Prayer zone for a better, empowering, inspiring, promoting, prospering, progressing and more successful life through Christ Jesus

Posts tagged ‘People’s Liberation Army’

China F-35: Secrets Stolen From US Show Up in Its Stealth Fighter.

China obtained F-35 secrets through an extensive cyber spy operation carried out in 2007 against U.S. defense contractor Lockheed Martin, U.S. officials and defense analysts said, and they have shown up China’s new stealth fighter jet.

Codenamed Operation Byzantine Hades, the multiyear cyber-espionage operation yielded sensitive technology about the United States’ latest fighter jet which in turn was incorporated into the development of China’s new J-20 fighter, the Washington Times reported.

According to Defense officials, a Chinese military unit known as the Technical Reconnaissance Bureau (TRF), located in the nation’s Chengdu province, was behind the cyber-espionage. Once the data had been acquired, the TRF is said to have transferred it to the state-run Aviation Industry Corp. of China, which then used that stolen data in building the J-20 fighter jet, the Washington Free Beaconreported.

Urgent: Do You Approve Or Disapprove of President Obama’s Job Performance? Vote Now in Urgent Poll 

Having started 10 years ago, the F-35 development program is a joint venture between Lockheed Martin and the Pentagon that has cost $392 billion, making it the Pentagon’s most expensive weapons program ever. The program’s original price tag was $233 billion; however it ballooned due to delays brought on by cost overruns.

Referred to as a “fifth-generation” warplane, the F-35 fighter jet will be replacing the popular F-16 and more than a dozen other warplanes that are currently in use by the United States and foreign governments around the world.

As of late 2013, the U.S. partner countries of Britain, Canada, Australia, Norway, the Netherlands, Italy, Turkey and Denmark, Israel, and Japan have already ordered F-35 fighter jets from Lockheed Martin.

Also known as the Joint Strike Fighter, the F-35 is said to be the most technically-advanced plane in the United States’ arsenal with 7.5 million lines of computer code controlling its weapons system, which is triple the amount of coding currently used in the top Air Force fighter, the Government Accountability Office told The Wall Street Journal.

“You’ve seen significant improvements in Chinese military capabilities through their willingness to spend, their acquisitions of advanced Russian weapons, and from their cyber-espionage campaign,” James A. Lewis, a cyber-policy expert at the Center for Strategic and International Studies, told The Washington Post. “Ten years ago, I used to call the [People’s Liberation Army] the world’s largest open-air military museum. I can’t say that now.”

In addition to the apparent cyber theft of secrets pertaining to the F-35’s development, China has also reportedly accessed other U.S. weapons systems, including the Patriot missile system, Terminal High Altitude Area Defense, and the Army’s ballistic missile interceptor program.

Editor’s Note: ObamaCare Is Here. Are You Prepared?

Related Stories:

© 2014 Newsmax. All rights reserved.
By Michael Mullins

Why China Is Practicing for an Invasion of Taiwan.

Image: Why China Is Practicing for an Invasion of Taiwan

Supply trucks cross a river during China’s Mission 2013B last month, practice for an invasion of Taiwan. (China Online)

The perception that U.S. leadership in the world is flagging likely inspired China to conduct a large-scale military drill using 20,000 troops this month in what experts say was a mock invasion of Taiwan. The danger lies not in how the United States reacts to the drill, which was broadcast to the world, but in not reacting at all and continuing to take great pains not to describe China as an enemy.

Click here to read the full analysis from top intelligence experts at

© 2013 Newsmax. All rights reserved.


China’s Military Is Preparing For War In Cyberspace.

As an unsaved world prepares to go through the coming Great Tribulation, we see that the next great battlefield will be ” in the air”. And no surprise, the Devil is the Prince of the power of the air.

“Wherein in time past ye walked according to the course of this world, according to the prince of the power of the air, the spirit that now worketh in the children of disobedience:” Ephesians 2:2

From WFB: China’s military is preparing for war in cyberspace involving space attacks on satellites and the use of both military and civilian personnel for a digital “people’s war,” according to an internal Chinese defense report.

“As cyber technology continues to develop, cyber warfare has quietly begun,” the report concludes, noting that the ability to wage cyber war in space is vital for China’s military modernization.


According to the report, strategic warfare in the past was built on nuclear weapons. “But strategic warfare in the information age is cyber warfare,” the report said.

“With the reliance of information warfare on space, cyberspace will surely become a hot spot in the struggle for cyberspace control,” the report said.

The new details of Chinese plans for cyber and space warfare were revealed in a report “Study on Space Cyber Warfare” by four engineers working at a Chinese defense research center in Shanghai.

The report presents a rare inside look of one of Beijing’s most secret military programs: Cyber warfare plans against the United States in a future conflict.

