Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Chinese hackers spying on US weapons programs
by Staff Writers
Washington (AFP) May 28, 2013


The cyber spying targeted designs for combat aircraft and ships, including the stealthy new F-35 fighter, the F/A-18 warplane, the V-22 tilt-rotor Osprey, the Black Hawk helicopter and the Navy's new Littoral Combat Ship.

Chinese hackers have gained access to secret designs for a slew of sophisticated US weapons programs, officials said Tuesday, possibly jeopardizing the American military's technological edge.

The breaches were part of a broad Chinese campaign of espionage against top US defense contractors and government agencies, officials said, confirming a Washington Post account of a Pentagon report.

The Defense Science Board, a senior advisory group with government and civilian experts, concluded that digital hackers had gained access to designs for two dozen major weapons systems critical to missile defenses, combat aircraft and naval ships, according to a Pentagon document cited by the Post.

The cyber spying gave China access to advanced technology and could weaken the US military's advantage in the event of a conflict, the board said.

The Pentagon advisory report stopped short of accusing Beijing of stealing the designs, but the conclusions help explain recent American warnings to the Chinese government.

"It's not clear how much of our stuff they got," a defense official told AFP on condition of anonymity.

The revelations of cyber espionage coincided with a report that Chinese hackers had stolen top-secret blueprints of Australia's new intelligence agency headquarters, including the layout for communications systems and server locations.

US officials are increasingly worried over digital spying from China and the White House said the issue would be high on the agenda when Chinese President Xi Jinping meets President Barack Obama next week.

"It is an issue that we raise at every level in our meetings with our Chinese counterparts," spokesman Jay Carney told reporters.

"And I'm sure will be a topic of discussion when the president meets with President Xi in California in early June."

The array of weapons designs that were targeted included the advanced Patriot missile system, a US Army program for shooting down ballistic missiles, and the Navy's Aegis missile defense system.

Designs for combat aircraft and ships, including the stealthy new F-35 fighter, the F/A-18 warplane, the V-22 tilt-rotor Osprey, the Black Hawk helicopter and the Navy's new Littoral Combat Ship, were also targeted.

The weapons programs affected are built by major defense contractors including Boeing, Lockheed Martin, Northrop Grumman and Raytheon.

Northrop Grumman spokesman Randy Belote said "the number of attempts to breach our networks are increasing at an alarming rate."

The list of hacked US weapons programs was outlined in a previously undisclosed section of the earlier report by the Defense Science Board.

A public version of the report had warned that America was ill-prepared in the case of a full-scale cyber war.

In a separate report sent to Congress earlier this month, the Pentagon said China's cyber spying was aimed at extracting information about the US government's foreign policy and military plans.

The espionage could assist the Chinese military in "building a picture of US network defense networks, logistics, and related military capabilities that could be exploited during a crisis," it said.

A cyber security expert and former US official, James Lewis, said it was unclear when the breaches took place, but noted that "people did wake up to this issue in the last couple of years and made it harder."

Before that, "between 1999 and 2009 it was an open door for Chinese (cyber) espionage," said Lewis, a fellow at the Center for Strategic and International Studies, a Washington think tank.

But Pentagon spokesman George Little played down the report and said the department had taken steps to help contractors counter digital spying

"We maintain full confidence in our weapons platforms," Little said.

"Suggestions that cyber intrusions have somehow led to the erosion of our capabilities or technological edge are incorrect."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
All governments hack secret data: Huawei
Sydney (AFP) May 29, 2013
Using the Internet to spy and steal sensitive data is standard practice by all countries, according to the security chief of controversial Chinese telecoms giant Huawei. The comments published Wednesday follow allegations that Chinese hackers gained access to secret designs for a slew of sophisticated US weapons programmes, and stole the blueprints for Australia's new intelligence agency hea ... read more


CYBER WARS
Moon dust samples missing for 40 years found in Calif. warehouse

Unusual minerals in moon craters may have been delivered from space

Moon being pushed away from Earth faster than ever

Bright Explosion on the Moon

CYBER WARS
Opportunity Departing 'Cape York'

Bacterium from Canadian High Arctic and life on Mars

Curiosity Drills Second Rock Target

Mars Rover Opportunity Examines Clay Clues in Rock

CYBER WARS
Northrop Grumman-Built Modular Space Vehicle Nears Completion of Manufacturing Phase

French government posts space counsellor in Bangalore

3D Printing: Food in Space

Chinese group bids for Club Med holidays: firms

CYBER WARS
Shopping for Shenzhou

Waiting for Shenzhou 10

China launches communications satellite

On Course for Shenzhou 10

CYBER WARS
International trio takes shortcut to space station

Science and Maintenance for Station Crew, New Crew Members Prep for Launch

ESA Euronews: Living in space

Next destination: space

CYBER WARS
First Light Angara Rocket Ready for Launch

Russia to launch 12 Proton-M rockets in 2013

Russian Spacecraft Manufacturer to Make Four Launches in 2014

Electric Propulsion

CYBER WARS
Big Weather on Hot Jupiters

Critical Kepler Reaction Wheel Fails: Mission End In Sight

Sifting Through the Atmosphere's of Far-Off Worlds

New Method of Finding Planets Scores its First Discovery

CYBER WARS
Helicopter-light-beams - a new tool for quantum optics

Just how secure is quantum cryptography

One Year Anniversary of KOMPSAT-3 Launch

Crystal-clear method for distinguishing between glass and fluids




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement