Spies breach Pentagon fighter-jet project: report

April 21, 2009

Computer spies have hacked into the Pentagon's most costly weapons program, a US newspaper reported Tuesday, raising the prospect of adversaries gaining access to top-secret security data.

Citing current and former government officials, The Wall Street Journal said cyber-intruders were able to copy several terabytes of data on the 300-billion-dollar Joint Strike Fighter project, which may make it easier to defend against the aircraft, also known as the F-35 Lightning II.

A terabyte is 1,000 gigabytes.

The officials said similar breaches were recorded at the US Air Force's air traffic-control system in recent months, while the Journal had also earlier reported that spies hacked into computers used to manage the US electrical distribution system and other infrastructure.

The latest attacks signal an escalation in attempts by intruders to gain access to vital US security data over the past six months -- or at least US awareness of such attacks, a former official said.

"There's never been anything like it," the former official was quoted as saying, adding that other military agencies as well as private contracting companies have been affected.

"It's everything that keeps this country going," he added.

It was not immediately clear how severe the breach was, or exactly who the hackers were, but the most on the fighter project is reportedly kept on secure computers not connected to the Internet.

The newspaper cited unnamed former US officials saying the attack appeared to have originated in China.

A recent Pentagon report stated that China's military had made "steady progress" in developing techniques for improved online warfare, as part of an effort to compensate for an underdeveloped military, the Journal said.

Earlier this month China denied the Journal's report that Chinese and Russian hackers had attempted to plant viruses in the US .

(c) 2009 AFP

Explore further: US electricity grid hit by cyber attacks: report

Related Stories

Cyber spying a threat, and everyone is in on it

April 10, 2009

(AP) -- Ghost hackers infiltrating the computers of Tibetan exiles and the U.S. electric grid have pulled the curtain back on 21st-century espionage as nefarious as anything from the Cold War - and far more difficult to stop.

Researchers: Cyber spies break into govt computers

March 29, 2009

(AP) -- A cyber spy network based mainly in China hacked into classified documents from government and private organizations in 103 countries, including the computers of the Dalai Lama and Tibetan exiles, Canadian researchers ...

Pentagon spends $100 million to fix cyber attacks

April 7, 2009

(AP) -- The Pentagon spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems, military leaders said Tuesday.

Recommended for you

A not-quite-random walk demystifies the algorithm

December 15, 2017

The algorithm is having a cultural moment. Originally a math and computer science term, algorithms are now used to account for everything from military drone strikes and financial market forecasts to Google search results.

US faces moment of truth on 'net neutrality'

December 14, 2017

The acrimonious battle over "net neutrality" in America comes to a head Thursday with a US agency set to vote to roll back rules enacted two years earlier aimed at preventing a "two-speed" internet.

FCC votes along party lines to end 'net neutrality' (Update)

December 14, 2017

The Federal Communications Commission repealed the Obama-era "net neutrality" rules Thursday, giving internet service providers like Verizon, Comcast and AT&T a free hand to slow or block websites and apps as they see fit ...

The wet road to fast and stable batteries

December 14, 2017

An international team of scientists—including several researchers from the U.S. Department of Energy's (DOE) Argonne National Laboratory—has discovered an anode battery material with superfast charging and stable operation ...


Adjust slider to filter visible comments by rank

Display comments: newest first

not rated yet Apr 21, 2009
so is this report inferring secured servers not connected to the Internet were compromised remotely?
not rated yet Apr 21, 2009
Since the US power grid does not run on MS-Windows, the viruses will be a waste of time. (-:
not rated yet Apr 21, 2009
Back in the 90's (or earlier) it was shown that with enough redundant signals packets can be sent and received between a pc and a printer (Novell's NEST project).

I've wondered about hacking the grid. Where do the packets stop? Could a hacker get into the system and shut down the grid?
4 / 5 (1) Apr 21, 2009
good, maybe that will give us reason to cancel this nonsense. our economy is about to force us to anyways. complete bankruptcy of the u.s. awaits us. every family now owes over 100k in national debt.
4 / 5 (1) Apr 21, 2009
Zevkirsh: Many other countries have a higher per capita debt than the US. As long as the debt stays below 150% of the GDP you're fine (any higher than that and the interest payments become problematic).

Of course, personally I hate deficits and think that they should only be run in times of extreme need (war, natural disasters, preventing an asteroid impact, etc). But they aren't going to flatten the country completely.

Basically, if you're running with a fiat currency system then a deficit simply causes inflation (eventually). That leads to the government's debt as a percentage of the total economy decreasing, and the value of everyone else's money decreasing in proportion. So it just ends up being a form of hidden taxation. Bad for the economy (and ultimately pretty mildly bad at that), but not the end of the world or anything.
3 / 5 (1) Apr 21, 2009
This is one of the (very few) ways that a fiat currency system is superior to a standard based currency system.

If you mismanage government finances with a standard based currency you're completely screwed. If you do it with a fiat currency you can get out of it if you're careful. Fiat currency systems are much more forgiving to mismanagement than standard based systems.
5 / 5 (2) Apr 26, 2009
How long does it take to transfer several terabytes of unclassified data over the internet? Unnoticed?
BTW, attaching computers with classified data to the internet requires cryptographic boxes, much like a VPN, so that data can't migrate between classified and unclassified networks (unclassified to classified is also generally prohibited.)
4 / 5 (1) Apr 26, 2009
Good point GrayMouser, I wondered that myself. Several terabytes? Even over the fastest connection that's going to take long enough for someone to notice what's happening.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.