Foreign Policy

July 23, 2013

Forget the shady middlemen; never mind the students just a little too eager to find out the particulars of engines and warheads. Today, when foreign spies want to acquire America’s latest weapons technology, they just hack into networks and steal the digital designs. 2012 marked the the first time, overseas intelligence agencies used cyber espionage – rather than the old-fashioned kind — as their number one way to pilfer information on U.S. weapons.

That’s according to a new report  by one of Pentagon branches responsible for preventing such spying. Not coincidentally, perhaps, half of all successful incidents in 2012 of espionage against American defense contractors originated in Asia, up from 43 percent the previous year. THis report highlights what plenty of us have come to grasp intuitively, cyber attacks are steadliy replacing — or at least complementing — attempts to flat-out purchase U.S. defense technology or simply ask for more information about it as the top MO of industrial intelligence operators.

This shift from overt attempts at collecting information on U.S. weapons to cyber theft means that it may become more difficult to detect when a rival is trying to gain access to America’s defense secrets. It also shows why the Obama administration has been in such a tizzy of China’s alleged industrial espionage.

According to the report from the Defense Security Service, these spies were particularly interested in gathering information on U.S. electronics; worldwide collection attempts in this sector spiked 94 percent from the year before.

A "substantial" number of those electronics were radiation-resistant electronics that can be used in nuclear weapons, ballistic missiles, aerospace and space programs, according to the report.

"Foreign entities, especially those linked to countries with mature missile programs, increasingly focuses collection efforts on U.S. missile technology, usually aimed at particular missile subsystems," reads the report.

Why are nations with mature missile programs trying to steal secrets about American missile parts? To make their missiles even more deadly, of course.

"After a country masters the chemistry and physics required to launch a missiles, scientists and engineers can focus on accuracy and lethality, the desired characteristics of modern missiles," the report notes.

Getting their hands on U.S. missile parts will also help these countries defend against American weapons.

"Reverse-engineering would probably give East Asia and the Pacific scientists and engineers a better understanding of the capabilities of the targeted and acquired technology to develop countermeasures to U.S. weapons systems," reads the document.

Overall, foreign spies’ top four American targets were "information systems; electronics; lasers, optics and sensors; and aeronautic systems technologies," according to the report.

All of these are crucial parts of the weapons that have given the U.S. a clear advantage on battlefields for the last 20 years. Information systems are how the US military passes massive amounts of intelligence and communications data. Meanwhile optics, lasers and sensors are key technologies that help American drones spy on enemies and that guide its smart weapons onto targets. Aeronautic systems technologies, as you know, are the parts that make up the Pentagon’s next-generation rockets, stealth drones and fighters — exactly the types of weapons that nations like China are trying to replicate.

The report doesn’t specifically call out China as the home of these spies. But let’s be honest, the vast majority of espionage attempts originating from Asia are likely coming from China.

"DSS continues to take the politically correct route and hide China within the ‘East Asia and Pacific’ category, disappointing," Richard Bejtlich, chief security officer of the cybersecurity firm Mandiant, told Killer Apps after reading the report.

The Defense Security Service document was published on July 17, two days before David Shedd, deputy director of the Defense Intelligence Agency told Killer Apps that his agency is constantly finding new attempts by foreign government to install spyware on U.S. weapon systems. (In 2011, a Senate investigation found that tons of counterfeit electronic parts made in China were making their way into U.S. weapons; these parts could hide spyware or ‘back doors’ allowing enemies to take over or disable the weapons.)

Far East countries — who accounted for 54 percent of the interest in American missile tech — targeted everything from the Standard Missiles and Ground Based Interceptors used for missile defense to TOW antitank missiles, Trident Submarine launched nuclear missiles, Tomahawk cruise missiles and Patriot anti-aircraft missiles and Harpoon anti-ship missiles.

Unlike overall trends in espionage, spies kept things old fashioned when going after missile tech, trying to either buy it outright or simply requesting information about such technology.

Interestingly, DSS found that successful attempts to get information on missile technology via cyber means are "relatively low." However, because digital espionage allows spies to be even sneakier than outright attempts to steal information, such efforts may go unnoticed.

When cyber espionage "goes unrecognized or unreported by cleared contractors, industry does not generate a report, making such instances unavailable for analysis in this data set," reads the DSS report.

The DSS report largely confirms what any casual news reader has seen over the last few years — the Far East, led by China, is pushing to build military technology rivaling the U.S.’s by any means necessary.

Previous
Previous

Son of a Blackbird: The Pentagon Eyes New Stealth Spy Plane

Next
Next

U.S., European Spooks Meet to Discuss PRISM Data Swap