China sets up military cyber-warfare team: report

May 27, 2011
China's military has set up an elite Internet security task force tasked with fending off cyberattacks, state media reported Friday, denying that the initiative is intended to create a "hacker army".

China's military has set up an elite Internet security task force tasked with fending off cyberattacks, state media reported Friday, denying that the initiative is intended to create a "hacker army".

The People's Liberation Army has reportedly invested tens of millions of yuan (millions of dollars) in the project -- which is sure to ring alarm bells around the world among governments and businesses wary of Beijing's intentions.

" have become an international problem affecting both civilian and military areas," the Global Times quoted China's defence ministry spokesman Geng Yansheng as telling a rare briefing this week.

"China is relatively weak in and has often been targeted. This temporary programme is aimed at improving our defences against such attacks."

The 30-member "Cyber Blue Team" -- the core of the PLA's cyber force -- has been organised under the Guangdong in the country's south, and will carry out " drills", the newspaper said.

The United States, Australia, Germany and other Western nations have long alleged that hackers inside China are carrying out a wide-range of cyberattacks on government and corporate computer systems worldwide.

But in a commentary, the Global Times hit out at "some foreign media" for interpreting the programme as a breeding ground for a "hacker army".

"China's capability is often exaggerated. Without substantiated evidence, it is often depicted by overseas media as the culprit for cyberattacks on the US and Europe," the paper said.

"China needs to develop its strong cyber defence strength. Otherwise, it would remain at the mercy of others."

China's military has received annual double-digit increases in its budget over much of the last two decades as it tries to develop a more modern force capable of winning increasingly high-tech wars.

In 2007, the Pentagon raised concerns about a successful Chinese test strike on a satellite, a weapon that could be used to knock out the high-tech communications of its enemies.

US computer firm McAfee said in February that hackers from China have also infiltrated the computer networks of global oil companies, stealing financial documents on bidding plans and other confidential information.

According to US diplomatic cables obtained and published by WikiLeaks, the United States believes that China's leadership has directed hacking campaigns against US Internet giant Google and Western governments.

In one cable, the US embassy in Beijing said it learned from "a Chinese contact" that the Politburo had led years of hacking into computers of the , its allies and Tibet's exiled spiritual leader, the Dalai Lama.

Explore further: New streaming apps could boost citizen journalism

Related Stories

Special ops troops using flawed intel software

13 hours ago

Special operations troops heading to war zones are asking for commercial intelligence analysis software they say will help their missions. But their requests are languishing, and they are being ordered to use a flawed, in-house ...

US turns to rewards in hunt for overseas cyber criminals

Mar 19, 2015

The FBI considers Evgeniy Bogachev one of the world's most prolific and brilliant cyber criminals, slapping his photos—bald, beefy-faced and smiling faintly—on "Wanted" fliers posted online. The Russian ...

Recommended for you

Individual privacy versus digital driftnets

4 hours ago

The great irony of the Abbott government's plan enforce the mandatory data retention legislation is that while this is being done to make us safer, in fact it creates new data security risks for us all.

Meerkat vs. Periscope: Live-streaming app battle & buzz

Mar 27, 2015

Download Periscope, Twitter's just-launched live video-streaming app, and you'll find people broadcasting all sorts of mundane stuff: waiting for AT&T to fix their wiring, getting out of bed in Silicon V ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.