WORLD AIR WAR HISTORY


 
  USA   United States Air Force
United States of America

US Air Force  •   •   •   •   •   •   • 
AF NEWS  •  AF HISTORY

A list of the U.S. weapons designs and technologies compromised by hackers

A list of the U.S. weapons designs and technologies compromised by hackers

The following is reproduced from the nonpublic version of the Defense Science Board report “Resilient Military Systems and the Advanced Cyber Threat”:

Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation

SYSTEM DESIGNS

Terminal High Altitude Area Defense

Patriot Advanced Capability-3

Extended Area Protection and Survivability System (EAPS)

F-35

V-22

C-17

Hawklink

Advanced Harpoon Weapon Control System

Tanker Conversions

Long-term Mine Reconnaissance System

Global Hawk

Navy antenna mechanisms

Global Freight Management System

Micro Air Vehicle

Brigade Combat Team Modernization

Aegis Ballistic Missile Defense System

USMC Tracked Combat Vehicles

Warfighter Information Network-Tactical (WIN-T)

T700 Family of Engines

Full Authority Digital Engine Controller (FADEC)

UH-60 Black Hawk

AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile)

Affordable Weapons System

Littoral Combat Ship

Navy Standard Missile (SM-2,3,6)

P-8A/Multi-Mission Aircraft

F/A and EA-18

RC-135 Detect./Collect.

Mk54 Light Weight Torpedo

TECHNOLOGIES

Directed Energy

UAV video system

Specific Emitter identification

Nanotechnology

Dual Use Avionics

Fuze/Munitions safety and development

Electronic Intelligence Processing

Tactical Data Links

Satellite Communications

Electronic Warfare

Advanced Signal Processing Technologies for Radars

Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor

Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV)

Space Surveillance Telescope

Materials/processing technologies

IR Search and Track systems

Electronic Warfare systems

Electromagnetic Aircraft Launch

Rail Gun

Side Scan sonar

Mode 5 IFF

Export Control, ITAR, Distribution Statement B,C,D Technical Information

CAD drawings, 3D models, schematics

Software code

Critical technology

Vendor/supply chain data

Technical manuals

PII (email addresses, SSN, credit card numbers, passwords, etc.)

Attendee lists for program reviews and meetings



Source: News - 28 May 2013

Photo: The US Weapon designs and technologies compromised (Photo by files)


(28.05.2013)


 
EMPTY
EMPTY
USA AF
Scheme
EMPTY
 

 
  CONTINENTAL NEWS:

American Air Force News
African Air Force News
Asian Air Force News
European Air Force News
Middle Eastern AF News
Ocean Air Force News


• USAF asks for 72 fighters in 2024, and it might happen again

(6.04.2023)
US Air Force asks for 72 fighters in 2024, and it might happen again...>>

• Lockheed Martin F-35 Fleet Now at 894 Aircraft After 141 Deliveries in 2022

(30.12.2022)
Pentagon and Lockheed Martin Finalize Lot 15-17 Agreement, Capping a Year of International Growth...>>

• Northrop Grumman B-2 Spirit Stealth Bomber Successfully Test Fires First Long-Range Stealth Missile

(22.08.2022)
A B-2 Spirit strategic bomber has successfully test-fired its first long -range stealth standoff missile, Northrop Grumman announced in a press release on Thursday....>>

• Armenia 4 Mi-8MTV-5 Hip Armed transport helicopter from Russia

(27.01.2022)
On 25 January 2022, a ceremonial event was held at Erebuni airport (Yerevan) related to the acceptance of new multipurpose helicopters for Armenian Air Defence Force. The event was...>>

• USN FA-18E Super Hornet, USS George H.W. Bush (CVN 77) Atlantic Ocean

(15.09.2021)
USS George H.W. Bush (CVN 77) F/A-18E Super Hornet aircraft...>>

• After 60 years, Chinook keeps getting better

(1.09.2021)
This month marks 60 years since the Chinook prototype took to the skies, setting the stage for the rotorcraft’s eventual dominance in heavy-lift heroics....>>

 




       info@xairforces.net Webmaster: REFLX DESIGN - © 2011 xairforces / Aviation Society,