Military Review

Chinese hackers could steal the secrets of the American missile defense

19
Hackers from China could access and steal drawings and descriptions of modern American ships and aircraft, as well as missile defense systems. Although experts doubt China’s ability to conduct large-scale cyber attacks on the Pentagon’s network, they do not exclude the possibility that Beijing could use the technologies stolen from the US to develop preventive weapons. A report on the theft of a number of US defense systems was published in The Washington Post, which refers to a report prepared by the United States Department of Defense's Scientific Council (DSB). This report will be submitted to the government of the country, the leadership of the Pentagon and the heads of US defense companies.


In an open form, the Scientific Council of the US Department of Defense does not blame Beijing, but high-ranking industrial and military officials say cyber attacks have become part of the expansion of China's espionage campaign. In January, 2013, experts have already warned that the Pentagon is not ready to fully counter full-scale cyber threats.

According to the report, in the hands of Chinese hackers were information about THAAD anti-missile systems, Patriot PAC-3 anti-aircraft missile systems, as well as the Aegis shipboard multifunctional combat information and control system. In addition, data was stolen from the convertible plane V-22 Osprey, the deck fighters F / A-18 Super Hornet, the multi-purpose UH-60 Black Hawk helicopters, the promising F-35 fighters and new combat ships of the LCS project designed for coastal operations .

Chinese hackers could steal the secrets of the American missile defense

The report contains information about projects that have been stolen in recent years, but it does not specify whether the projects were completely stolen or only some parts of them. So, the first information about leaks on the project of the promising F-35 fighter aircraft appeared in January 2007. At the beginning of May 2013, it was reported that Chinese hackers had stolen valuable information from some US companies related to promising military developments in a series of cyber attacks. At the same time, the attacks continued earlier during 2007-2010. In particular, Qinetiq North America, specializing in the production of satellite intelligence systems and robots, was attacked. According to analysts, these attacks can be a Chinese group of hackers Comment Crew, based in Shanghai.

According to The Washington Post, the American specialists who got acquainted with the list of stolen information were shocked by the scale of the leaks and the possible damage to the country's defense capability. Experts note that by gaining access to advanced US technology, Beijing will be able to secure an important advantage for itself. The stolen information will allow China to save billions of dollars in military development and can accelerate the pace of development of the country's defense industry. Commenting on this information, James Lewis, a cyber policy expert at the Center for Strategic International Studies, said: “10 years ago I called the Chinese army the world's largest open-air museum. Today I can’t say it anymore. ”

Vadim Kozyulin, who is the director of the program of the Center for Political Studies of Russia on Conventional Arms, in an interview with the newspaper Vzglyad noted that the technologies named by the US military are "these are the most sensitive, most modern developments". “Not just ready-made military products, but those over which work is still underway,” Kazyulin explained. The military expert noted that the creation and development of such technologies costs a lot of money and requires a lot of resources and time. In this case, knowledge of these technologies may be needed not only to develop their own counterparts or copy.


According to Vadim Kozyulin, the creation of a set of preventive measures against such weapons may become a more economical tactic. “Having information about the secrets of missile defense systems, air defense systems, you can think about how to circumvent them,” the expert said. “For example, it would be very important for North Korea to find out what means the United States can use against its missiles.” According to the expert, the buyers of this kind of secrets in the first place can be China and Russia. Recently, Beijing’s efforts are focused on neutralizing technologies such as the Patriot and Aegis. Also, this information is no less relevant for Israel, India, Pakistan and Iran, which is actively developing its own missile defense system.

In this regard, Kozyulin draws attention to countermeasures being taken by the United States. “Recently information has appeared that Washington has approved the right of the injured party to retaliate. So far this is only a declaration of intentions, but this is already symptomatic, the expert noted. “In its strategy, Washington is increasingly inclined to strike back, which is another step towards cyber warfare.”

Vladimir Anokhin, Vice President of the Academy of Geopolitical Problems, doubted the accuracy of the information provided by the American press. In an interview with Vedomosti, he noted that he had doubts about the authenticity of the Pentagon’s hacking by hackers. “If our hackers cannot hack it, the Chinese are even far from success,” the expert said.

