Security Experts:

Connect with us

Hi, what are you looking for?


Data Protection

Pentagon Steps Up Cyber Espionage Accusations Against China

China’s Cyber Spying Targets US Government: Pentagon Report

WASHINGTON – China has engaged in widespread cyber espionage in a bid to extract information about the US government’s foreign policy and military plans, said a Pentagon report issued Monday.

China’s Cyber Spying Targets US Government: Pentagon Report

WASHINGTON – China has engaged in widespread cyber espionage in a bid to extract information about the US government’s foreign policy and military plans, said a Pentagon report issued Monday.

China kept up a steady campaign of hacking in 2012 that included attempts to target US government computer networks, which could provide Beijing a better insight into America’s policy deliberations and military capabilities, according to the Pentagon’s annual assessment of China’s military.

Department of Defense“China is using its computer network exploitation (CNE) capability to support intelligence collection against the US diplomatic, economic, and defense industrial base sectors that support US national defense programs,” said the report to Congress.

“In 2012, numerous computer systems around the world, including those owned by the US government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military,” it said.

The report marked the most explicit statement yet from the United States that it believes China’s cyber spying is focused on the US government, as well as American corporations.

Though President Barack Obama’s administration has demanded China stop widespread cyber theft, officials have tended to focus their public comments on the hacking of private business networks and not US government agencies.

The information targeted by the cyber spying could possibly benefit China’s arms and technology sectors and policymakers interested in US leaders’ thinking on China-related issues, the report said.

The cyber spying also could assist Chinese military planners in “building a picture of US network defense networks, logistics, and related military capabilities that could be exploited during a crisis,” it said.

US officials have grown alarmed over what they call increasingly brazen hacking from China that has penetrated defense contractors including Lockheed Martin and a host of other organizations and agencies.

The digital espionage was part of a broader industrial espionage effort that seeks to secure military-related US and Western technology, allowing Beijing to scale back its reliance on foreign arms manufacturers, the report said.

Apart from describing the Chinese military’s focus on cyber warfare, the Pentagon report portrayed a steady build-up of Beijing’s armed forces, with investments in anti-ship missiles, space satellites, a new aircraft carrier and stealth fighter jets.

China in March announced a 10.7 percent increase in its annual defense spending, with a budget of $114 billion.

But the report estimated China’s total military spending for 2012 was much higher, between $135 billion and $215 billion.

Beijing, however, still spent more on “internal security” forces than on its military, it said.

Although China’s top strategic concern remained Taiwan, its “military modernization has begun to focus to an increasing extent on capabilities and mission sets that extend beyond immediate territorial concerns,” David Helvey, deputy assistant secretary of defense for East Asia, told reporters.

The report said much of China’s investment is concentrated on missiles and other weaponry to attack “military forces that might deploy or operate within the western Pacific,” where Beijing stakes territorial claim to an arc of disputed islands.

The Pentagon has been particularly concerned about the DF-21D anti-ship ballistic missile, as well as air defenses and other weapons that could hit destroyers or aircraft carriers from a long distance.

“Obviously, something that can hold at risk large surface ships, including aircraft carriers, is something we pay attention to,” Helvey said.

But the report stressed “positive momentum” in military relations between the United States and China, citing more high-level contacts and a joint counter-piracy exercise in the Gulf of Aden last year.

The 92-page report did not convey any shift in the US view of China’s military and was “even-handed” in its tone, said Andrew Scobell of the RAND Corporation think tank.

While US officials track China’s military build-up closely, the People’s Liberation Army is still often pre-occupied with domestic concerns and dissent, he said. “There’s a domestic drag on China’s military.”

Related: Military Database of U.S. Dams Compromised by Attackers

Related: US, China to Setup Cybersecurity Working Group

Updated: 05/07/13 6:45AM with Updates from AFP, Headline Updated

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Data Protection

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.