What's new

Hackers steal F-35 Data

HAIDER

ELITE MEMBER
Joined
May 21, 2006
Messages
33,771
Reaction score
14
Country
Pakistan
Location
Pakistan
WASHINGTON -- Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks.

Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft.

The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries over the data networks that tie the world together. The revelations follow a recent Wall Street Journal report that computers used to control the U.S. electrical-distribution system, as well as other infrastructure, have also been infiltrated by spies abroad.
Attacks like these -- or U.S. awareness of them -- appear to have escalated in the past six months, said one former official briefed on the matter. "There's never been anything like it," this person said, adding that other military and civilian agencies as well as private companies are affected. "It's everything that keeps this country going."

Many details couldn't be learned, including the specific identity of the attackers, and the scope of the damage to the U.S. defense program, either in financial or security terms. In addition, while the spies were able to download sizable amounts of data related to the jet-fighter, they weren't able to access the most sensitive material, which is stored on computers not connected to the Internet.

Former U.S. officials say the attacks appear to have originated in China. However it can be extremely difficult to determine the true origin because it is easy to mask identities online.

A Pentagon report issued last month said that the Chinese military has made "steady progress" in developing online-warfare techniques. China hopes its computer skills can help it compensate for an underdeveloped military, the report said.

The Chinese Embassy said in a statement that China "opposes and forbids all forms of cyber crimes." It called the Pentagon's report "a product of the Cold War mentality" and said the allegations of cyber espionage are "intentionally fabricated to fan up China threat sensations."
he U.S. has no single government or military office responsible for cyber security. The Obama administration is likely to soon propose creating a senior White House computer-security post to coordinate policy and a new military command that would take the lead in protecting key computer networks from intrusions, according to senior officials.

The Bush administration planned to spend about $17 billion over several years on a new online-security initiative and the Obama administration has indicated it could expand on that. Spending on this scale would represent a potential windfall for government agencies and private contractors at a time of falling budgets. While specialists broadly agree that the threat is growing, there is debate about how much to spend in defending against attacks.

The Joint Strike Fighter, also known as the F-35 Lightning II, is the costliest and most technically challenging weapons program the Pentagon has ever attempted. The plane, led by Lockheed Martin Corp., relies on 7.5 million lines of computer code, which the Government Accountability Office said is more than triple the amount used in the current top Air Force fighter.

Six current and former officials familiar with the matter confirmed that the fighter program had been repeatedly broken into. The Air Force has launched an investigation.

Pentagon officials declined to comment directly on the Joint Strike Fighter compromises. Pentagon systems "are probed daily," said Air Force Lt. Col. Eric Butterbaugh, a Pentagon spokesman. "We aggressively monitor our networks for intrusions and have appropriate procedures to address these threats." U.S. counterintelligence chief Joel Brenner, speaking earlier this month to a business audience in Austin, Texas, warned that fighter-jet programs have been compromised.

Foreign allies are helping develop the aircraft, which opens up other avenues of attack for spies online. At least one breach appears to have occurred in Turkey and another country that is a U.S. ally, according to people familiar with the matter.

Joint Strike Fighter test aircraft are already flying, and money to build the jet is included in the Pentagon's budget for this year and next.
Computer systems involved with the program appear to have been infiltrated at least as far back as 2007, according to people familiar with the matter. Evidence of penetrations continued to be discovered at least into 2008. The intruders appear to have been interested in data about the design of the plane, its performance statistics and its electronic systems, former officials said.

The intruders compromised the system responsible for diagnosing a plane's maintenance problems during flight, according to officials familiar with the matter. However, the plane's most vital systems -- such as flight controls and sensors -- are physically isolated from the publicly accessible Internet, they said.

The intruders entered through vulnerabilities in the networks of two or three contractors helping to build the high-tech fighter jet, according to people who have been briefed on the matter. Lockheed Martin is the lead contractor on the program, and Northrop Grumman Corp. and BAE Systems PLC also play major roles in its development.

