US Says China Stole Military Robot Designs

Graphic: Bloomberg

At least one China-backed cyber spy operation reportedly snared robotics research from QinetiQ, a Pentagon contractor and the supposed inspiration for gadget-maker “Q” in the James Bond movie franchise. 

This week, the US-China Economic and Security Review Commission began looking for analysts to write an unclassified report on China’s current industrial and military robotics capabilities, including the origins of those capabilities.

The study will identify know-how and tools that “have likely been acquired by China through technology transfers or cyber penetrations,” according to a Jan. 13 federal business solicitation.
 
The commission also intends to gauge the chances China’s automation efforts could eclipse comparable Pentagon initiatives, including “Offset,” a Defense Department research initiative meant to “offset” technological advances made by adversaries.

There are concerns China might be gaining an unfair competitive advantage in the robotics race.  Between 2007 and 2009, attackers tied to the People’s Liberation Army allegedly hacked a QinetiQ specialist who worked on embedded software in microchips that control the company’s military robots, Bloomberg reported, citing investigations by security firms Terremark and HBGary.  The Chinese military later showcased a bomb disposal robot in April 2012 that resembled QinetiQ’s Dragon Runner.

Now the United States is saying publicly it’s aiming to find out the technical specs of China’s humanoids. The forthcoming report will “identify key suppliers of components and chips,” as well as programming languages used in robotics research and development.

“To what extent do Chinese robotics technologies rely on US or other imported software, components or other technology?” is one question the study will address.

In addition, the US government seeks to learn the names of R&D organizations in the Chinese robotics field and locate any ties to the PLA. 
 
Chinese “breakthroughs” in self-driving vehicles, unmanned aircraft and seagoing drones are also an area of US interest.  The commission last year noted that, already, Chinese robots are capable of engaging in extraterrestrial war. While antisatellite systems haven’t been much of a threat since the Cold War, China’s space activities suggest the nation state is tailoring machines to potentially eviscerate US space assets, according to the commission’s 2015 report to Congress. The Chinese systems consist of “a satellite armed with a weapon,” commission officials said. Once close enough to an American target, the machine can deploy the armament against or “intentionally crash into the target satellite.”
 
China is “setting a strong foundation for future co-orbital antisatellite systems that could include jammers, robotic arms, kinetic kill vehicles, and lasers,” the report stated.
 
Some of China’s hopes for AI-powered combat are public knowledge.Chinese state-sponsored news agency Xinhua on Dec. 27, 2015 reported that, at a China civil-military integration conference in Beijing, several military equipment-makers demonstrated to 200 PLA members products that included robots and unmanned reconnaissance aircraft.
 
“The Chinese government and the PLA have meted out a succession of measures to boost the private sector’s participation in the arms and equipment industry over the past two years,” according to Xinhua.

Deputy Defense Secretary Robert Work recently said he expects to see Chinese or Russian robotic troops orchestrating military operations one day soon. 

“We know that China is already investing heavily in robotics and autonomy, and the Russian Chief of General Staff [Valery Vasilevich] Gerasimov recently said that the Russian military is preparing to fight on a roboticized battlefield,” Work told a national security forum on Dec. 14, 2015, according to Defense One. ”And he said, and I quote, ‘In the near future, it is possible that a complete roboticised unit will be created capable of independently conducting military operations.’”

DefenseOne:

 

 

« World Economic Forum Says Cyber-attack Is A Top Risk To Business.
When ISIS Turns to Cyber Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

Humming Heads

Humming Heads

Humming Heads offers a complete solution to fight the advanced threats that target a company's endpoints and servers.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

SafePaas

SafePaas

SafePaas is a leading Enterprise Risk Management Platform. One source of truth for all your Audit, Risk, and Compliance requirements. Complete governance across your systems.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.

Merkle Science

Merkle Science

Merkle Science provides next generation risk mitigation, compliance and forensics for crypto-native businesses, DeFi participants, financial institutions & government agencies.

EasySec Solutions

EasySec Solutions

EasySec Solutions provides a cyber-security platform, based on a combination of the zero trust model and the software-defined security management.