Feeds

China denies hacking claims, says it doesn’t need US tech

'You underestimate our wisdom' warns Middle Kingdom

Beginner's guide to SSL certificates

The Chinese Defense Ministry has rebutted claims in a US government report that it is systematically stealing American military secrets, and points out that China is producing enough of its own.

"We believe that the US remarks are a misjudgment. First it underestimates the Pentagon's security capabilities, and second it underestimates the Chinese people's wisdom," said spokesman Geng Yansheng.

"China is fully capable of safeguarding national security requires the construction of weapons and equipment. Let's just say, most recently, China's aircraft carrier, new combat aircraft, transport aircraft and Beidou satellite navigation system and other equipment to fully illustrate this point."

China does have an aircraft carrier, which was launched as the Soviet Navy's Riga in 1988, left derelict, and then sold to the Chinese and renamed the Liaoning. It's half the size of the US Nimitz-class aircraft carriers – of which the Navy has 10 – but Chinese shipyards are reportedly working on their own designs.

As for stocking the ship, the Chinese F-15 multi-role aircraft is in testing for carrier landings, and there have been some interesting sightings of Middle Kingdom airframes with stealth capability. El Reg has some doubts about any immediate threat, but the Chinese are making heavy investments in aerospace technology.

Chinese F-15 carrier take-off

The punch in a pocket carrier

On the matter of satellite navigation, however, China is approaching a point where it won't need to rely on the GPS system for much longer. Its home-grown sat-nav system Beidou (BDS) has 16 birds aloft, covering the Asia-Pacific region, and the government has mandated its use by civilians. It plans to go global by 2020.

Online arms race heats up

The US hacking claims that inspired the Chinese comments came from a redacted section of a Pentagon report (PDF) that identified the systematic plundering of US military intelligence by state-sponsored Chinese hackers.

The report, prepared by the Defense Science Board, claims theft of classified data on the F-35 Joint Strike Fighter, F/A-18 fighter, and V-22 Osprey tilting-rotor aircraft, as well as Black Hawk attack helicopter design plans. Specifications for the Patriot missile system and Aegis and Terminal High Altitude Area Defense anti-missile systems are also thought to have been compromised.

The Defense Science Board report was first published in public form in January, and concluded that "the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military intelligence capabilities."

The report recommends that the US should obtain "deeper intelligence about adversaries' offensive software," safeguard US nuclear forces so that they are less vulnerable, and set up a "Cyber Warrior" program within the Department of Defense to recruit and train the online security teams.

This will all be interesting grist for the mill when President Obama has his first meeting with the new Chinese president Xi Jinping next month. Many topics will no doubt be on the agenda, but based on the current row, online tactics will be high on the list. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.