Counterfeit Chinese Electronics Redux; AESA & GBU-39 Suspect

August 19/15: A Chinese company has been accused external link of selling counterfeit Active Electronically Scanned Array (AESA) radar systems, using a design taken from Israel’s Elta Systems. NAV Technology Company is believed to be selling a version of Elta Systems’ EL/M-2052 system external link, an airborne fire control radar capable of tracking dozens of targets simultaneously. The company also offers other products thought external link to be taken from US designs, including a copy of the GBU-39 precision munition.

For more on this and other stories, please consider purchasing a membership.
If you are already a subscriber, login to your account.
On Sept 30/08, “The USA’s National Cybersecurity Initiative” focused on the belated but growing reaction to recent uses of cyber-attacks as an adjunct to warfare, and by the growing rate of attempted intrusions into American systems from countries like China. “Secure Semiconductors: Sensible, or Sisiphyean?” discussed the growing realization within the US military that massive use of commercial electronics, coupled with the complexity of modern chip designs, made it very difficult to be sure that “backdoors” and other security flaws weren’t being inserted into high-end American defense equipment. It’s a difficult conundrum, because commercial chips offer orders of magnitude improvements in cost and performance. Hence DARPA’s “Trust in IC” program, which hopes to crack the problem and offer the best of both worlds. On Oct 2/08, Business Week’s in-depth article “Dangerous Fakes” claimed that a key component of the silicon security threat might be even simpler: “The American military faces a growing threat of potentially fatal equipment failure – and even foreign espionage – because of counterfeit computer components used in warplanes, ships, and communication networks. Fake microchips flow from unruly bazaars in rural China to dubious kitchen-table brokers in the U.S. and into complex weapons. Senior Pentagon officials publicly […]
MISC silicon chip

On Sept 30/08, “The USA’s National Cybersecurity Initiative” focused on the belated but growing reaction to recent uses of cyber-attacks as an adjunct to warfare, and by the growing rate of attempted intrusions into American systems from countries like China. “Secure Semiconductors: Sensible, or Sisiphyean?” discussed the growing realization within the US military that massive use of commercial electronics, coupled with the complexity of modern chip designs, made it very difficult to be sure that “backdoors” and other security flaws weren’t being inserted into high-end American defense equipment. It’s a difficult conundrum, because commercial chips offer orders of magnitude improvements in cost and performance. Hence DARPA’s “Trust in IC” program, which hopes to crack the problem and offer the best of both worlds.

On Oct 2/08, Business Week’s in-depth article “Dangerous Fakes” claimed that a key component of the silicon security threat might be even simpler:

ELEC_Spyware.gif

“The American military faces a growing threat of potentially fatal equipment failure – and even foreign espionage – because of counterfeit computer components used in warplanes, ships, and communication networks. Fake microchips flow from unruly bazaars in rural China to dubious kitchen-table brokers in the U.S. and into complex weapons. Senior Pentagon officials publicly play down the danger, but government documents, as well as interviews with insiders, suggest possible connections between phony parts and breakdowns… Potentially more alarming than either of the two aircraft episodes are hundreds of counterfeit routers made in China and sold to the Army, Navy, Air Force, and Marines over the past four years. These fakes could facilitate foreign espionage, as well as cause accidents. The U.S. Justice Dept. is prosecuting the operators of an electronics distributor in Texas – and last year obtained guilty pleas from the proprietors of a company in Washington State – for allegedly selling the military dozens of falsely labeled routers… Referring to the seizure of more than 400 fake routers so far, Melissa E. Hathaway, head of cyber security in the Office of the Director of National Intelligence, says: “Counterfeit products have been linked to the crash of mission-critical networks, and may also contain hidden ‘back doors’ enabling network security to be bypassed and sensitive data accessed…”

Update

August 19/15: A Chinese company has been accused of selling counterfeit Active Electronically Scanned Array (AESA) radar systems, using a design taken from Israel’s Elta Systems. NAV Technology Company is believed to be selling a version of Elta Systems’ EL/M-2052 system, an airborne fire control radar capable of tracking dozens of targets simultaneously. The company also offers other products thought to be taken from US designs, including a copy of the GBU-39 precision munition.

One Source: Hundreds of programs; Thousands of links, photos, and analyses

DII brings a complete collection of articles with original reporting and research, and expert analyses of events to your desktop – no need for multiple modules, or complex subscriptions. All supporting documents, links, & appendices accompany each article.

Benefits

  • Save time
  • Eliminate your blind spots
  • Get the big picture, quickly
  • Keep up with the important facts
  • Stay on top of your projects or your competitors

Features

  • Coverage of procurement and doctrine issues
  • Timeline of past and future program events
  • Comprehensive links to other useful resources