“Cyber warfare is not limited to military personnel. All personnel with special knowledge and skills on information system may participate in the execution of cyber warfare. Cyber warfare may truly be called a people’s warfare,” the report says.

People’s War was first developed by China’s Communist founder Mao Zedong as a Marxist-Leninist insurgency and guerrilla warfare concept. The article provides evidence that Chinese military theorists are adapting Mao’s peasant uprising stratagem for a future conflict with the United States.

A defense official said the report was recently circulated in military and intelligence circles. Its publication came as a surprise to many in the Pentagon because in the past, U.S. translations of Chinese military documents on similar warfighting capabilities were not translated under a directive from policy officials seeking to prevent disclosure of Chinese military writings the officials feared could upset U.S.-China relations.

A Chinese government spokesman could not be reached for comment. However, Chinese spokesmen in the past have denied reports that China engages in cyber attacks.

The study links China’s space warfare development programs with its extensive cyber warfare capabilities. Both programs are considered “trump card” weapons that would allow a weaker China to defeat a militarily stronger United States in a conflict.

“Cyber warfare is an act of war that utilizes space technology; it combines space technology and cyber technology and maintains and seizes the control of cyberspace,” the study says.

Because cyberspace relies on satellites, “space will surely be the main battlefield of cyber warfare,” the report said.

Satellites and space vehicles are considered the “outer nodes” of cyber space and “are clear targets for attack and may be approached directly,” the report said, adding that ground-based cyberspace nodes are more concealed and thus more difficult to attack.

Additionally, satellites have limited defenses and anti-jamming capabilities, leaving them very vulnerable to attack.

The report reveals that China’s military, which controls the country’s rapidly growing space program, is preparing to conduct space-based cyber warfare—“cyber reconnaissance, jamming, and attack”—from space vehicles.

Space-based cyber warfare will include three categories: space cyber attack, space cyber defense, and space cyber support. The space cyber support involves reconnaissance, targeting, and intelligence gathering.

“A space cyber-attack is carried out using space technology and methods of hard kill and soft kill,” the report said. “It ensures its own control at will while at the same time uses cyberspace to disable, weaken, disrupt, and destroy the enemy’s cyber actions or cyber installations.”

Soft-kill methods are designed to disrupt or damage cyberspace links using jamming, network cyber attacks, and “deceit” in the electromagnetic domain.

The cyber attacks include launching computer viruses, theft and tampering of data, denial of service attacks, and “detonation of [a] network bomb that can instantaneously paralyze or destroy enemy’s information network.”

“Soft kill measures are well concealed, fast in action, and the attack can be accomplished before the enemy even has time to discover it,” the report said. “Soft kill measures are deceptive and well hidden; they are difficult to detect and monitor.”

Hard-kill cyber attack weapons include missiles and other “kinetic” weapons along with directed energy, including lasers, radio frequency weapons, and particle beam weapons.

Chinese cyber warfare capabilities are one of the People’s Liberation Army’s (PLA) most closely guarded secrets, along with its anti-satellite missile and jamming program.

The topic of military cyber warfare was recently discussed by U.S. and Chinese military and defense officials at a meeting earlier this month of the U.S.-China Strategic and Economic Dialogue in Washington.

The Washington Free Beacon obtained a copy of the recently translated report, dated December 2012 and published in the journal Aerospace Electronic Warfare.

The journal is a bimonthly publication of the Institute 8511, part of the China Aerospace Science and Industry Corp. (CASIC), a state-run missile manufacturer and high-technology aerospace research center.

Institute 8511 develops electronic warfare offense and defense weapons, countermeasure technologies, and command and control systems for aircraft and missiles.

The institute in the past also developed China’s DF-21D anti-ship ballistic missile, a unique weapon that uses precision guidance to attack U.S. aircraft carriers at sea.

The defense official said Institute 8511 is located close to the PLA’s premier cyber warfare headquarters in Shanghai, known as Unit 61398. That unit was identified in a report last February by the security firm Mandiant as the main origin of widespread military cyber attacks on the West.

According to the report, China’s goal for cyber war calls for using high-technology weapons in cyberspace to achieve military objectives.

“Since cyberspace is boundless and transcends land, sea, air, and space, cyber warfare is not constrained by territorial land or territorial sea, and there is no difference between the front and the rear of the battlefield,” the report said. “The advantage of cyber warfare is its global nature; it has global alert, global resources, and global access.”

Additionally, war in cyberspace is not constrained by nighttime, weather, or geography and can be conducted at any time, key factors that have limited conventional warfighting in the past.

In line with Chinese military doctrine that calls for sudden attacks and the element of surprise, the report said cyberwarfare is ideal for rapid attacks that are difficult for an enemy to identify.

