Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

NSA Details Chinese Cyber Theft of F-35, Military Secrets
The Washington Free Beacon ^ | 22 Jan 2015 | Bill Gertz

Posted on 01/22/2015 6:20:36 PM PST by Spktyr

Subheadline: Chinese hackers pillaged U.S. defense, contractor networks for critical data

China obtained more than 50 terabytes of data from U.S. defense and government networks, notably the Joint Strike Fighter’s stealth radar and engine secrets, through cyber espionage, according to newly disclosed National Security Agency documents.

A NSA briefing slide labeled “Top Secret” and headlined “Chinese Exfiltrate Sensitive Military Data,” states that the Chinese have stolen a massive amount of data from U.S. government and private contractors.

The document was made public by the German magazine Der Spiegel in a two articles detailing how NSA in the mid-2000s was capable of conducting global cyber intelligence-gathering by tapping into the networks of foreign intelligence services and stealing the data they were collecting from others.

The unique capability of spying on the spies was described in a series of documents that were stolen in 2013 by former NSA contractor Edward Snowden, currently a fugitive in Russia.

For the F-35, according to NSA the Chinese were able to obtain digital design information on several different types of radar modules used by the fighter.

Northrop Grumman, the jet’s manufacturer, built the AN/APG-81 active, electronically scanned array radar for the F-35. The high-tech radar uses small, solid-state transmitter and receiver modules that allow the jet to avoid detection by enemy radar, a key stealth feature.

Another Northrop radar on the F-35 is the AN/AAS-37 electro-optical distributed aperture system the company says provides pilots with “unique protective sphere around the aircraft for missile warning, navigation support, and night operations,” according to Northrop’s website.

On F-35 engine schematics, the Chinese stole data on the methods used by the turbine to cool gases, along with leading and trailing edge engine treatments and engine heat reduction data—also key elements of its stealth design.

By learning the secrets, the Chinese were able to include the design and technology in Beijing’s new stealth jet, the J-20. The secret also could allow Chinese air defenses to target the F-35 in a future conflict.

The NSA estimated in the briefing slide that the Chinese had conducted more than 30,000 cyber attacks as part of the massive defense industrial espionage, and that more than 500 attacks were “significant intrusions in DoD systems.”

More than 1,600 network computers were penetrated and at least 600,000 user accounts were compromised, the undated slide stated, noting that the damage from the Chinese cyber spying was assessed to be more than $100 million, mainly in costs for rebuilding networks.

Other losses to Chinese cyber spies included the air refueling schedules of the U.S. Pacific Command, the military command that would be engaged in any future conflict with China.

The refueling schedules could reveal to the Chinese how Pacific Air Forces conduct operations in wartime and how they are supported in military operations over long distances of the Pacific.

China also stole data on the U.S. Transportation Command’s Single Mobility System. The network system is used by Transcom to plan missions for sending military troops and equipment by aircraft, ship, road, and rail in military operations.

Knowing details contained in the database could allow the Chinese to disrupt or sabotage Transcom’s critical support missions during a conflict or crisis.

The NSA also revealed that the Air Force’s networks were infiltrated by Chinese hackers, an attack that resulted in the loss of 33,000 records for general and field grade officers.

Navy losses to Chinese hackers included data on missile navigation and tracking system, nuclear submarine and anti-aircraft missile design and over 300,000 user identification and passwords.

The Chinese also obtained sensitive science and technology data controlled for export from U.S. networks, including International Traffic and Arms Restrictions (ITAR) secrets, and contractor research and development.

In all, the NSA concluded that the Chinese compromised key weapons systems including the F-35, the B-2 bomber, the F-22 fighter-bomber, the Space Based Laser, and other systems.

The amount of stolen data was “the equivalent of five Libraries of Congress (50 terabytes),” the NSA said. A terabyte is 1,000 gigabytes.

The slide appeared to be part of a briefing for the NSA’s “Sigint Development” division on how to prevent foreign spies from inserting malicious software into the weapons design process.

