Report: F-35, V-22, Black Hawk Targeted By Chinese Cyberspies | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Most Recent Daily Episodes

Episode Date

Airborne-Monday

Airborne-Tuesday

Airborne-Wednesday Airborne-Thursday

Airborne-Friday

Airborne On YouTube

Airborne-Unlimited-04.29.24

Airborne-NextGen-04.30.24

Airborne-Unlimited-05.01.24 Airborne-AffordableFlyers--05.02.24

Airborne-Unlimited-05.03.24

Thu, May 30, 2013

Report: F-35, V-22, Black Hawk Targeted By Chinese Cyberspies

Among More Than Two Dozen Weapons Systems Compromised By Electronic Intrusion

A confidential Pentagon report shows that Chinese cyberspies have collected data on more than two dozen U.S. weapons systems, including the F-35, the V-22 Osprey, and the Black Hawk helicopter.

The report, which was obtained by the Washington Post, indicates that Chinese cyber-espoinage compromised sensitive information that allowed that country to develop its version of a fifth-generation fighter aircraft much more quickly than it could have on its own. That hack was reportedly accomplished in 2007.

A public version of the report released in January indicated that "(w)hile DoD takes great care to secure the use and operation of the “hardware” of its weapon systems, these security practices have not kept up with the cyber adversary tactics and capabilities. Further, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical cyber capabilities embedded within them. This Task Force was asked to review and make recommendations to improve the resilience of DoD systems to cyber attacks and to develop a set of metrics that the Department could use to track progress and shape investment priorities." The list was contained in the confidential version of the report.

The report marks the first time the Pentagon has specifically named the Chinese government and its military as being the source of the cyber espionage. The paper reports that the document does not include specifics of the timing or depth of the security breaches.

FMI: Public Report

Advertisement

More News

ANN's Daily Aero-Term (05.02.24): Touchdown Zone Lighting

Touchdown Zone Lighting Two rows of transverse light bars located symmetrically about the runway centerline normally at 100 foot intervals. The basic system extends 3,000 feet alon>[...]

Aero-News: Quote of the Day (05.02.24)

“Discovery and innovation are central to our mission at Virgin Galactic. We’re excited to build on our successful record of facilitating scientific experiments in subor>[...]

Aero-News: Quote of the Day (05.03.24)

"We are reaching out to you today on behalf of the Popular Rotorcraft Association because we need your help. We are dangerously close to losing a critical resource that if lost, wi>[...]

ANN's Daily Aero-Term (05.03.24): UAS Traffic Management (UTM)

UAS Traffic Management (UTM) The unmanned aircraft traffic management ecosystem that will allow multiple low altitude BVLOS operations and which is separate from, but complementary>[...]

ANN's Daily Aero-Linx (05.03.24)

Aero Linx: Society of Aviation and Flight Educators (SAFE) SAFE is a member-oriented organization of aviation educators fostering professionalism and excellence in aviation through>[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2024 Web Development & Design by Pauli Systems, LC