- The Foundry: Conservative Policy News from The Heritage Foundation - http://blog.heritage.org -

Chinese Hackers Compromise U.S. Weapons Systems

Posted By David Inserra On May 29, 2013 @ 2:00 pm In Security | Comments Disabled

Newscom [1]

Newscom

The Washington Post is reporting that the designs for many [2] of the U.S.’s “most sensitive advanced weapons systems have been compromised by Chinese hackers.”

While the U.S. has started to increase its pressure on China, it is a dollar short and a day late. Rather than allow state-sponsored hackers to continue to harm U.S. national and economic security, the U.S. needs to take stronger actions [3] to deter future cyber aggression.

The new report [4] by the Defense Science Board lists at least 29 specific weapons system designs that were stolen by hackers. These included several missile defense systems, such as the Aegis Ballistic Missile Defense System [5], the Terminal High Altitude Aerial Defense, and the Patriot Advanced Capability-3. Aircraft [6], such as the F-35 and F/A 18 fighter planes, the C-17 cargo plane, and the UH-60 Black Hawk Helicopter, were compromised, as were the Navy’s new Littoral Combat Ship and several information and control systems.

According to those familiar with these hacks, the vast majority are part of an ongoing and growing Chinese cyber-espionage campaign to steal U.S. technologies, advance Chinese weapons development, and then turn them against their creators. Earlier this year, the security firm Mandiant also identified a specific bureau of the Chinese military [7] as responsible for stealing huge amounts of data from U.S. companies over the past seven years. Taken together with countless other confirmed and suspected Chinese hacks, clearly the U.S. should do more [8] to stop cyber aggression.

First, the U.S. should continue to name and shame China. This will mean issuing more reports that identify China as a bad cyber actor and then having U.S leaders use this information to call out China in speeches and diplomatic discussions. While the U.S. is starting to actually put the blame [9] on China in some of its reports, our leaders continue to naively treat China as a cyber ally.

In April, the highest-ranking American military officer, chairman of the Joint Chiefs General Martin Dempsey [10], stated that the U.S. sought “collaboration and transparency” with China, since “cyber threatens our economy and [the Chinese] economy.” U.S. leaders should be pointing the finger at the Chinese instead of inviting them to steal U.S. secrets.

Second, the U.S. should actually take a tougher line on China [3] by ceasing to cooperate with China on cybersecurity. The U.S. should not be engaging in cyber war games and cyber exchanges with the Chinese when they are merely using that information to learn how to do a better job hacking U.S. systems. Continuing to collaborate with China only proves that the U.S. knows about the problem but lacks the will to do anything about it, thus further emboldening China. The U.S. should also consider working with allies [11] to take economic and legal actions against Chinese companies that peddle stolen property.

U.S. military and business secrets are being stolen as part of an extensive cyber campaign by the Chinese to advance their weapons capabilities and economy. The U.S. should stand up to China and make them feel pain when they steal U.S. secrets. Failing to do so would further endanger U.S. national security and economic growth.


Article printed from The Foundry: Conservative Policy News from The Heritage Foundation: http://blog.heritage.org

URL to article: http://blog.heritage.org/2013/05/29/chinese-hackers-compromise-u-s-weapons-systems/

URLs in this post:

[1] Image: http://blog.heritage.org/wp-content/uploads/Chinese-Flags-Tiananmen-Square.jpg

[2] designs for many: http://www.washingtonpost.com/world/national-security/confidential-report-lists-us-weapons-system-designs-compromised-by-chinese-cyberspies/2013/05/27/a42c3e1c-c2dd-11e2-8c3b-0b5e9247e8ca_story.html

[3] stronger actions: http://www.heritage.org/research/reports/2013/02/chinese-cyber-attacks-robust-response-needed

[4] new report: http://www.washingtonpost.com/world/national-security/a-list-of-the-us-weapons-designs-and-technologies-compromised-by-hackers/2013/05/27/a95b2b12-c483-11e2-9fe2-6ee52d0eb7c1_story.html

[5] Aegis Ballistic Missile Defense System: http://www.heritage.org/research/reports/2011/05/improving-aegis-ballistic-missile-defense-command-and-control

[6] Aircraft: http://www.heritage.org/research/reports/2012/10/full-spectrum-air-power-building-the-air-force-america-needs

[7] specific bureau of the Chinese military: http://blog.heritage.org/2013/02/20/chinese-hackers-identified-as-part-of-the-military/

[8] should do more: http://blog.heritage.org/2013/02/26/chinese-cyber-attacks-take-off-the-kid-gloves/

[9] starting to actually put the blame: http://blog.heritage.org/2013/05/08/confronting-chinas-cyber-offensive/

[10] chairman of the Joint Chiefs General Martin Dempsey: http://blog.heritage.org/2013/05/01/u-s-should-stand-up-to-china-on-cyber-attacks/

[11] working with allies: http://www.heritage.org/research/reports/2013/04/a-congressional-guide-seven-steps-to-us-security-prosperity-and-freedom-in-cyberspace

Copyright © 2011 The Heritage Foundation. All rights reserved.