Â
The F-35 is the most expensive development ever approved by the Pentagon. 300 billion U.S. dollars will be invested the Super Bird, better than any other enemy aircraft from the sky and get themselves against attacks to defend themselves may be. Now detailed plans of the high-tech aircraft have been stolen - by hacker attack.
AP
Lockheed Martin F-35: Secret of the data called the Joint Strike Fighter are made of Pentagon computers had been stolen
The intruders had several terabytes of data from the computers of the Defense Ministry deducted, reported the
Wall Street Journal in its Tuesday edition. It was also detailed information on the electronic systems of the jet has been compromised, the paper quoted unspecified government officials said. Defense experts now fear that it might be easier to potential adversaries, against the sophisticated military aircraft for the defense to .
The development of the F-35, the Joint Strike Fighter, has for years had worked. The aircraft is an advanced stealth fighter. A total of 2443 copies of the flagship aircraft to the U.S. armed forces to purchase. First work on this project several branches in a joint combat aircraft in several versions of Air Foce, Navy and Marine Corps will be used.
China denies accusations from
The F-35-incident is just the latest link in a chain of cyber-attacks against U.S. infrastructure, and defense facilities. Almost two weeks discovered specialists in the networks of the U.S. electricity grid unknown programs that may be capable of doing would have been the U.S. electricity off. Moreover, according to the Wall Street Journal, was the air monitoring network in the U.S. Air Force in recent months target of Internet attacks have been.
The theft of the airplane blueprints is water on the mills of those who have been long rant, the United States were insufficient forces on an electronic fairs prepared. Especially from China should ever again attacks have been executed. Even now discovered attack is expected to be from China.
The Chinese embassy in Washington denied the allegations vehemently starting immediately. Man 'condemn and prohibit all forms of cyber-crime ", it was said by the Chinese.
Hacker Wanted
That the U.S. government cybersecurity contingency is well known, shows a job with an IT service provider to the U.S. Homeland Security Agency is looking for new staff at present. The requirement profile
Edel-hackers are looking for which any detected vulnerability in the networks of government agencies and with hacker methods can detect as yet unknown.
ON TO ONLINE blogs
Investigation: FBI uses the first U.S. citizen to terrorist list (21.04.2009)
Water Boarding: Obama defends release of torture memos (21.04.2009)
Cyber security: U.S. Homeland Security wants to hire hackers (19.04.2009)
Lauschangriff: U.S. magazine reveals sniffing strategy of the FBI (18.04.2009)
Warning IT expert: Hackers could power the U.S. ausknipsen (08.04.2009)
With such well-trained experts, the cyber-defense of the United States in the coming years, better protected against attacks from the Internet coverage. A total of 250 specialists, the U.S. government for a year to train future.
Whether for the job as Nobly hacker in government procurement have a qualified candidate is found, is unclear. Some aspects of the requirement profile may be used by most hackers is difficult to fulfill. Candidates will be among others already have the highest security classification of the U.S. secret services have.
No comments:
Post a Comment