Report: China’s New Comac C919 Jetliner Is Built With Stolen Technology

ExtremeTech
Oct 16, 2019 · 5 min read

by Joel Hruska

Image for post
Image for post

The C919 is a relatively new narrow-body jet built by the Commercial Aircraft Corporation of China, or COMAC for short. It’s also apparently the beneficiary (and to some degree, the result) of massive hacking operations undertaken by the Chinese government and a government-affiliated hacking group, dubbed Turbine Panda.

A major report by the infosec security company Crowdstrike lays out the details, and it doesn’t mince words. The opening paragraph of the report states:

Short of kicking down the door just as a cyber actor pushes enter, it is frustratingly hard to prove who is responsible for cyber attacks with 100% certainty. However, a series of recent U.S. Department of Justice (DoJ) indictments released over the course of two years, combined with CrowdStrike Intelligence’s own research, has allowed for startling visibility into a facet of China’s shadowy intelligence apparatus.

The document describes a sustained effort by China’s Ministry of State Security (MSS) to create a network of cyber actors, MSS employees, and company insiders to steal key pieces of technology from the companies China hired to collaborate on the design of the C919. These operations, CrowdStrike says, can ultimately be traced to the MSS Jiansu Bureau. That’s the same group thought to be responsible for breaching the Office of Personal Management (OPM) back in 2015.

Designing the C919

It was already obvious a decade ago that China would one day be a huge market for air travel. The country knew that rising per-capita GDP would spark domestic interest in flying and it set out to build a low-cost narrowbody jet that would meet its own needs more effectively than a competing solution from Boeing or Airbus. The C919, while described as being years behind the latest jets from the Boeing / Airbus duopoly, also has a much lower flyaway cost. To meet its own plan for a jet, China allied with a variety of foreign companies to produce various components.

Image for post
Image for post
Credit: CrowdStrike

In 2009, Comac announced it had chosen CFM International (a joint operation between GE Aviation and French aerospace firm Safran) to produce a variant of the LEAP-X engine, the LEAP-1C, for the C919. At the same time, Comac and another state-owned Chinese business, the Aviation Industry Corporation of China (Avic) were apparently tasked with designing a native Chinese design for the C919. In August 2016, Comac and Avic launched the Aero Engine Corporation of China (AECC), which produces an engine called the CJ-1000AX. The CJ-1000AX has long been suspected of being a copy of the LEAP-1C. The two engines share a great many suspicious similarities, including their dimensions and turbofan blade sizes. The first activity CrowdStrike observed in preparation for this theft came when Turbine Panda targeted the Los Angeles company Capstone Turbine in 2010, just a month after CFM was chosen as the engine provider.

Crowdstrike writes:

Though it is difficult to assess that the CJ-1000AX is a exact copy of the LEAP-X without direct access to technical engineering specifications, it is highly likely that its makers benefited significantly from the cyber espionage efforts of the MSS, which will be detailed further in subsequent blog installments, knocking several years (and potentially billions of dollars) off its development time.

We know so much about this specific situation because of indictments the Department of Justice has issued against various individuals, including “Sakula developer YU Pingan, JSSD Intelligence Officer XU Yanjun, GE Employee and insider ZHENG Xiaoqing, U.S. Army Reservist and assessor JI Chaoqun, and 10 JSSD-affiliated cyber operators in the ZHANG et. al. indictment.” The details revealed in these indictments have corroborated CrowdStrike’s own investigation.

Image for post
Image for post
Credit: CrowdStrike

Much of the rest of the report is a deep dive into the relationships between various individuals and the espionage they carried out. Honeywell and Safran were both targeted as well. Xu Yanjun recruited Zheng Xiaoqing as an insider informant and coached him on which technology to steal from GE. Ji Chaoqun entered the US on F-1 student visa to study electrical engineering in Chicago but agreed to work for Xu. He was, according to the report:

…eventually recruited to provide assessments on other high-value individuals in the aerospace industry for potential recruitment by the MSS. JI’s position in the U.S. Army Reserve program known as Military Accessions Vital to the National Interest (MAVNI) provided a perfect cover for JI’s assessment activities, as the program focuses on potential recruitment of foreign citizens with skills pertinent to national interest and legally residing in the U.S. Had it been successful, JI would have been handing XU other foreign-born recruitment candidates as they were about to enter U.S. military service on potentially sensitive projects.

The final section of the report is a discussion on what happened after these arrests and indictments were handed out. Despite the public nature of these indictments and events, China continues to mount attacks against US assets. The next-to-last paragraph of the report notes:

A major facet of the current Sino-U.S. trade war is forced technology transfer, which Beijing has used to great effect by siphoning intellectual property from foreign firms in exchange for providing joint ventures (JVs) and granting access to China’s lucrative market, only to be forced out later by domestic rivals as they grow competitive with state subsidies and support. Under current laws, the C919’s foreign suppliers (many of whom were targets of TURBINE PANDA operations) are required to physically assemble components in China through a JV with COMAC.

The original idea behind opening trade with China was that US and Chinese customers would both benefit. This has been true in many ways, but there’s a profound difference between manufacturing low-cost consumer goods and building high-performance aircraft parts with huge R&D costs. Such components are the end product of decades of research and manufacturing expertise. Far from competing on a level playing field, China appears to be focused on stealing the information it needs to close the gap with US companies, then limiting their access to its own market once it’s finished taking what it wants.

:

Originally published at https://www.extremetech.com on October 16, 2019.

ExtremeTech Access

All the cutting-edge chip news, software updates, and…

ExtremeTech

Written by

ExtremeTech is the Web’s top destination for news and analysis of emerging science and technology trends, and important software, hardware, and gadgets.

ExtremeTech Access

All the cutting-edge chip news, software updates, and future science of ExtremeTech, distilled into an easy-to-read format.

ExtremeTech

Written by

ExtremeTech is the Web’s top destination for news and analysis of emerging science and technology trends, and important software, hardware, and gadgets.

ExtremeTech Access

All the cutting-edge chip news, software updates, and future science of ExtremeTech, distilled into an easy-to-read format.

Medium is an open platform where 170 million readers come to find insightful and dynamic thinking. Here, expert and undiscovered voices alike dive into the heart of any topic and bring new ideas to the surface. Learn more

Follow the writers, publications, and topics that matter to you, and you’ll see them on your homepage and in your inbox. Explore

If you have a story to tell, knowledge to share, or a perspective to offer — welcome home. It’s easy and free to post your thinking on any topic. Write on Medium

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store