Lockheed Martin and BAE declined to comment. Northrop referred questions to Lockheed.

The spies inserted technology that encrypts the data as it's being stolen; as a result, investigators can't tell exactly what data has been taken. A former Pentagon official said the military carried out a thorough cleanup.

Fighting online attacks like these is particularly difficult because defense contractors may have uneven network security, but the Pentagon is reliant on them to perform sensitive work. In the past year, the Pentagon has stepped up efforts to work with contractors to improve computer security.

Investigators traced the penetrations back with a "high level of certainty" to known Chinese Internet protocol, or IP, addresses and digital fingerprints that had been used for attacks in the past, said a person briefed on the matter.

As for the intrusion into the Air Force's air-traffic control systems, three current and former officials familiar with the incident said it occurred in recent months. It alarmed U.S. national security officials, particularly at the National Security Agency, because the access the spies gained could have allowed them to interfere with the system, said one former official. The danger is that intruders might find weaknesses that could be exploited to confuse or damage U.S. military craft.

Military officials declined to comment on the incident.

In his speech in Austin, Mr. Brenner, the U.S. counterintelligence chief, issued a veiled warning about threats to air traffic in the context of Chinese infiltration of U.S. networks. He spoke of his concerns about the vulnerability of U.S. air traffic control systems to cyber infiltration, adding "our networks are being mapped." He went on to warn of a potential situation where "a fighter pilot can't trust his radar."
Computer Spies Breach Fighter-Jet Project - WSJ.com
 
.
US to create new military command for cyber warfare: Report

WASHINGTON: The United States will create a new military command to coordinate the defence of Pentagon computer networks and improve offensive
capabilities in cyberwarfare, the Wall Street Journal has reported.

The initiative will reshape the military's efforts to protect its networks from attacks by hackers, especially those from countries such as China and Russia, the influential daily said citing unnamed "current and former officials familiar with the plans."

The new command will be unveiled within the next few weeks, it said citing Pentagon officials. The move comes amid growing evidence that sophisticated cyberspies are attacking the US electric grid and key defence programmes.

The Journal on Tuesday reported that hackers breached the Pentagon's biggest weapons programme, the $300 billion Joint Strike Fighter, and stole data.

A White House team reviewing cybersecurity policy has sent a raft of recommendations to the president for approval, including the creation of a top White House cyberpolicy official, the Journal said.

President Barack Obama expected to announce the contours of his new approach later this month, it said citing "former officials familiar with the plans."

A draft of the White House review steps gingerly around the question of how to improve computer security in the private sector, especially key infrastructure such as telecommunications and the electricity grid.

The document stresses the importance of working with the private sector and civil-liberties groups to craft a solution, but doesn't call for a specific government role.

Defence Secretary Robert Gates plans to announce the creation of a new military "cyber command" after the rollout of the White House review, according to multiple military officials familiar with the plan, the Journal said.

The cyber command is likely to be led by a military official of four-star rank, it said citing unnamed "officials familiar with the proposal."

It would, at least initially, be part of the Pentagon's Strategic Command, which is currently responsible for computer-network security and other missions.
 
.
Chinese hackers steal JSF secrets

CHINESE computer spies are suspected of having cracked the Pentagon's $500 billion Joint Strike Fighter program, accessing top-secret files containing details of the aircraft's stealth design and electronics.

Details of the brazen break-in were reported yesterday in The Wall Street Journal newspaper, citing current and former US government officials.

The Royal Australian Air Force has placed a tentative order for 100 of the F-35 JSFs for about $16 billion, easily making it Australia's biggest defence purchase.

Last night, Defence confirmed it was aware of the report and was seeking more information. "Defence has seen the US reports and will discuss the issues raised with the JSF Program office in due course," it said in a written response to questions from The Australian.

