Feeds

China denies hacking claims, says it doesn’t need US tech

'You underestimate our wisdom' warns Middle Kingdom

Protecting users from Firesheep and other Sidejacking attacks with SSL

The Chinese Defense Ministry has rebutted claims in a US government report that it is systematically stealing American military secrets, and points out that China is producing enough of its own.

"We believe that the US remarks are a misjudgment. First it underestimates the Pentagon's security capabilities, and second it underestimates the Chinese people's wisdom," said spokesman Geng Yansheng.

"China is fully capable of safeguarding national security requires the construction of weapons and equipment. Let's just say, most recently, China's aircraft carrier, new combat aircraft, transport aircraft and Beidou satellite navigation system and other equipment to fully illustrate this point."

China does have an aircraft carrier, which was launched as the Soviet Navy's Riga in 1988, left derelict, and then sold to the Chinese and renamed the Liaoning. It's half the size of the US Nimitz-class aircraft carriers – of which the Navy has 10 – but Chinese shipyards are reportedly working on their own designs.

As for stocking the ship, the Chinese F-15 multi-role aircraft is in testing for carrier landings, and there have been some interesting sightings of Middle Kingdom airframes with stealth capability. El Reg has some doubts about any immediate threat, but the Chinese are making heavy investments in aerospace technology.

Chinese F-15 carrier take-off

The punch in a pocket carrier

On the matter of satellite navigation, however, China is approaching a point where it won't need to rely on the GPS system for much longer. Its home-grown sat-nav system Beidou (BDS) has 16 birds aloft, covering the Asia-Pacific region, and the government has mandated its use by civilians. It plans to go global by 2020.

Online arms race heats up

The US hacking claims that inspired the Chinese comments came from a redacted section of a Pentagon report (PDF) that identified the systematic plundering of US military intelligence by state-sponsored Chinese hackers.

The report, prepared by the Defense Science Board, claims theft of classified data on the F-35 Joint Strike Fighter, F/A-18 fighter, and V-22 Osprey tilting-rotor aircraft, as well as Black Hawk attack helicopter design plans. Specifications for the Patriot missile system and Aegis and Terminal High Altitude Area Defense anti-missile systems are also thought to have been compromised.

The Defense Science Board report was first published in public form in January, and concluded that "the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military intelligence capabilities."

The report recommends that the US should obtain "deeper intelligence about adversaries' offensive software," safeguard US nuclear forces so that they are less vulnerable, and set up a "Cyber Warrior" program within the Department of Defense to recruit and train the online security teams.

This will all be interesting grist for the mill when President Obama has his first meeting with the new Chinese president Xi Jinping next month. Many topics will no doubt be on the agenda, but based on the current row, online tactics will be high on the list. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.