Top Secret U.S. Military Data Breached

Information on the new F-35 Joint Strike Fighter plane was breached by hackers from Australia. (AFP/Photo)

October 12, 2017
OAN Newsroom

An Australian defense contractor suffered a major hack, exposing top secret U.S. military technology.

The country’s defense ministry has confirmed the breach, which reportedly included data on state-of-the-art military aircraft and warships.

While it remains unclear if the cyber-attack was state sponsored, officials say they are not ruling out the possibility.

Top secret information on the brand new F-35 Joint Strike Fighter along with the U.S. military’s mainstay transport plane, the C130, was also said to be compromised.

The manager of the Australian Signals Directorate described the breach as “extensive and extreme,” and said that the software the government was using had not been updated in a year.

Christopher Pyne, Austrailia’s Defense Industry Minister, said that the information taken was not military data, but commercial data.

He assured his team would get to the bottom of the situation at hand.


    Not the first time! Hillary has already done that!

  • John C

    No top secret information should ever be in a system that has internet access or WiFi. All security can be hacked. Secure secret rooms with white noise inside secure bunkers with thick walls and hundreds of guards are useless if the information is stored on a computer or server that can be accessed from the outside. These companies and people have to stop being so lazy and lackadaisical when it comes to secrets and keeping them secure. Hillary Clinton was a nightmare for national security with her unsecured server which got people killed and secure plans and information stolen. She must be prosecuted as should all who fail to secure secret information and above. It is the only way to protect this nation and her people.

  • seegul

    Could the US have wanted NK to know they had detailed war plans ready. They didn’t have to be the real ones, just overwhelming.

  • Elizabeth A. Parks

    Past time to make cyber security a priority.

  • rodger ramjet

    This is what TPP was all about. Obama and eventually Hillary wanted this trade agreement to pass if she won the election. Opening and sharing all the trade secrets from US to other countries. The foundations were already being laid before it was signed off by Obama or Hillary. Hillary wanted this to pass so she and her friends including Obama could fill up bank their accounts with billions of dollars.

  • Falconer375

    There is so many inaccuracies in that story the author might have been better doing a cut and paste from a decent and noted news organisation. Firstly as stated in the JSF caption the hackers were not ‘from’ Australia, it was a subcontractor that was hacked. A ‘defence’ contractor no less. Secondly the data accessed was not classified under military classification but was of a commercially sensitive nature. Thirdly it was the companies (who had passed vetting by various governments and their agencies) whose network security was not currently patched and upgraded, not any government networks. It might read as a good story the way it’s written but it’s not accurate to my knowledge.

  • Falconer375

    There is so many inaccuracies in that story the author might have been better doing a cut and paste from a decent and noted news organisation. Firstly as stated in the JSF caption the hackers were not ‘from’ Australia, it was a subcontractor that was hacked. A ‘defence’ contractor no less. Secondly the data accessed was not classified under military classification but was of a commercially sensitive nature. Thirdly it was the companies (who had passed vetting by various governments and their agencies) whose network security was not currently patched and upgraded, not any government networks. It might read as a good story the way it’s written but it’s not accurate to my knowledge.

    • Joe

      that would be “organization” if you want to get picky.

  • Mark Heinzen

    When supporting US Allies with US technology imbedded in weapons systems the safeguarding and encryption elements are complicated to protect when you are utilizing contractors.

  • John Smyth

    why do we let any other country’s industry work on US defense contracts? If they want to buy our products fine, they get maintenance and performance data only-nothing else and they make no parts

  • Kerry Good

    You know for a Cherokee Warrior, Enlisted Army Infantryman whom fought in Jungles of Vietnam, Cambodia, Laos, killing commie soldiers, I find that there is more enemies in USA than there!

  • Kyle Smith

    Under the previous administration.

  • Robert E Lee

    I vote we keep our top stuff on Hillary’s server.

  • jvlewis

    This occurred Nov 2016 and we are just finding out about it.

  • Sagev Sal

    Anytime you connect a system to the internet you risk a data breach. DOD and friends should never be connected with any system that contains secrets.


    Military aircraft have weapon systems in them that make them ‘top secret’.
    An F-35 can be sold without those systems. Much of these aircraft are not that ‘top secret’.

