China Denounces Pentagon Cyberwarfare Report

China is denouncing interpretations of its military operations in the East and the South China Sea contained in a new new US Defense Department report that focuses on on cyberwarfare.

The report “deliberately distorted” China’s defense policy and legitimate actions, spokesman Yang Yujun said in a statement posted Saturday on the Chinese defense ministry’s official feed on Weibo, the popular Chinese microblogging site.

At issue is the Defense Department’s annual report to Congress on China’s capabilities, published recently. China typically responds sharply to the U.S. assessments, and the 156-page document was released ahead of a visit to Vietnam and Japan this month by President Barack Obama amid increasing tensions between the US, China and Southeast Asian nations over sovereignty claims in the South China Sea.

The report asserts that China’s military conducted cyber probes and intrusions against US computer networks to support intelligence collection and electronic warfare.

Intelligence Gathering

“China is using its cyber capabilities to support intelligence collection against 
the US diplomatic, economic, and defense industrial base sectors that support US national defense programs,” the defense department said in the report.

Highlighting what the Pentagon describes as China’s focus on improving cyber capabilities to counter a “stronger foe,” the report said information gleaned by hackers “could inform Chinese military planners’ work to build a picture of US defense networks, logistics, and related military capabilities that could be exploited during a crisis.”

“The accesses and skills required for these intrusions are similar to those necessary to conduct cyber-attacks,” according to the report. The intelligence gathering could also provide the ruling Communist Party “insights into US leadership perspectives on key China issues.”

Yang, the Chinese defense ministry spokesman, warned in response that China wants the US to stop using words or actions detrimental to maintaining mutual trust between the US and Chinese militaries.

Contentious Islands

In the same statement, Yang said that China is reinforcing its military along defensive lines, to protect its sovereignty, security and territorial integrity. And the artificial islands being built in the South China Sea are mostly for civilian needs, said Yang.
The Pentagon report said that President Xi Jinping’s military in 2015 “accelerated land reclamation and infrastructure construction at its outposts in the Spratly Islands,” which when complete “will include harbors, communications and surveillance systems, logistics facilities, and three airfields.”

Quick-Take: Territorial Disputes Simmer Around an Assertive China

“Although artificial islands do not provide China with any additional territorial or maritime rights within the South China Sea, China will be able to use its reclaimed features as persistent civil-military bases to enhance its presence in the South China Sea significantly and enhance China’s ability to control the features and nearby maritime space,” the report said.

China claims more than 80 percent of the South China Sea. Several other nations, including Vietnam and the Philippines, have competing sovereignty claims in the region.

New Airstrip

Adding to tensions, Chinese naval vessels followed and sent warnings to the USS William P. Lawrence this week as the vessel sailed within the 12-nautical-mile (22 kilometer) territorial zone around Fiery Cross Reef, a feature in the Spratly Islands where China has dumped hundreds of thousands of tons of sand and coral to create an island on which it has built an airstrip.

China called the US warship’s maneuvers “a naked challenge,” while the US said it was a “freedom of navigation” operation in international waters, one of many it has taken near contested reefs and outcrops. Chinese officials held a video conference on the tensions on Friday with Marine General Joseph Dunford, chairman of the US Joint Chiefs of Staff.

The Pentagon’s report also highlighted what it described as an an “extraordinarily rapid” expansion of China’s long-range precision strike capabilities. While China has a no-first-use policy toward nuclear weapons, the report suggested, based on Chinese media reports and military writings, that the country intends to build a stealth bomber to carry nuclear weapons.
Nuclear Triad

“If it does, China would develop a ‘triad’ of nuclear delivery systems dispersed across land, sea and air, a posture considered since the Cold War to improve survivability and strategic deterrence,” according to the report. The US has plans to modernize its long-standing nuclear triad.

One of the Chinese military capability developments being most closely watched is when its first JIN-class submarines start to said armed with JL-2 intercontinental ballistic nuclear missiles capable of striking the US. These patrols have been forecast for at least two years in the Pentagon report and in Defense Intelligence Agency congressional testimony.

According to the recent assessment, “this platform represents China’s first credible, sea-based nuclear deterrent.” US Deputy Assistant Secretary for East Asia Abraham Denmark told reporters Friday that China has not yet conducted a “deterrence” patrol. “China will probably conduct its first” nuclear-missile armed submarine patrol sometime in 2016, the report said.

Ein News

 

« Britain’s Border Control Systems Keep Falling Over
Google Hiring People To Test Self-Driving Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Caldew Consulting

Caldew Consulting

Caldew specialise in providing information assurance and cyber security consultancy, covering the full spectrum of the security life cycle.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

Asseco Group

Asseco Group

Asseco Poland stands at the forefront of the multinational Asseco Group. We are a leading provider of state-of-the-art IT solutions in Central and Eastern Europe.

MER Group

MER Group

MER Group is a world-leading integrator in the areas of communications and security. MER cyber solutions cover the entire range of cyber and intelligence related products and services.

Edvance

Edvance

Edvance operates a range of cybersecurity businesses including value added cybersecurity solutions distribution, security technology innovation and development, and SaS solution offerings.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

Melius Cyber Security

Melius Cyber Security

Melius Cyber Security has developed a world-leading SaaS platform, Cyber Safe Plus, built around continuous assessment and improvement through vulnerability scanning and penetration testing

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

SeQure

SeQure

SeQure is a cutting-edge startup specializing in the development of advanced security infrastructure for artificial intelligence and blockchain.