Feeds

China denies hacking claims, says it doesn’t need US tech

'You underestimate our wisdom' warns Middle Kingdom

Providing a secure and efficient Helpdesk

The Chinese Defense Ministry has rebutted claims in a US government report that it is systematically stealing American military secrets, and points out that China is producing enough of its own.

"We believe that the US remarks are a misjudgment. First it underestimates the Pentagon's security capabilities, and second it underestimates the Chinese people's wisdom," said spokesman Geng Yansheng.

"China is fully capable of safeguarding national security requires the construction of weapons and equipment. Let's just say, most recently, China's aircraft carrier, new combat aircraft, transport aircraft and Beidou satellite navigation system and other equipment to fully illustrate this point."

China does have an aircraft carrier, which was launched as the Soviet Navy's Riga in 1988, left derelict, and then sold to the Chinese and renamed the Liaoning. It's half the size of the US Nimitz-class aircraft carriers – of which the Navy has 10 – but Chinese shipyards are reportedly working on their own designs.

As for stocking the ship, the Chinese F-15 multi-role aircraft is in testing for carrier landings, and there have been some interesting sightings of Middle Kingdom airframes with stealth capability. El Reg has some doubts about any immediate threat, but the Chinese are making heavy investments in aerospace technology.

Chinese F-15 carrier take-off

The punch in a pocket carrier

On the matter of satellite navigation, however, China is approaching a point where it won't need to rely on the GPS system for much longer. Its home-grown sat-nav system Beidou (BDS) has 16 birds aloft, covering the Asia-Pacific region, and the government has mandated its use by civilians. It plans to go global by 2020.

Online arms race heats up

The US hacking claims that inspired the Chinese comments came from a redacted section of a Pentagon report (PDF) that identified the systematic plundering of US military intelligence by state-sponsored Chinese hackers.

The report, prepared by the Defense Science Board, claims theft of classified data on the F-35 Joint Strike Fighter, F/A-18 fighter, and V-22 Osprey tilting-rotor aircraft, as well as Black Hawk attack helicopter design plans. Specifications for the Patriot missile system and Aegis and Terminal High Altitude Area Defense anti-missile systems are also thought to have been compromised.

The Defense Science Board report was first published in public form in January, and concluded that "the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military intelligence capabilities."

The report recommends that the US should obtain "deeper intelligence about adversaries' offensive software," safeguard US nuclear forces so that they are less vulnerable, and set up a "Cyber Warrior" program within the Department of Defense to recruit and train the online security teams.

This will all be interesting grist for the mill when President Obama has his first meeting with the new Chinese president Xi Jinping next month. Many topics will no doubt be on the agenda, but based on the current row, online tactics will be high on the list. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.