According to Vladimir Anokhin, news do not leak into the media by chance. “I believe that this is another reason to aggravate relations with Beijing, while China wants to put in the role of the culprit of these foreign political aggravations,” warns Anokhin. “And what follows will be difficult to answer.” At the same time, speaking of the stolen technologies, the political scientist noted that the PRC is not able to reproduce them. “Even if modern technologies were really stolen, they will have to go to the back box,” the expert is sure. The expert rejected the prospect of transferring stolen technologies to Russia. According to him, the Chinese are currently pursuing a rather aggressive, pragmatic and selfish foreign policy, so they will not share secrets with the Russian Federation.


Earlier, the United States has repeatedly called China and Russia the main cyber threats in the world. In April, 2013, the American agency Bloomberg, referring to the information of the company Akamai Technologies, prepared a rating of the states that are most dangerous because of the hacker attacks emanating from them. The PRC headed the list, the United States ranked second, the third was Turkey, and the fourth was Russia. At the same time, the PRC government did not cease to assert its complete non-participation in the ongoing cyber attacks. On the contrary, China all the time claims that it is itself a victim of hacker attacks.

In response to the growth of cyber threats in January 2013, the US Department of Defense approved a plan to increase the number of cyber security units immediately by 5. The staff is planned to increase from 900 to 4900 people. According to the military, thanks to the growth of staff, the Cyber ​​Command in the Strategic Command of the US Armed Forces will be able to more effectively deal with attacks on US computer networks, including the Defense Ministry’s information networks.

In addition, in March 2013, the US government introduced a new ban, according to which a number of government agencies cannot acquire information technology and computer systems created by companies associated with the Chinese government. These measures are aimed at combating computer espionage from Beijing. In particular, NASA, the Department of Justice and Commerce, and the National Science Foundation of the United States were under this ban.

Information sources:
-http: //www.vz.ru/world/2013/5/28/634598.print.html
-http: //newsland.com/news/detail/id/1185091
-http: //telegrafist.org/2013/05/28/59486
Author:
19 comments
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. svp67
    svp67 7 June 2013 08: 36 New
    +3
    Hackers from China could gain access and steal blueprints and descriptions of modern American ships and aircraft, as well as missile defense systems.
    I always liked this uncertainty ... now they will knock out a large pile of money under this news and calm down for a while ...
  2. Grigorich 1962
    Grigorich 1962 7 June 2013 08: 53 New
    +3
    svp67 is right. Such ducks without a long sight are not allowed .... American warriors want money. If the Chinese really entered the system of secret data on missile defense and other weapons, then the Americans would be silent like fish ... trying to somehow rectify the situation and defend the honor of the uniform, or there would already be such a chucker that the heads of generals and all kinds of military personnel would fly.
    1. individual
      individual 7 June 2013 10: 00 New
      0
      Well why.
      After all, with "Wikileaks" and Assange is still a bummer.
      1. Geisenberg
        Geisenberg 7 June 2013 12: 59 New
        0
        Quote: individ
        Well why.
        After all, with "Wikileaks" and Assange is still a bummer.


        And with what a bummer then? With Wikileaks or Asange? Let's really look - both 314zdets. Asange will decay at the embassy, ​​the Wikileaks will be buried, no options.

        According to the text of the article: The heading clearly reflects the essence - "could have been kidnapped" ... or could have not been. Everything is said clearly, this is a request for an increase in the budget and a legitimate reason for retaliatory attacks. Now amers can start breaking any country after another newspaper duck.
        1. brr7710
          brr7710 8 June 2013 07: 50 New
          0
          Quote: Geisenberg

          According to the text of the article: The heading clearly reflects the essence - "could have been kidnapped" ... or could have not been. Everything is said clearly, this is a request for an increase in the budget and a legitimate reason for retaliatory attacks. Now amers can start breaking any country after another newspaper duck.


          +++++++++++++ !!!!!!!!!!!!!!
  3. Kovrovsky
    Kovrovsky 7 June 2013 08: 59 New
    +1
    There is no smoke without fire ...
    1. svp67
      svp67 7 June 2013 09: 31 New
      +1
      Quote: Kovrovsky
      There is no smoke without fire ...