    • I. Forgot 2

      Thank God!

  • No Mas

    Let me please allow my insight on protecting Top Secret Data…

  • William Glass

    There goes our so called technological advantage over our enemies. Looks like we’re screwed.

  • “I’m a Rooster!”

    One would think this is the handy work of Mr. Kim Jong Un. I digress to say this may be the nefarious work of the Liberal Left as they have been attacking our President from the start.

  • sanman99

    No doubt created by obama and a democrat left in charge.

  • sanman99

    Question, WTF is Australia doing with our secrets????

    • john

      We are selling f35s to them

      • sanman99

        A receipt and owners manual is not good enough???

        • john

          well thats probably what was stolen the equivalent to an owners manual

  • H. P. Hazard

    Just flaming wonderful. No updated protection software for a year! Going forward our government needs to be sure all software is current and updated on a regular basis.

  • Paul Curto

    F-35 and C-130 are both very old and obsolete aircraft. Any “commercial” data on these is worthless. It’s good that silly false-flag break-ins like this are getting covered. Maybe they can find the Russian hackers at the DNC. Oh, that’s right, they don’t exist. Assange has proof the press has no interest in following because it clears Trump. Wow. Can you believe any of these “sources”?

    • Joe Michael

      Unless your talking bout the AC- 130 Spectre

      • Paul Curto

        Yes, but commercial data would indicate the non-lethal weaponry version. The AC-130 is a gunship. Still not “new”.

    • Roscoe

      Are you kidding? The F-35’s very first flight was 15 December 2006. It’s one of the newest fighters ever produced. I’ll agree with you on the C-130, since it’s first flight was August 1954. Granted, the newest version of C-130 has been around 20+ years. I agree with you though, can’t believe anything unless you do some research to back it up. F-35 very old and obsolete? Check your resources.

      • akafett

        The F-35 is old. When the public first heard about it in ’05 or ’06, it wasn’t new. It’s a safe bet that when you hear about “new” military equipment, it has already been in service for at least 5 years. That doesn’t include the testing/developing phases.

        Take the F-117 for example. When it made its debut in 1991 (Gulf War), many thought that was a new fighter. Nope. That thing was in service in something like 1980 or ’83.

        The military is not in the habit of telling about its newest arsenal lineup.

      • Paul Curto

        We were testing the F-35 (then the X-35) as early as 2000 at NASA. It was a research vehicle. It has similar flight characteristics to even older aircraft, like the ancient F-4 which was faster and cheaper. It was in a museum (Hazy) here in DC as early as 2007!

  • Dan Fundarz

    Pathetic, maybe its time to just keep the top secret stuff off the internet instead of letting everyone else steal it remotely.

  • Frank2525

    Somehow I missed something with this. I do not see anything in the article indicating how this hacking occurred. And it appears it was all within Australia, with their Signal Facility involved, and a contractor. And specifically I read no Military data was involved. So was this done by another employee in that office, recording on a flash or other recording device? If so, we have such info all over, since so many countries are now flying the F35, different versions. Same goes for other shared military or information. I have to wonder why this even made the social media, since it is not much of a story, with facts, names, or solutions.
    What is Australia doing to secure such information and data? Having experience many years ago with Australians, and others, I know them to be security minded, or they were then. Same with other countries USA was involved with, in such actions.

  • eladtoor

    An even more devastating breach of national security has so far been concealed
    The White House has not yet released the fact that the Putin Russian intelligence agency hacked US Presidential records which reveal that Trump has a negative IQ.

    • Joe Michael

      WOW! You sure have prooved how clever and witty you are with that! I’m impressed!

  • Jeff Pearce Sr.

    Expect more of this as the Clintons no longer are able to sell this information for their own profit.

  • landy fincannon

    LOL. I wish someone would hack my bank account and make me a multi millionaire.

    I promise I’d be a blessing to others.

  • Quantum Leap

    Why, WHY do we allow foreign countries to access Top Secret data? WHY????

  • Sui-Juris

    More “news” to cement the idea that the internet is the boogeyman so countries can tighten up on the free exchange of ideas it represents. Just like they used movies, and music to clamp down on file sharing, they will use military/State secrets to add further “policing”. After all, it wouldn’t dawn on them to keep their State and military secrets off the internet. Oh no! Someone would have to think. SMH

    • Roy Beane

      Ha. Quite true. And some people even think the term military intelligence is just an oxymoron.

