Posts Tagged china

Pentagon’s New China Plan

From The Washington Times:

The plan calls for preparing the Air Force, Navy and Marine Corps to defeat China’s “anti-access, area denial weapons,” including anti-satellite weapons, cyberweapons, submarines, stealth aircraft and long-range missiles that can hit aircraft carriers at sea.

, , , , , ,

No Comments

Chinese Fighters Cross “Middle Line” With Taiwan

From Financial Times:

Two Chinese fighter jets crossed an unofficial dividing line in the Taiwan Strait late last month in pursuit of a US spy aircraft, according to defence sources in Taipei and Beijing.

Confirmation of the close encounter comes as the US and China are trying to cool tensions in the South China Sea and safeguard a recent improvement in bilateral military relations.

, , ,

No Comments

“Defective” Chips could have caused U.S. military shut down by secret ‘back door’

“Sources have confirmed that the U.S. Department of Defense over recent months purchased 59,000 microchips to use in Navy equipment that control everything from missiles to transponders.

But all of the chips turned out to be cheap knock-offs from China, and they ultimately were not installed, according to sources.

Besides being subject to failure, the chips also were designed with a “back door” which would have allowed the chip, and the device it controlled, to be shut down remotely at any time, sources report.

Had the flaw not been detected, the chips could have shut down U.S. warships, aircraft, advanced weapons systems and encoded transponders that distinguish friendly aircraft from hostile attackers.”

http://www.wnd.com/?pageId=321477#ixzz1S0AZSZT8

, , ,

No Comments

Sophisticated Attacks Threaten Major Energy Firms

From: Dark Reading

New advanced persistent threat (APT) attack combines a variety of vectors, seeks to steal sensitive data, McAfee researchers say

By Tim Wilson

Researchers at McAfee yesterday revealed details of a new advanced persistent threat attack that uses a combination of methods in an effort to steal sensitive operations, exploration, and financial data from petroleum and energy companies.The new series of attacks, dubbed “Night Dragon,” may have begun as long ago as 2008, McAfee says in its report about the threat. “Now, new Night Dragon attacks are being identified every day,” the report says. Night Dragon’s creators “appear to be highly organized and motivated in their pursuits,” McAfee says.

The attack is “a combination of social engineering and well-coordinated, targeted, cyber attacks using Trojans, remote control software, and other malware.” The report says McAfee has seen evidence of the attacks in virtually every region of the globe, and that it has “identified tools, techniques, and network activities utilized … that point to individuals in China as the primary source. ”

more

, , , ,

No Comments

Chinese Espionage and French Trade Secrets

Chinese Espionage and French Trade Secrets is republished with permission of STRATFOR.

By Sean Noonan

Paris prosecutor Jean-Claude Marin on Jan. 14 began an inquiry into allegations of commercial espionage carried out against French carmaker Renault. The allegations first became public when Renault suspended three of its employees on Jan. 3 after an internal investigation that began in August 2010. Within days, citing an anonymous French government source, Reuters reported that French intelligence services were looking into the possibility that China played a role in the Renault espionage case. While the French government refused to officially confirm this accusation, speculation has run wild that Chinese state-sponsored spies were stealing electric-vehicle technology from Renault.

The Chinese are well-known perpetrators of industrial espionage and have been caught before in France, but the details that have emerged so far about the Renault operation differ from the usual Chinese method of operation. And much has been learned about this MO just in the last two years across the Atlantic, where the United States has been increasingly aggressive in investigating and prosecuting cases of Chinese espionage. If Chinese intelligence services were indeed responsible for espionage at Renault it would be one of only a few known cases involving non-Chinese nationals and would have involved the largest amount of money since the case of the legendary Larry Wu-Tai Chin, China’s most successful spy.

STRATFOR has previously detailed the Chinese intelligence services and the workings of espionage with Chinese characteristics. A look back at Chinese espionage activities uncovered in the United States in 2010, since our latest report was compiled, can provide more context and detail about current Chinese intelligence operations.

Chinese Espionage in the U.S.

We chose to focus on operations in the United States for two reasons. First, the United States is a major target for Chinese industrial espionage. This is because it is a leader in technology development, particularly in military hardware desired by China’s expanding military, and a potential adversary at the forefront of Chinese defense thinking. Second, while it is not the only country developing major new technologies in which China would be interested, the United States has been the most aggressive in prosecuting espionage cases against Chinese agents, thereby producing available data for us to work with. Since 2008, at least seven cases have been prosecuted each year in the United States against individuals spying for China. Five were prosecuted in 2007. Going back to about 2000, from one to three cases were prosecuted annually, and before that, less than one was prosecuted per year.

Most of the cases involved charges of violating export restrictions or stealing trade secrets rather than the capital crime of stealing state secrets. As the premier agency leading such investigations, the FBI has clearly made a policy decision to refocus on counterintelligence after an overwhelming focus on counterterrorism following 9/11, and its capability to conduct such investigations has grown. In 2010, 11 Chinese espionage cases were prosecuted in the United States, the highest number yet, and they featured a wide range of espionage targets. Read the rest of this entry »

, , , , , , , ,

No Comments

China’s Military Comes Into Its Own

China’s Military Comes Into Its Own is republished with permission of STRATFOR.

