Search
JOIN OUR NETWORK

     

     

 

 

ARTICLE ARCHIVE
« International coalition defends its challenge against Davis-Besse Shield Building cracks, gaps, and rebar damage | Main | Updated "Southeast MI in the Radioactive Cross Hairs" backgrounder »
Thursday
May222014

Chinese military cyber-attack hacks Westinghouse nuclear secrets; How vulnerable are US reactors to "offensive cyber-inovations"? 

The U.S. Justice Department has indicted five members of China’s Peoples Liberation Army on charges of economic espionage and cyber-theft. The Chinese military officers allegedly hacked into company computers and stole an estimated $100 billion in trade secrets from Westinghouse Nuclear Division and other leading U.S. steel and solar power firms. The federal grand jury indictments against a foreign country on cyber-security charges are unprecedented.  The Pittsburgh, PA-based Westinghouse Nuclear Division was in the middle of a huge nuclear technology transfer for the construction of its AP1000 nuclear power plants in China when it was announced that the Chinese military was at the same time stealing propriety information about the reactor technology and Westinghouse’s negotiation strategies.  At the same time, China is ambitiously establishing itself as a global leader in the marketing of nuclear power technology with its own nuclear reactor design based largely on the AP1000 pressurized water reactor.

The grand jury indictments focus on the cyber-theft of industrial secrets aimed at gaining an international competitive edge over “fair trade” with the U.S.-based companies. However, the discovery raises long standing and on-going national security, public health and safety concerns associated with the potential for large scale military cyber-attacks against vulnerable critical infrastructure, particularly a vast patchwork electrical grid system and inherently dangerous nuclear power plants.  U.S. nuclear power plants initially rely upon the offsite electrical grid to power all of the onsite reactor safety systems.  A standoff cyber-attack not only can shutdown the electrical production from nuclear reactors but target internal components where failure leads to radiological catastrophe. “Offensive cyber-innovations” aimed at destroying nuclear infrastructure and internal systems are not unprecedented. In 2010, the United States and Israel conducted a joint cyber-attack code-named “Olympic Games” where the Stuxnet computer worm disabled Iran’s nuclear program by ruining roughly one-fifth of its German-made uranium enrichment centrifuges.