Skip to main content

China Building Cyberwarfare Capabilities

china-flagChina is building its cyberwarfare capabilities and appears to be using the growing technical abilities to collect U.S. intelligence through a sophisticated and long-term computer attack campaign, according to an independent report.

Released Thursday by a congressional advisory panel, the study found cases suggesting that China’s elite hacker community has ties to the Beijing government, although there is little hard evidence.

The commission report details a cyberattack against a U.S. company several years ago that appeared to either originate in or come through China and was similar to other incidents also believed to be connected to the country.

According to the analysis, the company noticed that over several days, data from their network was being sent to multiple computers in the U.S. and overseas. While the report does not identify the company, it contends that the attackers targeted specific data, suggesting a very coordinated and sophisticated operation by people who had the expertise to use the high-tech information. An internet protocol (IP) address located in China was used at times during the episode.

Barring proof, the study by the U.S.-China Economic and Security Review Commission warns that the sort of expansive and sophisticated computer resources that have been seen in cyberattacks on the U.S. and other countries “is difficult at best without some type of state sponsorship.”

The study contends that the Chinese, long reported to be stoking a massive military build up, has also made computer warfare a priority. The Chinese government is said to view such cyberprowess as critical for victory in future conflicts — similar to the priority on offensive cyber abilities stressed by some U.S. officials.

Potential Chinese targets in the U.S., according to the report, would likely include Pentagon networks and databases to disrupt command and control communications, and possibly corrupt encrypted data. The report notes, however, that penetrating such classified systems would be time consuming and difficult.

In large part, the commission report expands on the Pentagon’s annual China military power review. The Defense study said earlier this year that China’s People’s Liberation Army has set up information warfare units to develop viruses to attack enemy computer systems and networks as well as to protect friendly systems.

The Pentagon report described computer attacks believed to have originated in China, but concluded that “it remains unclear if these intrusions were conducted by, or with the endorsement of, the PLA or other elements of the PRC (People’s Republic of China) government.”

The new report, prepared for the commission by Northrop Grumman Corp., relies largely on publicly available information from Chinese hacker web sites, technical articles and analysis of computer intrusions attributed to the Chinese.

Editors' Recommendations

Dena Cassella
Former Digital Trends Contributor
Haole built. O'ahu grown
Microsoft just gave you a new way to stay safe from viruses
A dark mystery hand typing on a laptop computer at night.

Microsoft has just taken a vital step towards better protecting your devices from malware, and it’s one that could stop viruses dead in their tracks. Interestingly, though, the Redmond giant seems to have made no mention of the change, despite its significance.

The new policy might sound minor on the surface: Microsoft’s SharePoint cloud storage service can apparently now scan files that are encrypted or password-protected. Previously, this wasn’t thought to be possible.

Read more
The best PC builds: budget, gaming, video editing, and more
Intel Core i5-13600K installed in a motherboard.

PC building is fun, but it's also a bit scary. After all, it's hardly cheap -- you're going to spend hundreds or thousands of dollars on something that will hopefully last you for years.

So, you need to know exactly what type of PC you're building and be realistic about what it'll be capable of. It's not as simple as buying a pre-built PC, and we could never give a recommendation for every budget and every specific scenario. But hopefully, these example builds give you a good place to start, especially if you aren't sure exactly how everything fits together.
The best budget PC build

Read more
Google just made this vital Gmail security tool completely free
google makes gmail dark web monitoring free laptop stephen phillips

Hackers are constantly trying to break into large websites to steal user databases, and it’s not entirely unlikely that your own login details have been leaked at some point in the past. In cases like that, upgrading your password is vital, but how can you do that if you don’t even know your data has been hacked?

Well, Google thinks it has the answer because it has just announced that it will roll out dark web monitoring reports to every Gmail user in the U.S. This handy feature was previously limited to paid Google One subscribers, but the company revealed at its Google I/O event that it will now be available to everyone, free of charge.

Read more