- Chinese Death Star: The moon cited as the perfect launch pad for ballistic missiles
- Help wanted: Homeland Security plagued by vacancies at the top
- We are not amused: Queen’s protection officers warned to keep ‘sticky fingers’ off the royal cashews
- Unleash the crossbows: Gov. Scott Walker creates new hunting season
- Bubonic plague kills 20 in Madagascar
- G-20 diplomats fell for hacker attack promising nude photos of former French first lady Carla Bruni
- Minnesota guardsman charged with stealing private soldier data for fake IDs
- Florida appeals court rules universities can’t regulate guns
- Vladimir Putin defends Russian conservative values
- Tea Party Patriots call key GOP firing a declaration of war
Report: U.S. forces vulnerable to Chinese cyberattack
Question of the Day
In a future war with the United States, China likely would first use cyberweapons to attack computer networks of U.S. forces in the Pacific rather than strike with conventional arms, according to a congressional report Thursday.
The cyberattacks would aim to disrupt the electronic systems on which U.S. Pacific Command relies for communications, command and resupply, impeding its ability to fight back against the People's Liberation Army (PLA), says a report for the U.S.-China Economic and Security Review Commission.
"PLA analysts consistently identify logistics and [communications, command and control] infrastructure as U.S. strategic centers of gravity, suggesting that PLA commanders will almost certainly attempt to target these systems [with cyber-weapons], likely in advance of actual combat to degrade [U.S.] capabilities in a conflict," the report states.
The report, prepared by analysts for defense contractor Northrop Grumman Corp., also says such attacks would take advantage of confusion over U.S. policies on how to respond to anonymous attacks over the Internet.
"Even if circumstantial evidence points to China as the culprit, no policy currently exists to easily determine appropriate response options to a large-scale attack on U.S. military or civilian networks in which definitive attribution is lacking," says the report.
"Beijing, understanding this, may seek to exploit this gray area in U.S. policymaking and legal frameworks."
The report notes that a successful cyberattack might not become apparent until after it is over or, worse, until conventional fighting has begun, as critical networks fail or become unreliable.
It is not just military networks that might fail as a result of Chinese cyberwarfare, the report warns.
The PLA's close ties to large Chinese telecommunications firms mean China's military has opportunities to penetrate the supply networks for electronic components used by the U.S. government and private industry as well as the U.S. military, building secret "back doors" or booby traps into vital systems.
Penetrating the U.S. telecommunications supply chain in this way would be complex and difficult, the report notes. But a successful attack would "cause a catastrophic failure of select systems and networks supporting critical infrastructure for national security or public safety," it says.
The report, based on publicly available Chinese official and academic publications, says the PLA has been conducting military exercises that include cyberoperations in an effort to better integrate cybercapabilities into its war-fighting.
"PLA exercises increasingly include network attack, network defense, electronic countermeasures, and psychological operations operating alongside ground, naval, air, and strategic missile forces," the report states.
The report says U.S. Transportation Command (Transcom) would be another likely target of any pre-emptive Chinese cyberstrike in the Pacific.
Transcom is the military command that provides cargo and logistics support to the nation's armed forces - moving troops, equipment and supplies into and out of war theaters. It also provides midair refueling for U.S. aircraft.
Transcom's computer systems have to run on unclassified networks because they are integrated with commercial airlift providers. The global system that manages midair refueling missions, for instance, is based on the Internet and could be susceptible to penetration by Chinese hackers, the report says.
© Copyright 2013 The Washington Times, LLC. Click here for reprint permission.
About the Author
By Matt Kibbe
The short-term deal will assure long-term overspending
- Obama's Afghanistan experts stumped on U.S. death toll, war costs during hearing
- Comma on!: Twitter erupts over Obama-Castro 'marriage'
- NAPOLITANO: A conspiracy so vast
- N. Korean news agency: Kim Jong Un's uncle executed
- All-out war breaks out in GOP over budget pact
- White House improvises again on patchy Obamacare rollout
- Biden guarantees victory on immigration reform
- Jane Fonda Foundation fails to make single contribution in 5 years: report
- Obama takes 'selfie' at Mandela's funeral service
- VEGAS RULES: Harry Reid pushed feds to change ruling for casino's big-money foreigners
Independent voices from the The Washington Times Communities
Born in 1930 in rural Missouri, Charles Vandegriffe, Sr., brings his time and place to the Communities.
Columns from Voices around the World talking about the events, people, politics and social issues that concern us wherever, and whoever, we are.
Chef Mary Moran discusses the food we eat, where it comes from and what it does for us.
An informed and often humorous take on the world of advertising, public relations and social media. 100% Pure. Not from concentrate.
Extraordinary day at Redskins Park
White House pets gone wild!
Let it snow