Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Chinese hackers spying on US weapons programs
by Staff Writers
Washington (AFP) May 28, 2013


The cyber spying targeted designs for combat aircraft and ships, including the stealthy new F-35 fighter, the F/A-18 warplane, the V-22 tilt-rotor Osprey, the Black Hawk helicopter and the Navy's new Littoral Combat Ship.

Chinese hackers have gained access to secret designs for a slew of sophisticated US weapons programs, officials said Tuesday, possibly jeopardizing the American military's technological edge.

The breaches were part of a broad Chinese campaign of espionage against top US defense contractors and government agencies, officials said, confirming a Washington Post account of a Pentagon report.

The Defense Science Board, a senior advisory group with government and civilian experts, concluded that digital hackers had gained access to designs for two dozen major weapons systems critical to missile defenses, combat aircraft and naval ships, according to a Pentagon document cited by the Post.

The cyber spying gave China access to advanced technology and could weaken the US military's advantage in the event of a conflict, the board said.

The Pentagon advisory report stopped short of accusing Beijing of stealing the designs, but the conclusions help explain recent American warnings to the Chinese government.

"It's not clear how much of our stuff they got," a defense official told AFP on condition of anonymity.

The revelations of cyber espionage coincided with a report that Chinese hackers had stolen top-secret blueprints of Australia's new intelligence agency headquarters, including the layout for communications systems and server locations.

US officials are increasingly worried over digital spying from China and the White House said the issue would be high on the agenda when Chinese President Xi Jinping meets President Barack Obama next week.

"It is an issue that we raise at every level in our meetings with our Chinese counterparts," spokesman Jay Carney told reporters.

"And I'm sure will be a topic of discussion when the president meets with President Xi in California in early June."

The array of weapons designs that were targeted included the advanced Patriot missile system, a US Army program for shooting down ballistic missiles, and the Navy's Aegis missile defense system.

Designs for combat aircraft and ships, including the stealthy new F-35 fighter, the F/A-18 warplane, the V-22 tilt-rotor Osprey, the Black Hawk helicopter and the Navy's new Littoral Combat Ship, were also targeted.

The weapons programs affected are built by major defense contractors including Boeing, Lockheed Martin, Northrop Grumman and Raytheon.

Northrop Grumman spokesman Randy Belote said "the number of attempts to breach our networks are increasing at an alarming rate."

The list of hacked US weapons programs was outlined in a previously undisclosed section of the earlier report by the Defense Science Board.

A public version of the report had warned that America was ill-prepared in the case of a full-scale cyber war.

In a separate report sent to Congress earlier this month, the Pentagon said China's cyber spying was aimed at extracting information about the US government's foreign policy and military plans.

The espionage could assist the Chinese military in "building a picture of US network defense networks, logistics, and related military capabilities that could be exploited during a crisis," it said.

A cyber security expert and former US official, James Lewis, said it was unclear when the breaches took place, but noted that "people did wake up to this issue in the last couple of years and made it harder."

Before that, "between 1999 and 2009 it was an open door for Chinese (cyber) espionage," said Lewis, a fellow at the Center for Strategic and International Studies, a Washington think tank.

But Pentagon spokesman George Little played down the report and said the department had taken steps to help contractors counter digital spying

"We maintain full confidence in our weapons platforms," Little said.

"Suggestions that cyber intrusions have somehow led to the erosion of our capabilities or technological edge are incorrect."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
All governments hack secret data: Huawei
Sydney (AFP) May 29, 2013
Using the Internet to spy and steal sensitive data is standard practice by all countries, according to the security chief of controversial Chinese telecoms giant Huawei. The comments published Wednesday follow allegations that Chinese hackers gained access to secret designs for a slew of sophisticated US weapons programmes, and stole the blueprints for Australia's new intelligence agency hea ... read more


CYBER WARS
Russia developing counter-measures for European anti-missile shield

Jordan seeks to deploy Patriot missiles: minister

Lockheed Martin Completes Milestone for Training Element of United States Ballistic Missile Defense System

US missile defense still plagued by technical doubts

CYBER WARS
Russia to send Syria missiles as spillover fears grow

Defense Acquisition Board approves Standard Missile-6 full-rate production

Lockheed Martin and the MDA Conduct Test of New Air-Launched Missile Target Prototype

ESSM intercept of high-diving threat proves expanded defensive capability

CYBER WARS
After vowing transparency, US silent on drone killing

US drone strike kills six in Pakistan: officials

US drone crashes in Somalia: official

German railways to use mini drones to stop graffiti

CYBER WARS
Mutualink Platform to be Deployed by US DoD during JUICE 2013

General Dynamics to Deliver U.S. Army's Newest Tactical Ground Station Intelligence System

Boeing-built WGS-5 Satellite Enhances Tactical Communications for Warfighters

US Navy And Lockheed Martin Deliver Secure Communications Satellite For Mobile Users

CYBER WARS
Funding early awareness of emerging technology

Facial recognition technology proves its mettle

Warrior Web Prototype Takes Its First Steps

Lockheed Martin Conducts First EMD Flight Test of New GMLRS Warhead

CYBER WARS
Helicopter, encryptian device deals for EADS companis

Merkel under fire again over Mideast arms sales

Manila confirms boost to military spending

New Zealand beefs up defense spending

CYBER WARS
White House stresses personal side of Obama-Xi summit

In Asia, Hagel to promise 'follow-through' on US pivot

Outside View: Europe's tolerance tested by Islam

Three Chinese ships in disputed waters: Japan

CYBER WARS
Shape-shifting nanoparticles flip from sphere to net in response to tumor signal

Gold nanocrystal vibration captured on billion-frames-per-second film

Understanding freezing behavior of water at the nanoscale

Kinks and curves at the nanoscale




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement