Chinese Military Aim To Lead On Cyber-Space Defense

A new Chinese military outfit will lead the country's push to enhance its cyber warfare, space security and online espionage capabilities, Chinese military observers and analysts said.

Senior People's Liberation Army (PLA) officials and other observers have begun to give details of the country's new Strategic Support Force (SSF), whose establishment was announced at the end of last year as part of a major overhaul of the armed forces.

"It's going to make them far more effective," said John Costello, a Washington-based analyst who focuses on China's cyber capabilities.

"It will most likely increase the sophistication of cyber intrusions and cyber reconnaissance over the long term. It will make them a lot more formidable to sustain cyber operations in a contested environment." The new outfit will also be charged with assisting civilian government departments with cyber defense, analysts said.

"China is facing many hackers on the Internet engaging in illegal activities against our country, for example online attacks against important government facilities, military facilities, and important civilian facilities," Rear Admiral Yin Zhuo, director of the PLA Navy's Expert Consultation Committee, told the official People's Daily online. "So it's imperative that we're equipped with defensive strength accordingly."

Yin, who according to his official biography is considered an expert on communications technology in the military, added that the force would also focus on space assets and global positioning operations.

China's growing cyber security prowess has been a source of tension in its relationship with the United States, which has repeatedly accused China of sponsoring hackers to steal data from its companies.

Beijing vehemently denies it engages in cyber theft, saying China itself is a victim of such attacks.

The Pentagon sees cyber espionage as a top national security concern. A 2014 U.S. indictment accused five Chinese military officers of hacking into American nuclear, metal and solar companies to steal trade secrets.

The indictment singled out Unit 61398 of the People's Liberation Army, which was "hired" to assemble corporate intelligence. China called the charges "made up."
In an interview, Song Zhongping, a respected Beijing-based military expert, said the SSF was more than a support force, and should be considered a military branch in its own right.

He added the force was comprised of three parts, including one made up of, "hacker troops" for cyber attacks and defense, as well as space and electronic warfare.

The space force will focus on all types of reconnaissance and satellite navigation, Song added. The electronic warfare unit would work on interference with enemy radar and communications.

Speaking about the military reforms on state television at the end of last year, Chinese President Xi Jinping called the support force a "new-type combat force to maintain national security and an important growth point of the PLA's combat capabilities." The force would facilitate cooperation between defense and civilian sectors, Xi added.

The new force could also incorporate civilian technology including cloud computing, artificial intelligence and Nano-Technology state media reported this month.

Senior Colonel Shao Yongling, a professor at the PLA Rocket Force Command College in the central province of Hubei, told the official China Daily that the SSF would serve to reduce duplication of tasks in the military and improve the PLA's ability to carry out joint operations.

"As for the Strategic Support Force, it better coordinates the cooperation between forces on the battlefield and logistic support," Major General Du Wenlong, PLA Academy of Military Science, told state broadcaster China Central Television (CCTV).

Reuters: 

« Computer Blind Spots (£)
Cognitive Computing is Advancing (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

EIT Digital

EIT Digital

EIT Digital is a leading digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. Areas of focus include digital infrastructure and cyber security.

Bugcrowd

Bugcrowd

As leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of tens of thousands of security researchers to identify critical software vulnerabilities.

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky addresses all the cybersecurity needs of industrial organizations in its Kaspersky Industrial CyberSecurity (KICS) portfolio.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Trusted Technologies and Solutions (TTS)

Trusted Technologies and Solutions (TTS)

TTS is a security consulting company specialised on business continuity and crisis management, information security management, information risk management and identity and access management.

senhasegura

senhasegura

senhasegura is a global Privileged Access Management vendor. Our mission is to eliminate privilege abuse in organizations around the globe and build digital sovereignty.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

Mindgard

Mindgard

The Mindgard Security Copilot platform secures your Artificial Intelligence, GenAI and LLMs.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.