Subscribe free to our newsletters via your
. GPS News .




CYBER WARS
Chinese hackers spying on US weapons programs
by Staff Writers
Washington (AFP) May 28, 2013


The cyber spying targeted designs for combat aircraft and ships, including the stealthy new F-35 fighter, the F/A-18 warplane, the V-22 tilt-rotor Osprey, the Black Hawk helicopter and the Navy's new Littoral Combat Ship.

Chinese hackers have gained access to secret designs for a slew of sophisticated US weapons programs, officials said Tuesday, possibly jeopardizing the American military's technological edge.

The breaches were part of a broad Chinese campaign of espionage against top US defense contractors and government agencies, officials said, confirming a Washington Post account of a Pentagon report.

The Defense Science Board, a senior advisory group with government and civilian experts, concluded that digital hackers had gained access to designs for two dozen major weapons systems critical to missile defenses, combat aircraft and naval ships, according to a Pentagon document cited by the Post.

The cyber spying gave China access to advanced technology and could weaken the US military's advantage in the event of a conflict, the board said.

The Pentagon advisory report stopped short of accusing Beijing of stealing the designs, but the conclusions help explain recent American warnings to the Chinese government.

"It's not clear how much of our stuff they got," a defense official told AFP on condition of anonymity.

The revelations of cyber espionage coincided with a report that Chinese hackers had stolen top-secret blueprints of Australia's new intelligence agency headquarters, including the layout for communications systems and server locations.

US officials are increasingly worried over digital spying from China and the White House said the issue would be high on the agenda when Chinese President Xi Jinping meets President Barack Obama next week.

"It is an issue that we raise at every level in our meetings with our Chinese counterparts," spokesman Jay Carney told reporters.

"And I'm sure will be a topic of discussion when the president meets with President Xi in California in early June."

The array of weapons designs that were targeted included the advanced Patriot missile system, a US Army program for shooting down ballistic missiles, and the Navy's Aegis missile defense system.

Designs for combat aircraft and ships, including the stealthy new F-35 fighter, the F/A-18 warplane, the V-22 tilt-rotor Osprey, the Black Hawk helicopter and the Navy's new Littoral Combat Ship, were also targeted.

The weapons programs affected are built by major defense contractors including Boeing, Lockheed Martin, Northrop Grumman and Raytheon.

Northrop Grumman spokesman Randy Belote said "the number of attempts to breach our networks are increasing at an alarming rate."

The list of hacked US weapons programs was outlined in a previously undisclosed section of the earlier report by the Defense Science Board.

A public version of the report had warned that America was ill-prepared in the case of a full-scale cyber war.

In a separate report sent to Congress earlier this month, the Pentagon said China's cyber spying was aimed at extracting information about the US government's foreign policy and military plans.

The espionage could assist the Chinese military in "building a picture of US network defense networks, logistics, and related military capabilities that could be exploited during a crisis," it said.

A cyber security expert and former US official, James Lewis, said it was unclear when the breaches took place, but noted that "people did wake up to this issue in the last couple of years and made it harder."

Before that, "between 1999 and 2009 it was an open door for Chinese (cyber) espionage," said Lewis, a fellow at the Center for Strategic and International Studies, a Washington think tank.

But Pentagon spokesman George Little played down the report and said the department had taken steps to help contractors counter digital spying

"We maintain full confidence in our weapons platforms," Little said.

"Suggestions that cyber intrusions have somehow led to the erosion of our capabilities or technological edge are incorrect."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
All governments hack secret data: Huawei
Sydney (AFP) May 29, 2013
Using the Internet to spy and steal sensitive data is standard practice by all countries, according to the security chief of controversial Chinese telecoms giant Huawei. The comments published Wednesday follow allegations that Chinese hackers gained access to secret designs for a slew of sophisticated US weapons programmes, and stole the blueprints for Australia's new intelligence agency hea ... read more


CYBER WARS
Even farm animal diversity is declining as accelerating species loss threatens humanity

China's Shuanghui to buy US pork icon Smithfield

Colombia peace still distant despite a first deal

New research shows that potatoes provide one of the best nutritional values per penny

CYBER WARS
Milwaukee-York researchers forward quest for quantum computing

New Technique May Open Up an Era of Atomic-scale Semiconductor Devices

Bright Future For Photonic Quantum Computers

New magnetic graphene may revolutionize electronics

CYBER WARS
Slow progress on Unasur plans for a joint trainer aircraf

EADS sweetens KF-X offering

NASA's BARREL Mission Launches 20 Balloons

US F-15 crashes in Japan, pilot ejects safely

CYBER WARS
Monitoring system can detect dangerous fatigue in mine truck driver

Electric cars slow to gain traction in Germany

Space drives e-mobility

Better Place electric car firm to be dissolved

CYBER WARS
France backs plan for punitive EU levies on China

More paramilitaries for Chhattisgarh state

Sick workers pay price for Chinese growth

Chinese group in bid for Club Med holidays: firms

CYBER WARS
Study explores 100 year increase in forestry diseases

Drought makes Borneo's trees flower at the same time

Reforestation study shows trade-offs between water, carbon and timber

Amazon River exhales virtually all carbon taken up by rain forest

CYBER WARS
NASA Ships Sensors for Seafaring Satellite to France

NASA's Landsat Satellite Looks for a Cloud-Free View

Google team captures Galapagos Island beauty for maps

NASA Helps Pinpoint Glaciers' Role in Sea Level Rise

CYBER WARS
Shape-shifting nanoparticles flip from sphere to net in response to tumor signal

Gold nanocrystal vibration captured on billion-frames-per-second film

Understanding freezing behavior of water at the nanoscale

Kinks and curves at the nanoscale




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement