Cybersecurity

China making steady gains in cyber, military IT

iStockPhoto / FCW

China has made steady gains in military IT and has stolen U.S. intellectual property related to “key national security technologies,” the Pentagon charged June 5 in an annual report to Congress.

Beijing has “used its intelligence services and other illicit approaches to collect sensitive U.S. information and export-controlled technology in violation of U.S. laws and export controls,” the unclassified report said.

The Chinese defense industry is also tightly integrated with the country’s civilian science and technology sectors, which has helped the military develop source code, avionics, and information and cyber-technologies, the report said.

The findings come amid rising Sino-American tensions related to information security. The Justice Department last month indicted five members of China’s People’s Liberation Army on cyber-espionage charges. Beijing responded by canceling a bilateral dialogue on cybersecurity and, through state-run media, denouncing tech giants like Google and Apple as “pawns” of the American government.

Beijing has leveled its own accusations of cyber-espionage at Washington. China’s main Internet security agency said in March that a large portion of cyber-attacks against the country's computers in 2013 originated in the United States.

Like the U.S. military, the PLA’s strategic goals are increasingly based on controlling information, whether in cyberspace, outer space or elsewhere, the Pentagon report said.

“Almost all of the PLA’s 2013 exercises focused on operating in ‘informationized’ conditions by emphasizing system-of-systems operations, a concept that can be viewed as the Chinese corollary to U.S. network-centric warfare,” the document said. China’s investments in advanced electronic warfare systems and computer network operations reflect this priority, the report added.

The report involved the departments of State, Homeland Security, Energy, Commerce and Treasury, the intelligence community, and the National Security Council staff, a senior defense official said.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group