

The Navy is leading the investigation into the breach with the assistance of the FBI, officials said. The news comes as the Trump administration is seeking to secure Beijing's support in persuading North Korea to give up nuclear weapons, even as tensions persist between the United States and China over trade and defense matters. advantage in military technology and become the preeminent power in east Asia. The breach is part of China's long-running effort to blunt the U.S.

The officials said the material, when aggregated, would be considered classified, a fact that raises concerns about the Navy's ability to oversee contractors tasked with developing cutting-edge weapons. The data stolen was of a highly sensitive nature despite being housed on the contractor's unclassified network. The Washington Post agreed to withhold certain details about the compromised missile project at the request of the Navy, which argued that their release could harm national security. Taken were 614 gigabytes of material relating to a closely held project known as Sea Dragon, as well as signals and sensor data, submarine radio room information relating to cryptographic systems, and the Navy submarine development unit's electronic warfare library. The officials did not identify the contractor. The hackers targeted a contractor who works for the Naval Undersea Warfare Center, a military organization headquartered in Newport, Rhode Island, that conducts research and development for submarines and underwater weaponry. The breaches occurred in January and February, the officials said, speaking on the condition of anonymity to discuss an ongoing investigation.