      • Sui-Juris

        …or State secret, after the Obama era! LOL

    • landy fincannon

      Sui-Juris in practice ? It’s an interesting concept.

      • Sui-Juris

        What, to shoulder the responsibility’s necessary to manage ones own affairs?

        • landy fincannon

          Yes, I think we should handle own affairs but the courts are shark infested waters. I’ve been looking for a good link, if you know one please visit my account and post on another site that allows links. Thanks.

          • Sui-Juris

            Link to what?

          • landy fincannon

            A good web site to learn more about representing ones self Sui Juris

          • Sui-Juris

            Oh! No. Sorry. I haven’t a clue. I only represent here my own hard earned personal socio-political philosophy of owning my life’s decisions, words, and actions.

  • My Head

    Comey investigated, there was no malicious intent. Wait, this isn’t another HRC story?

  • 210’s

    Didn’t see an OAN story about Las Vegas this morning but read this elsewhere: Workers at the Route 91 festival turned their phones over to the FBI and they were recently returned, “They all said that all their phones are completely wiped clean! All messages and info from that weekend are completely gone. I thought OAN would be on top of this.

    • Legion

      Because that never happened.. there is no such story.

      Go back into your tin foil covered dark room.

      • 210’s

        I DIDN’T read it on CNN or NBC

      • 210’s

        How do you know this?

  • …remain calm and return fire

    top tier brains are in the private sector….only 2nd, 3rd, or worse in government…..our ‘leaders’ have no clue how to stop these breaches…..the technology is way over their heads…

  • Roger Williams

    This idiocy must stop. Trump insisted on very strong cyber defense at home from day one of his administration, so the deep state (and the Corker/McCain crew of confederates) had to focus on America’s allies.

    Having addressed the issue of Russia’s Kaspersky software, We now have to address the thievery of China, Pakistan, India et al IMMEDIATELY … and make them pay in significant ways …

  • Why are they having a problem hiring the best people for the job in protecting our national security? This is a major issue.

    • …remain calm and return fire

      the best people want to soar with eagles, not fly with turkeys…..government employees are stifled by institutional bureaucracy and dumbed down to a least common denominator, the private sector offers free thinking, innovation, and initiative……

    • tedlv

      Good morning!

      Maybe they should look to Pakistan for some real cyber security experts. 🙂

      • Hey Ted. Nice to see you.

    • Ken Knerr

      The private sector pays. The Gov does not.

  • Alice

    Why do we give the information to Australia?

    • …remain calm and return fire

      or any other country

    • Hillfarmer79

      If they have purchased those aircraft from us they also have the software.

      • Alice

        Should we be selling our brand new fighter planes to other countries? Can’t we sell them a different version or late year’s model?

        • Falconer375

          If said country had contributed money and resources to the development of the aircraft whilst it was still a paper aeroplane……I’d imagine there would be an expectation that they could buy them yes.

        • Falconer375

          If said country had contributed money and resources to the development of the aircraft whilst it was still a paper aeroplane……I’d imagine there would be an expectation that they could buy them yes.

      • R.L.

        Actually I believe that as part of the one world government we decided years ago to allow foreign countries to make parts for our most classified weapons. You know they call it free trade etc….

        The company is a defense contractor so i figure it is making something as a component for that aircraft as opposed to being just a customer and user of that aircraft.

  • CDG

    This was to be expected. The Soviets used spies to steal U.S. secrets on the Atomic bomb during the Cold War. Spies are no longer even required. Pay off some guy for computer access. Secrets acquired. C-130 info is not classified. F-35 info would have gotten out sooner or later as numerous countries were involved with the financing and will soon have the aircraft. Pilot training, skill and support are still the most important aspect of air/combat operations.

    • Joe Michael

      I agree! Our soldiers, sailors and airmen are second to none. This just makes their jobs harder and more dangerous . We should never become complaisant .

  • Joe Michael

    How many many times is this going to continue before they get their head out of their asses and secure the computers with sensitive stuff on them? What are we paying them billions for? Why isn’t congress screaming? Why isn’t the press and the Prez shouting? It’s like the monkeys are loose and at the helm. We are not safe!

