TechUS bolsters cybersecurity to safeguard next-gen F-47 fighter

US bolsters cybersecurity to safeguard next-gen F‑47 fighter

The F-47 aircraft is intended to ensure US air dominance and will simultaneously be the first sixth-generation fighter to be introduced into service. To prevent data leaks about it, the Americans have implemented special security procedures. The threat is real—information about other aircraft has already been stolen by China.

5th generation Chinese multirole aircraft J-20
5th generation Chinese multirole aircraft J-20
Images source: © cgtn
Łukasz Michalik

Boeing, the corporation to which the US Department of Defense has entrusted the construction of the new F-47 fighter jet, will have to meet stricter—higher than ever—safety standards. Information about the new requirements was provided by Katie Arrington, acting director of information at the Department of Defense.

According to information obtained by Breaking Defense, this is the result of previous experiences related to data security breaches. These involved, among other things, information about F-22 and F-35 aircraft, which—according to the Americans—helped China build their new air superiority aircraft, the J-20.

According to the Pentagon, China's progress in building new generation aircraft is due, in part, to industrial espionage and the theft of information about American combat aircraft. Katie Arrington referenced this during her speech at the TechNet Cyber conference in Baltimore.

To prevent a situation where China steals the results of American work, Boeing and its subcontractors are to apply the zero trust principle. In practice, this introduces the requirement of constantly assessing users for access only to the data they need at a given moment.

The next link in the security chain is the use of the Cybersecurity Maturity Model Certification (CMMC). This is a cybersecurity compliance and certification program of the US Department of Defense (DoD), allowing the evaluation of defence sector contractors in terms of security levels. This is intended to reduce the risk of various types of cyber threats.

Boeing F-47
Boeing F-47© Wikimedia Commons

The F-47 is intended to ensure US superiority

The Pentagon's caution seems fully justified in this case. This is due to both the significance attributed to the F-47 aircraft and past experiences related to Chinese industrial espionage or the use of reverse engineering.

The F-47 is set to replace the F-22 Raptor in the US Air Force. Designed according to assumptions from the end of the Cold War, it was initially an uncompromising, state-of-the-art air superiority fighter. Due to high costs and the collapse of the Soviet Union, production of the F-22 was limited to 195 units (including prototypes).

The F-22 led the world by about 30 years in terms of technology—ensuring the US Air Force's superiority over any opponent for that long. This advantage is gradually diminishing as potential adversaries introduce new types of machines such as the Russian Su-57 or the Chinese J-20.

F-22 Raptor planes
F-22 Raptor planes© usaf

Therefore, the Department of Defense, starting to phase out the F-22, plans to replace it with an aircraft that will once again guarantee the US Air Force a technological advantage over a potential adversary and compensate for its numerical superiority. From the Pentagon's point of view, the F-22 is one of the key weapon systems in the context of a potential confrontation with China.

Cyberattacks on the USA

The threat from Chinese intelligence is real and documented by numerous past cases. Regardless of the capabilities of the Chinese defence sector, the country has been stealing military technologies for decades (even from its allies).

Insights into classified data on this topic were provided, among others, by information stolen by Edward Snowden. According to it (verified, among others, by "Der Spiegel"), China carried out a multi-year, extensive operation aimed at Lockheed Martin and its subcontractors worldwide (including companies from Australia, Israel, Canada, and the UK).

J-20 Chinese air superiority aircraft
J-20 Chinese air superiority aircraft© Getty Images | VCG

The result was the theft of about 100 terabytes of data related to the F-35 aircraft, which helped the Chinese aviation sector catch up with over a decade of development and research work within two years. The stolen information pertained to, among other things, avionics systems, crucial engine parts, anti-radar coatings, and exhaust gas cooling methods, allowing for a reduction in the aircraft's thermal signature.

The technology thief

The F-35 case—although probably the most spectacular (at least among those revealed)—is not the only one. Through cyberattacks or the work of agents, China acquired terabytes of data on American submarines, the Patriot air defence system, and B-2 Spirit bombers.

Among the proven thefts is an operation conducted by China using an agent employed at Boeing and a company established in Canada specializing in cable production, used in the onboard installations of aircraft.

The result of this action was the theft of 630,000 files belonging to Boeing, containing information about F-35, F-22, and, primarily, the C-17 transport aircraft. This information allowed China to accelerate work on its own transport aircraft, now known as the Y-20.

Chinese transport aircraft Y-20
Chinese transport aircraft Y-20© Getty Images | VCG

However, the targets of Chinese attacks are not only the United States. Back in the 1980s, using reverse engineering, China copied, among other things, the French Crotale air defence system, creating the HQ-9 set.

Chinese J-15 airplane
Chinese J-15 airplane© Getty Images | NurPhoto

Even earlier, in the 1960s—after cooling relations with the Soviet Union—Beijing copied the Soviet MiG-21 aircraft, which was subsequently produced in China under the name J-7. The Shenyang J-11 (Su-27) and Shenyang J-15 (Su-33) are also unlicensed copies of Russian aircraft.

Related content