China’s Strategic Force Gears Up for Space and Cyber War

Li Shangfu (3rd left) is seen in this photo

Li Shangfu (3rd left) is seen in this photo / Getty Images

 

NDU report reveals PLA information warfare plans

China’s new Strategic Support Force highlights Beijing’s growing military might and plans to expand both power and influence using space, cyber, and information warfare in both peacetime and a future high-tech war, according to a Pentagon-sponsored study.

The new force, set up in late 2015, is not part of army, navy, air force, or missile force and is directly under the Communist Party’s Central Military Commission, according to a report published this week by the National Defense University. Continue reading

China electronic spying threat

https://twt-thumbs.washtimes.com/media/image/2018/07/04/7_4_2018_china-us-28201_s878x585.jpg?9739c089d09019457eff90957353d2bf131e7da7

Defense Secretary Jim Mattis and Chinese Defense Minister Wei Fenghe met last week in Beijing. The delegation traveling on the E-4B plane with Mr. Mattis had to take extraordinary security precautions. (Associated Press) Photo by: Mark Schiefelbein

 

Defense Secretary Jim Mattis‘ recent visit to China highlighted the security dangers posed by sophisticated Chinese electronic spying in the capital of Beijing.

Security precautions for those traveling with the defense secretary were extremely tight during his June 26-28 visit.

To prevent Chinese spying through cellphones or laptop computers, the 10 journalists traveling aboard the secretary’s Air Force E-4B nuclear command plane, a militarized Boeing 747, were prohibited from bringing any electronic devices that were taken off the aircraft during the two-day visit back onto the plane. Anything that used wireless connectivity was deemed potentially vulnerable to Chinese hacking. Continue reading

PLA’s new Strategic Support Force remains an enigma

A visitor watches a video of President Xi Jinping talking at an exhibition in Beijing about China’s military achievements, on October 10, 2017. Photo: Reuters / Jason Lee

 

Two years after the People’s Liberation Army created a new Strategic Support Force, a combined cyber and space warfare and military spy service, details about the force’s structure and mission remain wrapped in mystery.

As with most of China’s advanced arms programs and warfighting capabilities, the Strategic Support Force (SSF) remains a closely guarded secret. But the fact that China’s leaders have combined four or five military departments into a service on a par with its army, air force and navy in terms of stature highlights the importance the Chinese have placed on non-kinetic forms of warfare. Continue reading

PLA’s hacking hotel

American military intelligence has identified a hotel complex that is serving as an ersatz headquarters for a Chinese military hacking unit. China is basically hiding its operations cyberattack units in plain sight.

 

U.S. military intelligence has identified a headquarters for a Chinese military hacking unit — inside two Beijing hotels.

According to an open-source intelligence report produced by the Army’s Asian Studies Detachment, “the Headquarters/Jintang and Seasons Hotel appear to be located in the same or at least adjacent buildings, both of which are, according to available information, owned by or connected to the People’s Liberation Army 4th Department.”

The Fourth Department, known as 4PLA, until recently was part of the military’s General Staff Department and is also known as the Electronic Countermeasures and Radar Department. The unit was reorganized into a new PLA service called the Strategic Support Force. The roll of the department is to conduct offensive electronic warfare and information warfare, including offensive cyberattacks. Continue reading

Exclusive: Cyberattack leaves natural gas pipelines vulnerable to sabotage

For further information on SCADAs, please see the following Global Geopolitics entries that were ahead of the curve:

Red Dragon Rising: Communist China’s Military Threat to America” from 1999 is a highly recommended read. The United States is in more vulnerable than most people know, and longer than most people would have thought.

Cyberspies linked to China’s military targeted nearly two dozen US natural gas pipeline operators over a recent six-month period, stealing information that could be used to sabotage US gas pipelines, according to a restricted US government report and a source familiar with the government investigation.

From December 2011 through June 2012, cyberspies targeted 23 gas pipeline companies with e-mails crafted to deceive key personnel into clicking on malicious links or file attachments that let the attackers slip into company networks, says the Department of Homeland Security (DHS) report.

The report does not mention China, but the digital signatures of the attacks have been identified by independent cybersecurity researchers as belonging to a particular espionage group recently linked to China’s military.

The confluence of these factors –  along with the sensitive operational and technical details that were stolen – make the cyberbreaches perhaps among the most serious so far, some experts say. The stolen information could give an adversary all the insider knowledge necessary to blow up not just a few compressor stations but perhaps many of them simultaneously, effectively holding the nation’s gas infrastructure hostage. Nearly 30 percent of the nation’s power grid now relies on natural gas generation.

