Chinese Hackers Score F-35, Black Hawk Chopper, and PATRIOT Missile Data
May 28, 2013 12:24 PM
comment(s) - last by
F-35, Aegis, PATRIOT Missile, Littoral vessel, Blackhawk chopper, and THAAD are among the compromised programs
Defense Science Board
(DSB) in a new report suggests that Chinese military hackers have compromised one of America's most costly weapons projects --
the nearly $1.4T USD
F-35 Joint Strike fighter weapons system
I. Why Research When You Can Steal?
In its confidential report for the Pentagon and industry officials --
The Washington Post
-- the DSB claims that blueprints and data pertaining to two dozen weapons systems -- including U.S. missile defenses and combat aircraft and ships -- were accessed by Chinese hackers. The report, by the mixed civilian/government board, which advises government and corporate policy makers, does not suggest necessarily the Chinese have stolen complete designs.
The U.S. federal government recently expressed the desire to force "help" onto private sector utilities. However, the report basically indicated that at this point the federal government is incompetent when it comes to cybersecurity when it comes to foreign threats, unable to sufficiently block attacks on itself, let alone others.
Among the other weapons systems accessed by Chinese hackers include:
The PATRIOT missile system
Terminal High Altitude Area Defense (THAAD)
, the Army's ballistic missile interceptor program
, the Navy's ballistic-missile interceptor technology
F/A-18 fighter jet
The V-22 Osprey
The Black Hawk helicopter
The Navy Littoral Combat Ship
The nation's most expensive weapon in history -- the F-35 -- has been compromised by Chinese intrusions and may be effectively useless in combat as a result.
[Image Source: Lockheed Martin]
Compromised contractors include:
Lockheed Martin Corp. (
Raytheon Comp. (
Northrop Grumman Corp. (
Mark Stokes, executive director of the
Project 2049 Institute
-- an Asian-centric D.C. think-tank, comments, "[The intrusions are] staggering. These are all very critical weapons systems, critical to our national security. When I hear this in totality, it’s breathtaking."
II. Experts Astounded by China's Weapons Progress
China has expressed frustration that its military trails the U.S.'s technologically. But recently the Asian nation has been shocking observers with its weapons development. While
"experts" expressed skepticism
that China would be able to field a stealth fighter, it shocked the world in Jan. 2011 showing off a fully functional design.
Much of the design of the
"J-20" stealth fighter
is thought to have been stolen from the U.S., though it's unclear whether that was the result of offline subterfuge (
analysis of crashed U.S. fighters
China's strategy to update its military in the most cost effective manner possible appears to be two-fold. Some technologies it buys at budget rates from U.S. Cold War-era rivals like Russia -- such as its first aircraft carrier that deployed last year (a retrofitted Russian craft). Other technologies it simply steals from the U.S. and builds itself.
The hodge-podge approach isn't pretty, but it may prove modestly effective given the size of the nation's military.
China's cost-saving approach to defense appears to be partially to steal U.S. technology.
[Image Source: DMM News]
James A. Lewis, a cyber-policy expert at the
Center for Strategic and International Studies
(CSIS), remarks, "You’ve seen significant improvements in Chinese military capabilities through their willingness to spend, their acquisitions of advanced Russian weapons, and from their cyber-espionage campaign. Ten years ago, I used to call the PLA [People’s Liberation Army] the world’s largest open-air military museum. I can’t say that now."
A frustrated unnamed senior military official told
The Washington Post
that the Chinese strategy of stealing U.S. technology has allowed it to save billions. The source comments, "In many cases, they don’t know they’ve been hacked until the FBI comes knocking on their door. This is billions of dollars of combat advantage for China. They’ve just saved themselves 25 years of research and development. It’s nuts."
According to the report, the stolen information could be used not only to make weapons, but also to counter U.S. designs by pinpointing and compromising their digital or physical weaknesses. Winslow T. Wheeler, director of the
Straus Military Reform Project
Project on Government Oversight
(POGO), comments, "If they got into the combat systems, it enables them to understand it to be able to jam it or otherwise disable it. If they’ve got into the basic algorithms for the missile and how they behave, somebody better get out a clean piece of paper and start to design all over again."
III. Obama Administration's "Tough Talk" Approach Fails
The Washington Post
report, sources indicate that a year ago U.S. officials met with top Chinese officials in a closed door meeting to present evidence that they had "caught" China in cyberspying. The Chinese, unperturbed responded with their usual denials.
Unable to defend itself with cyber-might, the Obama administration has since largely turned its focus to defense via rhetoric. Following the
U.S. Department of Defense
's (DoD) May 2011 declaration that cyberattacks
could be construed as acts of war
U.S. National Security Agency
Gen. Keith Alexander
delivered testimony on Chinese hacking to the
Senate Armed Services Committee
. In his testimony, held March 2012, he claimed that the Chinese were destroying the U.S. economy with hacks.
