Feeds

US: BAE 'could have' pirated our secret Stealth 3.0 tech sauce

Arms globocorp enters grey zone?

Combat fraud and increase customer satisfaction

One may take it that the knowhow could then spread onward from Saudi to pretty much any place which can afford to rustle up a few briefcases of cash, Bentleys with solid-gold hubcaps, scantily-clad practitioners in the field of negotiable companionship and so forth. Not many people could actually use such specialised information, but there are those in Russia and China who'd love to have it.

As the Defense IG's henchmen note:

BAE Systems manufactures both [Eurofighter] Typhoon and the JSF aircraft components at its Samlesbury site in the United Kingdom. With contractors such as BAE Systems plc, and its subsidiaries working on competing aircraft, the US Government needs to implement effective management accountability and security controls to safeguard sensitive JSF technologies. Additional [Defense Department] oversight, accountability, and control would help DoD to reduce its exposure to an increased risk that unauthorized access to classified US technologies may occur. More specifically, DoD advanced aviation and weapons technology may not be adequately protected from unauthorized access at facilities and in computers at BAE Systems.

BAE might say that it is finding out how to do Stealth entirely on its own, working wholly on the UK side of the company firewall. In 2006, the UK Ministry of Defence gave BAE a £124m contract for Project Taranis, under which a working stealth aircraft demonstrator would be built for the RAF in just a few years - a remarkable feat by the Lancashire engineers, given the hugely greater amounts of time and money it took Americans to do the same.

This came just a few months after the US government, following pressure from BAE's political allies in Britain - in particular the former defence procurement ministers Lord Drayson (Labour) and James Arbuthnot (Tory) - inked a special deal letting the UK, and thus BAE plc, have wider access to JSF technology in order to support, modify and operate the jet as part of the British forces.

The US Defense IG, speaking generally of the past several years, says:

Advanced aviation and weapons technology for the JSF program may have been compromised... incomplete contractor oversight may have increased the risk of unintended or deliberate release of information to foreign competitors.

[The US Defense Department] did not always employ sufficient controls to evaluate and correct potential unauthorized access to classified US technology.

[Security inspectors] allowed the contractor to dictate what the Government could oversee... Allowing BAE Systems not to adhere to reporting requirements denies [government] representatives access to critical security information.

So the IG seems to be suggesting that BAE Systems had the ability to just move the information across the company - conceivably a matter of simply walking across a corridor, or of files being moved across the corporate network. Taking this scenario to its logical conclusion, the MoD would have actually paid BAE to launder its pirated tech under Project Taranis, and presto - BAE is in a position to sell Stealth and the rest of it to anyone approved by the British government. This would be pretty much anyone in the world, on past form.

But of course that isn't true, as everyone involved will tell you. BAE - without any reference to information it had been given as a result of the F-35 programme - is simply able to develop working Stealth planes for approximately one or two per cent of what it cost the USA.

Top three mobile application threats

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.