A Canberra-based spokesman for the JSF's maker, Lockheed Martin, said a statement was expected today from head office in the US.

The JSF program is the US Defence Department's costliest, and according to the WSJ, the spies were able to siphon off "terabytes of data related to design and electronics systems", potentially making it easier to defend against the stealth-protected aircraft.

"Former US officials say the attacks appear to have originated in China. However, it can be extremely difficult to determine the true origin because it is easy to mask identities online," the WSJ said.

Unnamed US officials are quoted as saying cyber attacks on military projects appear to have escalated in the past six months.

According to the WSJ, a Pentagon report issued last month warned that the Chinese military had made "steady progress" in developing online-warfare techniques.

China hopes its computer skills can help it compensate

for an underdeveloped military, it said.

The F-35 JSF has proved a contentious buy, with critics saying the Rudd Government should have been more forceful in trying to pursuade the US to sell the RAAF the more expensive F-22 Raptor.

Unlike the JSF, the Raptor is operational but prohibited from export.

The JSF is intended to replace the ageing fleet of F-111 strike aircraft and the frontline F/A-18 jet fighters.

While Australia can expect to retain a technology edge over its immediate neighbours in Southeast Asia, China will acquire 500-600 advanced fighter bombers over the next 30 years and is expected to surpass the US as the leading air power in East Asia.

Chinese hackers steal JSF secrets | The Australian

Steal, Duplicate and then mass produce.
 
.
China Denies Hacked Into Pentagon Computers

Cyber spies have broken into the Pentagon and stolen details of the new Joint Strike Fighter, the most expensive fighter jet in history, according to reports.

The $300 billion (£206bn) jet is being developed by Lockheed Martin and will be bought by eight other countries, including the UK.However, the Wall Street Journal reported that hackers had broken into the project and siphoned off "several terabytes of data related to design and electronics systems".


The leak could make it easier to defend against the plane, also known as the F35 Lightning II. However, the spies could not access the most sensitive material, which is kept on computers that are not connected to the internet.

Former US officials said the attacks appear to have originated in China, but there is scant concrete evidence because it is easy to mask identities online.

Chinese officials reacted angrily to the accusation, and a spokesman for the foreign ministry said: "China has not changed its stance on hacking. China has always been against hacking and we have cracked down very hard on hacking. This is not a Chinese phenomenon. It happens everywhere in the world."

Attacks on the Pentagon are common, but are said to have escalated dramatically in the past six months, and coincide with growing speculation about China's role in cyber espionage.

A report issued by the Pentagon last month said the Chinese military has made "steady progress" in its online warfare capabilities, a key field in which China can compete with the US.

The Chinese Embassy in Washington called the report "a product of the Cold War mentality" and said accusations of cyber crime were being spread to inflame opinion against China.

At the end of last month, researchers at several universities discovered the existence of GhostNet, a vast internet espionage network that was siphoning information from sensitive computers in 103 countries. One third of its targets were based in embassies, news media and NGOs. The researchers said the majority of GhostNet's attacks originated from within China but stopped short of accusing Beijing of responsibility.

The security of the Joint Strike Fighter may have been breached before, according to a Pentagon report in 2008. The report said that "the advanced aviation and weapons technology for the JSF programme may have been compromised" because the Defence Department had not kept a close enough eye on the 1,200 contractors involved in the mammoth process. At the time, BAE Systems, the UK arms company, was named as one contractor that might have allowed details to leak. BAE denied that any information on the jet had been compromised.

The UK intends to use the Joint Strike Fighter as a replacement for the Harrier jump jet. More than 2,400 jets will be built in total.

Source: China denies claims it hacked into Pentagon computers - Telegraph
 
. . .

That's right, the internet. You know like when computers are connected in a network and accessible even when they are supposedly secured? The most sensitive tech related to JSF was on stand alone computers which weren't accessible or rather hack proof through the internet.
 
