Feeds

US: BAE 'could have' pirated our secret Stealth 3.0 tech sauce

Arms globocorp enters grey zone?

Mobile application security vulnerability report

One may take it that the knowhow could then spread onward from Saudi to pretty much any place which can afford to rustle up a few briefcases of cash, Bentleys with solid-gold hubcaps, scantily-clad practitioners in the field of negotiable companionship and so forth. Not many people could actually use such specialised information, but there are those in Russia and China who'd love to have it.

As the Defense IG's henchmen note:

BAE Systems manufactures both [Eurofighter] Typhoon and the JSF aircraft components at its Samlesbury site in the United Kingdom. With contractors such as BAE Systems plc, and its subsidiaries working on competing aircraft, the US Government needs to implement effective management accountability and security controls to safeguard sensitive JSF technologies. Additional [Defense Department] oversight, accountability, and control would help DoD to reduce its exposure to an increased risk that unauthorized access to classified US technologies may occur. More specifically, DoD advanced aviation and weapons technology may not be adequately protected from unauthorized access at facilities and in computers at BAE Systems.

BAE might say that it is finding out how to do Stealth entirely on its own, working wholly on the UK side of the company firewall. In 2006, the UK Ministry of Defence gave BAE a £124m contract for Project Taranis, under which a working stealth aircraft demonstrator would be built for the RAF in just a few years - a remarkable feat by the Lancashire engineers, given the hugely greater amounts of time and money it took Americans to do the same.

This came just a few months after the US government, following pressure from BAE's political allies in Britain - in particular the former defence procurement ministers Lord Drayson (Labour) and James Arbuthnot (Tory) - inked a special deal letting the UK, and thus BAE plc, have wider access to JSF technology in order to support, modify and operate the jet as part of the British forces.

The US Defense IG, speaking generally of the past several years, says:

Advanced aviation and weapons technology for the JSF program may have been compromised... incomplete contractor oversight may have increased the risk of unintended or deliberate release of information to foreign competitors.

[The US Defense Department] did not always employ sufficient controls to evaluate and correct potential unauthorized access to classified US technology.

[Security inspectors] allowed the contractor to dictate what the Government could oversee... Allowing BAE Systems not to adhere to reporting requirements denies [government] representatives access to critical security information.

So the IG seems to be suggesting that BAE Systems had the ability to just move the information across the company - conceivably a matter of simply walking across a corridor, or of files being moved across the corporate network. Taking this scenario to its logical conclusion, the MoD would have actually paid BAE to launder its pirated tech under Project Taranis, and presto - BAE is in a position to sell Stealth and the rest of it to anyone approved by the British government. This would be pretty much anyone in the world, on past form.

But of course that isn't true, as everyone involved will tell you. BAE - without any reference to information it had been given as a result of the F-35 programme - is simply able to develop working Stealth planes for approximately one or two per cent of what it cost the USA.

Mobile application security vulnerability report

More from The Register

next story
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
UK.gov's Open Source switch WON'T get rid of Microsoft, y'know
What do you mean, we've ditched Redmond in favour of IBM?!
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
US Social Security 'wasted $300 million on an IT BOONDOGGLE'
Scrutiny committee bods probe derailed database project
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Australia floats website blocks and ISP liability to stop copyright thieves
Big Content could get the right to order ISPs to stop traffic
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.