【禁聞】中共黑客竊美數十武器國防技術

Facebook

【新唐人2013年05月31日訊】中共新領導人習近平訪美前夕,美國最新消息披露,中共利用黑客攻擊,獲得將近40個五角大樓武器項目、和近30個國防技術,從導彈防禦系統到F-35聯合攻擊戰鬥機的數據。白宮發言人卡尼28號表示,網絡安全是美方主要關注的項目,兩國領袖會晤時,一定會討論網絡安全問題。不過,分析認為,美、中領袖的會面,並不會杜絕中共的網絡攻擊。

美國《華盛頓郵報》引述五角大樓的機密報告,其中披露了一份至今為止,最詳細的被入侵武器系統清單,從這份清單可以看出,是遭到中共黑客入侵。入侵清單中包括﹕「愛國者」導彈系統、戰區高空區域防禦系統(THAAD)、美國海軍的「宙斯盾」等導彈防禦系統,以及目前正在研製中的F-35聯合打擊戰鬥機、和魚鷹飛機等尖端飛機。

《美聯社》報導,這份清單的廣度,凸顯了攻擊已經變得多麼常規。

五角大樓表示,他們非常嚴肅看待網路間諜的威脅,並且已經採取行動加強相關的防禦能力。美國國防部長哈格爾接下來幾天,在新加坡出席亞洲安全峰會時,將有機會向中共國防部的官員提出相關議題。

此外,白宮發言人卡尼在28號表示,網絡安全是美方主要關注的點,肯定美、中領袖會晤時也會討論。

時事評論員汪北稷表示,歐巴馬與習近平的會晤,很難解決中共的網絡攻擊問題。

時事評論員汪北稷:「因為美國從來是一個愛好和平、真正民主的一個善良的一個實體、一個國家,他是意識不到邪惡的這種殘暴性。我認為,他們見面之後僅僅是表面上的,中共會敷衍一下,減少對美國的網絡攻擊,但是實際上真正的攻擊,中共絕對不會停止。」

對於中共為何願意從事黑客行為,甚至不惜造成跟美國政府的緊張?美國《彭博社》在5月24號的報導中,引述英國專家的話說,黑客給予中共一個史無前例的能力,來收集過去它們可能無法獲得的巨大數量的信息,好處超過了風險。

汪北稷指出,中共非常清楚,它在熱兵器、核武器,以及陸軍、海軍、空軍等方面,跟西方民主國家的差距很大。

汪北稷:「所以中共就在隱蔽的網絡的這個戰線。包括情報的戰線,包括間諜這一層面,包括文化的侵略,經濟的擴張,就是除了傳統戰爭意義上的戰爭,中共實際上早就向西方社會開戰了。所以在這個背景下不難理解,中共非常重視在網絡這個領域來攻擊西方。」

汪北稷認為,這份報告是告訴人們,要清楚的認識中共的擴張性和侵略性。

汪北稷:「與中共打交道決不能說是,只顧著表面的握手,而忘記了背後還要拿起保衛自身的武器,時刻警惕中共侵略性、擴張性。」

美國國會「全球網絡自由法案(Global Online Freedom Act)」當事人蔣品超呼籲,歐巴馬與習近平會晤時,美國政府應該給中共施加壓力。

美「全球網絡自由法案」當事人蔣品超:「對它的駭客行為以及它們在竊取高科技,等等這方面的網絡的這種行為,要施行一個嚴厲的制裁,才能夠讓正義的力量屹立這個世界。」

此外,澳大利亞《ABC電視臺》報導說,中國黑客已經比以往認為的、更加積極的瞄準澳大利亞的公司,包括鋼鐵製造商博思格鋼鐵(Bluescope Steel),軍事和民用通訊製造商「柯頓有限公司(Codan Ltd)」。

澳大利亞富有影響力的「綠黨」指出,被報導的黑客消息是一個「百年難遇」的安全失誤,被盜竊了新組建的澳大利亞安全情報組織的樓層平面圖,以及通訊和電腦網絡的地點。

採訪編輯/常春 後製/薛莉

CCP Hackers Have Stolen Dozens of American Weapons and Defense Technologies

Just before Xi Jinping, the new leader of Chinese Communist

Party (CCP) visits U.S., the latest U.S. news has unveiled that

the CCP has hacked and obtained detail data of

nearly 40 weapon’s projects and nearly 30 defense technologies from the Pentagon,

including missile defense systems and

details of the F35 Joint Strike Fighter.

