ADVERTISEMENT

NSA Network Engineering Codes provided to China for Defense Contractors

IlluminatiEXPOSETHEMNOW1

General of the Army
Feb 7, 2009
5,122
0
0
You see it is impossible to put a trojan horse on a defense contractor computer, that is protected by multi layered encryption. Even if you had access to an internal computer on site directly in the design departments you could not pirate the information without the encryption key, it would all be random code. None of these files are unprotected. So it isn't that the Chinese hacked in like a high school student hollywood style. There is only one way they could of pirated this information. Someone had to provide them the decryption keys to even see the information. And someone would have had to provide them the engineering codes to the internal mainframe to pirate it, you couldn't get in with an email passcode like they would have you believe. Only one group in the entire world could of done that. Nobody has access to all of any government defense project. It is all compartmentalized, so that different computer zones are only working on one part of the project and those groups are firewall protected from the other sides. Only someone above that firewall could have even had access to that, but even they don't have any way to decrypt the files off the computers. Only one group could possibly have done this. And we all know who that is. So if China has these secrets that isn't a mistake just so you know. That is what happens when traitors takeover the country. They denounce the patriots for lack of patriotism, and they proceed to rip the pillars down inside the gates because you were not paying attention to that nice Trojan sacrifice statue you brought inside the gates. Ron Paul was simply saying what if there are people inside that statue that are going to slit our throats while we are sleeping, most of the country laughed at him. But when you all were asleep they came inside the gates and got into high places. And now we all know what happens next don't we.




http://venturebeat.com/2013/05/02/qinetiq-china-hack/


Chinese cyberspies stole a good majority of U.K.-based defense contractor Bloomberg. The theft happened over a three-year period in which QinetiQ seemed to make all the wrong moves.
We're all aware cyberespionage is a growing threat in the United States, where military secrets are of high value. This group, known as the Comment Crew, hacked its way into QinetiQ's North American division's systems in 2007. The defense contractor was originally notified of the breach by a Naval Criminal Investigative Service employee who found two infected computers at QinetiQ's McLean, Va., headquarters. The discovery was tangential to another Naval Criminal Investigative Service project that revealed a great many more compromised defense contractors. But this information was left out of the report to QinetiQ.
Bloomberg chronicles what happened from there. It looked at internal QinetiQ emails as revealed by Anonymous' hack on HBGary, revealing a string of poor decisions. Security firms HBGary, as well as Terremark and Mandient, came in to deal with the intrusions. But HBGary's monitoring software slowed employee computers down so much they actually removed it with permission from their IT departments.
Richard Clarke, the former special adviser to George W. Bush, explained to Bloomberg that this could wind up being a huge embarrassment if we ever get into a conflict with China. "We try out all these sophisticated weapons systems, and they don't work," he explained.
Mandient revealed the Comment Crew to the masses earlier this year as a specialized group of hackers working for the People's Liberation Army. Comment Crew is otherwise known as PLA 61398.
One of the ways the Comment Crew got into further systems was by stealing passwords and simply logging in as if they were employees working remotely. Mandient had pointed out this to QinetiQ, suggesting a fix, which might have been two-factor authentication. QinetiQ did not act on the advice.
Furthermore, when future attacks were uncovered ?such as one reported by NASA ? the company continued to treat them as isolated events instead of as an organized attempt to steal what eventually would be secret military data on drones, robotics, and more. Bloomberg reports the amount as being close to 3.3 million Excel spreadsheets.
Terremark senior vice president Christopher Day spoke to Bloomberg, saying,"There was virtually no place we looked where we didn't find them."
Last May, QinetiQ was given a new contract from the U.S. Transportation Department for $4.7 million.
We have reached out to QinetiQ for comment on the report and will update this story upon hearing back.
Read more at http://venturebeat.com/2013/05/02/qinetiq-china-hack/#uhigidTLqX5BOl2h.99

This post was edited on 6/14 1:21 AM by IlluminatiEXPOSETHEMNOW1
 
You see defense related projects have MULTIPLE encryptions and MULTIPLE keys. So how did China pirate this information on their own? The answer is THEY SIMPLY CAN'T. Not unless someone gave the access codes and decryption keys, and we all know who did that don't we? Might want to think about that for a minute or two.



In message authentication codes.


In designing security systems, it is wise to assume that the details of the cryptographic algorithm are already available to the attacker. This is known as secret.
 
ADVERTISEMENT
ADVERTISEMENT