Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Snowden reveals that china stole plans for a new f 35 aircraft fighter

1,066 views

Published on

Chinese Spies Stole F-35 Fighter Design, Edward Snowden Reveals. http://www.cyberkendra.com/2015/01/chinese-spies-stole-f-35-fighter-design.html

Published in: News & Politics
  • Be the first to comment

Snowden reveals that china stole plans for a new f 35 aircraft fighter

  1. 1. ,, ',-. . , ~“i. * _, ‘ i: m CC -= (U) Acquired radar design —To? .r. F,cRET/ /co: .iiNfrI/ Ri: i USA. E_V". Y ; »t. --, »z. ~“. ,.. ~.i. _. _ — (U) Numbers and types of modules ° (U) Detailed engine schematics (U) Methods for cooling gases (U) Leading and trailing edge treatments (U) Aft deck heating contour maps ° (U) l/ la ‘es of data TOP SECRET/ /COMlNT/ / REL USA, FVEY
  2. 2. “air .1; ; :1_:1r":1I IIIIVIIIIILZHIKIE; llmi. -"13’ It x 11 . n '7, F’ . ‘,Aw' '| “|' 4!. ’ 1"} _= lJ! £II‘-: ' '. :*’i run; n| nr: g_I: E’ 'in' ]_u(: :.': -*' (S/ /REL) At least +30,000 Incidents/ +500 Significant Intrusions (S/ /REL) in DoD Systems Resources - At least +1600 Network Computers Penetrated Ex ended - At least 600,00 User Accounts Compromised Tolavards - +$100 Million to Assess Damage, Rebuild Networks RESPONSE TO - USPACOM: Air Refueling Schedules (CORONET) Attacks USTRANSCOM: Single Mobility System (SMS) (S/ /REL) Personnel, - U. S. Air Force: 33,000 General/ Field Network, Logistics Grade Officer Records I Data’ compromises Navy. Over 300,00 User ID/ Passwords Compromised - Navy: Missile Navigation and Tracking Systems - Navy: Nuclear Submarine/ Anti—Air Missile Designs _ - International Traffic and Arms Restrictions (ITAR) Data (S/ /REL) Science & - Contractor Research & Development Technoiogy - Defense Industrial Espionage —B2 F-22 F— —B dL h Export Controlled , , 35, Space ase aser, Ot ers (SHRED Data ""‘" 77"“ ii, -t-. I‘: :I: u”iiiii l"‘: ‘1£. l,, E. :—’? 'Iiii-. ,i’r. ioji §1!I! f“5:ll= lII :1‘ '«“m-. _.1fu-. _i‘i-. w ci’ . oi| [_n‘| '-. }:. :.: ..; /‘, ‘v.8‘1-ri; :,~’l_, -. . . . "“/ ""v; “ l -~ ‘-Ii‘-. I,; ""r—i-‘N ’ T‘ 1‘
  3. 3. Timelines (S/ / REL) Adversary Malware Design Process DEPLOY A timeline SIGINT Discovers Adversary Tools Adversary Malware Deployment/ Attack Process W/ w Tailored Countermeasure SIGINT Discovers Developed & Deployed Adversary Intentions How do we do this? Countermeasure Development (S/ /REL) How do we use SIGI to discover Malviiare during the TOP SECRETIICOMINTI / REL USA, FVEY

×