The keyboard: The weapon of choice in new type of warfare

THE evidence had been trickling in for years. As far back as 2007, hackers penetrated the Pentagon’s defences and stole plans for the F-35 Lightning II fighter, a combination stealth bomber and fighter jet that remains under development by a consortium of defence and aerospace companies.
Determining the source of attacks like these is notoriously difficult. Determining anything in relation to international cyber crime is notoriously difficult, but Pentagon officials amassed sufficient evidence to conclude that the hack originated in China.