Jay Carney, White House spokesman, said on May 28 that

internet security is one of the projects of major concern to

the US, the leaders of U.S. and China will discuss internet security.

However, analysts have commented that the meeting of

U.S. and Chinese leaders won’t stop the CCP’s hacking.

The U.S. “Washington Post" quoted the Pentagon’s report and

unveiled a most detailed list of the hacked weapon systems.

It shows that the systems were hacked by the CCP.

The list includes the Patriot Missile system,

Terminal High Altitude Area Defense system (THAAD),

the U.S. Navy’s Aegis Combat System, the currently being

developed F-35 Joint Strike Fighter, Osprey , and other advanced aircraft.

Associated Press has reported that the breadth of

this list highlights how often the hackers act.

The Pentagon have said that they treat internet espionage

as a very serious issue, and they have taken actions to strengthen defense capability.

Chuck Hagel, Secretary of the United States Secretary of

Defense will participate in the Asia Security Conference in Singapore in the next few days.

He will use this opportunity to raise the issue to

the officials of China’s Ministry of Defense.

In addition, Jay Carney, White House spokesman, said

on May 28 that internet security is one point that the U.S. is mainly concerned with.

It’s sure that the leaders of the U.S. and

China will talk about it when they meet.

Wang Beiji, a political commentator, said that it will be

very hard to solve the hacking issue just by one meeting between Obama and Xi.

Wang Beiji, a political commentator, “Because the U.S. has

always been a kind entity or a country that loves peace and executes a real democracy,

it can’t be aware of the brutal evil of the CCP.

I think CCP will only perfunctory promise to reduce

hacking action on the surface, when (the leaders) meet.

But in fact, CCP will never stop the real attack.”

Why is the CCP engaged in hacking?

and why doesn’t it even mind that action causing tension

in it’s relationship with U.S. government?

The U.S. Bloomberg reported on May 24,

quoting the words of a British expert that

the hacker gives the CCP an unprecedented ability to collect

the enormous amount of data available that they couldn’t obtain in the past.

The benefit obtained from hacking outweighs the risk.

Wang Beiji pointed out that the CCP is very clear that

it has a big gap to cover if it wants to catch up on the level

of defense capability of Western democracies in

heavy weaponry, nuclear weapons, Army, Navy,

Air Force and other related fields.

Wang Beiji: “That’s the reason why the CCP hides itself on

the frontline of the internet. Including in the intelligence war,

spy ware level, cultural aggression and economic expansion,

but doesn’t enter the traditional fighting arena.

CCP has started the war on Western society in fact.

In this present situation, the CCP is now paying great

attention to it’s own internet attack on Western powers.”

Wang Beiji thinks that this report is telling people to

clearly recognize the CCP’s expansionist aggression.

Wang Beiji: ”To make a deal with CCP, you can’t

only look at the shaking of hands on the surface and forget your own defense plan.

You must be ever vigilant of the CCP’s expansionist aggression.”

Jiang Pinchao’s case is listed in the U.S.

Congress Global Online Freedom Act.

He has urged the U.S. government to give

the CCP pressure when Obama meets with Xi.

Jiang Pinchao, the litigant of the U.S. Global Online

Freedom Act: “Should launch severe sanctions over the CCP’s hacking actions

and it’s stealing of high-technology data, this will enable

the right power to stand up in this world.”

In addition, Australian ABC TV reported that

Chinese hackers are more active than people thought

in targeting Australian companies,

this includes targeting of the steelmaker BlueScope Steel,

also the targeting of the civilian and military communication equipments supplier Codan Ltd.

Australia’s influential Greens Party has pointed out that

the reported hacker’s news is a security mistake of “epic proportions"

The floor plan, the layout of communications and

computer systems of the newly-built Australian Intelligence Organization’s building were all recently hacked.

相關文章