“This theft of key information is about hearing the footsteps get closer and closer,” says William Rush, a retired scientist formerly with the Gas Technology Institute who chaired the effort to create a cybersecurity standard applicable to the gas pipeline industry.

“Anyone can blow up a gas pipeline with dynamite. But with this stolen information, if I wanted to blow up not one, but 1,000 compressor stations, I could,” he adds. “I could put the attack vectors in place, let them sit there for years, and set them all off at the same time. I don’t have to worry about getting people physically in place to do the job, I just pull the trigger with one mouse click.Continue reading

Chinese hackers have hit every Washington network, intel says

Chinese hackers have hit nearly every Washington institution, according to unnamed intelligence officials.

The dark secret is there is no such thing as a secure unclassified network,” one said in a Newser report. “Law firms, think tanks, newspapers. If there’s something of interest, you should assume you’ve been penetrated.” Continue reading

Obama’s Cyber Dodge – White House cyber report won’t focus on China

The Obama administration plan to counter massive cyber espionage from China will not focus on a single country, a White House official said.

The administration is set to release its “Strategy to Mitigate the Theft of U.S. Trade Secrets” at a press conference of senior officials, including Attorney General Eric Holder.

“This strategy is not focused on any one country nor is it focused on cybersecurity exclusively, though cyber does play an important role in the strategy,” the official said. Continue reading

China the world’s ‘most sophisticated’ hacker, says Google’s Eric Schmidt

As long as the United States remains unwilling to fight fire with fire on some fronts, especially cyber warfare, expect things to get much worse — such as one day shutting down banks and grinding the economy to a halt.

China’s state-sanctioned cybercrime is a global “menace” according to Eric Schmidt, Google’s executive chairman, as he predicts a revolution in the country in the coming decades in his latest book.

“The disparity between American and Chinese firms and their tactics will put both the government and the companies of the United States at a distinct disadvantage,” because “the United States will not take the same path of digital corporate espionage, as its laws are much stricter (and better enforced) and because illicit competition violate the American sense of fair play,” the book claims. Continue reading

Cyber Spies Spotted

Report: Chinese military cyber warfare units identified

China’s military is conducting extensive cyber warfare and spying operations through several electronic intelligence units, including a group identified for the first time called Beijing North Computing Center, according to a new report by a private research group.

“Chinese cyber espionage poses an advanced persistent threat to U.S. national and economic security,” states the report, set for publication Friday. Continue reading

Rise In U.S. Hacker Attacks Against China

The PLA has been at this for decades, although they now have assigned the 4PLA to head the cyberwarfare theatre. It should be interesting to see if they can be beaten at their own game, but likely not with their advantage of having made the microchips and components our infrastructure, military hardware/software and  government communication systems (and possibly even our nuclear deterrent) is highly dependent on.

About 7.8 million Chinese computers were affected in 27,900 IP attacks that originated in other countries. And that’s just between January and June, China’s National Computer Network Emergency Response Technical Team said on Monday.

The source of the attacks? The majority come from the U.S. Continue reading

White House Hack Attack

What good is a nuclear deterrent when it’s compromised? The “MAD” concept has been effectively thrown out the window. What’s more is the American public is 99.9% unaware of the grave danger this puts them in, let alone it happened at all. Sadly, the only “football” most are concerned about is the one that gets tossed around on Monday nights.

Hackers linked to China’s government broke into one of the U.S. government’s most sensitive computer networks, breaching a system used by the White House Military Office for nuclear commands, according to defense and intelligence officials familiar with the incident.

One official said the cyber breach was one of Beijing’s most brazen cyber attacks against the United States and highlights a failure of the Obama administration to press China on its persistent cyber attacks.

U.S. officials familiar with reports of the White House hacking incident said it took place earlier this month and involved unidentified hackers, believed to have used computer servers in China, who accessed the computer network used by the White House Military Office (WHMO), the president’s military office in charge of some of the government’s most sensitive communications, including strategic nuclear commands. The office also arranges presidential communications and travel, and inter-government teleconferences involving senior policy and intelligence officials.

“This is the most sensitive office in the U.S. government,” said a former senior U.S. intelligence official familiar with the work of the office. “A compromise there would cause grave strategic damage to the United States.”

Security officials are investigating the breach and have not yet determined the damage that may have been caused by the hacking incident, the officials said.