      But there are also smoke curtains, where a little fire, and smoke .... fellow
  4. Dima190579
    Dima190579 7 June 2013 09: 02 New
    +2
    The most annoying antivirus and hacker protection is the pulled plug from the outlet. But seriously not figs to keep the classified information on the Internet.
  5. The comment was deleted.
  6. cartridge
    cartridge 7 June 2013 09: 08 New
    +4
    Someway, the Chinese will soon sopp the last pants from the Americans! And Obama will be in a loincloth to jump on the lawn of the White House asking for bananas for lunch from Chinese tourists!
  7. individual
    individual 7 June 2013 09: 55 New
    0
    I wonder how they perceive Jews that they ceased to be mentioned since the Chinese.
    The Chinese, the Chinese, the Chinese are all around the Chinese. bully
  8. Roll
    Roll 7 June 2013 10: 07 New
    +1
    laughing As Americans are self-righteous and full of snobbery, China has stolen technology and cannot reproduce it, such as putting it in the long box, we heard something like that and in the USSR we will do the atomic bomb no sooner than 20 years later. But nevermind, atomic secrets were stolen and quickly caught up and hydrogen equalized. Then it is unclear why the hackers clung to, as if there were few Chinese spies in their firms. A Chinese cleaner looked at the password of some military sucker, threw it on a flash drive and continues to work, or the amer is now judged, downloaded hundreds of gigabytes of secret information to a flash drive and sent it to Wikelix, and then the hackers found scapegoats.
  9. KazaK Bo
    KazaK Bo 7 June 2013 10: 28 New
    0
    ... another worries - and with us they shared their "finds" on the streets and squares of Virtulstreet ... We do share when ... we sell them the latest technological developments in the latest military equipment. Or our specialists from the department do not understand why only 3-5 copies are bought? Everyone understands, but .. but you can see it should be!
  10. Gato
    Gato 7 June 2013 10: 59 New
    0
    Vladimir Anokhin, Vice President of the Academy of Geopolitical Problems, doubted the accuracy of the information provided by the American press. In an interview with Vedomosti, he noted that he had doubts about the authenticity of the Pentagon’s hacking by hackers. “If our hackers cannot hack it, the Chinese are even far from success,” the expert said.


    From personal experience - how the IT security system works in one of our quite ordinary logistics trading companies:
    1. For competitors and the curious, a "cardboard fool" is arranged - a fictitious network where all information garbage and outright disinformation are dumped under the guise of serious documents. A hacker with a lower than average skill level can gain access to such a network.
    2. The real work infa revolves in another network, which can be accessed by a hacker of average skill, but his services will cost much more than the profit gained from a cyber attack. This network also has "cow cakes" from a better prepared disinformation.
    3. A truly important infa lives in the third network, which generally does not physically have Internet access and is maximally protected by technical agents. I don’t know for sure, but probably there is also a hidden disinformation there.
    I repeat - this is quite an ordinary firm.
    I don’t think that everything is simpler at the Pentagon or at the development corporations. They have vast experience in technical espionage. So it is likely that the Chinese deliberately drained misinformation.
    In addition, drawings and even working samples can be ... but this is only the tip of the iceberg. And materials, technologies, etc., etc.?
    1. Roll
      Roll 7 June 2013 11: 43 New
      0
      And as a third network is protected from a cleaning lady or a former or working employee offended by your company. And then there is no Internet connection, this does not always mean that it is impossible to connect to the network. But if the information is encoded, then there are difficulties. And then professionals work with the information and they will be able to distinguish the cake from the truth, the more so a quality cake is also difficult and costly to create.
  11. pa_nik
    pa_nik 7 June 2013 12: 16 New
    +1
    Our hackers also need to direct energy in the right direction. Stop sucking beer, and fill the virus every day with clave. Give NATO secrets to the network of the Russian Defense Ministry !!! laughing
    1. Delink
      Delink 7 June 2013 12: 50 New
      0
      Give NATO secrets to the network of the Russian Defense Ministry !!!

