Skip to comments.China cyber capability puts U.S. forces at risk: report
Posted on 03/07/2012 11:27:05 PM PST by Olog-hai
Chinese cyberwarfare would pose a "genuine risk" to the U.S. military in a conflict, for instance over Taiwan or disputes in the South China Sea, according to a report prepared for the U.S. Congress.
Operations against computer networks have become fundamental to Beijing's military and national development strategies over the past decade, said the 136-page analysis by Northrop Grumman Corp released on Thursday by the U.S.-China Economic and Security Review Commission.
Chinese commercial firms, bolstered by foreign partners, are giving the military access to cutting-edge research and technology, the analysis said.
The Chinese military's close ties to large Chinese telecommunications firms create a path for state-sponsored penetrations of supply networks for electronics used by the U.S. military, government and private industry, it added.
That has the potential to cause a "catastrophic failure of systems and networks supporting critical infrastructure for national security or public safety," according to the report.
On the military side, "Chinese capabilities in computer network operations have advanced sufficiently to pose genuine risk to U.S. military operations in the event of a conflict," the report said.
(Excerpt) Read more at reuters.com ...
Does this mean that government needs more power and control over the net so that they can protect us and the country from things they can’t protect us from now and won’t be able to protect us from then, only cut us off from the net to protect us? The US government needs communist like control over the net so that they can protect us from a communist Chinese takeover?
Yeah, I am being silly but it seems every-time our government talks about a threat...it usually means more laws and less freedom. I don’t trust them, I have become jaded.
You haven’t become jaded. You’ve become realistic.
THE WASHINGTON FREE BEACON: "HUAWEI TOO DANGEROUS Chinese Telecoms Seeking Access to U.S. Markets Have Close Ties to PLA, Report Says" by Bill Gertz (SNIPPET: "New information about Chinese civilian telecommunications companies' close support of the Chinese military and information warfare programs is raising fresh concerns about the companies' access to U.S. markets, according to a congressional report.") (March 13, 2012) (Read More...)
USCC.gov - Report "Prepared for the U.S.-China Economic and Security Review Commission by Northrop Grumman Corp.": "OCCUPYING THE INFORMATION HIGH GROUND: CHINESE CAPABILITIES FOR COMPUTER NETWORK OPERATIONS AND CYBER ESPIONAGE" by Bryan Krekel, Patton Adams, George Bakos (pdf) (March 7, 2012) (Read More...)
Online.WSJ.com - THE WALL STREET JOURNAL - Technology: "CHINESE TECH GIANT AIDS IRAN" by Steve Stecklow, Farnaz Fassihi and Loretta Chao (SNIPPET: "Huawei Technologies Co. now dominates Iran's government-controlled mobile-phone industry. In doing so, it plays a role in enabling Iran's state security network.") (October 27, 2011) (Read More...)
WASHINGTON TIMES.com: "CHINESE TELECOM FIRM TIED TO SPY MINISTRY CIA: Beijing funded Huawei" by Bill Gertz (SNIPPET: "A U.S. intelligence report for the first time links China's largest telecommunications company to Beijing's KGB-like intelligence service and says the company recently received nearly a quarter-billion dollars from the Chinese government. The disclosures are a setback for Huawei Technologies Co. Ltd.'s efforts to break into the U.S. telecommunications market.") (October 11, 2011) (Read More...)
ZDNET.com - blog: "CHINESE SPIES USED FAKE FACEBOOK PROFILE TO FRIEND NATO OFFICIALS" by Emil Protalinski (SNIPPET: "Summary: Chinese spies created a fake Facebook profile of U.S. Navy admiral James Stavridis, friended various NATO officials, and gained access to their personal data. The fake profile has since been taken down.") (March 11, 2012, 10:58 pm PDT) (Read More...)
THE STAR.com: Washington - "HACKERS BREACHED NASA SYSTEMS THOUSANDS OF TIMES IN 2010-2011: FEDERAL REPORT" (SNIPPET: "NASA said hackers stole employee credentials and gained access to mission-critical projects last year in 13 major network breaches that could compromise U.S. national security." SNIPPET: "Martin said his office identified thousands of computer security breaches at the agency in 2010 and 2011. The agency "reported 5,408 computer security incidents that resulted in the installation of malicious software on or unauthorized access to its systems" he testified.") (March 3, 2012) (Read More...)>
“Chinese Economic Espionage: An Overlooked Concern”
Derek Scissors, Ph.D.
March 13, 2012 at 12:00 pm
SNIPPET: “If you heard that people based in a certain country completely compromised the computer systems of Nortel, a Canadian telecom firm that has since collapsed, what country would you guess?
If you heard that a company based in a certain country was accused of receiving commercial secrets stolen from DuPont, what country would you guess?
If you heard that a company based in a certain country was accused by American Superconductor (AMSC) of stealing software used to program advanced wind turbines, what country would you guess?
Most people might just guess China, China, and China. Theyd be right, which is a problem. And its not a new problem.
Economic espionage overlaps with and falls between national security and economics, between cybersecurity attacks and the violation of intellectual property rights (IPR). China is at or near the top of the offenders list in both cyberwarfare and IPR infringement, so its no surprise that the same is true for economic espionage.”