Feeds

China denies hacking claims, says it doesn’t need US tech

'You underestimate our wisdom' warns Middle Kingdom

Intelligent flash storage arrays

The Chinese Defense Ministry has rebutted claims in a US government report that it is systematically stealing American military secrets, and points out that China is producing enough of its own.

"We believe that the US remarks are a misjudgment. First it underestimates the Pentagon's security capabilities, and second it underestimates the Chinese people's wisdom," said spokesman Geng Yansheng.

"China is fully capable of safeguarding national security requires the construction of weapons and equipment. Let's just say, most recently, China's aircraft carrier, new combat aircraft, transport aircraft and Beidou satellite navigation system and other equipment to fully illustrate this point."

China does have an aircraft carrier, which was launched as the Soviet Navy's Riga in 1988, left derelict, and then sold to the Chinese and renamed the Liaoning. It's half the size of the US Nimitz-class aircraft carriers – of which the Navy has 10 – but Chinese shipyards are reportedly working on their own designs.

As for stocking the ship, the Chinese F-15 multi-role aircraft is in testing for carrier landings, and there have been some interesting sightings of Middle Kingdom airframes with stealth capability. El Reg has some doubts about any immediate threat, but the Chinese are making heavy investments in aerospace technology.

Chinese F-15 carrier take-off

The punch in a pocket carrier

On the matter of satellite navigation, however, China is approaching a point where it won't need to rely on the GPS system for much longer. Its home-grown sat-nav system Beidou (BDS) has 16 birds aloft, covering the Asia-Pacific region, and the government has mandated its use by civilians. It plans to go global by 2020.

Online arms race heats up

The US hacking claims that inspired the Chinese comments came from a redacted section of a Pentagon report (PDF) that identified the systematic plundering of US military intelligence by state-sponsored Chinese hackers.

The report, prepared by the Defense Science Board, claims theft of classified data on the F-35 Joint Strike Fighter, F/A-18 fighter, and V-22 Osprey tilting-rotor aircraft, as well as Black Hawk attack helicopter design plans. Specifications for the Patriot missile system and Aegis and Terminal High Altitude Area Defense anti-missile systems are also thought to have been compromised.

The Defense Science Board report was first published in public form in January, and concluded that "the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military intelligence capabilities."

The report recommends that the US should obtain "deeper intelligence about adversaries' offensive software," safeguard US nuclear forces so that they are less vulnerable, and set up a "Cyber Warrior" program within the Department of Defense to recruit and train the online security teams.

This will all be interesting grist for the mill when President Obama has his first meeting with the new Chinese president Xi Jinping next month. Many topics will no doubt be on the agenda, but based on the current row, online tactics will be high on the list. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.