Posted without comment.The WSJ wrote:
WASHINGTON -- Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks.
Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft.
The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries over the data networks that tie the world together. The revelations follow a recent Wall Street Journal report that computers used to control the U.S. electrical-distribution system, as well as other infrastructure, have also been infiltrated by spies abroad.
Attacks like these -- or U.S. awareness of them -- appear to have escalated in the past six months, said one former official briefed on the matter. "There's never been anything like it," this person said, adding that other military and civilian agencies as well as private companies are affected. "It's everything that keeps this country going."
Many details couldn't be learned, including the specific identity of the attackers, and the scope of the damage to the U.S. defense program, either in financial or security terms. In addition, while the spies were able to download sizable amounts of data related to the jet-fighter, they weren't able to access the most sensitive material, which is stored on computers not connected to the Internet.
Former U.S. officials say the attacks appear to have originated in China. However it can be extremely difficult to determine the true origin because it is easy to mask identities online.
A Pentagon report issued last month said that the Chinese military has made "steady progress" in developing online-warfare techniques. China hopes its computer skills can help it compensate for an underdeveloped military, the report said.
The Chinese Embassy said in a statement that China "opposes and forbids all forms of cyber crimes." It called the Pentagon's report "a product of the Cold War mentality" and said the allegations of cyber espionage are "intentionally fabricated to fan up China threat sensations."
The U.S. has no single government or military office responsible for cyber security. The Obama administration is likely to soon propose creating a senior White House computer-security post to coordinate policy and a new military command that would take the lead in protecting key computer networks from intrusions, according to senior officials.
The Bush administration planned to spend about $17 billion over several years on a new online-security initiative and the Obama administration has indicated it could expand on that. Spending on this scale would represent a potential windfall for government agencies and private contractors at a time of falling budgets. While specialists broadly agree that the threat is growing, there is debate about how much to spend in defending against attacks.
The Joint Strike Fighter, also known as the F-35 Lightning II, is the costliest and most technically challenging weapons program the Pentagon has ever attempted. The plane, led by Lockheed Martin Corp., relies on 7.5 million lines of computer code, which the Government Accountability Office said is more than triple the amount used in the current top Air Force fighter.
Six current and former officials familiar with the matter confirmed that the fighter program had been repeatedly broken into. The Air Force has launched an investigation.
Pentagon officials declined to comment directly on the Joint Strike Fighter compromises. Pentagon systems "are probed daily," said Air Force Lt. Col. Eric Butterbaugh, a Pentagon spokesman. "We aggressively monitor our networks for intrusions and have appropriate procedures to address these threats." U.S. counterintelligence chief Joel Brenner, speaking earlier this month to a business audience in Austin, Texas, warned that fighter-jet programs have been compromised.
Foreign allies are helping develop the aircraft, which opens up other avenues of attack for spies online. At least one breach appears to have occurred in Turkey and another country that is a U.S. ally, according to people familiar with the matter.
Joint Strike Fighter test aircraft are already flying, and money to build the jet is included in the Pentagon's budget for this year and next.
Computer systems involved with the program appear to have been infiltrated at least as far back as 2007, according to people familiar with the matter. Evidence of penetrations continued to be discovered at least into 2008. The intruders appear to have been interested in data about the design of the plane, its performance statistics and its electronic systems, former officials said.
The intruders compromised the system responsible for diagnosing a plane's maintenance problems during flight, according to officials familiar with the matter. However, the plane's most vital systems -- such as flight controls and sensors -- are physically isolated from the publicly accessible Internet, they said.
The intruders entered through vulnerabilities in the networks of two or three contractors helping to build the high-tech fighter jet, according to people who have been briefed on the matter. Lockheed Martin is the lead contractor on the program, and Northrop Grumman Corp. and BAE Systems PLC also play major roles in its development.
Lockheed Martin and BAE declined to comment. Northrop referred questions to Lockheed.
The spies inserted technology that encrypts the data as it's being stolen; as a result, investigators can't tell exactly what data has been taken. A former Pentagon official said the military carried out a thorough cleanup.
Fighting online attacks like these is particularly difficult because defense contractors may have uneven network security, but the Pentagon is reliant on them to perform sensitive work. In the past year, the Pentagon has stepped up efforts to work with contractors to improve computer security.
Investigators traced the penetrations back with a "high level of certainty" to known Chinese Internet protocol, or IP, addresses and digital fingerprints that had been used for attacks in the past, said a person briefed on the matter.
As for the intrusion into the Air Force's air-traffic control systems, three current and former officials familiar with the incident said it occurred in recent months. It alarmed U.S. national security officials, particularly at the National Security Agency, because the access the spies gained could have allowed them to interfere with the system, said one former official. The danger is that intruders might find weaknesses that could be exploited to confuse or damage U.S. military craft.
Military officials declined to comment on the incident.
In his speech in Austin, Mr. Brenner, the U.S. counterintelligence chief, issued a veiled warning about threats to air traffic in the context of Chinese infiltration of U.S. networks. He spoke of his concerns about the vulnerability of U.S. air traffic control systems to cyber infiltration, adding "our networks are being mapped." He went on to warn of a potential situation where "a fighter pilot can't trust his radar."
