And In Other News, The Chinese Government Hacks The U.S. Navy

From the Post:

Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to undersea warfare — including secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020, according to American officials.

The breaches occurred in January and February, the officials said, speaking on the condition of anonymity to discuss an ongoing investigation. The hackers targeted a contractor who works for the Naval Undersea Warfare Center, a military organization headquartered in Newport, R.I., that conducts research and development for submarines and underwater weaponry.

and

Investigators say the hack was carried out by the Chinese Ministry of State Security, a civilian spy agency responsible for counterintelligence, foreign intelligence and domestic political security. The hackers operated out of an MSS division in the province of Guangdong, which houses a major foreign hacking department.

Although the Chinese People’s Liberation Army is far better-known than the MSS when it comes to hacking, the latter’s personnel are more skilled and much better at hiding their tracks, said Peter Mattis, a former analyst in the CIA counterintelligence center. The MSS, he said, hack for all forms of intelligence: foreign, military and commercial

Login to read this IPVM discussion.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

** ***** ******** **** **** *** ******* ** ** **** *******.

** ***** **** **** **** **** *** ******* ** ** with *******.

*** ***?

*** **** ****** *** ** * ****** ********* ****** ******* being ****** ** ***contractor’s ************ *******.

** ******, *** ******** ********* *******’* ****** **** **** ******* Secretary *** ****** *** ***** ** ** ****** ********** ************* issues ******* **** *** ****’* *****.

**** ********* ****. **** ****** ****, “***** *** ******** ** place **** ******* ********* ** ****** *** ********** **** * ‘cyber ********’ *** ******** **** *** ****** ** ********* ******* effects ** ***** ******** **** ******* ********** ************ ***********.”

****, **** ** ** *** ********** ** *** *********** *** capabilities ** *** ******* ***** ***** ******* *****.

** ***** ****** **** ******* *** *** ** ***** *** Hikvision

*** ***** * *** ****** **** ***** ***** ****?

***** ******* ******* ********** *** ****** **** ********

...**** ***** ***** ****...

** *** *********, *** ******** ** “*****” ** ** ***.