The slide indicated that the NSA planned to use Signals Intelligence-enabled countermeasures to counter enemy network intrusions.

A separate NSA document outlined a Chinese cyber spying operation code-named “Byzantine Hades” that included 12 coded subcategories. These included “Byzantine Candor,” a subgroup concentrated on the Defense Department, commercial oil deals, and current geopolitical and economic events.

Other elements of the operation included cyber spying on Congress, weapons contractors, the National Aeronautics and Space Administration, and the Energy Department, which is in charge of building nuclear weapons and developing advanced technology.

The “Byzantine Foothold” subgroup was used to target Transcom and the Pacific Command as well as defense contractors.

In “Byzantine Candor” cyber attacks, the Chinese used Facebook as a command and control point for planting malware. One NSA slide showed that victims who unwittingly accessed a Facebook page through an email would end up with their computers under the remote control of the Chinese.

The report said that in late October 2009 the NSA was able to penetrate a Chinese hacking “virtual machine” that was linked to the 3rd Department of the People’s Liberation Army General Staff Department, the Chinese NSA known as “3PLA.”

The Justice Department last May indicted five PLA hackers for their roles in a major cyber espionage operation against American companies and a labor union.

A third NSA document revealed that NSA and its Tailored Access Operations unit, which conduct cyber attacks, engages in “remote subversion.” Those include foreign network penetrations, “on-net” access operations, and software implantation.

The Der Spiegel documents were partially redacted, an indication the news organization coordinated publication of the documents with authorities.

The Washington Free Beacon disclosed in March that Chinese cyber espionage against the F-35 was so successful that U.S. intelligence agencies believe that the stolen secrets were used to build China’s new J-20 stealth jet.

The cyber spying was carried out by a Chinese military unit called the Technical Reconnaissance Bureau, located in the Chengdu province.

Photo comparisons of the F-35 and J-20 revealed remarkable similarities between the two aircraft.

Chinese Foreign Ministry spokesman Hong Lei dismissed the documents’ disclosures that China stole F-35 secrets.

“The so-called evidence that has been used to launch groundless accusations against China is completely unjustified,” Hong told reporters Jan. 19.


TOPICS: Crime/Corruption; Government; News/Current Events
KEYWORDS: china; chinacybertheft; chinahackers; cybertheft; f35; hacking; j20; nsa; nsareport
Navigation: use the links below to view more comments.
first 1-2021-4041-44 next last
Additional links at source.

So, that J-20 isn't looking quite so craptacular any more...

1 posted on 01/22/2015 6:20:36 PM PST by Spktyr
[ Post Reply | Private Reply | View Replies]

To: Admin Moderator

Not sure if this was Breaking worthy, could you decide for me? Thanks.


2 posted on 01/22/2015 6:21:07 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Spktyr

The prez is a putz, middle east is on fire, and the chinese steal our lunch money. Film at 11.


3 posted on 01/22/2015 6:23:59 PM PST by SpaceBar
[ Post Reply | Private Reply | To 1 | View Replies]

To: Spktyr

Why am I tempted to laugh?
Oh, right, because the F-35 is an overpriced “multi-role” POS that won’t be able to compete with single-role aircraft.


4 posted on 01/22/2015 6:24:51 PM PST by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Spktyr; blueyon; KitJ; T Minus Four; xzins; CMS; The Sailor; ab01; txradioguy; Jet Jaguar; ...

Active Duty ping.


5 posted on 01/22/2015 6:25:23 PM PST by Jet Jaguar
[ Post Reply | Private Reply | To 1 | View Replies]

To: SpaceBar

Plus we are about to set yet another trade deficit record, with China.

By a significant amount.

Up from last year, which was also a brand new record.


6 posted on 01/22/2015 6:25:36 PM PST by Cringing Negativism Network (http://www.census.gov/foreign-trade/balance/c5700.html)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Spktyr
So, that J-20 isn't looking quite so craptacular any more...