Joint Strike Fighter program hacked, probably by Chinese
Moderators: Alyrium Denryle, Edi, K. A. Pital
Joint Strike Fighter program hacked, probably by Chinese
'After 9/11, it was "You're with us or your with the terrorists." Now its "You're with Straha or you support racism."' ' - The Romulan Republic
'You're a bully putting on an air of civility while saying that everything western and/or capitalistic must be bad, and a lot of other posters (loomer, Stas Bush, Gandalf) are also going along with it for their own personal reasons (Stas in particular is looking through rose colored glasses)' - Darth Yan
'You're a bully putting on an air of civility while saying that everything western and/or capitalistic must be bad, and a lot of other posters (loomer, Stas Bush, Gandalf) are also going along with it for their own personal reasons (Stas in particular is looking through rose colored glasses)' - Darth Yan
- Chris OFarrell
- Durandal's Bitch
- Posts: 5724
- Joined: 2002-08-02 07:57pm
- Contact:
Re: Joint Strike Fighter program hacked, probably by Chinese
I can't believe that all the sensitive stuff in the Pentagon is connected to networks which ultimately are connected to the internet. And I find it very hard to believe that someone copied TERABYTES of data out of the Pentagon without anyone noticing or anything flagging this as unusual.
EDIT
So I see it says that they confirm the REAL sensitive data is on computers not connected to the internet. I'm guessing this means what they have copied is probably not THAT big a deal to have get out. A big security breach deal, but not damning to national security in a major way in of itself.
Still, you have to wonder what the US is doing in return to China, I don't have any doubts that there are US hackers going into Chinese defense computers just as much after all.
EDIT
So I see it says that they confirm the REAL sensitive data is on computers not connected to the internet. I'm guessing this means what they have copied is probably not THAT big a deal to have get out. A big security breach deal, but not damning to national security in a major way in of itself.
Still, you have to wonder what the US is doing in return to China, I don't have any doubts that there are US hackers going into Chinese defense computers just as much after all.
![Image](http://img479.imageshack.us/img479/3232/logorp8.png)
- Sea Skimmer
- Yankee Capitalist Air Pirate
- Posts: 37390
- Joined: 2002-07-03 11:49pm
- Location: Passchendaele City, HAB
Re: Joint Strike Fighter program hacked, probably by Chinese
The Turks involvement is mainly the fabrication of several access panels, which must have stealthy joints. That’s actually one of the biggest problems in making a stealth aircraft, so the Chinese might well have stolen some information of real value. But nothing they wouldn’t have learned soon after the first F-35 is exported anyway.
The main targets would most likely be the Chinese nuclear submarine program, and Chinese SAM development. Really though the most important thing is that the US just keeps good tabs on the rate of development of the high tech Chinese economy in general. Right now China could not copy the latest US weapons even with complete blueprints, because they have no mastered the required technical base in computers and chemicals. Once they catch up, or at least get fairly close, it’s a whole different world.Chris OFarrell wrote: Still, you have to wonder what the US is doing in return to China, I don't have any doubts that there are US hackers going into Chinese defense computers just as much after all.
"This cult of special forces is as sensible as to form a Royal Corps of Tree Climbers and say that no soldier who does not wear its green hat with a bunch of oak leaves stuck in it should be expected to climb a tree"
— Field Marshal William Slim 1956
— Field Marshal William Slim 1956
-
- Sith Marauder
- Posts: 3539
- Joined: 2006-10-24 11:35am
- Location: Around and about the Beltway
Re: Joint Strike Fighter program hacked, probably by Chinese
There's a lot of data on the Chinese military in the Internet if you look in the right place. One of the contractors mentioned on their website that they were making reactor circulation pumps for the Type 095 SSN (the page was shortly pulled). No accounting for incompetence, I guess.
Turns out that a five way cross over between It's Always Sunny in Philadelphia, the Ali G Show, Fargo, Idiocracy and Veep is a lot less funny when you're actually living in it.
- Spyder
- Sith Marauder
- Posts: 4465
- Joined: 2002-09-03 03:23am
- Location: Wellington, New Zealand
- Contact:
Re: Joint Strike Fighter program hacked, probably by Chinese
Oh that'll stem from some high ranking official demanding to have ebay open in one window while logged into whatever DMS (Document Management) they use for storing their documents.Chris OFarrell wrote:I can't believe that all the sensitive stuff in the Pentagon is connected to networks which ultimately are connected to the internet. And I find it very hard to believe that someone copied TERABYTES of data out of the Pentagon without anyone noticing or anything flagging this as unusual.
It is actually reasonably trivial to make a DMS totally inaccessable from outside networks even with a physical connection. NZ IRD's taxpayer information for example is only accessable via SSH sessions from internally connected PCs.
What's happened here is either someone fucked up the firewall rules or a user's breeched the pentagon's internal document handling policies. In these cases, usually the later.
![Very Happy :D](./images/smilies/icon_biggrin.gif)