China sets up military cyber-warfare team: report

May 27, 2011
China's military has set up an elite Internet security task force tasked with fending off cyberattacks, state media reported Friday, denying that the initiative is intended to create a "hacker army".

China's military has set up an elite Internet security task force tasked with fending off cyberattacks, state media reported Friday, denying that the initiative is intended to create a "hacker army".

The People's Liberation Army has reportedly invested tens of millions of yuan (millions of dollars) in the project -- which is sure to ring alarm bells around the world among governments and businesses wary of Beijing's intentions.

" have become an international problem affecting both civilian and military areas," the Global Times quoted China's defence ministry spokesman Geng Yansheng as telling a rare briefing this week.

"China is relatively weak in and has often been targeted. This temporary programme is aimed at improving our defences against such attacks."

The 30-member "Cyber Blue Team" -- the core of the PLA's cyber force -- has been organised under the Guangdong in the country's south, and will carry out " drills", the newspaper said.

The United States, Australia, Germany and other Western nations have long alleged that hackers inside China are carrying out a wide-range of cyberattacks on government and corporate computer systems worldwide.

But in a commentary, the Global Times hit out at "some foreign media" for interpreting the programme as a breeding ground for a "hacker army".

"China's capability is often exaggerated. Without substantiated evidence, it is often depicted by overseas media as the culprit for cyberattacks on the US and Europe," the paper said.

"China needs to develop its strong cyber defence strength. Otherwise, it would remain at the mercy of others."

China's military has received annual double-digit increases in its budget over much of the last two decades as it tries to develop a more modern force capable of winning increasingly high-tech wars.

In 2007, the Pentagon raised concerns about a successful Chinese test strike on a satellite, a weapon that could be used to knock out the high-tech communications of its enemies.

US computer firm McAfee said in February that hackers from China have also infiltrated the computer networks of global oil companies, stealing financial documents on bidding plans and other confidential information.

According to US diplomatic cables obtained and published by WikiLeaks, the United States believes that China's leadership has directed hacking campaigns against US Internet giant Google and Western governments.

In one cable, the US embassy in Beijing said it learned from "a Chinese contact" that the Politburo had led years of hacking into computers of the , its allies and Tibet's exiled spiritual leader, the Dalai Lama.

Explore further: Study shows role of media in sharing life events

add to favorites email to friend print save as pdf

Related Stories

Google made failed bid for Spotify

2 hours ago

Internet titan Google tried last year to buy streaming music service Spotify but backed off for reasons including a whopping price tag, the Wall Street Journal reported on Tuesday.

Thieves got into 1K StubHub accounts

2 hours ago

(AP)—Cyber thieves got into more than 1,000 StubHub customers' accounts and fraudulently bought tickets for events through the online ticket reseller, a law enforcement official and the company said Tuesday.

Microsoft CEO sees 'bold' plan as 4Q tops Street

3 hours ago

(AP)—Microsoft Corp. CEO Satya Nadella painted an upbeat vision of the future Tuesday, saying that the next version of Windows will be unified across screens of all sizes and that two money-losing units—Nokia ...

Recommended for you

Study shows role of media in sharing life events

16 hours ago

To share is human. And the means to share personal news—good and bad—have exploded over the last decade, particularly social media and texting. But until now, all research about what is known as "social sharing," or the ...

UK: Former reporter sentenced for phone hacking

23 hours ago

(AP)—A former British tabloid reporter was given a 10-month suspended prison sentence Thursday for his role in the long-running phone hacking scandal that shook Rupert Murdoch's media empire.

Evaluating system security by analyzing spam volume

23 hours ago

The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company's spam volume to evaluate its security vulnerability through the SpamRankings.net ...

Surveillance a part of everyday life

Jul 24, 2014

Details of casual conversations and a comprehensive store of 'deleted' information were just some of what Victoria University of Wellington students found during a project to uncover what records companies ...

European Central Bank hit by data theft

Jul 24, 2014

(AP)—The European Central Bank said Thursday that email addresses and other contact information have been stolen from a database that serves its public website, though it stressed that no internal systems or market-sensitive ...

Twitter admits to diversity problem in workforce

Jul 24, 2014

(AP)—Twitter acknowledged Wednesday that it has been hiring too many white and Asian men to fill high-paying technology jobs, just like several other major companies in Silicon Valley.

User comments : 0