Sign up to get full access to our latest articles, reports, videos and events delivered by military and industry experts and decision makers.

Pentagon Admits F-35 Data Theft is a ‘Major Problem’

Add bookmark

A top Pentagon official admitted in a Senate hearing this week that the theft of sensitive design data by hackers targeting programs like the F-35 Joint Strike Fighter has wiped out a huge U.S. advantage.

Defense acquisitionschief Frank Kendallsaid the theft is allowing rivals the chance to rush through development of their own stealth aircraft.

Mr. Kendall said he was fairly confident that classified information related to the F-35 was well-protected, but a lot of unclassified details were not protected.

"A lot of that is being stolen right now and it's a major problem for us," Mr. Kendall said.

"What it does is reduce the costs and lead time of our adversaries to doing their own designs, so it gives away a substantial advantage."

The F-35, which is the most expensive weapons program in U.S. history, is a fifth generation aircraft capable of evading radar and integrated air defense systems.

It was developed by Lockheed Martin and the U.S. intends to buy more than 2,400 of the aircraft, Reuters reports.

Mr. Kendall told Senators on Wednesday that his main concern was that the design and production edge had been compromised by competing powers.

He said: "It's the amount of time and effort they're going to have to put into getting their next design and staying with us.

"And as you're probably well aware, at least two nations are well into developing fifth-generation aircraft right now, so that's a concern."

He did not name any countries, but China and Russia are both developing their own fifth generation fighters.

Mr. Kendall said the Pentagon is working on bringing in stronger sanctions against defense contractors who fail to protect sensitive data.

Some analysts have been surprised at the rapid pace of stealth fighter development in China, which is suspected of stealing vast amounts of F-35 data.

In 2011 the communist country conducted a test flight of its J-20 stealth fighter in a show of force just hours before then-U.S. Defense Secretary Robert Gates met with then-President Hu Jintao during a visit to Beijing. A year later, it tested another stealth fighter, the J-31.

Hacking issues will be discussed at IDGA's Cyber Security for Government event in August. For more information, go to www.cybersecurityevent.com

[inlinead]


Upcoming Events

Military Flight Training USA

October 28 - 29, 2025

The Westin San Antonio North, San Antonio, TX

Military Flight Training USA

Biometrics for Government and Law Enforcement

November 19 - 20, 2025

Sheraton Reston Hotel, Reston, VA

Biometrics for Government and Law Enforcement

Next Generation Missiles and Hypersonics Summit

December 9 - 10, 2025

Sheraton Reston Hotel, Reston, VA

Next Generation Missiles and Hypersonics Summit

Future Indirect Fires

January 27 - 28, 2026

The Westin Arlington, Arlington, VA

Future Indirect Fires

Military Simulation Training Summit

February 24 - 25, 2026

The Celeste Hotel, Orlando, FL

Military Simulation Training Summit

Latest Webinars

Responsible and Transparent Approaches to AI in Biometric Algorithm

2024-08-14

01:00 PM - 01:45 PM EDT

Join the Department of Homeland Security and IDEMIA as they discuss how to bring security and transp...

Securing the Defence Industrial Base: Mitigating Risk and Delivering Resiliency in Physical and Digital Supply Chains

2022-04-21

12:00 PM - 01:00 PM EST

This webinar discusses the current risks in today's supply chain and the recent military initiatives...

Treatment Option for Two Subsets of Challenging to Treat Major Depressive Disorder in Adults

2021-08-25

12:00 PM - 01:00 PM EST

The latest IDGA webinar looks at treatment plans for the VA's adult patients with two subtypes of ma...

Recommended