Chinese Hackers Score F-35, Black Hawk Chopper, and PATRIOT Missile Data
May 28, 2013 12:24 PM
F-35, Aegis, PATRIOT Missile, Littoral vessel, Blackhawk chopper, and THAAD are among the compromised programs
Defense Science Board
(DSB) in a new report suggests that Chinese military hackers have compromised one of America's most costly weapons projects --
the nearly $1.4T USD
F-35 Joint Strike fighter weapons system
I. Why Research When You Can Steal?
In its confidential report for the Pentagon and industry officials --
The Washington Post
-- the DSB claims that blueprints and data pertaining to two dozen weapons systems -- including U.S. missile defenses and combat aircraft and ships -- were accessed by Chinese hackers. The report, by the mixed civilian/government board, which advises government and corporate policy makers, does not suggest necessarily the Chinese have stolen complete designs.
The U.S. federal government recently expressed the desire to force "help" onto private sector utilities. However, the report basically indicated that at this point the federal government is incompetent when it comes to cybersecurity when it comes to foreign threats, unable to sufficiently block attacks on itself, let alone others.
Among the other weapons systems accessed by Chinese hackers include:
The PATRIOT missile system
Terminal High Altitude Area Defense (THAAD)
, the Army's ballistic missile interceptor program
, the Navy's ballistic-missile interceptor technology
F/A-18 fighter jet
The V-22 Osprey
The Black Hawk helicopter
The Navy Littoral Combat Ship
The nation's most expensive weapon in history -- the F-35 -- has been compromised by Chinese intrusions and may be effectively useless in combat as a result.
[Image Source: Lockheed Martin]
Compromised contractors include:
Lockheed Martin Corp. (
Raytheon Comp. (
Northrop Grumman Corp. (
Mark Stokes, executive director of the
Project 2049 Institute
-- an Asian-centric D.C. think-tank, comments, "[The intrusions are] staggering. These are all very critical weapons systems, critical to our national security. When I hear this in totality, it’s breathtaking."
II. Experts Astounded by China's Weapons Progress
China has expressed frustration that its military trails the U.S.'s technologically. But recently the Asian nation has been shocking observers with its weapons development. While
"experts" expressed skepticism
that China would be able to field a stealth fighter, it shocked the world in Jan. 2011 showing off a fully functional design.
Much of the design of the
"J-20" stealth fighter
is thought to have been stolen from the U.S., though it's unclear whether that was the result of offline subterfuge (
analysis of crashed U.S. fighters
China's strategy to update its military in the most cost effective manner possible appears to be two-fold. Some technologies it buys at budget rates from U.S. Cold War-era rivals like Russia -- such as its first aircraft carrier that deployed last year (a retrofitted Russian craft). Other technologies it simply steals from the U.S. and builds itself.
The hodge-podge approach isn't pretty, but it may prove modestly effective given the size of the nation's military.
China's cost-saving approach to defense appears to be partially to steal U.S. technology.
[Image Source: DMM News]
James A. Lewis, a cyber-policy expert at the
Center for Strategic and International Studies
(CSIS), remarks, "You’ve seen significant improvements in Chinese military capabilities through their willingness to spend, their acquisitions of advanced Russian weapons, and from their cyber-espionage campaign. Ten years ago, I used to call the PLA [People’s Liberation Army] the world’s largest open-air military museum. I can’t say that now."
A frustrated unnamed senior military official told
The Washington Post
that the Chinese strategy of stealing U.S. technology has allowed it to save billions. The source comments, "In many cases, they don’t know they’ve been hacked until the FBI comes knocking on their door. This is billions of dollars of combat advantage for China. They’ve just saved themselves 25 years of research and development. It’s nuts."
According to the report, the stolen information could be used not only to make weapons, but also to counter U.S. designs by pinpointing and compromising their digital or physical weaknesses. Winslow T. Wheeler, director of the
Straus Military Reform Project
Project on Government Oversight
(POGO), comments, "If they got into the combat systems, it enables them to understand it to be able to jam it or otherwise disable it. If they’ve got into the basic algorithms for the missile and how they behave, somebody better get out a clean piece of paper and start to design all over again."
III. Obama Administration's "Tough Talk" Approach Fails
The Washington Post
report, sources indicate that a year ago U.S. officials met with top Chinese officials in a closed door meeting to present evidence that they had "caught" China in cyberspying. The Chinese, unperturbed responded with their usual denials.
Unable to defend itself with cyber-might, the Obama administration has since largely turned its focus to defense via rhetoric. Following the
U.S. Department of Defense
's (DoD) May 2011 declaration that cyberattacks
could be construed as acts of war
U.S. National Security Agency
Gen. Keith Alexander
delivered testimony on Chinese hacking to the
Senate Armed Services Committee
. In his testimony, held March 2012, he claimed that the Chinese were destroying the U.S. economy with hacks.
President Obama bows to the President of China. [Image Source: Reuters]
U.S. President Barack Obama
was mostly silent
until this year, when a series of Chinese-sourced attacks struck
The New York Times
, and the
U.S. Federal Reserve
. Around that same time security officials with the research firm Mandiat
finally pinned the attacks on an elite group of PLA hackers
-- dubbed Unit 61398 -- which were based out of a government-guarded 12-story white high-rise in Shanghai. That report was confirmed by government officials earlier this month, which led to China responding that the U.S. was "the real 'hacking empire.'"
