Feeds

China hits back at US cyber snooping allegations

Satellite exports to China will be tightened

Application security programs and practises

The war of words between the US and China escalated at the weekend after the People’s Republic vigorously denied allegations from the Pentagon that its rapid rise as a space superpower has been made possible in part thanks to “successful spying”.

The US report prepared by the departments of State, Commerce and Defence recommended that export restrictions generally be loosened on items used to build satellites and other hi-tech monitoring equipment, in order to give US industry a much-needed economic boost.

However, the same report reportedly went on to advise that controls on exports of satellites to countries including China, Iran and North Korea actually be tightened.

The US government has identified 26 separate occasions since 2006 on which China has tried to get hold of space launch data and sensitive information on cruise missiles and other military equipment, Bloomberg said.

The report had the following:

China’s continuing efforts to acquire US military and dual-use technologies are enabling China’s science and technology base to diminish the U.S. technological edge in areas critical to the development of weapons and communications systems. Additionally, the technologies China has acquired could be used to develop more advanced technologies by shortening Chinese R&D cycles.

Economic espionage, supported by extensive open-source research, computer network exploitation and targeted intelligence operations also enables China to obtain technologies to supplement indigenous military modernisation efforts.

Given that the allegations are some of the most direct and serious yet, it’s not surprising that China has been forced to issue a strong denial, published in most of the country’s state-run media outlets.

Foreign Ministry spokesman Liu Weimin reportedly said in a statement that China’s rapid ascendancy in terms of its military and space achievements are not down to cyber espionage but the "pioneering, innovative and devoted work" of the Chinese people.

"All attempts to limit our space development or defame and abuse it are in vain," he added. “The report recommending the maintenance of restrictions on exports to China, which was a policy formulated more than 20 years ago, does not comply with the consensus reached by leaders of both countries to strengthen bilateral cooperation on space exploration.”

A Xinhua editorial went further, accusing the report’s accusations of being “utterly groundless, irresponsible and detrimental to bilateral relations” and urging the US to reconsider the export restrictions in order to reduce its trade deficit.

The report is the latest salvo in an increasingly bitter cyber stand-off between the two superpowers – with senior US politicians and military figures apparently now emboldened enough to directly accuse their counterparts of cyber espionage, while the Chinese deny, deny, deny.

Given its success with the strategy to date, there’s certainly no indication that China will halt hacking attacks on western companies anytime soon.

The US could always take the hardline option, increasing restrictions on Chinese tech imports and scrutiny of M&A deals involving Chinese companies. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.