Last edited:
. .
Since when was the pentagon a difficult target? There something breeched or leaked every few months it seems.This sucks.I hope US does not pass some crazy laws to restrict Internet which is meant to be free!
 
.
Pentagon denies secret jet fighter plans stolen
By Jim Wolf, ReutersApril 21, 2009



Secrets about the F-35 Joint Strike Fighter aircraft being built for the United States have reportedly been stolen. Above is a photo of a different fighter jet.Photograph by: File photo, Canwest News ServiceWASHINGTON - The Pentagon and Lockheed Martin Corp., its top supplier, discounted a Wall Street Journal report that cyber spies had stolen secrets of the F-35 Joint Strike Fighter aircraft being built for the United States and nearly a dozen allies.


"I'm not aware of any specific concerns," Bryan Whitman, a U.S. Defense Department spokesman, said of the reported compromise of the Pentagon's costliest arms acquisition plan.


He spoke after the Journal said Tuesday that "terabytes" of data about the plane's design and electronics had been taken, according to current and former officials said to be familiar with the matter.


Former U.S. officials were cited as saying the alleged cyber espionage appeared to have come from China. A Chinese embassy spokesman did not immediately respond to a request for comment from Reuters.


Such computer intrusions, if confirmed, could make it easier to defend against the multirole F-35, a roughly $300 billion program in the early stages of production. The United States alone plans to buy 2,443 of three F-35 designs for its Air Force, Navy and Marine Corps.


The radar-evading aircraft is being developed with financing from the United States, Britain, Italy, the Netherlands, Turkey, Canada, Australia, Denmark and Norway. Other projected early buyers include Israel and Singapore.


Lockheed Martin, the primary contractor, said, "We actually believe the Wall Street Journal was incorrect in its representation of successful cyber attacks on the F-35 program."


"I've not heard of that, and to our knowledge there's never been any classified information breach," Bruce Tanner, the company's chief financial officer, said during a teleconference on the company's latest earnings.


Tanner acknowledged attacks on Lockheed Martin's systems, much like those on U.S. government networks, "are continuous."


"We do have stringent measures in place to both detect and stop these attacks," he said.


Later, the Defense Department said it did not comment on "alleged or actual cyber infiltrations, potential impacts to DoD operations, or any possible investigations."


This was to deny information on a potential success or failure that might help an attacker, said Lieut. Col. Eric Butterbaugh of the Air Force, a department spokesman.


Lockheed's chief subcontractors on the F-35 are Northrop Grumman Corp. and BAE Systems Plc. Representatives of Northrop and BAE referred questions to Lockheed.


Last October, the Pentagon's chief internal watchdog office withdrew a finding that U.S. technology in the F-35 might have been compromised by unauthorized access at units of BAE Systems.


In a rare climbdown, the inspector general's office said in an October 23-dated statement that it had lacked "sufficient appropriate evidence" to support the conclusion of a March 6 report in which it had raised alarm about the security oversight of BAE facilities and computers.


The withdrawn report had noted that BAE was also playing a key role in the Eurofighter Typhoon, a competitor to the F-35 for billions of dollars in overseas sales.


EADS, with a 46 per cent stake, is the largest shareholder in the Typhoon-building consortium, Eurofighter GmbH, based in Halbergmoos, Germany. BAE has 33 per cent and Italy's Finmeccanica SpA holds 21 per cent through its Alenia Aeronautica unit.


The Defense Science Board, a Pentagon advisory panel, said in a just-released report that the U.S. Defense Department was "not yet organized, trained, equipped or in many cases adequately focused on threats to cyberspace-enabled operations."


A task force formed by the board concluded in the March-dated report that "threats from cyber-intelligent adversaries represent a clear and present danger to U.S. national security" in the absence of tightened cyber security plans.

