China’s shadowy cyber-warfare capabilities unmasked in official report

china internet censorship chinahack
Shutterstock
China has a lot of hackers on its payroll. We’ve known that for a long time, even though there has never been much of an official announcement. However, in an unprecedented move the People’s Liberation Army has now for the first time detailed the make up of its digital military divisions, and they are more extensive than most would have imagined.

The reason China’s ruling party has been so quite about its hacking efforts in the past, has been to enable it to deny any actions traced back to it. However, the cat is now firmly out of the bag, as in its latest publication of The Science of Military Strategy – a once every few decades document that details its military infrastructure – it has detailed three separate arms devoted to digital war making.

The first branch is known as the “specialized military network warfare forces,” which is made up of military units that are designed to carry out focused network based attacks, as well as defensive actions, according to security researcher Joe McReynolds (via the Daily Beast). The second arm links with civilian organizations, to conduct “network warfare operations,” on behalf of the military, but without any specific involvement from army personnel. The third and final group is the most shadowy, described in the report as merely “external entities,” which can be mobilized when needed to carry out “network warfare operations.”‘

It’s not clear at this time where the infamous PLA Unit 61398 – which has been linked with hacks against US infrastructure – falls into. It has been speculated in the past that it may operate outside of the traditional party power structure, though it is possible that the second or third branch of the cyber warfare divisions would be applicable for the specialized unit.

The official report including this information was published in December of 2013, but due to the insularity of the Chinese government and the lack of an English translation, it’s only now become noticed by the United States – or the civilian press, at least. What impact this will have on relations between China and other countries active in cyber warfare, such as the United States, is unclear, but McReynolds think it may make foreign cooperation with China on cyber-crime investigations within its borders more difficult.

Movies & TV

‘Game of Thrones’ prequel series finds a director and new cast members

HBO's Game of Thrones prequel series has its director and a bunch of new cast members as it prepares to start filming this year. The show is set thousands of years before the events of the original series.
Mobile

Samsung's advanced folding phone needed 'total reconfiguration' to make it real

Samsung has been showcasing bendable display tech for a few years and now a folding smartphone might finally arrive. The Galaxy X, or perhaps the Galaxy Fold, may be the company's first example. Here's everything we know about it.
Photography

What to look for and what to avoid when buying a camera

Looking to buy a new camera? Our comprehensive camera guide for 2016 has answers to any camera or photography questions you might ask, whether in regards to pricing, image quality, or weatherproofing.
Gaming

Who needs a Switch? These 25 games prove there's fun to be found on 3DS

The 3DS is home to a large library, including some of the greatest games Nintendo has ever published. We've compiled this list of some of the best Nintendo 3DS games currently available.
Computing

Change your mouse cursor in Windows with these quick tips

The standard mouse cursor is boring, so change it! With this guide on how to change your mouse cursor in Windows, you can choose to use one of Microsoft's pre-installed cursors or download something a bit more extravagant.
Computing

Go hands-free in Windows 10 with speech-to-text support

Looking for the dictation, speech-to-text, and voice control options in Windows 10? Here's how to set up Speech Recognition in Windows 10 and use it to go hands-free in a variety of different tasks and applications within Windows.
Computing

Printing to PDF in Windows is easy, no matter which method you use

Microsoft's latest operating system makes it easier than ever to print to PDF in Windows, but there are alternative methods for doing so, even if you want to forgo Adobe Acrobat. Here's how.
Computing

Changing a PDF into an EPUB file is easier than you might think

If you like to read on a tablet or ebook reader, you'll find that ePUB files offer a number of advantages over PDFs. With this guide, we'll show you how to convert a PDF to EPUB in a few quick steps.
Computing

Need to combine a PDF? Here's how to get it done on both Windows and Mac

Sometimes juggling multiple files at once is more of a hassle than a convenience, especially when a single file would do. This quick guide will teach you how to combine PDF files on Windows, MacOS, or with online tools.
Computing

Don’t even bother with the rest. Here are the only laptop brands that matter

If you want to buy your next laptop based around a specific brand, it helps to know which the best brands of laptops are. This list will give you a good grounding in the most reliable, quality laptop manufacturers today.
Computing

Secure your Excel documents with a password by following these quick steps

Excel documents are used by people and businesses all over the world. Given how often they contain sensitive information, it makes sense to keep them from the wrong eyes. Thankfully, it's easy to secure them with a password.
Computing

Style up your MacBook Air with one of these great cases or sleeves

Whether you’re looking for added protection or a stylish flourish, you’re in the right place for the best MacBook Air cases. We have form-hugging cases, luxurious covers and padded sleeves priced from $10 to $130. Happy shopping!
Computing

Getting Windows 10 updated doesn't have to be so painful

Windows update not working? It's a more common problem than you might think. Fortunately, there are a few steps you can take to troubleshoot it and in this guide we'll break them down for you step by step.
Computing

Reluctant to give your email address away? Here's how to make a disposable one

Want to sign up for a service without the risk of flooding your inbox with copious amounts of spam and unwanted email? You might want to consider using disposable email addresses via one of these handy services.