Despite the administration national security official’s assertion, one defense official said there is fairly solid intelligence linking the penetration of the WHMO network to China, and there are concerns that the attackers were able to breach the classified network.

Details of the cyber attack and the potential damage it may have caused remain closely held within the U.S. government.

However, because the military office handles strategic nuclear and presidential communications, officials said the attack was likely the work of Chinese military cyber warfare specialists under the direction of a unit called the 4th Department of General Staff of the People’s Liberation Army, or 4PLA.

It is not clear how such a high-security network could be penetrated. Such classified computer systems are protected by multiple levels of security and are among the most “hardened” systems against digital attack.

However, classified computer systems were compromised in the past using several methods. They include the insertion of malicious code through a contaminated compact flash drive; a breach by a trusted insider, as in the case of the thousands of classified documents leaked to the anti-secrecy web site Wikileaks; and through compromised security encryption used for remote access to secured networks, as occurred with the recent compromise involving the security firm RSA and several major defense contractors.

According to the former official, the secrets held within the WHMO include data on the so-called “nuclear football,” the nuclear command and control suitcase used by the president to be in constant communication with strategic nuclear forces commanders for launching nuclear missiles or bombers.

The office also is in charge of sensitive continuity-of-government operations in wartime or crises.

The former official said if China were to obtain details of this sensitive information, it could use it during a future conflict to intercept presidential communications, locate the president for targeting purposes, or disrupt strategic command and control by the president to U.S. forces in both the United States and abroad.

Former McAffee cyber threat researcher Dmitri Alperovitch said he was unaware of the incident, but noted: “I can tell you that the Chinese have an aggressive goal to infiltrate all levels of U.S. government and private sector networks.”

The White House network would be the crown jewel of that campaign so it is hardly surprising that they would try their hardest to compromise it,” said Alperovictch, now with the firm Crowdstrike.

Last week the senior intelligence officer for the U.S. Cyber Command said Chinese cyber attacks and cyber-espionage against Pentagon computers are a constant security problem.

“Their level of effort against the Department of Defense is constant” and efforts to steal economic secrets are increasing, Rear Adm. Samuel Cox, Cyber Command director of intelligence, told Reuters after a security conference.

“It’s continuing apace,” Cox said of Chinese cyber-espionage. “In fact, I’d say it’s still accelerating.”

The office is also in charge of the White House Communications Agency, which handles all presidential telephone, radio, and digital communications, as well as airlift operations through both fixed-wing and helicopter aircraft.

It also operates the presidential retreat at Camp David and the White House Transportation Agency.

“To assure proper coordination and integration, the WHMO also includes support elements such as operations; policy, plans, and requirements; administration, information resource management; financial management and comptroller; WHMO counsel; and security,” the website states.

“Together, WHMO entities provide essential service to the president and help maintain the continuity of the presidency.”

A report by the defense contractor Northrop Grumman made public by the congressional U.S.-China Economic and Security Review Commission in March stated that China’s military has made targeting of U.S. command and control networks in cyber warfare a priority.

Chinese capabilities in computer network operations have advanced sufficiently to pose genuine risk to U.S. military operations in the event of a conflict,” the report said.

“PLA analysts consistently identify logistics and C4ISR infrastructure as U.S. strategic centers of gravity suggesting that PLA commanders will almost certainly attempt to target these system with both electronic countermeasures weapons and network attack and exploitation tools, likely in advance of actual combat to delay U.S. entry or degrade capabilities in a conflict,” the report said.

C4ISR is military jargon for command, control, communications, computers, intelligence, surveillance, and reconnaissance.

Little is known within the U.S. intelligence community about Chinese strategic cyber warfare programs.

However, recent military writings have disclosed some aspects of the program, which is believed to be one of Beijing’s most closely guarded military secrets, along with satellite weapons, laser arms, and other high-technology military capabilities, such as the DF-21 ballistic missile modified to attack aircraft carriers at sea.

A Chinese military paper from March stated that China is seeking “cyber dominance” as part of its efforts to build up revolutionary military capabilities.

“In peacetime, the cyber combat elements may remain in a ‘dormant’ state; in wartime, they may be activated to harass and attack the network command, management, communications, and intelligence systems of the other countries’ armed forces,” wrote Liu Wangxin in the official newspaper of the Chinese military on March 6.

“While great importance is attached continuously to wartime actions, it is also necessary to pay special attention to non-wartime actions,” he said. “For example, demonstrate the presence of the cyber military power through cyber reconnaissance, cyber deployment, and cyber protection activities.”

Full article: White House Hack Attack (Washington Free Beacon)