Hackers breach defenses of next generation fighter jet program?

April 21, 2009

(ChattahBox) — Anonymous senior defense officials reportedly said that thousands of confidential files on the U.S. military’s most technologically advanced fighter aircraft the F-35 Joint Striker Fighter have been compromised or stolen by unknown computer hackers over the past two years.  The news was first reported by the Wall Street Journal (WSJ).

The Joint Striker Fighter plane is the military’s new F-35 Lightning II designed to become the aircraft used by all of the branches of service.  Hackers allegdly gain access to computers of Pentagon contractors in charge of designing and building the aircraft, specifially to data related to the design and electronics systems of the Joint Strike Fight.  Even though officials classified the compromised data as NOT highly sensitive data, experts fear the information could be used to make the plane easier to fight or defend against. Hackers did not gain access to the most sensitive information about the aircraft, including its flight controls and sensors. Such information is stored on computers that are not connected to the internet, defense officials said.  Officials say the attacks appear to have originated in China, but can be extremely difficult to determine the true origin because it is easy to mask identities online.

One of the Joint Strike Fighter’s main contractors Lockheed Martin Corp., CFO denied the WSJ report saying that there has been no breach of classified information.This new cyber spying revelation comes as the White House is poised to release its review on U.S. cyber security. There have been increasingly frequent warnings that U.S. networks are at risk and repeatedly are being probed by foreign governments, criminals or other groups.


2 Responses to “Hackers breach defenses of next generation fighter jet program?”

  1. webster on April 21st, 2009 10:31 pm

    What operating system were the breached military and their contractors using? OS, firewall, etc.?

    Why do they leave out the most important information.

  2. Rajesh on April 22nd, 2009 7:37 am

    For 2 years this was going on , why did information security auditors did not audit
    Information security process properly and not give nay findings? Are Information secuirty auditors sub standard

Got something to say? **Please Note** - Comments may be edited for clarity or obscenity, and all comments are published at the discretion of ChattahBox.com - Comments are the opinions of the individuals leaving them, and not of ChattahBox.com or its partners. - Please do not spam or submit comments that use copyright materials, hearsay or are based on reports where the supposed fact or quote is not a matter of public knowledge are also not permitted.