By Rodger Baker

Chinese President Hu Jintao is visiting the United States, perhaps his last state visit as president before China begins its generational leadership transition in 2012. Hu’s visit is being shaped by the ongoing China-U.S. economic dialogue, by concerns surrounding stability on the Korean Peninsula and by rising attention to Chinese defense activity in recent months. For example, China carried out the first reported test flight of its fifth-generation combat fighter prototype, dubbed the J-20, during U.S. Defense Secretary Robert Gates’ visit to China the previous week.

The development and test flight of China’s J-20 is not insignificant, but it is also by no means a game changer in the U.S.-China defense balance. More intriguingly, the test highlights how China’s military increasingly is making its interests heard. Read the rest of this entry »

, , , , ,

1 Comment

China and its Double-edged Cyber-sword

China and its Double-edged Cyber-sword is republished with permission of STRATFOR.

By Sean Noonan

A recent batch of WikiLeaks cables led Der Spiegel and The New York Times to print front-page stories on China’s cyber-espionage capabilities Dec. 4 and 5. While China’s offensive capabilities on the Internet are widely recognized, the country is discovering the other edge of the sword.

China is no doubt facing a paradox as it tries to manipulate and confront the growing capabilities of Internet users. Recent arrests of Chinese hackers and People’s Liberation Army (PLA) pronouncements suggest that China fears that its own computer experts, nationalist hackers and social media could turn against the government. While the exact cause of Beijing’s new focus on network security is unclear, it comes at a time when other countries are developing their own defenses against cyber attacks and hot topics like Stuxnet and WikiLeaks are generating new concerns about Internet security.

One of the U.S. State Department cables released by WikiLeaks focuses on the Chinese-based cyber attack on Google’s servers that became public in January 2010. According to a State Department source mentioned in one of the cables, Li Changchun, the fifth highest-ranking member of the Communist Party of China (CPC) and head of the Party’s Propaganda Department, was concerned about the information he could find on himself through Google’s search engine. He also reportedly ordered the attack on Google. This is single-source information, and since the cables WikiLeaks released do not include the U.S. intelligence community’s actual analysis of the source, we cannot vouch for its accuracy. What it does appear to verify, however, is that Beijing is regularly debating the opportunities and threats presented by the Internet. Read the rest of this entry »

, , , , ,

No Comments

A Change of Course in Cuba and Venezuela?

A Change of Course in Cuba and Venezuela? is republished with permission of STRATFOR.

By George Friedman and Reva Bhalla

Strange statements are coming out of Cuba these days. Fidel Castro, in the course of a five-hour interview in late August, reportedly told Jeffrey Goldberg of The Atlantic and Julia Sweig of the Council on Foreign Relations that “the Cuban model doesn’t even work for us anymore.”

Once that statement hit the headlines, Castro backtracked. Dressed in military uniform for the first time in four years (which we suspect was his way of signaling that he was not abandoning the revolution), he delivered a rare, 35-minute speech Sept. 3 to students at the University of Havana. In addition to spending several minutes on STRATFOR’s Iran analysis, Castro addressed his earlier statement on the Cuban model, saying he was “accurately quoted but misinterpreted” and suggesting that the economic model doesn’t work anymore but that the revolution lives on.

Castro, now 84, may be old, but he still seems to have his wits about him. We don’t know whether he was grossly misinterpreted by the reporter during the earlier interview, was acknowledging the futility of the Cuban model and/or was dropping hints of a policy shift. Regardless of what he did or did not say, Castro’s reported statement on the weakness of the revolution was by no means revolutionary. Read the rest of this entry »

, , , , ,

No Comments

Overview of Potential threat: Electromagnetic pulse (EMP) attack

“If Osama bin Laden’s al-Qaeda — or the dictators of North Korea or Iran — had the ability to destroy America as a superpower, would they be tempted to try?

Wouldn’t that temptation be even greater if that result could be achieved with a single attack, involving just one nuclear weapon, perhaps even one of modest power and relatively unsophisticated design?

And, what if the attacker could be reasonably sure that the United States would not know who was responsible for such a devastating blow?

Read the rest of this entry »

, , , , , , , ,

No Comments

Chinese missile could shift Pacific power balance

In this July 25, 2010 photo, crew of the USS George Washington line up on the deck as the supercarrier leaves South Korea's southern port city of Pusan as part of four-day maneuvers, called "Invincible Spirit," involving 20 ships, 200 aircraft and about 8,000 U.S. and South Korean sailors, off the east coast of Korea. Credit: Eric Talmadge

“Nothing projects U.S. global air and sea power more vividly than supercarriers. Bristling with fighter jets that can reach deep into even landlocked trouble zones, America’s virtually invincible carrier fleet has long enforced its dominance of the high seas.

China may soon put an end to that.

U.S. naval planners are scrambling to deal with what analysts say is a game-changing weapon being developed by China…”

http://articles.sfgate.com/2010-08-05/world/22206136_1_carrier-chinese-defense-ministry-north-korea

, , ,

No Comments