Chinese Hackers Score F-35, Black Hawk Chopper, and PATRIOT Missile Data
May 28, 2013 12:24 PM
comment(s) - last by
F-35, Aegis, PATRIOT Missile, Littoral vessel, Blackhawk chopper, and THAAD are among the compromised programs
Defense Science Board
(DSB) in a new report suggests that Chinese military hackers have compromised one of America's most costly weapons projects --
the nearly $1.4T USD
F-35 Joint Strike fighter weapons system
I. Why Research When You Can Steal?
In its confidential report for the Pentagon and industry officials --
The Washington Post
-- the DSB claims that blueprints and data pertaining to two dozen weapons systems -- including U.S. missile defenses and combat aircraft and ships -- were accessed by Chinese hackers. The report, by the mixed civilian/government board, which advises government and corporate policy makers, does not suggest necessarily the Chinese have stolen complete designs.
The U.S. federal government recently expressed the desire to force "help" onto private sector utilities. However, the report basically indicated that at this point the federal government is incompetent when it comes to cybersecurity when it comes to foreign threats, unable to sufficiently block attacks on itself, let alone others.
Among the other weapons systems accessed by Chinese hackers include:
The PATRIOT missile system
Terminal High Altitude Area Defense (THAAD)
, the Army's ballistic missile interceptor program
, the Navy's ballistic-missile interceptor technology
F/A-18 fighter jet
The V-22 Osprey
The Black Hawk helicopter
The Navy Littoral Combat Ship
The nation's most expensive weapon in history -- the F-35 -- has been compromised by Chinese intrusions and may be effectively useless in combat as a result.
[Image Source: Lockheed Martin]
Compromised contractors include:
Lockheed Martin Corp. (
Raytheon Comp. (
Northrop Grumman Corp. (
Mark Stokes, executive director of the
Project 2049 Institute
-- an Asian-centric D.C. think-tank, comments, "[The intrusions are] staggering. These are all very critical weapons systems, critical to our national security. When I hear this in totality, it’s breathtaking."
II. Experts Astounded by China's Weapons Progress
China has expressed frustration that its military trails the U.S.'s technologically. But recently the Asian nation has been shocking observers with its weapons development. While
"experts" expressed skepticism
that China would be able to field a stealth fighter, it shocked the world in Jan. 2011 showing off a fully functional design.
Much of the design of the
"J-20" stealth fighter
is thought to have been stolen from the U.S., though it's unclear whether that was the result of offline subterfuge (
analysis of crashed U.S. fighters
China's strategy to update its military in the most cost effective manner possible appears to be two-fold. Some technologies it buys at budget rates from U.S. Cold War-era rivals like Russia -- such as its first aircraft carrier that deployed last year (a retrofitted Russian craft). Other technologies it simply steals from the U.S. and builds itself.
The hodge-podge approach isn't pretty, but it may prove modestly effective given the size of the nation's military.
China's cost-saving approach to defense appears to be partially to steal U.S. technology.
[Image Source: DMM News]
James A. Lewis, a cyber-policy expert at the
Center for Strategic and International Studies
(CSIS), remarks, "You’ve seen significant improvements in Chinese military capabilities through their willingness to spend, their acquisitions of advanced Russian weapons, and from their cyber-espionage campaign. Ten years ago, I used to call the PLA [People’s Liberation Army] the world’s largest open-air military museum. I can’t say that now."
A frustrated unnamed senior military official told
The Washington Post
that the Chinese strategy of stealing U.S. technology has allowed it to save billions. The source comments, "In many cases, they don’t know they’ve been hacked until the FBI comes knocking on their door. This is billions of dollars of combat advantage for China. They’ve just saved themselves 25 years of research and development. It’s nuts."
According to the report, the stolen information could be used not only to make weapons, but also to counter U.S. designs by pinpointing and compromising their digital or physical weaknesses. Winslow T. Wheeler, director of the
Straus Military Reform Project
Project on Government Oversight
(POGO), comments, "If they got into the combat systems, it enables them to understand it to be able to jam it or otherwise disable it. If they’ve got into the basic algorithms for the missile and how they behave, somebody better get out a clean piece of paper and start to design all over again."
III. Obama Administration's "Tough Talk" Approach Fails
The Washington Post
report, sources indicate that a year ago U.S. officials met with top Chinese officials in a closed door meeting to present evidence that they had "caught" China in cyberspying. The Chinese, unperturbed responded with their usual denials.
