Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Pentagon Steps Up Cyber Espionage Accusations Against China

China’s Cyber Spying Targets US Government: Pentagon Report

WASHINGTON – China has engaged in widespread cyber espionage in a bid to extract information about the US government’s foreign policy and military plans, said a Pentagon report issued Monday.

China’s Cyber Spying Targets US Government: Pentagon Report

WASHINGTON – China has engaged in widespread cyber espionage in a bid to extract information about the US government’s foreign policy and military plans, said a Pentagon report issued Monday.

China kept up a steady campaign of hacking in 2012 that included attempts to target US government computer networks, which could provide Beijing a better insight into America’s policy deliberations and military capabilities, according to the Pentagon’s annual assessment of China’s military.

Department of Defense“China is using its computer network exploitation (CNE) capability to support intelligence collection against the US diplomatic, economic, and defense industrial base sectors that support US national defense programs,” said the report to Congress.

“In 2012, numerous computer systems around the world, including those owned by the US government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military,” it said.

The report marked the most explicit statement yet from the United States that it believes China’s cyber spying is focused on the US government, as well as American corporations.

Though President Barack Obama’s administration has demanded China stop widespread cyber theft, officials have tended to focus their public comments on the hacking of private business networks and not US government agencies.

The information targeted by the cyber spying could possibly benefit China’s arms and technology sectors and policymakers interested in US leaders’ thinking on China-related issues, the report said.

The cyber spying also could assist Chinese military planners in “building a picture of US network defense networks, logistics, and related military capabilities that could be exploited during a crisis,” it said.

Advertisement. Scroll to continue reading.

US officials have grown alarmed over what they call increasingly brazen hacking from China that has penetrated defense contractors including Lockheed Martin and a host of other organizations and agencies.

The digital espionage was part of a broader industrial espionage effort that seeks to secure military-related US and Western technology, allowing Beijing to scale back its reliance on foreign arms manufacturers, the report said.

Apart from describing the Chinese military’s focus on cyber warfare, the Pentagon report portrayed a steady build-up of Beijing’s armed forces, with investments in anti-ship missiles, space satellites, a new aircraft carrier and stealth fighter jets.

China in March announced a 10.7 percent increase in its annual defense spending, with a budget of $114 billion.

But the report estimated China’s total military spending for 2012 was much higher, between $135 billion and $215 billion.

Beijing, however, still spent more on “internal security” forces than on its military, it said.

Although China’s top strategic concern remained Taiwan, its “military modernization has begun to focus to an increasing extent on capabilities and mission sets that extend beyond immediate territorial concerns,” David Helvey, deputy assistant secretary of defense for East Asia, told reporters.

The report said much of China’s investment is concentrated on missiles and other weaponry to attack “military forces that might deploy or operate within the western Pacific,” where Beijing stakes territorial claim to an arc of disputed islands.

The Pentagon has been particularly concerned about the DF-21D anti-ship ballistic missile, as well as air defenses and other weapons that could hit destroyers or aircraft carriers from a long distance.

“Obviously, something that can hold at risk large surface ships, including aircraft carriers, is something we pay attention to,” Helvey said.

But the report stressed “positive momentum” in military relations between the United States and China, citing more high-level contacts and a joint counter-piracy exercise in the Gulf of Aden last year.

The 92-page report did not convey any shift in the US view of China’s military and was “even-handed” in its tone, said Andrew Scobell of the RAND Corporation think tank.

While US officials track China’s military build-up closely, the People’s Liberation Army is still often pre-occupied with domestic concerns and dissent, he said. “There’s a domestic drag on China’s military.”

Related: Military Database of U.S. Dams Compromised by Attackers

Related: US, China to Setup Cybersecurity Working Group

Updated: 05/07/13 6:45AM with Updates from AFP, Headline Updated

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.