China Denounces Pentagon Cyberwarfare Report

China is denouncing interpretations of its military operations in the East and the South China Sea contained in a new new US Defense Department report that focuses on on cyberwarfare.

The report “deliberately distorted” China’s defense policy and legitimate actions, spokesman Yang Yujun said in a statement posted Saturday on the Chinese defense ministry’s official feed on Weibo, the popular Chinese microblogging site.

At issue is the Defense Department’s annual report to Congress on China’s capabilities, published recently. China typically responds sharply to the U.S. assessments, and the 156-page document was released ahead of a visit to Vietnam and Japan this month by President Barack Obama amid increasing tensions between the US, China and Southeast Asian nations over sovereignty claims in the South China Sea.

The report asserts that China’s military conducted cyber probes and intrusions against US computer networks to support intelligence collection and electronic warfare.

Intelligence Gathering

“China is using its cyber capabilities to support intelligence collection against 
the US diplomatic, economic, and defense industrial base sectors that support US national defense programs,” the defense department said in the report.

Highlighting what the Pentagon describes as China’s focus on improving cyber capabilities to counter a “stronger foe,” the report said information gleaned by hackers “could inform Chinese military planners’ work to build a picture of US defense networks, logistics, and related military capabilities that could be exploited during a crisis.”

“The accesses and skills required for these intrusions are similar to those necessary to conduct cyber-attacks,” according to the report. The intelligence gathering could also provide the ruling Communist Party “insights into US leadership perspectives on key China issues.”

Yang, the Chinese defense ministry spokesman, warned in response that China wants the US to stop using words or actions detrimental to maintaining mutual trust between the US and Chinese militaries.

Contentious Islands

In the same statement, Yang said that China is reinforcing its military along defensive lines, to protect its sovereignty, security and territorial integrity. And the artificial islands being built in the South China Sea are mostly for civilian needs, said Yang.
The Pentagon report said that President Xi Jinping’s military in 2015 “accelerated land reclamation and infrastructure construction at its outposts in the Spratly Islands,” which when complete “will include harbors, communications and surveillance systems, logistics facilities, and three airfields.”

Quick-Take: Territorial Disputes Simmer Around an Assertive China

“Although artificial islands do not provide China with any additional territorial or maritime rights within the South China Sea, China will be able to use its reclaimed features as persistent civil-military bases to enhance its presence in the South China Sea significantly and enhance China’s ability to control the features and nearby maritime space,” the report said.

China claims more than 80 percent of the South China Sea. Several other nations, including Vietnam and the Philippines, have competing sovereignty claims in the region.

New Airstrip

Adding to tensions, Chinese naval vessels followed and sent warnings to the USS William P. Lawrence this week as the vessel sailed within the 12-nautical-mile (22 kilometer) territorial zone around Fiery Cross Reef, a feature in the Spratly Islands where China has dumped hundreds of thousands of tons of sand and coral to create an island on which it has built an airstrip.

China called the US warship’s maneuvers “a naked challenge,” while the US said it was a “freedom of navigation” operation in international waters, one of many it has taken near contested reefs and outcrops. Chinese officials held a video conference on the tensions on Friday with Marine General Joseph Dunford, chairman of the US Joint Chiefs of Staff.

The Pentagon’s report also highlighted what it described as an an “extraordinarily rapid” expansion of China’s long-range precision strike capabilities. While China has a no-first-use policy toward nuclear weapons, the report suggested, based on Chinese media reports and military writings, that the country intends to build a stealth bomber to carry nuclear weapons.
Nuclear Triad

“If it does, China would develop a ‘triad’ of nuclear delivery systems dispersed across land, sea and air, a posture considered since the Cold War to improve survivability and strategic deterrence,” according to the report. The US has plans to modernize its long-standing nuclear triad.

One of the Chinese military capability developments being most closely watched is when its first JIN-class submarines start to said armed with JL-2 intercontinental ballistic nuclear missiles capable of striking the US. These patrols have been forecast for at least two years in the Pentagon report and in Defense Intelligence Agency congressional testimony.

According to the recent assessment, “this platform represents China’s first credible, sea-based nuclear deterrent.” US Deputy Assistant Secretary for East Asia Abraham Denmark told reporters Friday that China has not yet conducted a “deterrence” patrol. “China will probably conduct its first” nuclear-missile armed submarine patrol sometime in 2016, the report said.

Ein News

 

« Britain’s Border Control Systems Keep Falling Over
Google Hiring People To Test Self-Driving Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

Tech Mahindra

Tech Mahindra

Tech Mahindra is a global leader in IT solutions, BPO, business consulting services & digital technologies.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

Intrinsyc Technologies

Intrinsyc Technologies

Intrinsyc provides product development services and Edge Computing modules that are helping to take the Internet of Things products to the next level.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

NXTsoft

NXTsoft

NXTsoft’s solutions help businesses secure, connect and optimize their data to maximize revenue opportunities, enhance profitability, and mitigate cybersecurity risk.

Trusted Technologies and Solutions (TTS)

Trusted Technologies and Solutions (TTS)

TTS is a security consulting company specialised on business continuity and crisis management, information security management, information risk management and identity and access management.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.