=nlOdA5ALYFk:52q225Y9z3c:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/weblogsinc\/engadget?i=nlOdA5ALYFk:52q225Y9z3c:V_sGLiPBpWU\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.engadget.com\/~ff\/weblogsinc\/engadget?a=nlOdA5ALYFk:52q225Y9z3c:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/weblogsinc\/engadget?i=nlOdA5ALYFk:52q225Y9z3c:-BTjWOF_DHI\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.engadget.com\/~ff\/weblogsinc\/engadget?a=nlOdA5ALYFk:52q225Y9z3c:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/weblogsinc\/engadget?d=qj6IDK7rITs\" border=\"0\"><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/weblogsinc\/engadget\/~4\/nlOdA5ALYFk\" height=\"1\" width=\"1\"><\/p>\n<p>SOURCE <a href=\"http:\/\/www.engadget.com\/2013\/05\/28\/china-hacking-advanced-us-weapons\/?utm_medium=feed&#038;utm_source=feedburner&#038;utm_campaign=Feed%3A+weblogsinc%2Fengadget+%28Engadget%29\">Engadget RSS Feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many of the Pentagon&#8217;s most advanced weapon systems &#8212; including the F-35 Joint Strike Fighter and PAC-3 Patriot missile system &#8212; were compromised by Chinese hackers, according to a classified document obtained by the Washington Post. The list of weapons was part of an earlier DoD report condemning Chinese cyber-espionage activities, but had been confidential &#8230; <a href=\"https:\/\/backgroundpropaganda.com\/wp\/?p=245\">Continue Reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-245","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=245"}],"version-history":[{"count":1,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/245\/revisions"}],"predecessor-version":[{"id":276,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/245\/revisions\/276"}],"wp:attachment":[{"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}