President Obama bows to the President of China. [Image Source: Reuters]
U.S. President Barack Obama
was mostly silent
until this year, when a series of Chinese-sourced attacks struck
The New York Times
, and the
U.S. Federal Reserve
. Around that same time security officials with the research firm Mandiat
finally pinned the attacks on an elite group of PLA hackers
-- dubbed Unit 61398 -- which were based out of a government-guarded 12-story white high-rise in Shanghai. That report was confirmed by government officials earlier this month, which led to China responding that the U.S. was "the real 'hacking empire.'"
Amid the confirmations that the PLA was behind the victimization of the U.S., President Obama
responded to these developments
with his toughest rhetoric yet
led to counter-accusations from China
. The tough rhetoric from the Commander-in-chief seemed to work, though; Unit 61398 fell silent for nearly three months from February into May, but recently
returned to action
China's President Xi Jinping and President Obama are expected to meet next month in California; the issue of hacking is expected to be high on the agenda.
IV. Plans for Australian Spy Headquarters Stolen by Chinese
In related news, Chinese hackers have
plans to the
Australian Security Intelligence Organization
's new $630M AU ($608M USD) headquarters. The plans were stolen from a contractor and include locations/details of communications cabling, servers, and security systems.
First reported by the Australian Broadcasting Company, Des Ball, an Australian National University cybersecurity expert, suggests that the hack could allow Chinese spies to effectively bug the building.
The ASIO building [Image Source: AFP]
The spy agency's chief dodged the reports calling them "unsubstantiated", while refusing to definitively confirm or deny if data loss had occurred. He commented, "This building is a very secure, state-of-the-art facility. I'm not going to comment on operational matters involving the Australian Security Intelligence Organization or any security matters."
The lakeside glass-and-concrete structure has been plagued with budget overruns and delays. The structure is located in Canberra, a city in southeastern Australia.
The Washington Post
This article is over a month old, voting and posting comments is disabled
Just how dumb are USA IT depts??
5/30/2013 7:56:11 AM
Are we so stupid that we just can't take all military OFF LINE? It would seem to me if you're worried about stuff like this, no military file should be available to ANY internet based connections. At least for the contractors. Also they should tell all contractors if you are caught letting data escape you can no longer get a contract for govt. work and will be SEVERELY FINED for data loss.
How hard is it to pull the plug? If you're too stupid to protect our stuff GTF off the net! If you're IT people can't protect the data, then either train them or fire them. But get the data off the web. You can't hack what isn't connected. It's as simple as that.
How hard is it to FORCE encryption of the data to begin with? By the time they sorted that out it should be worthless data. I'm guessing all these plane plans etc were just sitting on some drive/servers unprotected and unencrypted. I base that on previous experience with IT managers (they should know better right?) who had NO encrypted files on their drives when I had to repair them.
“We do believe we have a moral responsibility to keep porn off the iPhone.” -- Steve Jobs
Lockheed F-35 Program Costs Plummeted $4.5 Billion in 2012
May 24, 2013, 8:00 AM
China Back to Cyberlooting "Helpless" U.S. After Failure of Obama Shaming Strategy
May 20, 2013, 11:12 AM
Intelligence Adviser Warns China's Hacking is Hurting Relations, China Offers Talks
March 12, 2013, 2:27 PM
China Accuses U.S. of Hacking, "Victimizing" Its Military
February 28, 2013, 5:36 PM
White House Threatens Action Against China Over Corporate Espionage
February 21, 2013, 1:33 PM
5 Easy Ways to Lower Blood Pressure By Monique C. Bethell, Ph.D.
August 25, 2016, 8:00 AM
5 Healthy and Creative ways to add Fiber to your Diet By Monique C. Bethell, Ph.D.
August 18, 2016, 7:43 AM
Wearable Technology for Peanut Allergy Sufferers: By Monique Bethell Ph.D.
August 17, 2016, 6:40 AM
Diuretics: Helpful or Harmful?
August 2, 2016, 10:29 PM
Creationists are Mad About Google Doodle Depicting Evolution
November 24, 2015, 8:48 PM
DHS and TSA: Whoops, We Missed That 73 Airport Employees May be Terrorists
November 19, 2015, 2:16 PM
Most Popular Articles
Say Goodbye to Data Plans - Sprint and T-Mobile offer Unlimited Data
August 22, 2016, 6:12 AM
2 NEW PlayStation 4 Models - Unveiling September 7th
August 23, 2016, 6:23 AM
Uber - Everyone's Autonomous Car Driver?
August 20, 2016, 6:01 AM
iPhones May Get Curved Screens Next Year
August 24, 2016, 6:45 AM
Lenovo vs. Asus vs. HP - Best Laptop Under $500.00
August 19, 2016, 4:00 AM
Latest Blog Posts
First Self-Driving Car debut on the streets of Singapore
Aug 28, 2016, 4:10 PM
Coming Soon - Drones and Airports
Aug 24, 2016, 12:40 PM
SolarCity’s Gigafactory: A Milesone in Emerging Technology by Lily Emamian - 15 August 2016
Aug 15, 2016, 6:30 AM
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information