Snowden Reveals that China Stole Plans For New F-35

The documents leaked by Edward Snowden have uncovered a new large-scale industrial espionage campaign conducted by the Chinese Government. State-sponsored hackers have operated to steal sensitive information on advanced fighter aircraft, the US-built F-35 Joint Strike Fighter (JSF). The Australian Government has ordered 72 F-35 jets that will be operational in 2020.

According to Snowden, the US Intelligence was aware that Chinese cyber spies have stolen "many terabytes of data" about the design of Australia's Lockheed Martin F-35 Lightning II JSF. The details of the operation are described in a set of top-secret documents published by the Der Spiegel magazine.

Chinese hackers have allegedly stolen as much as 50 terabytes of data, including the details of the fighter's radar systems, engine schematics, "aft deck heating contour maps," designs to cool exhaust gases and the method the jet uses to track targets.

The purpose of the Chinese Government is to acquire intellectual property on advanced technologies, benefiting Chinese companies on the market and narrowed the gap in the research of advanced technological solution. Military experts speculated that the stolen blue prints could help the country to develop a new generation of advanced aircraft fighter, so called "fifth-generation" fighters.

Military experts confirmed a striking resemblance with the Chinese advanced fighter jets, the Chengdu J-20 and the Shenyang J-31 Falcon Hawk, this second vehicle quite similar to F-35 JSF.

Not only F-35 documents were stolen, sensitive military data stolen by the foreign Intelligence included information relating to the Northrop-Grumman B-2 stealth bomber, the F-22 Raptor stealth fighter, nuclear submarine and naval air-defence missile designs. The hackers also accessed tens of thousands of military personnel records. Defence missile designs. The total data theft was estimated to be equivalent to "five Libraries of Congress (50 terabytes).

SecurityAffairs:

« UK Police: 'Innocent people' on unregulated photo database
Global shortage of skilled CyberSecurity professionals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Globalscape

Globalscape

Globalscape is a leader in secure data exchange solutions.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

OneVisage

OneVisage

Our award-winning 3DAuth digital identity platform turns any consumer mobile device into a real-time 3D facial scanner that securely authenticates the user in seconds.

PROMIA

PROMIA

PROMIA is in the business of providing solutions that are designed to support highly secure, reliable, scalable and interoperable business applications.

Rippleshot

Rippleshot

Rippleshot is a fraud analytics firm that detects mass card compromises faster, allowing issuers to execute more proactive fraud detection strategies.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

MrLooquer

MrLooquer

MrLooquer provide a solution to automatically discover the assets of organizations on the internet, determine the level of exposure to attacks and help to manage risk accurately.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

Telefonica Global Solutions (TGS)

Telefonica Global Solutions (TGS)

Telefonica Global Solutions is the technological partner of wholesalers and enterprises, helping them to achieve the digitalization they need.

Plex IT

Plex IT

Plex IT provides managed IT services to organisations along with managed security services.

Zyber 365 Group

Zyber 365 Group

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.

P3M Works

P3M Works

P3M Works delivers Cyber Security and Digital Transformation projects across both private and public sector clients.