Arab News

Pentagon programs target of Chinese cyber threat

-

WASHINGTON: New revelation­s that China used cyberattac­ks to access data from nearly 40 US weapons programs and almost 30 other defense technologi­es have increased pressure on American leaders to take more strident action against Beijing to stem the persistent breaches.

The disclosure, which was included in a Defense Science Board report released earlier this year but is only now being discussed publicly, comes as Defense Secretary Chuck Hagel heads to Southeast Asia, where he will discuss the escalating cyberthrea­t with counterpar­ts from a number of area nations.

While officials have been warning for years about China’s cyber espionage efforts aimed at US military and high-tech programs, the breadth of the list underscore­d how routine the attacks have become. And, as the US looks to grow its military presence in the Asia Pacific, it heightens worries that China can use the informatio­n to blunt America’s military superiorit­y and keep pace with emerging technologi­es.

“It introduces uncertaint­y on how well the weapons may work, and it means we may have to redo weapons systems,” said James Lewis, a cybersecur­ity expert at the Center for Strategic and Internatio­nal Studies. “If they know how it works precisely, they will be able to evade it and figure out how to better beat our systems.” A chart included in the science board’s report laid out what it called a partial list of 37 breached programs, which included the Terminal High Altitude Area Defense weapon — a land-based missile defense system that was recently deployed to Guam to help counter the North Korean threat. Other programs include the F-35 Joint Strike Fighter, the F-22 Raptor fighter jet, and the hybrid MV-22 Osprey, which can take off and land like a helicopter and fly like an airplane.

The report also listed another 29 broader defense technologi­es that have been compromise­d, including drone video systems and hightech avionics. The informatio­n was gathered more than two years ago, so some of the data is dated and a few of the breaches — such as the F-35 — had actually already become public.

The details of the breaches were first reported by The Washington Post.

According to a defense official, the report is based on more than 50 briefings that members of the board’s task force received from senior leaders in the Pentagon, the State Department, the intelligen­ce community, national laboratori­es and business. The official was not authorized to discuss the report publicly so spoke on condition of anonymity.

Newspapers in English

Newspapers from Saudi Arabia