      Your words, but Putin’s ears. Maybe the idea will burn out laughing
  12. Matt eversmann
    Matt eversmann 7 June 2013 15: 03 New
    0
    Recently, Chinese programmers have added a lot and are practically at the same level as ours and American programmers. I often visit university sites where they propose to solve programming problems, and the Chinese are among the best there. So do not underestimate them. Perhaps they are really drained of misinformation. But the fact that they penetrate American networks cannot be ignored.
  13. Vtel
    Vtel 7 June 2013 15: 32 New
    +1
    Computers in China produce the sea, each Chinese has a computer and a link to the Pentagon and all of their servers fall like baobabs under a Swedish chainsaw.
    1. Karlsonn
      Karlsonn 7 June 2013 16: 15 New
      +1
      Quote: Vtel
      Computers in China produce the sea, each Chinese has a computer and a link to the Pentagon


      TO THE PENTAGON !!! CHECKERS ON-ON-ONNN !!
      1. brr7710
        brr7710 8 June 2013 07: 56 New
        0
        Quote: Karlsonn
        Quote: Vtel
        Computers in China produce the sea, each Chinese has a computer and a link to the Pentagon


        TO THE PENTAGON !!! CHECKERS ON-ON-ONNN !!


        Is it uni that border mountain parts, or Chinese KAZAKI?
      2. Roll
        Roll 8 June 2013 11: 25 New
        0
        wassat I don’t know about the pentagon, and in our Transbaikal forests, the thing is that, besides the checkers, they also have an assault rifle, like a blocap, and grenades, and where the horse will pass the BMP will not pass, and the visibility in the IR range is minimal, in general a formidable force .
    2. Lustrator
      Lustrator 7 June 2013 20: 53 New
      0
      Quote: Vtel
      Computers in China produce the sea, each Chinese has a computer and a link to the Pentagon and all of their servers fall like baobabs under a Swedish chainsaw.

      And if you give each Chinese a pomegranate, then they will bombard everyone?
      Most of these computers are exported abroad. Although, yes, you are right, in the last half-year in China, the PC boom. Internet army? Maybe.
      China has chosen the right path in intelligence - you can save on R&D. If there is a network of computers, why build a new one - of spies? But this takes time, and money is also needed. There is still enough time, since the Chinese are actively engaged in hacking, which means that the Chinese do not plan to "take over the world" in the near future. The funny thing is that the owners of the US project cannot come to an agreement with the nobles of the Celestial Empire. They are constantly sent in the direction known to every 7-year-old boy from the CIS. But in Chinese it is polite :)

      P.S. Perhaps this is indeed a duck, launched to suck out dollars from a peacefully sleeping American taxpayer. Otherwise, why make yourself an idiot by telling people that protecting their information is shamefully ineffective? Unless in order to intimidate, having received permission to read personal correspondence, etc.
  14. ivanovbg
    ivanovbg 11 June 2013 16: 39 New
    0
    I do not understand the logic of these robbed companies.

    It is only necessary to create a local network without any Internet access. Several computers that are not included in the network can be connected to the Internet and all unclassified workflow with the outside world is conducted through them.

    The secret materials should be transferred to external hard drives by special courier communication and all problems have been resolved. Then, the enemy will have as an option only secret intelligence, which is an order of magnitude more complicated, more expensive and more dangerous for the Chinese.
  15. stavras26rus
    stavras26rus 17 June 2013 14: 47 New
    0
    Perhaps the Chinese could hack us too.
  16. scientist
    scientist 20 August 2013 22: 28 New
    0
    I was a little interested and asked the Americans themselves IT-Schnick. Initially, the network was created to manage strategic forces with all possible security measures and access control; the need for its distribution around the world arose to ensure the survivability of command and control from anywhere in the world. As far as I know, now it has 3 levels. 1st for this is the usual open, which is used by the whole world, the 2nd level is physically separated from the first and is intended for military or diplomatic service information. The 1st and 2nd levels can, with appropriate access, exchange information through a special screen - the gateway. But there is also the 3rd level of the American network in which only sensitive information circulates and is physically separated from the rest of the Internet, has appropriate protection from technical hacking, not to mention some kind of virtual attacks.
    Therefore, I am sure that all these hackers hacks in 90% of the desa aimed at once again knocking money out of the US budget and aggravating relations. In addition, it can help hide the true goals of cyber command, for example, monitoring the activities of foreign banks or energy supply systems.
  17. Gonoriy
    Gonoriy 30 June 2016 13: 09 New
    0
    The Ketais stubbornly want to become a superpower. Let's see.