Chinese hackers spying on US weapons programs

May 29, 2013 9:16 am
A V-22 Osprey takes part in a flying display at the Farnborough International Airshow/AFP
A V-22 Osprey takes part in a flying display at the Farnborough International Airshow/AFP

, WASHINGTON, May 29 – Chinese hackers have gained access to secret designs for a slew of sophisticated US weapons programs, officials said, possibly jeopardizing the American military’s technological edge.

The breaches were part of a broad Chinese campaign of espionage against top US defense contractors and government agencies, officials said, confirming a Washington Post account of a Pentagon report.

The Defense Science Board, a senior advisory group with government and civilian experts, concluded that digital hackers had gained access to designs for two dozen major weapons systems critical to missile defenses, combat aircraft and naval ships, according to a Pentagon document cited by the Post.

The cyber spying gave China access to advanced technology and could weaken the US military’s advantage in the event of a conflict, the board said.

The Pentagon advisory report stopped short of accusing Beijing of stealing the designs, but the conclusions help explain recent American warnings to the Chinese government.

“It’s not clear how much of our stuff they got,” a defense official told AFP on condition of anonymity.

The revelations of cyber espionage coincided with a report that Chinese hackers had stolen top-secret blueprints of Australia’s new intelligence agency headquarters, including the layout for communications systems and server locations.

US officials are increasingly worried over digital spying from China and the White House said the issue would be high on the agenda when Chinese President Xi Jinping meets President Barack Obama next week.

“It is an issue that we raise at every level in our meetings with our Chinese counterparts,” spokesman Jay Carney told reporters.

“And I’m sure will be a topic of discussion when the president meets with President Xi in California in early June.”

The array of weapons designs that were targeted included the advanced Patriot missile system, a US Army program for shooting down ballistic missiles, and the Navy’s Aegis missile defense system.

Designs for combat aircraft and ships, including the stealthy new F-35 fighter, the F/A-18 warplane, the V-22 tilt-rotor Osprey, the Black Hawk helicopter and the Navy’s new Littoral Combat Ship, were also targeted.

The weapons programs affected are built by major defense contractors including Boeing, Lockheed Martin, Northrop Grumman and Raytheon.

Northrop Grumman spokesman Randy Belote said “the number of attempts to breach our networks are increasing at an alarming rate.”

The list of hacked US weapons programs was outlined in a previously undisclosed section of the earlier report by the Defense Science Board.

A public version of the report had warned that America was ill-prepared in the case of a full-scale cyber war.

In a separate report sent to Congress earlier this month, the Pentagon said China’s cyber spying was aimed at extracting information about the US government’s foreign policy and military plans.

The espionage could assist the Chinese military in “building a picture of US network defense networks, logistics, and related military capabilities that could be exploited during a crisis,” it said.

A cyber security expert and former US official, James Lewis, said it was unclear when the breaches took place, but noted that “people did wake up to this issue in the last couple of years and made it harder.”

Before that, “between 1999 and 2009 it was an open door for Chinese (cyber) espionage,” said Lewis, a fellow at the Center for Strategic and International Studies, a Washington think tank.

But Pentagon spokesman George Little played down the report and said the department had taken steps to help contractors counter digital spying

“We maintain full confidence in our weapons platforms,” Little said.

“Suggestions that cyber intrusions have somehow led to the erosion of our capabilities or technological edge are incorrect.”

Using the Internet to spy and steal sensitive data is standard practice by all countries, according to the security chief of controversial Chinese telecoms giant Huawei.

John Suffolk, a former chief information officer with the British government and now head of security operations at Huawei, said he was not surprised by claims of international hacking.

“Governments have always done that,” he told the Australian Financial Review, adding that the “harsh reality is every government around the world has a similar strap-line for their security agencies”.


Latest Articles

Most Viewed