It may be months before American intelligence agencies can compare the audacious flight of a Chinese surveillance balloon across the country to other intrusions on America’s national security systems, to determine how it ranks.
After all, there is plenty of competition.
There was the theft of the designs of the F-35 about 15 years ago, enabling the Chinese air force to develop its own look-alike stealth fighter, with Chinese characteristics. There was the case of China’s premier hacking team lifting the security clearance files for 22 million Americans from the barely secured computers of the Office of Personnel Management in 2015. That, combined with stolen medical files from Anthem and travel records from Marriott hotels, has presumably helped the Chinese create a detailed blueprint of America’s national security infrastructure...
Not surprisingly, now it is coveted by military and intelligence officials who desperately want to reverse-engineer whatever remains the Coast Guard and the Navy can recover. more
Extra Credit: Spy vs Spy: A brief history of balloon spying & Thaddeus S. C. Lowe