Chinese Hackers Reportedly Compromised U.S. Designs For More Than 2 Dozen Weapons

Hackers Reportedly Accessed U.S. Weapons Designs
|

WASHINGTON, May 28 (Reuters) - President Barack Obama will discuss cyber security with Chinese President Xi Jinping during a meeting in California next week, as Washington becomes increasingly worried about Chinese hacking of U.S. military networks.

"Cyber security is a key priority of this administration. It is a key concern that we have," White House spokesman Jay Carney told reporters on Air Force One as Obama flew to New Jersey.

"It is an issue that we raise at every level in our meetings with our Chinese counterparts, and I'm sure it will be a topic of discussion when the president meets with President Xi in California in early June," he said.

The Pentagon underscored its concerns in a report to Congress earlier this month, accusing China of using cyber espionage to modernize its military. It said the U.S. government has been the target of hacking that appeared to be "attributable directly to the Chinese government and military."

But Pentagon spokesman George Little and other defense officials downplayed as outdated and overstated a report in Tuesday's Washington Post, which cited a Defense Science Board (DSB) report as saying that Chinese hackers have gained access to designs of more than two dozen major U.S. weapons systems.

The newspaper said the compromised U.S. designs included those for combat aircraft and ships, as well as missile defenses vital for Europe, Asia and the Gulf. But Little said it was wrong to suggest that U.S. capabilities had been eroded.

"We maintain full confidence in our weapons platforms," Little said in a statement. "Suggestions that cyber intrusions have somehow led to the erosion of our capabilities or technological edge are incorrect."

Little said the department was taking steps to strengthen the military's cyber capabilities, improve security of government networks and get more insight into threats faced by U.S. defense companies.

A Defense Department spokesman said some findings of the Defense Science Board report were dated because much of its research was completed two years ago, but it had highlighted some security issues that needed attention.

"Despite significant gains to better posture the department against cyber threats, the DSB report outlines several areas of concern that we will address promptly to ensure the viability of our cyber capabilities and defenses," the spokesman said.

"The findings of the DSB report make it clear that much work remains as we establish the right balance of integrated cyber defenses, capabilities and forces."

Among the weapons listed as compromised were the advanced Patriot missile system, the Navy's Aegis ballistic missile defense systems, the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the F-35 Joint Strike Fighter.

The report did not specify the extent or time of the cyber-thefts or indicate if they involved computer networks of the U.S. government, contractors or subcontractors.

But the espionage would give China knowledge that could be exploited in a conflict, such as the ability to knock out communications and corrupting data, the Post said. It also could speed China's development of its defense technology.

China dismissed as groundless the Pentagon's report to Congress earlier this month.

China also dismissed as without foundation a February report by the U.S. computer security company Mandiant, which said a secretive Chinese military unit was probably behind a series of hacking attacks targeting the United States that had stolen data from 100 companies.

AUSTRALIAN "SECURITY BLUNDER"

In Australia, a news report by Australia's ABC Television said hackers linked to China stole the floor plans of a A$630 million headquarters for the Australia Security Intelligence Organization, the country's domestic spy agency.

The attack through the computers of a construction contractor exposed not only building layouts, but also the location of communication and computer networks, it said.

Chinese Foreign Ministry spokesman Hong Lei, asked about the report, said China disapproved of hacking.

"China pays high attention to the cyber security issue and is firmly opposed to all forms of hacker attacks," Hong said at a daily briefing. "Since it is very difficult to find out the origin of hacker attacks, it is very difficult to find out who carried out such attacks."

"I don't know what the evidence is for media to make such kinds of reports," Hong added.

Repeating China's position that every country is susceptible to cyber attacks, Hong said nations should make joint efforts toward a secure and open Internet.

The building is to be part of an electronic intelligence gathering network that includes the United States and Britain. Its construction has been plagued by delays and cost over-runs, with some builders blaming late design changes on cyber attacks.

The influential Greens party said the hacking was a "security blunder of epic proportions" and called for an inquiry, but the government did not confirm the breach.

Prime Minister Julia Gillard said the reports were "inaccurate", but declined to say how.

Despite being one of Beijing's major trade partners, Australia is seen by China as the southern fulcrum of a U.S. military pivot to the Asia-Pacific. In 2011, it agreed to host thousands of U.S. Marines in near-permanent rotation.

Support HuffPost

At HuffPost, we believe that everyone needs high-quality journalism, but we understand that not everyone can afford to pay for expensive news subscriptions. That is why we are committed to providing deeply reported, carefully fact-checked news that is freely accessible to everyone.

Whether you come to HuffPost for updates on the 2024 presidential race, hard-hitting investigations into critical issues facing our country today, or trending stories that make you laugh, we appreciate you. The truth is, news costs money to produce, and we are proud that we have never put our stories behind an expensive paywall.

Would you join us to help keep our stories free for all? Your will go a long way.