If possible, maybe we could let those pinko commie geeks steal plans that are deliberately designed to cause the airplane to blow up, like Reagan allowed the Russians to steal pipeline data, which resulted in a gigantic explosion. Wouldn't that be sweet?

7 posted on 01/22/2015 6:31:30 PM PST by Mark17 (Fear not little flock, from the cross to the throne, from death into light he went for His own)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mark17

That’d be nice but apparently we let them steal the real plans instead by our own internal documentation.


8 posted on 01/22/2015 6:33:03 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Spktyr

Well Hell!We should have gave the Chinese a complete copy of the F-23 considering the crappy information security we had protecting it.

I hope this report is just B.S. and the Chinese just got into a honey pot.


9 posted on 01/22/2015 6:34:42 PM PST by puppypusher ( The World is going to the dogs.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Spktyr

Stealing the F-35 won’t help them much unless they can get it working. Apparently, we can’t.


10 posted on 01/22/2015 6:36:08 PM PST by Little Ray (How did I end up in this hand-basket, and why is it getting so hot?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Spktyr

I haven’t been able to pick up Rush Limbaugh for maybe 10 years but I can remember when he was saying that Clinton was just openly selling our secrets to the Chinese. They were making campaign contributions or something like that.


11 posted on 01/22/2015 6:36:12 PM PST by yarddog (Romans 8:38-39, For I am persuaded.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Spktyr

Well, we can always dream. I figure, however, if you or I have thought about it, I am sure many others have too. Screw those pinko commie geeks.


12 posted on 01/22/2015 6:36:16 PM PST by Mark17 (Fear not little flock, from the cross to the throne, from death into light he went for His own)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Jeff Head

(((((PING))))))


13 posted on 01/22/2015 6:40:57 PM PST by Timber Rattler (Just say NO! to RINOS and the GOP-E)
[ Post Reply | Private Reply | To 1 | View Replies]

To: puppypusher

Doubtful, this came from the Snowden data dump; the source is an internal NSA presentation. Pretty good chance they got the real stuff, too. Especially considering how many compromised Chinese chips have been showing up in American military and networking hardware lately.


14 posted on 01/22/2015 6:41:49 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Mark17

Which ones? The ones running the country or the ones in China? :P


15 posted on 01/22/2015 6:42:17 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Spktyr

I’m hoping this plane is just a distraction while a true state of the art fighter like an up-to-date YF-23 is being built is secrecy to be our next fighter. But maybe it is a black UFO. I’ve read a lot of reports on the Lightning11 but none had been positive about anything. At least I recall some positives about the F-111 Aardvark. Just another part of the Muslims plan. Lending borrowed money is a power dive method to 3rd world status.


16 posted on 01/22/2015 6:42:58 PM PST by mcshot (OMG We're going down!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Little Ray

We tried to make another F-111 ‘universal fighter’ out of it, which is always doomed to failure. They can choose what role they want, strip out all the useless crap they don’t need for it, and fly it.

Oh wait, they already have.


17 posted on 01/22/2015 6:43:32 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: mcshot

The F-111 was a budgetary black hole and never worked as intended. The fact that it worked as a wild weasel was not by design but a happy coincidence and desperation to find something for them to do that they didn’t suck at.


18 posted on 01/22/2015 6:44:39 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Spktyr

Nah, we can only hope the Chinese build lots and lots of their own exact duplicate F-35’s rather than something which might work.


19 posted on 01/22/2015 6:45:26 PM PST by Thud
[ Post Reply | Private Reply | To 1 | View Replies]

To: Spktyr
Which ones? The ones running the country or the ones in China? :P

LOL, good question. How about both. I don't know which ones I abhor more, theirs or ours.

20 posted on 01/22/2015 6:47:20 PM PST by Mark17 (Fear not little flock, from the cross to the throne, from death into light he went for His own)
[ Post Reply | Private Reply | To 15 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-44 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson