Peek A Boo, China Is Waging Undeclared War On You

Is your computer acting squirrelly, your internet connection spotty? It might not be Microsoft after all, it could be Chinese military sponsored hackers.

Congressional commission focuses on China’s cyberwar capability

In war and possibly in peace, China will wage cyberwar to control the information flow and dominate the battle space, according to a new report compiled for a congressional commission.

Chinese military strategists see information dominance as the key to overall success in future conflicts and will continue to expand the country’s computer network exploitation capabilities, according to the report, titled “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation.” The report was prepared for the U.S.-China Economic and Security Review Commission under contract by Northrop Grumman’s Information Systems Sector.

In a conflict, China will likely target the U.S. government and private industry with long-term, sophisticated computer network exploitation and intelligence collection campaigns, the report concludes. U.S. security agencies can expect to face disciplined, standardized operations; sophisticated techniques; high-end software; and a deep knowledge of the U.S. networks, according to the report (PDF).

The strategy employed by the People’s Liberation Army–China’s military organization–is to consolidate computer network attacks with electronic warfare and kinetic strikes, creating “blind spots” in enemy systems to be exploited later as the tactical situation warrants, according to the report. The strategy, which has been adopted by the world’s other technologically inclined armies, is referred to by the PLA as “Integrated Network Electronic Warfare,” the report stated.

The emphasis on information warfare has forced the PLA to recruit from a wide swath of the civilian sector, according to the report. As is the case with the U.S. military and its new Cyber Command, the PLA looks to commercial industry and academia for people possessing the requisite specialized skills and pasty pallor to man the keyboards. And although it hints broadly at it, the report offers no evidence of ties between the PLA and China’s hacker community.

The U.S.-China Economic and Security Review Commission reports and provides recommendations to Congress on the national security implications of the bilateral trade and economic relationship between the United States and the People’s Republic of China.

China Expands Cyberspying in U.S., Report Says

The Chinese government is ratcheting up its cyberspying operations against the U.S., a congressional advisory panel found, citing an example of a carefully orchestrated campaign against one U.S. company that appears to have been sponsored by Beijing.

The unnamed company was just one of several successfully penetrated by a campaign of cyberespionage, according to the U.S.-China Economic and Security Review Commission report to be released Thursday. Chinese espionage operations are “straining the U.S. capacity to respond,” the report concludes.

See also:
Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation
Evidence Points To China In Cyber Attacks
Report: China building cyberwarfare capabilities
Security report finds Chinese cyberspying threat growing
U.S. report says China engages in cyber warfare
China fingered in cyberattack on mystery high tech co.
‘Huawei continues to receive preferential funding from China’s army’, says US Commission
United States-China Economic and Security Review Commission

/I sure hope Obama and company are putting at least as much time and energy into fighting this undeclared cyberwar with China as they are prosecuting their childish, whiny, crybaby media war against Fox News

Things That Make You Go Hmmm

Colonel: US Army has working electropulse grenades

Contradicting previous reports, a US Army electronic-warfare colonel has apparently confirmed the existence of working non-nuclear electromagnetic pulse (EMP) ordnance – apparently so portable that it is even available in hand-grenade size.

The revelation came at a blogger roundtable (press conference) held in order to introduce the US Army’s new electronic-warfare specialist career field. The briefing was reported by the war-hacks at Military.com:

“EMP grenade technology is out there, but I’ve never had my hands on one,” said Col Laurie Buckhout, chief of the newly formed Electronic Warfare Division, Army Operations, Readiness and Mobilization…

The target may be a small building or a village, she said, and so a small jammer could be used, or EMP grenades.

Iraq Hones Army Electronic Warfare

It was barely a year ago that the Army stood up an EW division under the G-3 in the Army staff. This placed it in an operational environment where it could have significant influence on many Army disciplines, including kinetic activities such as fires. So, soldiers and field artillery officers can be the chief bearers of EW in the Army’s transformational brigade combat team configuration. Fires personnel will be responsible for the integration of EW effects.

Col. Laurie Moe Buckhout, USA, chief of the Army EW division, points out that this makes EW a weapon system of choice over which the field artillery officer has command and control. The other services integrate EW systems under the EW Coordination Center, or EWCC. This ensures a joint doctrine, and the Army’s adoption of a similar approach will help interoperability.

The Army’s new approach to EW represents a bit of a turnaround. Whereas the service had little to do with EW for many years, it now is emphasizing its importance both tactically and organizationally. Col. Buckhout explains that the Army has dedicated EW as a core competency, so every soldier must have an understanding of EW. The Army also is building a core of EW experts in the enlisted, warrant and commissioned ranks.

Army EW will be an aspect of the service’s modularity in that these experts will be embedded throughout the Army in all echelons. Some organizations will include EW teams, the colonel adds.

The colonel allows that the Army’s new emphasis on EW emerged from the fight against IEDs in Iraq. But, important as that fight is, EW’s importance has spread beyond it. Col. Buckhout cites the Army’s pursuit of the core elements of EW.

Electronic attack entails offensive action against an adversary. This could range from suppressing air defenses to employing radio traffic countermeasures. Electronic protect defends Army assets against enemy electronic attacks, which could include direct methods such as jamming or indirect kinetic methods such as setting IEDs. And, signals intelligence must be integrated into EW to increase the efficiency of both disciplines.

Staying ahead of the enemy is the chief tactical challenge facing Army EW, Col. Buckhout states. The enemy in Iraq is well suited to technology adaptation, and it repeatedly has changed its tactics to combat Army IED countermeasures. “However you make them unsuccessful, they’re going to try something new,” she says.

But recently the Army has been able to turn the tide in EW. It has been able to use EW for targeting and for surgically interdicting specific operators without interfering with other users of the local electromagnetic spectrum.

These successes emerged from earlier efforts that achieved mixed results. Those efforts mainly involved brute-force EW against the IED spectrum instead of actions targeted against specific threats. Electronic countermeasures systems pressed into action against IEDs were not designed for crowded urban environments rife with various radio frequency systems. Many of these early counter-IED efforts interfered with friendly spectrum, both military and civilian.

Satellite, FM and cell phone systems all suffered from some of these jamming measures. The military found that its vital global positioning system (GPS) and communications systems, including Blue Force Tracking, were disabled when these IED jammers were operating. Iraqi emergency responders, such as Red Crescent ambulance staff, could not use their communications systems. Civilians who relied on cell phone connectivity for their day-to-day existence were cut off, and even helicopters and aircraft could be affected locally.

But a key tactical success in the EW counter-IED effort was the refinement of materiel, techniques and operations, Col. Buckhout states. Those interference issues have been largely resolved, so the Army now can counter enemy IEDs more effectively while maintaining vital communications and radio frequency systems. “We have come a long way in technologies and capabilities to address the threat while enabling our own friendly use of the spectrum,” she states. “We have had great successes countering certain types of IEDs by denying the enemy use of the spectrum.

“Because of electronic warfare, we are able to more surgically affect hostile operations,” the colonel declares. “We can go directly after a threat while impacting less of the spectrum writ large. So you’re having less collateral damage on overall systems that are friendly or have the potential to be friendly, and a more surgical effect going directly after enemy systems.”

See also:
The Electromagnetic Bomb – a Weapon of Electrical Mass Destruction
ElectroMagnetic Pulse Bomb
Electronic warfare (EW)
The Electronic Warfare (EW) Working Group
Electronic Warfare Offers New Jobs for Tech-savvy Professionals

/I wonder how good Iran is at sheilding their military electronics?