China’s Cyber Espionage -DoD Report

gAtO rEpOrTiNg – China’s Cyber Espionage: Annual Report to Congress – Military and Security Development involving the People’s Republic of China May-2012 –

THE PEOPLE’S REPUBLIC OF CHINA (PRC) is pursuing a long-term, comprehensive military mod- ernization program designed to improve the capacity of China’s armed forces to fight and win “local wars under conditions of informatization,” or high-intensity, information-centric regional military operations of short duration. China’s leaders view modernization of the Chinese People’s Liberation Army (PLA) as an essential component of their strategy to take advan- tage of what they perceive to be a “window of strategic opportunity” to advance China’s national development during the first two decades of the 21st century. During this period, China’s leaders are placing a priority on fostering a positive external environment to provide the PRC with the strategic space to focus on economic growth and development. At the same time, Chinese leaders seek to maintain peace and stability along their country’s periphery, expand their diplomatic influence to facilitate access to markets, capital, and resources, and avoid direct confrontation with the United States and other countries. This strategy has led to an expansion of China’s presence in regions all over the world, creating new and expanding economic and diplomatic interests.

As these interests have grown, and as China has assumed new roles and responsibilities in the inter- national community, China’s military modernization is, to an increasing extent, focusing on investments in military capabilities that would enable China’s armed forces to conduct a wide range of missions, including those farther from China. Even as the PLA is contend- ing with this growing array of missions, preparing for contingencies in the Taiwan Strait remains the principal focus and driver of much of China’s military invest- ment. In this context, over the past year, the PLA con- tinued to build the capabilities and develop the doctrine it considers necessary to deter Taiwan from declaring independence; to deter, delay, and deny effective U.S. intervention in a potential cross-Strait conflict; and to defeat Taiwan forces in the event of hostilities.

To support the PLA’s expanding set of roles and mis- sions, China’s leaders in 2011 sustained investment in advanced cruise missiles, short and medium range conventional ballistic missiles, anti-ship ballistic missiles, counterpace weapons, and military cyberspace capabilities which appear designed to enable anti-access/ area-denial (A2/AD) missions, or what PLA strategists refer to as “counter intervention operations.” The PLA also continued to demonstrate improved capabilities in advanced fighter aircraft, as evidenced by the inaugural flight testing of the J-20 stealth fighter; limited power projection, with the launch of China’s first aircraft carrier for sea trials; integrated air defenses; under- sea warfare; nuclear deterrence and strategic strike; improved command and control; and more sophisti- cated training and exercises across China’s air, naval, and land forces.

Underscoring the extent to which China’s leaders are increasingly looking to the PLA to perform missions that go beyond China’s immediate territorial concerns, over the past year the PLA deployed assets to support non-combatant evacuation operations from Libya, extended its presence in the Gulf of Aden for a third year of counterpiracy operations, took on leadership roles in United Nations peace operations, and con- ducted medical exchanges and a service mission to Latin America and the Caribbean using the PLA Navy’s hospital ship.

During their January 2011 summit, President Barack Obama and China’s President Hu Jintao committed to work together to build a cooperative partnership based on mutual respect and mutual benefit. Within that framework, the U.S. Department of Defense seeks to build a military-to-military relationship with China that is healthy, stable, reliable, and continuous. Strengthening the U.S.-China military-to-military relationship is a part of shaping China’s choices by encouraging it to cooperate with the United States and its allies and partners in the delivery of international public goods, including in such endeavors as counter- piracy, international peacekeeping, and humanitarian assistance and disaster relief operations. As the United States builds a stronger foundation for a military-to- military relationship with China, it also will continue to monitor China’s evolving military strategy, doctrine, and force development. In concert with Allies and partners, the United States will continue adapting its forces, posture, and operational concepts to maintain a stable and secure Asia-Pacific security environment.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

The United States continues to pay “very careful attention” to China’s growing cyberspace capabilities, said Dave Helvey, acting deputy assistant defense secretary for East Asia. “There is the potential for these types of operations to be very disruptive” to the United States and its allies, said Helvey in briefing reporters May 18 on the contents of the Pentagon’s newly issued annual report to Congress on Chinese military developments. The China report claims that “many” of the cyber intrusions and data thefts conducted on US systems in 2011 originated in China.

The report infers that the Chinese government was behind at least some of those attacks, although Helvey declined to offer specifics. He also said he couldn’t say whether such attacks are increasing in frequency. “We note that China’s investing in not only capabilities to better defend their networks, but also they’re looking at ways to use cyber for offensive operations,” he said. “We also highlight a number of areas where we see China engaging in cyber activity focused on computer-network exploitation and lately our pipelines. That continues to be a concern of ours,” said Helvey. -gAtO oUt

This is a must Read from the DOD —>China DoD May 2012  report;
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: