US Says China Stole Military Robot Designs

Graphic: Bloomberg

At least one China-backed cyber spy operation reportedly snared robotics research from QinetiQ, a Pentagon contractor and the supposed inspiration for gadget-maker “Q” in the James Bond movie franchise. 

This week, the US-China Economic and Security Review Commission began looking for analysts to write an unclassified report on China’s current industrial and military robotics capabilities, including the origins of those capabilities.

The study will identify know-how and tools that “have likely been acquired by China through technology transfers or cyber penetrations,” according to a Jan. 13 federal business solicitation.
 
The commission also intends to gauge the chances China’s automation efforts could eclipse comparable Pentagon initiatives, including “Offset,” a Defense Department research initiative meant to “offset” technological advances made by adversaries.

There are concerns China might be gaining an unfair competitive advantage in the robotics race.  Between 2007 and 2009, attackers tied to the People’s Liberation Army allegedly hacked a QinetiQ specialist who worked on embedded software in microchips that control the company’s military robots, Bloomberg reported, citing investigations by security firms Terremark and HBGary.  The Chinese military later showcased a bomb disposal robot in April 2012 that resembled QinetiQ’s Dragon Runner.

Now the United States is saying publicly it’s aiming to find out the technical specs of China’s humanoids. The forthcoming report will “identify key suppliers of components and chips,” as well as programming languages used in robotics research and development.

“To what extent do Chinese robotics technologies rely on US or other imported software, components or other technology?” is one question the study will address.

In addition, the US government seeks to learn the names of R&D organizations in the Chinese robotics field and locate any ties to the PLA. 
 
Chinese “breakthroughs” in self-driving vehicles, unmanned aircraft and seagoing drones are also an area of US interest.  The commission last year noted that, already, Chinese robots are capable of engaging in extraterrestrial war. While antisatellite systems haven’t been much of a threat since the Cold War, China’s space activities suggest the nation state is tailoring machines to potentially eviscerate US space assets, according to the commission’s 2015 report to Congress. The Chinese systems consist of “a satellite armed with a weapon,” commission officials said. Once close enough to an American target, the machine can deploy the armament against or “intentionally crash into the target satellite.”
 
China is “setting a strong foundation for future co-orbital antisatellite systems that could include jammers, robotic arms, kinetic kill vehicles, and lasers,” the report stated.
 
Some of China’s hopes for AI-powered combat are public knowledge.Chinese state-sponsored news agency Xinhua on Dec. 27, 2015 reported that, at a China civil-military integration conference in Beijing, several military equipment-makers demonstrated to 200 PLA members products that included robots and unmanned reconnaissance aircraft.
 
“The Chinese government and the PLA have meted out a succession of measures to boost the private sector’s participation in the arms and equipment industry over the past two years,” according to Xinhua.

Deputy Defense Secretary Robert Work recently said he expects to see Chinese or Russian robotic troops orchestrating military operations one day soon. 

“We know that China is already investing heavily in robotics and autonomy, and the Russian Chief of General Staff [Valery Vasilevich] Gerasimov recently said that the Russian military is preparing to fight on a roboticized battlefield,” Work told a national security forum on Dec. 14, 2015, according to Defense One. ”And he said, and I quote, ‘In the near future, it is possible that a complete roboticised unit will be created capable of independently conducting military operations.’”

DefenseOne:

 

 

« World Economic Forum Says Cyber-attack Is A Top Risk To Business.
When ISIS Turns to Cyber Warfare »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

CYBERPOL

CYBERPOL

CYBERPOL is the leading Public Utility Agency for investigating cyber crimes and cyber attacks by criminals, international adversaries.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Alyne

Alyne

Alyne is a Munich based 2B RegTech offering organisations risk insight capabilities through a Software as a Service.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

ESC - Enterprise Security Center

ESC - Enterprise Security Center

ESC is a system house specializing exclusively in IT security - Security Implementation & Optimization, Operations, Managed Security Services.

Trusted Security Solutions (TSS)

Trusted Security Solutions (TSS)

TSS are specialist in IT Security and providing Cybersecurity Solutions & Services combined with storage and backup.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.

itm8

itm8

itm8 is a Nordic digital transformation partner offering a wide range of services in IT operations and Cloud Services, Digital Transformation, Application Services, ERP, and Cyber Security.

The Missing Link

The Missing Link

Whether your requirements are large or small, The Missing Link have you covered with our core offerings including IT & Cloud, Cyber Security and Automation.