China Denounces Pentagon Cyberwarfare Report

China is denouncing interpretations of its military operations in the East and the South China Sea contained in a new new US Defense Department report that focuses on on cyberwarfare.

The report “deliberately distorted” China’s defense policy and legitimate actions, spokesman Yang Yujun said in a statement posted Saturday on the Chinese defense ministry’s official feed on Weibo, the popular Chinese microblogging site.

At issue is the Defense Department’s annual report to Congress on China’s capabilities, published recently. China typically responds sharply to the U.S. assessments, and the 156-page document was released ahead of a visit to Vietnam and Japan this month by President Barack Obama amid increasing tensions between the US, China and Southeast Asian nations over sovereignty claims in the South China Sea.

The report asserts that China’s military conducted cyber probes and intrusions against US computer networks to support intelligence collection and electronic warfare.

Intelligence Gathering

“China is using its cyber capabilities to support intelligence collection against 
the US diplomatic, economic, and defense industrial base sectors that support US national defense programs,” the defense department said in the report.

Highlighting what the Pentagon describes as China’s focus on improving cyber capabilities to counter a “stronger foe,” the report said information gleaned by hackers “could inform Chinese military planners’ work to build a picture of US defense networks, logistics, and related military capabilities that could be exploited during a crisis.”

“The accesses and skills required for these intrusions are similar to those necessary to conduct cyber-attacks,” according to the report. The intelligence gathering could also provide the ruling Communist Party “insights into US leadership perspectives on key China issues.”

Yang, the Chinese defense ministry spokesman, warned in response that China wants the US to stop using words or actions detrimental to maintaining mutual trust between the US and Chinese militaries.

Contentious Islands

In the same statement, Yang said that China is reinforcing its military along defensive lines, to protect its sovereignty, security and territorial integrity. And the artificial islands being built in the South China Sea are mostly for civilian needs, said Yang.
The Pentagon report said that President Xi Jinping’s military in 2015 “accelerated land reclamation and infrastructure construction at its outposts in the Spratly Islands,” which when complete “will include harbors, communications and surveillance systems, logistics facilities, and three airfields.”

Quick-Take: Territorial Disputes Simmer Around an Assertive China

“Although artificial islands do not provide China with any additional territorial or maritime rights within the South China Sea, China will be able to use its reclaimed features as persistent civil-military bases to enhance its presence in the South China Sea significantly and enhance China’s ability to control the features and nearby maritime space,” the report said.

China claims more than 80 percent of the South China Sea. Several other nations, including Vietnam and the Philippines, have competing sovereignty claims in the region.

New Airstrip

Adding to tensions, Chinese naval vessels followed and sent warnings to the USS William P. Lawrence this week as the vessel sailed within the 12-nautical-mile (22 kilometer) territorial zone around Fiery Cross Reef, a feature in the Spratly Islands where China has dumped hundreds of thousands of tons of sand and coral to create an island on which it has built an airstrip.

China called the US warship’s maneuvers “a naked challenge,” while the US said it was a “freedom of navigation” operation in international waters, one of many it has taken near contested reefs and outcrops. Chinese officials held a video conference on the tensions on Friday with Marine General Joseph Dunford, chairman of the US Joint Chiefs of Staff.

The Pentagon’s report also highlighted what it described as an an “extraordinarily rapid” expansion of China’s long-range precision strike capabilities. While China has a no-first-use policy toward nuclear weapons, the report suggested, based on Chinese media reports and military writings, that the country intends to build a stealth bomber to carry nuclear weapons.
Nuclear Triad

“If it does, China would develop a ‘triad’ of nuclear delivery systems dispersed across land, sea and air, a posture considered since the Cold War to improve survivability and strategic deterrence,” according to the report. The US has plans to modernize its long-standing nuclear triad.

One of the Chinese military capability developments being most closely watched is when its first JIN-class submarines start to said armed with JL-2 intercontinental ballistic nuclear missiles capable of striking the US. These patrols have been forecast for at least two years in the Pentagon report and in Defense Intelligence Agency congressional testimony.

According to the recent assessment, “this platform represents China’s first credible, sea-based nuclear deterrent.” US Deputy Assistant Secretary for East Asia Abraham Denmark told reporters Friday that China has not yet conducted a “deterrence” patrol. “China will probably conduct its first” nuclear-missile armed submarine patrol sometime in 2016, the report said.

Ein News

 

« Britain’s Border Control Systems Keep Falling Over
Google Hiring People To Test Self-Driving Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

Digital Infrastructure Association (DINL)

Digital Infrastructure Association (DINL)

DINL is the leading representative for companies and organisations which are active within the Dutch digital infrastructure sector.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

Startup Capital Ventures

Startup Capital Ventures

Startup Capital Ventures is an early stage venture capital firm with a focus on FinTech, Cloud/SaaS, Security, Healthcare IT, and IoT.

Caveonix

Caveonix

Caveonix’s RiskForesight TM solution is an automated, proactive risk and compliance platform designed for hybrid and multi-cloud.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Foretrace

Foretrace

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Druva

Druva

Druva is the industry’s leading SaaS platform for data resiliency, and the only vendor to ensure data protection across the most common data risks backed by a $10m guarantee.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.

Control D

Control D

Control D is a modern and customizable DNS service that blocks threats, unwanted content and ads - on all devices.