asif iqbal
Lieutenant General
bit like the North sea cable that went from Scotland to Iceland which detected any breakout of Soviet submarines into the Atlantic during the Cold War
Not sure what to believe out of this news Is the US submarine warfare secret leaking like a sieve? Hard to believe
China hacked a Navy contractor and secured a trove of highly sensitive data on submarine warfare
and June 8 at 3:04 PM Email the author
Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to undersea warfare — including secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020, according to American officials.
The breaches occurred in January and February, the officials said, speaking on the condition of anonymity to discuss an ongoing investigation. The hackers targeted a contractor who works for the Naval Undersea Warfare Center, a military organization headquartered in Newport, R.I., that conducts research and development for submarines and underwater weaponry.
The officials did not identify the contractor.
.
Not sure what to believe out of this news Is the US submarine warfare secret leaking like a sieve? Hard to believe
China hacked a Navy contractor and secured a trove of highly sensitive data on submarine warfare
and June 8 at 3:04 PM Email the author
Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to undersea warfare — including secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020, according to American officials.
The breaches occurred in January and February, the officials said, speaking on the condition of anonymity to discuss an ongoing investigation. The hackers targeted a contractor who works for the Naval Undersea Warfare Center, a military organization headquartered in Newport, R.I., that conducts research and development for submarines and underwater weaponry.
The officials did not identify the contractor.
.
The data on the US supersonic AShM would be useful, but unlikely to add much to Chinese knowledge on AShMs, so would only allow China to better counter the new US missile and is unlikely to give anything that would allow China to significantly improve its own AShMs.
If true, the EW library would be the true prize, and should give the PLAN an incredibly insightful look at US and allied signals intelligence capabilities.
Depending on the nature and stage of development being done, it may also yield invaluable intel and insight on US EW and ECM, ECCM etc.
If the Chinese were incredibly lucky, that EW library may even contain US and allied warship and submarine signature data and/or IFF protocols and data. That would be a monumental prize indeed. Although since they were developing an AShM, there would not really be a need for the contractor to have US sub signatures, so that’s probably too much to hope for.
this type of warfare is exactly wha China should be fighting
code breaking, intelligence gathering and eavesdropping
they are all important
Some US general said roughly the same thing (with a proverbial wink and a smile) when an angry senator asked him during a hearing how China was getting away with stealing American technology secrets. The only problem for us is that neither the Americans nor the Chinese are telling us how badly Chinese computer systems are getting hacked by US intelligence agencies.Indeed. The US, along with Israel, is the world's most aggressive nation in the use of cyber warfare for penetrating the most sensitive computer systems of its rivals....
Same case with ELINT and code-breaking. There is no organization in the world that comes even close to the NSA and other agencies of the USA in the scale and aggressiveness of their operations in these domains.
Indeed. The US, along with Israel, is the world's most aggressive nation in the use of cyber warfare for penetrating the most sensitive computer systems of its rivals and acquiring data on its rivals' industrial and technological advances. Every disruptive military and civilian advancement in the rest of the world is targeted in this way to ensure that the US can stay ahead in the technological race in every domain.
This is also why the US will aggressively guard its lead in semiconductor technology and software
Same case with ELINT and code-breaking. There is no organization in the world that comes even close to the NSA and other agencies of the USA in the scale and aggressiveness of their operations in these domains. That is why the US is always ahead of every other nation in devising counter measures to its enemies' weapon systems.