A list of the U.S. weapons designs and technologies compromised by hackers
The following is reproduced from the nonpublic version of the Defense Science Board report “Resilient Military Systems and the Advanced Cyber Threat”:
Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation
SYSTEM DESIGNS
Terminal High Altitude Area Defense
Patriot Advanced Capability-3
Extended Area Protection and Survivability System (EAPS)
F-35
V-22
C-17
Hawklink
Advanced Harpoon Weapon Control System
Tanker Conversions
Long-term Mine Reconnaissance System
Global Hawk
Navy antenna mechanisms
Global Freight Management System
Micro Air Vehicle
Brigade Combat Team Modernization
Aegis Ballistic Missile Defense System
USMC Tracked Combat Vehicles
Warfighter Information Network-Tactical (WIN-T)
T700 Family of Engines
Full Authority Digital Engine Controller (FADEC)
UH-60 Black Hawk
AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile)
Affordable Weapons System
Littoral Combat Ship
Navy Standard Missile (SM-2,3,6)
P-8A/Multi-Mission Aircraft
F/A and EA-18
RC-135 Detect./Collect.
Mk54 Light Weight Torpedo
TECHNOLOGIES
Directed Energy
UAV video system
Specific Emitter identification
Nanotechnology
Dual Use Avionics
Fuze/Munitions safety and development
Electronic Intelligence Processing
Tactical Data Links
Satellite Communications
Electronic Warfare
Advanced Signal Processing Technologies for Radars
Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor
Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV)
Space Surveillance Telescope
Materials/processing technologies
IR Search and Track systems
Electronic Warfare systems
Electromagnetic Aircraft Launch
Rail Gun
Side Scan sonar
Mode 5 IFF
Export Control, ITAR, Distribution Statement B,C,D Technical Information
CAD drawings, 3D models, schematics
Software code
Critical technology
Vendor/supply chain data
Technical manuals
PII (email addresses, SSN, credit card numbers, passwords, etc.)
Attendee lists for program reviews and meetings
Source: News - 28 May 2013
Photo: The US Weapon designs and technologies compromised (Photo by files)
(28.05.2013)
|