    • skyhawk

      The “internet of things” is real convenient but it has come to be so ubiquitous and far reaching that we, as a society, are at extreme risk.
      Nothing…..I repeat NOTHING…can be made fully secure while connected to the Net.

      The more things that become interconnected by the Net, the more vulnerable we’ll become.

  • James Wagner

    KC130 crashed in Mississippi
    MV22 crashed in Australia & two Navy war ships blindsided by slow moving oil tankers when the truth come out we will realized war has been declared on us

  • Joe Michael

    What is commercial about an F35?

    • Mary Hasting

      Good question. That was my first thought, too.

      • Joe Michael

        Great minds think alike. lol

        • Mary Hasting

          So true! LOL

  • Donald York

    Not good !

  • anotherday

    If true, maybe we need to keep our closest secrets a bit closer to home.
    And maybe off the internet.

    • Heremeroor

      Certainly not in a server stored in a bathroom closet and managed by a foe…

    • “I’m a Rooster!”

      Doesn’t it just pickle you when something like this happens? My question is “How?”

    • kaiju

      I worked for a defense contractor most of my career and had more passwords than I could keep up with. Security is a joke though, with the PC gov at the helm, diversity is more important than security. We had middle easterners, Chinese, and you name it roaming the halls. We asked on more than one occasion to have engineering disconnected from the outside network. Corporate slave masters though also want to spy on their own employees. There is no security. It’s a nice illusion, but it doesn’t really exist.

      • No Mas

        Seems our problem is the diversity instead of American Constitutional values –

        • Joe

          diversity has always destroyed civilizations throughout world history. We don’t see hyena’s in the same cage as a labrador…. it’s insane.

      • anotherday

        It doesn’t seem we have a handle on who works for us or what access they have.
        It also seems that data breaches only go one way.
        Against us.

      • RMCS Ret.

        Pretty much the same experience here. They refuse to disconnect from the web. The ability is there, but not the desire. You can design a system with shielded rooms, end to end military grade encryption, and no connection to the web but what good does it do if some numb skull puts it on his laptop and then logs onto the web, accesses private servers and generally goes about business in a hazardous fashion.

        • Elizabeth A. Parks

          Safeguards against that need to be part of the security.

    • Charles

      You 100% correct. Get all this data off the internet. That way you can easily find a leaker.

  • Theo Stall

    Russia, China, North Korea–take your pick–the US better REQUIRE PROOF OF CYBER SECURITY before it deals with any government and our military capabilities.

  • Obama fruits!

  • Roy Beane

    There is no computer network ANYWHERE that can’t be hacked. Those who haven’t already been breached shortly WILL BE. Wouldn’t be a bit surprised if one day soon we see Minuteman 3 nuke missile silos launching missiles out of our pastures and back yards because the hackers are the ones who are REALLY in control.

    • alneuman

      every computer connected to the internet can be hacked. a stand alone machine that is not, has never and will never be connected to the internet in any form (hard wired or wireless) can only be hacked by a person actually touching that machine. of course, not being connected to the internet really limits the computer’s uses.

      • Joe Michael

        Then limit them! Tell the genius minds we pay top doller to figure another way of handling this. Sometimes the old ways are better.

    • thedobc

      The Minuteman silos are not interconnected, and their software is so archaic it comes in on 8 inch floppies… Launch keys are actual keys. Codes are hand delivered in plastic capsules and have to be authenticated twice… I doubt it will be hacked

      • Roy Beane

        I sincerely hope you are right, otherwise, it’s simply a matter of time……..

      • mark abby

        Then there’s people like Reality Winner who are more than willing to give up information. We need the death penalty for treason

      • tedlv

        I worked as a nuclear power plant operator and project manager from 1981 to 2003. The plant management wanted absolutely no connection between the controls and the outside world. I’m sure it’s still like that.

  • Sane_Person37

    Why is such data exposed to the internet. Absurd. Unless it’s a decoy.

  • Lady Liberty

    Islam is taking over Australia. Wouldn’t be surprised if the source of the breach is associated.

  • landy fincannon

    Yea, keep banking on line.

    China for the most part is now cashless. Not good.