China Denounces Pentagon Cyberwarfare Report

China is denouncing interpretations of its military operations in the East and the South China Sea contained in a new new US Defense Department report that focuses on on cyberwarfare.

The report “deliberately distorted” China’s defense policy and legitimate actions, spokesman Yang Yujun said in a statement posted Saturday on the Chinese defense ministry’s official feed on Weibo, the popular Chinese microblogging site.

At issue is the Defense Department’s annual report to Congress on China’s capabilities, published recently. China typically responds sharply to the U.S. assessments, and the 156-page document was released ahead of a visit to Vietnam and Japan this month by President Barack Obama amid increasing tensions between the US, China and Southeast Asian nations over sovereignty claims in the South China Sea.

The report asserts that China’s military conducted cyber probes and intrusions against US computer networks to support intelligence collection and electronic warfare.

Intelligence Gathering

“China is using its cyber capabilities to support intelligence collection against 
the US diplomatic, economic, and defense industrial base sectors that support US national defense programs,” the defense department said in the report.

Highlighting what the Pentagon describes as China’s focus on improving cyber capabilities to counter a “stronger foe,” the report said information gleaned by hackers “could inform Chinese military planners’ work to build a picture of US defense networks, logistics, and related military capabilities that could be exploited during a crisis.”

“The accesses and skills required for these intrusions are similar to those necessary to conduct cyber-attacks,” according to the report. The intelligence gathering could also provide the ruling Communist Party “insights into US leadership perspectives on key China issues.”

Yang, the Chinese defense ministry spokesman, warned in response that China wants the US to stop using words or actions detrimental to maintaining mutual trust between the US and Chinese militaries.

Contentious Islands

In the same statement, Yang said that China is reinforcing its military along defensive lines, to protect its sovereignty, security and territorial integrity. And the artificial islands being built in the South China Sea are mostly for civilian needs, said Yang.
The Pentagon report said that President Xi Jinping’s military in 2015 “accelerated land reclamation and infrastructure construction at its outposts in the Spratly Islands,” which when complete “will include harbors, communications and surveillance systems, logistics facilities, and three airfields.”

Quick-Take: Territorial Disputes Simmer Around an Assertive China

“Although artificial islands do not provide China with any additional territorial or maritime rights within the South China Sea, China will be able to use its reclaimed features as persistent civil-military bases to enhance its presence in the South China Sea significantly and enhance China’s ability to control the features and nearby maritime space,” the report said.

China claims more than 80 percent of the South China Sea. Several other nations, including Vietnam and the Philippines, have competing sovereignty claims in the region.

New Airstrip

Adding to tensions, Chinese naval vessels followed and sent warnings to the USS William P. Lawrence this week as the vessel sailed within the 12-nautical-mile (22 kilometer) territorial zone around Fiery Cross Reef, a feature in the Spratly Islands where China has dumped hundreds of thousands of tons of sand and coral to create an island on which it has built an airstrip.

China called the US warship’s maneuvers “a naked challenge,” while the US said it was a “freedom of navigation” operation in international waters, one of many it has taken near contested reefs and outcrops. Chinese officials held a video conference on the tensions on Friday with Marine General Joseph Dunford, chairman of the US Joint Chiefs of Staff.

The Pentagon’s report also highlighted what it described as an an “extraordinarily rapid” expansion of China’s long-range precision strike capabilities. While China has a no-first-use policy toward nuclear weapons, the report suggested, based on Chinese media reports and military writings, that the country intends to build a stealth bomber to carry nuclear weapons.
Nuclear Triad

“If it does, China would develop a ‘triad’ of nuclear delivery systems dispersed across land, sea and air, a posture considered since the Cold War to improve survivability and strategic deterrence,” according to the report. The US has plans to modernize its long-standing nuclear triad.

One of the Chinese military capability developments being most closely watched is when its first JIN-class submarines start to said armed with JL-2 intercontinental ballistic nuclear missiles capable of striking the US. These patrols have been forecast for at least two years in the Pentagon report and in Defense Intelligence Agency congressional testimony.

According to the recent assessment, “this platform represents China’s first credible, sea-based nuclear deterrent.” US Deputy Assistant Secretary for East Asia Abraham Denmark told reporters Friday that China has not yet conducted a “deterrence” patrol. “China will probably conduct its first” nuclear-missile armed submarine patrol sometime in 2016, the report said.

Ein News

 

« Britain’s Border Control Systems Keep Falling Over
Google Hiring People To Test Self-Driving Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

National Cyber Security Centre (NCSC) - Norway

National Cyber Security Centre (NCSC) - Norway

NCSC is part of the Norwegian Security Authority, and is Norway's national cyber security hub and the national CERT.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

Wavestone

Wavestone

Wavestone is a strategy and technology consulting company with areas of expertise including digital transformation and cybersecurity.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

CryptTalk

CryptTalk

CryptTalk is an easy-to-use secure communication service.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

Austrian Institute of Technology (AIT)

Austrian Institute of Technology (AIT)

AIT is Austria's largest research and technology organisation and a specialist in the key infrastructure issues of the future including data science and cybersecurity.

US Venture Partners (USVP)

US Venture Partners (USVP)

USVP is a leading Silicon Valley venture capital firm focusing on early-stage start-ups that transform cybersecurity, enterprise software, consumer mobile and e-commerce, and healthcare.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

HunCERT

HunCERT

HunCERT's mission is to assist Hungarian Internet Service Providers in applying appropriate procedures to address the risks of computer network incidents and to respond to such incidents.

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Certcube Labs

Certcube Labs

Certcube Labs provide a broad range of services in the areas of Assessments, Development, Risk Advisory, Blockchain, Forensics Investigations, Managed Security Solutions, and IT Security Trainings.

Guardian Angel Cyber

Guardian Angel Cyber

Guardian Angel Cyber, is your trusted ally in safeguarding your digital assets and online presence.

SECTA5

SECTA5

SECTA5 is a cybersecurity company building a next-generation Continuous Threat and Exposure Management platform, leveraging the expertise of offensively trained cyber defenders.