Chinese Military Aim To Lead On Cyber-Space Defense

A new Chinese military outfit will lead the country's push to enhance its cyber warfare, space security and online espionage capabilities, Chinese military observers and analysts said.

Senior People's Liberation Army (PLA) officials and other observers have begun to give details of the country's new Strategic Support Force (SSF), whose establishment was announced at the end of last year as part of a major overhaul of the armed forces.

"It's going to make them far more effective," said John Costello, a Washington-based analyst who focuses on China's cyber capabilities.

"It will most likely increase the sophistication of cyber intrusions and cyber reconnaissance over the long term. It will make them a lot more formidable to sustain cyber operations in a contested environment." The new outfit will also be charged with assisting civilian government departments with cyber defense, analysts said.

"China is facing many hackers on the Internet engaging in illegal activities against our country, for example online attacks against important government facilities, military facilities, and important civilian facilities," Rear Admiral Yin Zhuo, director of the PLA Navy's Expert Consultation Committee, told the official People's Daily online. "So it's imperative that we're equipped with defensive strength accordingly."

Yin, who according to his official biography is considered an expert on communications technology in the military, added that the force would also focus on space assets and global positioning operations.

China's growing cyber security prowess has been a source of tension in its relationship with the United States, which has repeatedly accused China of sponsoring hackers to steal data from its companies.

Beijing vehemently denies it engages in cyber theft, saying China itself is a victim of such attacks.

The Pentagon sees cyber espionage as a top national security concern. A 2014 U.S. indictment accused five Chinese military officers of hacking into American nuclear, metal and solar companies to steal trade secrets.

The indictment singled out Unit 61398 of the People's Liberation Army, which was "hired" to assemble corporate intelligence. China called the charges "made up."
In an interview, Song Zhongping, a respected Beijing-based military expert, said the SSF was more than a support force, and should be considered a military branch in its own right.

He added the force was comprised of three parts, including one made up of, "hacker troops" for cyber attacks and defense, as well as space and electronic warfare.

The space force will focus on all types of reconnaissance and satellite navigation, Song added. The electronic warfare unit would work on interference with enemy radar and communications.

Speaking about the military reforms on state television at the end of last year, Chinese President Xi Jinping called the support force a "new-type combat force to maintain national security and an important growth point of the PLA's combat capabilities." The force would facilitate cooperation between defense and civilian sectors, Xi added.

The new force could also incorporate civilian technology including cloud computing, artificial intelligence and Nano-Technology state media reported this month.

Senior Colonel Shao Yongling, a professor at the PLA Rocket Force Command College in the central province of Hubei, told the official China Daily that the SSF would serve to reduce duplication of tasks in the military and improve the PLA's ability to carry out joint operations.

"As for the Strategic Support Force, it better coordinates the cooperation between forces on the battlefield and logistic support," Major General Du Wenlong, PLA Academy of Military Science, told state broadcaster China Central Television (CCTV).

Reuters: 

« Computer Blind Spots (£)
Cognitive Computing is Advancing (£) »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

SIS Certifications (SIS CERT)

SIS Certifications (SIS CERT)

SIS Certifications is an ISO certification body serving more than 10,000 clients in over 15 countries worldwide.

Mayhem

Mayhem

Mayhem, by ForAllSecure, is a developer-first application and API security testing solution.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

SubRosa Cyber Solutions

SubRosa Cyber Solutions

SubRosa Cyber Solutions solves its clients’ most tenacious information security, risk and compliance challenges through a multitude of information technology services and expertise.

Axellio

Axellio

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network.

Hayes Connor Solicitors

Hayes Connor Solicitors

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm. We act for clients on individual data breaches and also where a group has been compromised as part of a targeted attack.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

Technology Mindz

Technology Mindz

Technology Mindz is a leading provider of cybersecurity services. We offer a wide range of services to help businesses. Our services are Identity and access management, Governance risk and compliance.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs are a group of IT security specialists, ethical hackers, and researchers driven to identify security flaws before cyber threat actors does.