Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News

      China Prepares for First Strike in Electronic War

      Written by

      Lisa Vaas
      Published May 30, 2007
      Share
      Facebook
      Twitter
      Linkedin

        eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

        Chinas military is preparing for electronic warfare by setting up information warfare units that are developing viruses to attack enemy computers and networks, according to the Department of Defenses annual report to Congress.

        According to the DoD, the PLA (Peoples Liberation Army) has also established tactics to protect its own computer systems and networks and those of friendly states. Since 2005, the PLA has been including offensive network attacks into its exercises, “primarily in first strikes against enemy networks,” according to the report.

        Chinas military is looking to establish what it calls “electromagnetic dominance” early in a conflict, specifically by launching electronic warfare against an enemys information systems on the battlefield, the DoD said.

        Beyond computer viruses, the PLA is investing in other electronic countermeasures, including electronic and infrared decoys, angle reflectors and false target generators.

        Chinas foreign ministry spokesperson Jiang Yu denounced the DoDs report, saying that it exaggerates Chinas military strength and expenses “out of ulterior motives.”

        “As a peace-loving country, China steadfastly follows a road of peaceful development, adopting a national defense policy that is defensive in nature,” she said.

        “Each sovereign state has the right and obligation to develop necessary national defense strength to safeguard its national security and territorial integrity. It is totally erroneous and invalid for the U.S. Report to play up the so-called China Threat.”

        The DoD views Taiwan and the Taiwan Strait as being the likeliest arena for military confrontation and credits Chinas focus on that country for its recent efforts to modernize its military planning.

        “Chinas near-term focus on preparing for military contingencies in the Taiwan Strait, including the possibility of U.S. intervention, appears to be an important driver of its modernization plans,” the report states.

        In response to that particular view, Yu called Taiwan an “inalienable part of the Chinese territory.”

        “China resolutely opposes interference in Chinas internal affairs by any country with whatever manifestation,” she said. “… We will never tolerate the Taiwan Independence or any attempt by anyone to separate Taiwan from China by whatever means.”

        /zimages/1/28571.gifChina tries to upgrade its Made in China image. Click here to read more.

        At any rate, Chinas cyber-espionage is nothing new. Ira Winkler—author of “Zen and the Art of Information Security,” former NSA (National Security Agency) analyst, former director of technology with the National Computer Security Association and current president of the Internet Security Advisors Group—said in an interview with eWEEK that Russia has had cyber-security squads for decades and that China has been at it for at least a decade. North Korea has had this type of behavior attributed to it as well.

        “As far as a potential military adversary goes, China is clearly ranked second behind Russia with regards to capability,” he said. “We have lots of little adversaries all over the place, but nobody offers more of a strategic threat than [Russia].”

        What China has, Winkler said, is sheer resources to lavish on the effort, both in terms of gathering intelligence against the United States as a whole, as well as in military preparation.

        Next Page: Chinese hackers.

        Chinese Hackers

        “They have hundreds of people simultaneously working on this,” he said. “Just by sheer numbers of people they have the largest agencies in the world: cyber agencies, intelligence agencies, [etc.]”

        Titan Rain—the U.S. governments former code name (the current code name is classified) for a set of coordinated attacks against the countrys computer systems that were attributed to China and which were believed to have been first executed in 2003—is one example of Chinas ongoing computer espionage program. (For more on Titan Rain, Time has an in-depth article here.)

        Chinese hackers over that time period broke into U.S. computer networks including those of Lockheed Martin, Sandia National Laboratories and NASA. Winkler said that China devoted 10-12 hackers to the project, 24×7, as the PLA attempted to find systems that might have valuable information “in any way, shape or form.”

        “They systematically access a system and suck up information as quickly as possible,” he said. “They have it down to a science: In 20 minutes they can get into a system, suck up information and be out of there. Its been going on for years at this time. Theyve probably broken into tens of thousands of systems theyve sucked clean.”

        Those hackers didnt get into Sandia Labs, U.S. Army systems and other military contractors systems because theyre brilliant, Winkler said. Rather, cyber-espionage such as this is mostly enabled by Chinese hackers practice of being extremely methodical.

        Their success also comes from “incredibly poor security on the part of victims,” Winkler said. “Most computer attacks are based on poor security rather than the genius of an attacker,” he said.

        As far as spreading malware as a part of electronic warfare goes, it would make sense for the PLA to plant tracking software on systems theyve broken into, in order to increase their intelligence-gathering capabilities. As far as spreading viruses goes, though, Winkler said its nothing hed lose sleep over.

        “Generic viruses, thats something that frankly I would say its not something you want to rely on, and it could be dangerous to do that. If you start spreading viruses, they could come back and hurt you,” he said. “Thereve been so many cases of viruses that have backfired. Some have attempted to help people and have had the opposite effect.”

        China, which is technologically behind the United States, may not rely on the Internet as much as this country, but taking it down still wouldnt make much sense and likely wouldnt work, given the resiliency its shown.

        “Things go wrong on the Internet on a daily basis, but we survive. If Chinas wasting all their efforts on cyber-intelligence or relying on [electronic warfare preparations], it makes me very happy. As opposed to thinking of more damaging [tactics],” Winkler said.

        “Frankly, they have ballistics weapons capabilities and a whole bunch of things. Im much more concerned with a single nuclear weapon making it through. [And] wouldnt they get much more value from listening to the critical conversations than destroying [the Internet]? It would have more long-term strategic advantage.”

        Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

        Lisa Vaas
        Lisa Vaas
        Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection.

        Get the Free Newsletter!

        Subscribe to Daily Tech Insider for top news, trends & analysis

        Get the Free Newsletter!

        Subscribe to Daily Tech Insider for top news, trends & analysis

        MOST POPULAR ARTICLES

        Artificial Intelligence

        9 Best AI 3D Generators You Need...

        Sam Rinko - June 25, 2024 0
        AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
        Read more
        Cloud

        RingCentral Expands Its Collaboration Platform

        Zeus Kerravala - November 22, 2023 0
        RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
        Read more
        Artificial Intelligence

        8 Best AI Data Analytics Software &...

        Aminu Abdullahi - January 18, 2024 0
        Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
        Read more
        Latest News

        Zeus Kerravala on Networking: Multicloud, 5G, and...

        James Maguire - December 16, 2022 0
        I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
        Read more
        Video

        Datadog President Amit Agarwal on Trends in...

        James Maguire - November 11, 2022 0
        I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
        Read more
        Logo

        eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

        Facebook
        Linkedin
        RSS
        Twitter
        Youtube

        Advertisers

        Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

        Advertise with Us

        Menu

        • About eWeek
        • Subscribe to our Newsletter
        • Latest News

        Our Brands

        • Privacy Policy
        • Terms
        • About
        • Contact
        • Advertise
        • Sitemap
        • California – Do Not Sell My Information

        Property of TechnologyAdvice.
        © 2024 TechnologyAdvice. All Rights Reserved

        Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

        ×