Chinese Military Aim To Lead On Cyber-Space Defense

A new Chinese military outfit will lead the country's push to enhance its cyber warfare, space security and online espionage capabilities, Chinese military observers and analysts said.

Senior People's Liberation Army (PLA) officials and other observers have begun to give details of the country's new Strategic Support Force (SSF), whose establishment was announced at the end of last year as part of a major overhaul of the armed forces.

"It's going to make them far more effective," said John Costello, a Washington-based analyst who focuses on China's cyber capabilities.

"It will most likely increase the sophistication of cyber intrusions and cyber reconnaissance over the long term. It will make them a lot more formidable to sustain cyber operations in a contested environment." The new outfit will also be charged with assisting civilian government departments with cyber defense, analysts said.

"China is facing many hackers on the Internet engaging in illegal activities against our country, for example online attacks against important government facilities, military facilities, and important civilian facilities," Rear Admiral Yin Zhuo, director of the PLA Navy's Expert Consultation Committee, told the official People's Daily online. "So it's imperative that we're equipped with defensive strength accordingly."

Yin, who according to his official biography is considered an expert on communications technology in the military, added that the force would also focus on space assets and global positioning operations.

China's growing cyber security prowess has been a source of tension in its relationship with the United States, which has repeatedly accused China of sponsoring hackers to steal data from its companies.

Beijing vehemently denies it engages in cyber theft, saying China itself is a victim of such attacks.

The Pentagon sees cyber espionage as a top national security concern. A 2014 U.S. indictment accused five Chinese military officers of hacking into American nuclear, metal and solar companies to steal trade secrets.

The indictment singled out Unit 61398 of the People's Liberation Army, which was "hired" to assemble corporate intelligence. China called the charges "made up."
In an interview, Song Zhongping, a respected Beijing-based military expert, said the SSF was more than a support force, and should be considered a military branch in its own right.

He added the force was comprised of three parts, including one made up of, "hacker troops" for cyber attacks and defense, as well as space and electronic warfare.

The space force will focus on all types of reconnaissance and satellite navigation, Song added. The electronic warfare unit would work on interference with enemy radar and communications.

Speaking about the military reforms on state television at the end of last year, Chinese President Xi Jinping called the support force a "new-type combat force to maintain national security and an important growth point of the PLA's combat capabilities." The force would facilitate cooperation between defense and civilian sectors, Xi added.

The new force could also incorporate civilian technology including cloud computing, artificial intelligence and Nano-Technology state media reported this month.

Senior Colonel Shao Yongling, a professor at the PLA Rocket Force Command College in the central province of Hubei, told the official China Daily that the SSF would serve to reduce duplication of tasks in the military and improve the PLA's ability to carry out joint operations.

"As for the Strategic Support Force, it better coordinates the cooperation between forces on the battlefield and logistic support," Major General Du Wenlong, PLA Academy of Military Science, told state broadcaster China Central Television (CCTV).

Reuters: 

« Computer Blind Spots (£)
Cognitive Computing is Advancing (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

Information Network Security Agency (INSA) - Ethiopia

Information Network Security Agency (INSA) - Ethiopia

INSA's vision is to realize a globally competent National Cyber capability which plays a key role in protecting the national interests of Ethiopia.

Basis Technology

Basis Technology

Basis Technology provides software solutions for text analytics, information retrieval, digital forensics, and identity resolution.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

North East Business Resilience Centre (NEBRC)

North East Business Resilience Centre (NEBRC)

The North East Business Resilience Centre is a non-profit organisation here to support businesses in the North East of England in protecting themselves from cyber crimes and fraud.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

Certera

Certera

Certera is a modern and affordable SSL Certificate, Code Signing Certificate, and Cyber Security Services provider.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).