Clearly a noble tradition. Such inadvertent "sharing" of information may drive the price of weapons down, may create arms races, or may make stealth or improved nuclear weapons more obtainable for the have-nots. One case is China acquiring US F-22 and F-35 secrets as well as Su-33 secrets from Russia. Chinese espionage has led. Another case is Klaus Fuchs. (Map on Slide 10 courtesy Cyber Agency)
November 9, 2015
Beware of hackers, human spies and employees!
(Graphics on Slide 12 courtesy Cyber Agency) A combination or overlap of motivations and actions may lead to a leak of information. For example a Disgruntled Employee may appoach a Competitor, Foreign Corporation or Foreign Government. The Disgruntled Employee may stay in place while he thumb-drives information out to (say):
- a Competitor or Foreign Corporation who after months or years hires him as an employee or overpaid contractor
- a Foreign Government that he/she defects/immigrates to - then becoming a "foreign contractor", liberal activist for an authoritarian government or bona fide immigrant.
Attempted hacking of Western economic secrets by the Russian and Chinese Government and by Russian and Chinese arms companies is to be expected. Plain old hackers with no agenda other than to get into online secrets for the challenge “fun” of it are also a threat.
The “30 to 40 (hacking) attempts per night,” reported by TKMS (article below) may be a standard year round level aimed at submarine secrets, many other technical secrets and politically sensitive material held by a company. It would be the same for targeted companies and governments in France and Japan.
On a traditional human intelligence (HUMINT) level Russian and Chinese diplomats, “agents” and students would also attempt to gather secrets from Western arms companies, research institutes and Western governments. Dr A Q Khan (now 79) is a classic agent-student case.
Conference attendees and couriers should watch out for pre-blackmail or chain-cutter wielding “honey traps” and “honeypots”. Bad news!
A large number of publications on November 9, 2015 have drawn from an articlein The Australian November 9, 2015. For example an article in Europe online said in quotation marks “…” http://en.europeonline-magazine.eu/china-russia-reportedly-try-to-hack-into-australian-submarine-plans_421843.html and I have added comments in square brackets […]:
“Sydney (dpa) - Spies from both China and Russia have tried to hack into German, French and Japanese plans to build Australia‘s future submarines…”
[TKMS, DCNS and the Japanese government - hold highly sensitive Competitive Evaluation Process (CEP) questions and their highly classified answers in response to these questions.]
“The three bidders have been forced to rely on hand delivery of sensitive information and the Australian government has examined cyber-security with each of the foreign bidders.”
"We have about 30 to 40 (hacking) attempts per night, that‘s what our IT people say," according to Manfred Klein, [Senior Vice-President, Product Management, TKMS, Kiel, told The Australian]
"John White, chairman of the German group in Australia, told [TheAustralian] the attempted espionage was to be expected."
"They‘re trying to get into everyone‘s communications," White said. "Espionage and breaches of security ... you just assume it is happening. Everybody is in that game. It‘s a space that people play in. We don‘t suspect anyone, we suspect everybody."
[Final answers/responses from the three contenders are due November 30, 2015. The Australian Federal (Turnbull) Government is expected to pick a winner or eliminate one contender some time in 2016.]
Posted by Peter Coates