Amid the confirmations that the PLA was behind the victimization of the U.S., President Obama
responded to these developments
with his toughest rhetoric yet
led to counter-accusations from China
. The tough rhetoric from the Commander-in-chief seemed to work, though; Unit 61398 fell silent for nearly three months from February into May, but recently
returned to action
China's President Xi Jinping and President Obama are expected to meet next month in California; the issue of hacking is expected to be high on the agenda.
IV. Plans for Australian Spy Headquarters Stolen by Chinese
In related news, Chinese hackers have
plans to the
Australian Security Intelligence Organization
's new $630M AU ($608M USD) headquarters. The plans were stolen from a contractor and include locations/details of communications cabling, servers, and security systems.
First reported by the Australian Broadcasting Company, Des Ball, an Australian National University cybersecurity expert, suggests that the hack could allow Chinese spies to effectively bug the building.
The ASIO building [Image Source: AFP]
The spy agency's chief dodged the reports calling them "unsubstantiated", while refusing to definitively confirm or deny if data loss had occurred. He commented, "This building is a very secure, state-of-the-art facility. I'm not going to comment on operational matters involving the Australian Security Intelligence Organization or any security matters."
The lakeside glass-and-concrete structure has been plagued with budget overruns and delays. The structure is located in Canberra, a city in southeastern Australia.
The Washington Post
"My sex life is pretty good" -- Steve Jobs' random musings during the 2010 D8 conference
Lockheed F-35 Program Costs Plummeted $4.5 Billion in 2012
May 24, 2013, 8:00 AM
China Back to Cyberlooting "Helpless" U.S. After Failure of Obama Shaming Strategy
May 20, 2013, 11:12 AM
Intelligence Adviser Warns China's Hacking is Hurting Relations, China Offers Talks
March 12, 2013, 2:27 PM
China Accuses U.S. of Hacking, "Victimizing" Its Military
February 28, 2013, 5:36 PM
White House Threatens Action Against China Over Corporate Espionage
February 21, 2013, 1:33 PM
PIQ ROBOTTM reveals its new artificial intelligence software
November 29, 2016, 12:59 AM
One more time - Happy Thanksgiving to Everyone Around the World
November 24, 2016, 4:00 AM
Google’s Smart Contact Lens Project gets halted for 2016
November 20, 2016, 7:00 AM
Cell Research Study shows African Americans have greater immune response to infection
November 10, 2016, 1:00 AM
UTHealth Clinical Trial Shows Progress Using Stem Cells to Treat Traumatic Brain Injury
November 8, 2016, 1:00 AM
Uber Partners with Circulation to Pilot Program Connecting Transportation and Digital Health Care
November 6, 2016, 5:00 AM
Most Popular Articles
Gigabit Are you looking for an Ultra Compact board?
February 22, 2017, 6:30 AM
Dell XPS 13 Touch – Rose Gold Edition
February 23, 2017, 7:29 AM
ASUS ROG Maximus IX - Among the Best of the Best
February 21, 2017, 7:50 AM
Comparison: Tag Heuer Connected Modular VS Samsung Gear S3
February 20, 2017, 7:20 AM
Xiaomi Mi Note 2 – This Chinese Phablet is the Best
February 24, 2017, 7:25 AM
Latest Blog Posts
How much Ram do you need for gaming?
Feb 27, 2017, 6:00 AM
Interesting News of the Day
Feb 25, 2017, 7:37 AM
AMD and More
Feb 24, 2017, 5:55 AM
Feb 23, 2017, 6:30 AM
Feb 21, 2017, 6:12 AM
Here is how startups are helping new parents in raising children
Feb 20, 2017, 6:45 AM
Around the World
Feb 18, 2017, 5:48 AM
News of Future
Feb 17, 2017, 6:30 AM
Amazon parachutes May Float Packages to Customers
Feb 16, 2017, 8:00 AM
Now you Can Watch Facebook on Your TV
Feb 15, 2017, 7:42 AM
Feb 14, 2017, 5:36 AM
Razer Blade Stealth – Little Kaby Lake Powerhouse
Feb 13, 2017, 7:50 AM
Android 7.0 Nougat 7.0 Update Bring Less Battery Life for Samsung Galaxy S7 & S7 Edge
Feb 12, 2017, 7:45 AM
Apple iPhone 8 – OLED Display & Wireless Charging
Feb 11, 2017, 8:09 AM
Feb 10, 2017, 6:15 AM
Feb 9, 2017, 6:00 AM
Eye catching news
Feb 8, 2017, 6:16 AM
Some World News
Feb 7, 2017, 6:15 AM
Feb 6, 2017, 10:11 AM
Feb 5, 2017, 7:27 AM
Notes and News
Feb 4, 2017, 5:53 AM
Feb 3, 2017, 5:30 AM
More Blog Posts
Copyright 2017 DailyTech LLC. -
Terms, Conditions & Privacy Information