US Says China Stole Military Robot Designs

Graphic: Bloomberg

At least one China-backed cyber spy operation reportedly snared robotics research from QinetiQ, a Pentagon contractor and the supposed inspiration for gadget-maker “Q” in the James Bond movie franchise. 

This week, the US-China Economic and Security Review Commission began looking for analysts to write an unclassified report on China’s current industrial and military robotics capabilities, including the origins of those capabilities.

The study will identify know-how and tools that “have likely been acquired by China through technology transfers or cyber penetrations,” according to a Jan. 13 federal business solicitation.
 
The commission also intends to gauge the chances China’s automation efforts could eclipse comparable Pentagon initiatives, including “Offset,” a Defense Department research initiative meant to “offset” technological advances made by adversaries.

There are concerns China might be gaining an unfair competitive advantage in the robotics race.  Between 2007 and 2009, attackers tied to the People’s Liberation Army allegedly hacked a QinetiQ specialist who worked on embedded software in microchips that control the company’s military robots, Bloomberg reported, citing investigations by security firms Terremark and HBGary.  The Chinese military later showcased a bomb disposal robot in April 2012 that resembled QinetiQ’s Dragon Runner.

Now the United States is saying publicly it’s aiming to find out the technical specs of China’s humanoids. The forthcoming report will “identify key suppliers of components and chips,” as well as programming languages used in robotics research and development.

“To what extent do Chinese robotics technologies rely on US or other imported software, components or other technology?” is one question the study will address.

In addition, the US government seeks to learn the names of R&D organizations in the Chinese robotics field and locate any ties to the PLA. 
 
Chinese “breakthroughs” in self-driving vehicles, unmanned aircraft and seagoing drones are also an area of US interest.  The commission last year noted that, already, Chinese robots are capable of engaging in extraterrestrial war. While antisatellite systems haven’t been much of a threat since the Cold War, China’s space activities suggest the nation state is tailoring machines to potentially eviscerate US space assets, according to the commission’s 2015 report to Congress. The Chinese systems consist of “a satellite armed with a weapon,” commission officials said. Once close enough to an American target, the machine can deploy the armament against or “intentionally crash into the target satellite.”
 
China is “setting a strong foundation for future co-orbital antisatellite systems that could include jammers, robotic arms, kinetic kill vehicles, and lasers,” the report stated.
 
Some of China’s hopes for AI-powered combat are public knowledge.Chinese state-sponsored news agency Xinhua on Dec. 27, 2015 reported that, at a China civil-military integration conference in Beijing, several military equipment-makers demonstrated to 200 PLA members products that included robots and unmanned reconnaissance aircraft.
 
“The Chinese government and the PLA have meted out a succession of measures to boost the private sector’s participation in the arms and equipment industry over the past two years,” according to Xinhua.

Deputy Defense Secretary Robert Work recently said he expects to see Chinese or Russian robotic troops orchestrating military operations one day soon. 

“We know that China is already investing heavily in robotics and autonomy, and the Russian Chief of General Staff [Valery Vasilevich] Gerasimov recently said that the Russian military is preparing to fight on a roboticized battlefield,” Work told a national security forum on Dec. 14, 2015, according to Defense One. ”And he said, and I quote, ‘In the near future, it is possible that a complete roboticised unit will be created capable of independently conducting military operations.’”

DefenseOne:

 

 

« World Economic Forum Says Cyber-attack Is A Top Risk To Business.
When ISIS Turns to Cyber Warfare »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

KIOS Center of Excellence (KIOS CoE)

KIOS Center of Excellence (KIOS CoE)

KIOS carries out top level research in the area of Information and Communication Technologies (ICT) with emphasis on the Monitoring, Control and Security of Critical Infrastructures.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

Gatefy

Gatefy

Getfy is a cybersecurity company specialized in artificial intelligence and machine learning. We work to solve challenging issues, especially those involving email security.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.

MARS Suite

MARS Suite

MARS Suite is your all-in-one solution for cyber protection & compliance. Cybersecurity and risk management is what we do best. And we’re making it simple and easy.

CliffGuard Cybersecurity

CliffGuard Cybersecurity

CliffGuard Cybersecurity deliver comprehensive services designed to protect your organization from the ever-evolving landscape of cyber threats.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.

SiyanoAV

SiyanoAV

SiyanoAV's range of antivirus products delivers strong protection against various cyber threats, including malware, ransomware, phishing schemes, and beyond.