DOUGLAS V. GIBBS<---------->RADIO<---------->BOOKS<---------->CONSTITUTION <---------->CONTACT/FOLLOW <----------> DONATE

Thursday, December 31, 2015

Barack Obama's Gifts To The People's Liberation Army

by JASmius



Whether this strategic military disaster was from a direct hack or from the haul Beijing reaped from the vast Edward Snowden intel treasure trove, it stands second only to the Red Chinese conquest of the United States in the not too distant future as a testament to The One's outright hostility to the very concept of U.S. cybersecurity:

Designs and technology for two new [Red] Chinese bomber drones that bear a striking resemblance to a cutting-edge U.S. military attack drone reportedly were stolen by [Red] Chinese cyber spies.

According to a report in the Asia Times, a video that popped up on a [Red] Chinese military blog this month showed a missile-firing drone in action that looked almost identical to the U.S. military combat drone, the MQ-9 Reaper.

And on other ChiComm military blogs as well.  But that's only the tip of the iceberg;

Drones aren't Beijing's only cyber-hacking target, the newspaper reports; other aircraft compromises have involved the B-2 Spirit bomber, the F-22 Raptor [air superiority fighter], and the frontline F-35 Lightning Joint Strike Fighter.

The Asia Times reports the hack of advanced radar and engine designs of the F-35 are believed to have been through a non-U.S. subcontractor — and those features are now part of a new stealth fighter jet being developed in [Red] China. [emphasis added]

And, get this, you know what the ChiComm cyberspies' point of entry into this, yes, non-U.S. subcontractor's servers was?  Facebook.  Through which they implanted malware that gained them user IDs and passwords with which to completely loot and ransack every U.S. military secret to whiich they wanted to help themselves.  Which I'm guessing was pretty much all of them.

Makes you wonder what other malware they've planted, doesn't it?  What logic bombs they can trigger whenever they want to cripple our defense networks and linked military capabilities as part of the final attack on our country.

All because of Barack Obama's outright hostility to the very concept of U.S. cybersecurity - and, by implicaton, to America itself.

If the Cylons had been attempting to wipe out the United States instead of the Twelve Colonies of Kobol....



....Number Six could have just stayed home and let her big-eared, mom-jeaned "Baltar" bring the defense network access codes to her.

No comments: