Subscribe free to our newsletters via your
. Space Industry and Business News .




CYBER WARS
China says US hacking charges 'fabricated out of thin air'
by Staff Writers
Beijing (AFP) Sept 18, 2014


Beijing on Thursday strongly denied a US congressional panel's claim that Chinese government-linked hackers had launched dozens of cyberattacks on American defence contractors, saying the charges were "fabricated out of thin air".

The denial came a day after a Senate panel released a study finding that hackers had gained access to systems run by companies doing contract work for the US Transportation Command (TRANSCOM) at least 50 times between 2012 and 2013, potentially compromising military operations.

"Chinese law prohibits cyberattacks and other crimes, and cracks down on such crimes," Chinese foreign ministry spokesman Hong Lei said. "The Chinese government and military will never support hacker attacks."

"The accusation against China is fabricated out of thin air, and is groundless," he added. "We urge the American side to stop its irresponsible accusations against China."

The row is the latest cyber-security spat to roil US-China relations.

In May this year, China banned the use of Microsoft's Windows 8 operating system on all new government computers, amid reports alleging security concerns.

That followed the United States indicting five members of a Chinese military unit for allegedly hacking US companies for trade secrets.

The New York Times in July quoted US officials saying Chinese hackers accessed US government computers containing personal information on all federal employees.

The Senate Armed Services Committee's report found that of the 50 attacks, at least 20 were "attributed to an 'advanced persistent threat' (APT), a term used to distinguish sophisticated cyber threats that are frequently associated with foreign governments".

The report, as well as committee chairman Senator Carl Levin, attributed all 20 APTs to China.

"The security of our military operations is what is at stake," Levin told reporters as he unveiled a de-classified version of the report.

The hacking has apparently occurred for years. Between 2008 and 2010, for example, a "Chinese military intrusion" into a TRANSCOM contractor compromised emails, documents, computer code and passwords, the report said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
US accuses China of hacking into defense contract firms
Washington (AFP) Sept 17, 2014
Chinese hackers believed to be linked to Beijing conducted dozens of cyberattacks on US defense contractors between 2012 and 2013, potentially compromising military operations, a congressional probe warned Wednesday. A study by the Senate Armed Services Committee found that hackers gained access to systems run by companies doing contract work for the US Transportation Command (TRANSCOM) at ... read more


CYBER WARS
Larry Ellison releases helm of mighty Oracle ship

Mussel-inspired MIT glue may have naval, medical applications

'Priceless' 600-tonne jade deposit found in China

NASA Awards Cross-track Infrared Sounder For JPS System-2 Bird

CYBER WARS
Russian Aerospace Defense Forces Again Dismiss Satellite Explosion Rumors

Harris Corporation supplying radios to Air Force Special Operations Command

Harris Corporation supply Falcon III RF-340M radios to U.S. military

Middle East entity orders Harris tactical radios

CYBER WARS
France raises heat on decision for next Ariane rocket

Elon Musk gets fresh challenge with space contract

Proton Launches May Compete on Price With US Falcons

NASA's Wind-Watching ISS-RapidScat Ready for Launch

CYBER WARS
Russia Unable To Reject Foreign Parts in GLONASS Satellites

Talks Over GLONASS Station Locations in US on Hold

Sam Houston State study examines use of GIS in policing

Western Sanctions Fail to Impede GLONASS Satellite Production

CYBER WARS
USMC system for aircraft battle management to be maintained by Lockheed

Japan wants its own early-warning planes: report

Upgrade for F-35's Autonomic Logistics Information System

Upgraded Brazilian Army helo passes evaluation

CYBER WARS
Method detects prize particle for future quantum computing

Program Grows Lasers Directly on Silicon-Based Microchips

New species of electrons can lead to better computing

The quantum revolution is a step closer

CYBER WARS
Dry Conditions and Lightning Strikes Make for a Long California Fire Season

NASA Airborne Campaigns Focus on Climate Impacts in the Arctic

Severe flooding in Northern Pakistan photographed by NASA

EIAST announces Remote Sensing Applications Competition 2014

CYBER WARS
NJIT researchers working to safeguard the shoreline

Mexican authorities say mine still leaking acid

Auf Wiedersehen to plastic at Berlin's no-packaging store

New toxic spill traced to Mexico mine




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.