Unable to defend itself with cyber-might, the Obama administration has since largely turned its focus to defense via rhetoric. Following the
U.S. Department of Defense
's (DoD) May 2011 declaration that cyberattacks
could be construed as acts of war
U.S. National Security Agency
Gen. Keith Alexander
delivered testimony on Chinese hacking to the
Senate Armed Services Committee
. In his testimony, held March 2012, he claimed that the Chinese were destroying the U.S. economy with hacks.
President Obama bows to the President of China. [Image Source: Reuters]
U.S. President Barack Obama
was mostly silent
until this year, when a series of Chinese-sourced attacks struck
The New York Times
, and the
U.S. Federal Reserve
. Around that same time security officials with the research firm Mandiat
finally pinned the attacks on an elite group of PLA hackers
-- dubbed Unit 61398 -- which were based out of a government-guarded 12-story white high-rise in Shanghai. That report was confirmed by government officials earlier this month, which led to China responding that the U.S. was "the real 'hacking empire.'"
Amid the confirmations that the PLA was behind the victimization of the U.S., President Obama
responded to these developments
with his toughest rhetoric yet
led to counter-accusations from China
. The tough rhetoric from the Commander-in-chief seemed to work, though; Unit 61398 fell silent for nearly three months from February into May, but recently
returned to action
China's President Xi Jinping and President Obama are expected to meet next month in California; the issue of hacking is expected to be high on the agenda.
IV. Plans for Australian Spy Headquarters Stolen by Chinese
In related news, Chinese hackers have
plans to the
Australian Security Intelligence Organization
's new $630M AU ($608M USD) headquarters. The plans were stolen from a contractor and include locations/details of communications cabling, servers, and security systems.
First reported by the Australian Broadcasting Company, Des Ball, an Australian National University cybersecurity expert, suggests that the hack could allow Chinese spies to effectively bug the building.
The ASIO building [Image Source: AFP]
The spy agency's chief dodged the reports calling them "unsubstantiated", while refusing to definitively confirm or deny if data loss had occurred. He commented, "This building is a very secure, state-of-the-art facility. I'm not going to comment on operational matters involving the Australian Security Intelligence Organization or any security matters."
The lakeside glass-and-concrete structure has been plagued with budget overruns and delays. The structure is located in Canberra, a city in southeastern Australia.
The Washington Post
This article is over a month old, voting and posting comments is disabled
RE: Is it really stealing?
5/28/2013 4:15:10 PM
That is, unless they're going to cancel our debts in an equivalent amount to the value of what they stole.
RE: Is it really stealing?
5/29/2013 1:31:30 PM
Perhaps they will...plus it is only Defense weapons so what is the worry, they are an ally right??
"The whole principle [of censorship] is wrong. It's like demanding that grown men live on skim milk because the baby can't have steak." -- Robert Heinlein
Lockheed F-35 Program Costs Plummeted $4.5 Billion in 2012
May 24, 2013, 8:00 AM
China Back to Cyberlooting "Helpless" U.S. After Failure of Obama Shaming Strategy
May 20, 2013, 11:12 AM
Intelligence Adviser Warns China's Hacking is Hurting Relations, China Offers Talks
March 12, 2013, 2:27 PM
China Accuses U.S. of Hacking, "Victimizing" Its Military
February 28, 2013, 5:36 PM
White House Threatens Action Against China Over Corporate Espionage
February 21, 2013, 1:33 PM
Creationists are Mad About Google Doodle Depicting Evolution
November 24, 2015, 8:48 PM
DHS and TSA: Whoops, We Missed That 73 Airport Employees May be Terrorists
November 19, 2015, 2:16 PM
Star Wars Spinoff Film "Rogue One", Theme Park Attractions Announced
August 17, 2015, 12:20 PM
SpaceX Falcon 9's Seventh Supply Mission to ISS Ends w/ Fiery Stage 1 Explosion
June 28, 2015, 1:10 PM
Cool Science Video: Glowing Millipede Prowls the Nevada Desert
May 18, 2015, 12:00 PM
Newly Discovered Costa Rican Glass Frog is Kermit's Doppelgänger
April 22, 2015, 11:26 AM
Most Popular Articles
Smart Security Cameras: 5 Good Choices For Any Budget
July 25, 2016, 7:13 PM
2017 Porsche Panamera: I’ll Take Three of These.
July 24, 2016, 6:44 PM
Free Windows 10 offer ends July 29th, 2016: 10 Reasons to Upgrade Immediately
July 22, 2016, 9:19 PM
5 Excellent Cable Modems: Buy Your Own and Avoid Rental Fees
July 28, 2016, 8:44 PM
Top 5 Smart Watches
July 21, 2016, 11:48 PM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information