Pentagon denies secret jet fighter plans stolen
 
.
WASHINGTON (Reuters) - The Pentagon and Lockheed Martin Corp, its top supplier, discounted a Wall Street Journal report that cyber spies had stolen secrets of the F-35 Joint Strike Fighter aircraft being built for the United States and nearly a dozen allies.

"I'm not aware of any specific concerns," Bryan Whitman, a Defense Department spokesman, said of the reported compromise of the Pentagon's costliest arms acquisition plan.

He spoke after the Journal said on Tuesday that "terabytes" of data about the plane's design and electronics had been taken, according to current and former officials said to be familiar with the matter.

Former U.S. officials were cited as saying the alleged cyber espionage appeared to have come from China. A Chinese embassy spokesman did not immediately respond to a request for comment from Reuters.

Such computer intrusions, if confirmed, could make it easier to defend against the multirole F-35, a roughly $300 billion program in the early stages of production. The United States alone plans to buy 2,443 of three F-35 designs for its Air Force, Navy and Marine Corps.

The radar-evading aircraft is being developed with financing from the United States, Britain, Italy, the Netherlands, Turkey, Canada, Australia, Denmark and Norway. Other projected early buyers include Israel and Singapore.

Lockheed Martin, the primary contractor, said, "We actually believe the Wall Street Journal was incorrect in its representation of successful cyber attacks on the F-35 program."

"I've not heard of that, and to our knowledge there's never been any classified information breach," Bruce Tanner, the company's chief financial officer, said during a teleconference on the company's latest earnings.

The Wall Street Journal is standing by its story, according to Robert Christie, a spokesman for the newspaper's publisher, Dow Jones & Co, which is owned by News Corp.

Tanner acknowledged attacks on Lockheed Martin's systems, much like those on U.S. government networks, "are continuous."

"We do have stringent measures in place to both detect and stop these attacks," he said.

Later, the Defense Department said it did not comment on "alleged or actual cyber infiltrations, potential impacts to DoD operations, or any possible investigations."

This was to deny information on a potential success or failure that might help an attacker, said Lieutenant Colonel Eric Butterbaugh of the Air Force, a department spokesman.

Lockheed's chief subcontractors on the F-35 are Northrop Grumman Corp and BAE Systems Plc. Representatives of Northrop and BAE referred questions to Lockheed.

Last October, the Pentagon's chief internal watchdog office withdrew a finding that U.S. technology in the F-35 might have been compromised by unauthorized access at units of BAE Systems
In a rare climbdown, the inspector general's office said in an October 23-dated statement that it had lacked "sufficient appropriate evidence" to support the conclusion of a March 6 report in which it had raised alarm about the security oversight of BAE facilities and computers.

The withdrawn report had noted that BAE was also playing a key role in the Eurofighter Typhoon, a competitor to the F-35 for billions of dollars in overseas sales.

EADS, with a 46 percent stake, is the largest shareholder in the Typhoon-building consortium, Eurofighter GmbH, based in Halbergmoos, Germany. BAE has 33 percent and Italy's Finmeccanica SpA holds 21 percent through its Alenia Aeronautica unit.

The Defense Science Board, a Pentagon advisory panel, said in a just-released report that the U.S. Defense Department was "not yet organized, trained, equipped or in many cases adequately focused on threats to cyberspace-enabled operations."

A task force formed by the board concluded in the March-dated report that "threats from cyber-intelligent adversaries represent a clear and present danger to U.S. national security" in the absence of tightened cyber security plans.

Lockheed says F-35 classified data not breached | Technology | Reuters
 
.
now chinese will come out with their stealth this is the fastest, cheapest and easiest way to build a fighter:angel:
 
.
EPIC FAIL......

can not trace the attack origination however blame China first......

btw, the title is misleading......something wrong with the OP?
 
.
There's no proof that China was involved in this.
 
Last edited:
.
Theres no proof of anything yet. Even if this is even real. So I wouldn't worry about it.
 
.

Pakistan Defence Latest Posts

Back
Top Bottom