Support HuffPost

Before You Go

9 Gadgets To Help You Avoid Surveillance
Fingerprint Gel(01 of09)
Open Image Modal
The Japanese government counter-terrorism practice of fingerprinting foreigners who enter the country may have inspired Doctor Tsutomu Matsumoto to invent "fingerprinting gels", a way of faking fingerprints for scanners.Learn how to make your own here. (credit:AP)
White Noise Generator(02 of09)
Open Image Modal
Worried someone around you is secretly recording everything you do? No fear! There's a relatively low-tech way to defeat such snoops, via white-noise-producing audio jammers. These tiny devices use good ol' white noise to blur the sound picked up by hidden microphones and other surreptitious recording devices. (credit:<a href="http://www.flickr.com/" role="link" class=" js-entry-link cet-external-link" data-vars-item-name="Flickr:" data-vars-item-type="text" data-vars-unit-name="5bb365dae4b0fa920b97b2b5" data-vars-unit-type="buzz_body" data-vars-target-content-id="http://www.flickr.com/" data-vars-target-content-type="url" data-vars-type="web_external_link" data-vars-subunit-name="before_you_go_slideshow" data-vars-subunit-type="component" data-vars-position-in-subunit="29" data-vars-position-in-unit="29">Flickr:</a><a href="http://www.flickr.com/people/anonymous9000/" role="link" class=" js-entry-link cet-external-link" data-vars-item-name=" Anonymous9000" data-vars-item-type="text" data-vars-unit-name="5bb365dae4b0fa920b97b2b5" data-vars-unit-type="buzz_body" data-vars-target-content-id="http://www.flickr.com/people/anonymous9000/" data-vars-target-content-type="url" data-vars-type="web_external_link" data-vars-subunit-name="before_you_go_slideshow" data-vars-subunit-type="component" data-vars-position-in-subunit="30" data-vars-position-in-unit="30"> Anonymous9000</a>)
Phonekerchief(03 of09)
Open Image Modal
MIT's Technology Review calls it the newest, hottest Thanksgiving accessory -- but you can use phone-size "Faraday cages" like this (sold by uncommongoods) to block your cellphone's call signal, WiFi and GPS. Handy now that federal courts are ruling that cops can track suspects via cellphone sans warrant, and Apple can remotely disable your phone camera with a click. As security researcher Jacob Appelbaum said in an interview with N+1 back in April, "Cell phones are tracking devices that make phone calls." So shouldn't you be prepared for when you don't want to be tracked? (credit:uncommongoods)
LED-Lined Hat(04 of09)
Open Image Modal
Hidden cameras got you down? Blind them all with a simple baseball cap lined with infrared LEDs. Amie, a hacker on WonderHowTo, shows the world how to make one, while this German art exhibition lays out how these ingenious devices work. (credit:AP)
Bug Detector(05 of09)
Open Image Modal
These receivers reveal the telltale electronic crackle of hidden mics and cameras. Strangely enough, they were around long before "surveillance culture" became a common phrase. Today they're sold in all sorts of shops for surveillance paranoids. (credit:Gadget Playground)
Camera Map(06 of09)
Open Image Modal
Sometimes hiding your face isn't enough; sometimes you don't want to be seen at all. For those days, there's camera maps. The NYC Surveillance Camera Project is currently working to document the location of and working status of every security camera in New York City. This project has been replicated by others in Boston, Chicago and Bloomington, Indiana. Notbored.org has even published a guide to making your own surveillance camera maps (here). (credit:AP)
Dazzle Camouflage(07 of09)
Open Image Modal
Credit to artist Adam Harvey for this one. Inspired by the "dazzle camouflage" used on submarines and warships during World War I, he designed a series of face paint principles meant to fool the facial recognition schemas of security cameras. Check out The Perilous Glamour of Life Under Surveillance for some tips on designing your own camera-fooling face paint. (credit:Adam Harvey)
Throwaway Cellphone(08 of09)
Open Image Modal
Walmart may be the premier symbol of corporate America, but its disposable cellphone selection can help you start a thoroughly maverick lifestyle. $10 TracFones work on most major networks, including AT&T, T-Mobile, Sprint and Verizon, and come with minutes prepaid so you can dispose of the devices when you're done. (credit:AP)
RFID-Blocking Wallet(09 of09)
Open Image Modal
Radio-Frequency Identification (RFID) chips are now regularly implanted in passports, ID cards, credit cards and travel papers. These tiny chips make machine-reading your documents easier -- but could also let anyone with the right type of scanner scrape your information and track your whereabouts. Luckily, gadget geeks have come to the rescue again, this time with RFID-blocking wallets. Working on the same principle as the "phonekerchief", these wallets create a Faraday cage around your items, keeping their data secure until you take them out to be scanned where they're supposed to be scanned. Destroying the chip is simpler: just nuke it in the microwave for five seconds. Of course, whatever you're microwaving might burst into flames first... (credit:AP)