China Denounces Pentagon Cyberwarfare Report

China is denouncing interpretations of its military operations in the East and the South China Sea contained in a new new US Defense Department report that focuses on on cyberwarfare.

The report “deliberately distorted” China’s defense policy and legitimate actions, spokesman Yang Yujun said in a statement posted Saturday on the Chinese defense ministry’s official feed on Weibo, the popular Chinese microblogging site.

At issue is the Defense Department’s annual report to Congress on China’s capabilities, published recently. China typically responds sharply to the U.S. assessments, and the 156-page document was released ahead of a visit to Vietnam and Japan this month by President Barack Obama amid increasing tensions between the US, China and Southeast Asian nations over sovereignty claims in the South China Sea.

The report asserts that China’s military conducted cyber probes and intrusions against US computer networks to support intelligence collection and electronic warfare.

Intelligence Gathering

“China is using its cyber capabilities to support intelligence collection against 
the US diplomatic, economic, and defense industrial base sectors that support US national defense programs,” the defense department said in the report.

Highlighting what the Pentagon describes as China’s focus on improving cyber capabilities to counter a “stronger foe,” the report said information gleaned by hackers “could inform Chinese military planners’ work to build a picture of US defense networks, logistics, and related military capabilities that could be exploited during a crisis.”

“The accesses and skills required for these intrusions are similar to those necessary to conduct cyber-attacks,” according to the report. The intelligence gathering could also provide the ruling Communist Party “insights into US leadership perspectives on key China issues.”

Yang, the Chinese defense ministry spokesman, warned in response that China wants the US to stop using words or actions detrimental to maintaining mutual trust between the US and Chinese militaries.

Contentious Islands

In the same statement, Yang said that China is reinforcing its military along defensive lines, to protect its sovereignty, security and territorial integrity. And the artificial islands being built in the South China Sea are mostly for civilian needs, said Yang.
The Pentagon report said that President Xi Jinping’s military in 2015 “accelerated land reclamation and infrastructure construction at its outposts in the Spratly Islands,” which when complete “will include harbors, communications and surveillance systems, logistics facilities, and three airfields.”

Quick-Take: Territorial Disputes Simmer Around an Assertive China

“Although artificial islands do not provide China with any additional territorial or maritime rights within the South China Sea, China will be able to use its reclaimed features as persistent civil-military bases to enhance its presence in the South China Sea significantly and enhance China’s ability to control the features and nearby maritime space,” the report said.

China claims more than 80 percent of the South China Sea. Several other nations, including Vietnam and the Philippines, have competing sovereignty claims in the region.

New Airstrip

Adding to tensions, Chinese naval vessels followed and sent warnings to the USS William P. Lawrence this week as the vessel sailed within the 12-nautical-mile (22 kilometer) territorial zone around Fiery Cross Reef, a feature in the Spratly Islands where China has dumped hundreds of thousands of tons of sand and coral to create an island on which it has built an airstrip.

China called the US warship’s maneuvers “a naked challenge,” while the US said it was a “freedom of navigation” operation in international waters, one of many it has taken near contested reefs and outcrops. Chinese officials held a video conference on the tensions on Friday with Marine General Joseph Dunford, chairman of the US Joint Chiefs of Staff.

The Pentagon’s report also highlighted what it described as an an “extraordinarily rapid” expansion of China’s long-range precision strike capabilities. While China has a no-first-use policy toward nuclear weapons, the report suggested, based on Chinese media reports and military writings, that the country intends to build a stealth bomber to carry nuclear weapons.
Nuclear Triad

“If it does, China would develop a ‘triad’ of nuclear delivery systems dispersed across land, sea and air, a posture considered since the Cold War to improve survivability and strategic deterrence,” according to the report. The US has plans to modernize its long-standing nuclear triad.

One of the Chinese military capability developments being most closely watched is when its first JIN-class submarines start to said armed with JL-2 intercontinental ballistic nuclear missiles capable of striking the US. These patrols have been forecast for at least two years in the Pentagon report and in Defense Intelligence Agency congressional testimony.

According to the recent assessment, “this platform represents China’s first credible, sea-based nuclear deterrent.” US Deputy Assistant Secretary for East Asia Abraham Denmark told reporters Friday that China has not yet conducted a “deterrence” patrol. “China will probably conduct its first” nuclear-missile armed submarine patrol sometime in 2016, the report said.

Ein News

 

« Britain’s Border Control Systems Keep Falling Over
Google Hiring People To Test Self-Driving Cars »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

Delta Risk

Delta Risk

Delta Risk is a global provider of managed security services and cyber security risk management solutions to government and private sector clients.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

Slovenian Digital Coalition

Slovenian Digital Coalition

Slovenian Digital Coalition is a coalition working in the field of smart cities, e-commerce, e-skills, e-inclusion, cyber security, internet and other areas related to developing the digital society.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Crowe

Crowe

Crowe is a public accounting, consulting, and technology firm that combines deep industry and specialized expertise with innovation.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

Bastion Networks

Bastion Networks

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions to protect from online threats.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

TIM Enterprise

TIM Enterprise

TIM Enterprise offers innovative, sustainable and secure 360-degree digital solutions to companies and public administrations.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.