“This suddenness can often leave cyber warfare without a trace and without damaging the physical installation or personnel, and yet it can change the trend and outcome of war by affecting the operational effectiveness in an instance.”

A second recently translated military report by two PLA colonels calls for China to adopt a new military doctrine called “trump card and data link-centric warfare” that is based on the U.S. war fighting doctrine called “network-centric warfare.”

The two colonels, Sr. Col. Du Wenlong and Sr. Col. Xie Zhaohui, call for a new strategic concept designed to attack and defeat the United States using advanced command, control, communications, computers, intelligence, surveillance, and reconnaissance, what the military calls C4ISR and the key to conducting combined arms warfare.

The colonels call for new weapons and other military capabilities “to penetrate and to strike as quickly as possible … and ensure that our military will win the warfare under the informatized conditions.”

“Should the United States military’s transformation model of ‘network-centric warfare’ become a success, it will undoubtedly and completely change the mode and means of warfare, making warfare even more sudden and its outcome even quicker to come, generating unmatched asymmetrical advantages,” the colonels said. “This will inevitably greatly strengthen its arrogance, enabling it to have its own way to an even bigger extent and to promote its politics of hegemony.”

Publication of the new cyber warfare report provides a more recent example of the contradiction between internal Chinese military writings and public statements. A 1999 book produced for the Pentagon’s Office of Net Assessment and edited by China specialist Michael Pillsbury first reveals the contradiction.

The book, “Chinese Views of Future Warfare,” influenced many senior Pentagon and military leaders’ views of China by showing that internal Chinese military writings discussed plans for war with the United States, considered China’s main enemy. The writings contrasted sharply with frequent public statements by China that its arms buildup is purely defensive and not directed at any country.

Richard Fisher, a Chinese military affairs expert, said the Chinese report reveals China’s merger of cyber warfare and space warfare efforts.

Fisher said the Chinese military understands that U.S. satellites are critical to relaying computer data traffic and are vulnerable to direct attack.

“China has already demonstrated two anti-satellite weapons: ground based lasers in 2006 and then the SC-19 [anti-satellite] missile in 2007. A higher Medium Earth Orbit (MEO) capable ASAT called DN02 may have been tested recently,” Fisher said.

China also is pressing for a space arms agreement at the same time it is building up its space forces, Fisher said.

“The bottom line today is that China’s first priority is building the means to win wars in space while using space diplomacy to disarm its potential enemies,” he said.

U.S. cyber warfare strategy was recently disclosed in a top-secret Presidential Policy Directive-20 that was made public by former National Security Agency contractor Edward Snowden.

The directive outlines the use of military cyber attacks that “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.”

A third Chinese document from 2005 that was translated recently by the U.S. government reveals that Chinese military planners are preparing to destroy or disable up to eight Global Positioning System satellites. The satellites are critical for U.S. military precision guided missiles and bombs.

“Eliminating two groups of GPS satellites can prevent GPS satellites from providing navigation service around the clock,” the study stated. “The effect of dropping these GPS satellites on the navigation accuracy of GPS satellites is quite obvious,” the study, “Research on Voidness of GPS,” said. source – Washington Free Beacon.

by NTEB News Desk

China And Russia To Hold Massive War Games.


China will join Russia later this week for its largest-ever naval drills with a foreign partner, underlining deepening ties between the former cold war rivals along with Beijing’s desire for closer links with regional militaries.

China has long been a key customer for Russian military hardware, but only in the last decade have their militaries begun taking part in joint exercises.

China’s defence ministry said on Tuesday that its navy would send four destroyers, two guided missile frigates and a support ship for the exercises, which start on Friday in the Sea of Japan and run until 12 July.

The ships departed on Monday from the port of Qingdao, where China’s Northern Fleet is based, and headed for the rallying point in Peter the Great Bay near Vladivostok.

“This marks our navy’s single biggest deployment of military force in a China-foreign joint exercise,” the ministry said.

General Fang Fenghui, the People’s Liberation Army chief of the general staff, announced the exercises during a visit to Moscow, where he met his Russian counterpart, Valery Gerasimov. The two also announced that another round of anti-terrorism joint drills would be held in Russia’s Ural mountains from 27 July to 15 August.

In comments reported by the official Liberation Army Daily, Fang emphasised that outsiders should not consider the exercises threatening.

“The joint drill conducted by the two militaries of China and Russia do not target any third parties. Their aim is to deepen co-operation between the two militaries in the training field, boost capacity in co-ordinating military activities, and serve the purpose of safeguarding regional security and stability,” Fang said.

China began deploying ships to the anti-piracy flotilla off the coast of Somalia in 2008 and in recent years its navy has joined in a series of joint drills in the Pacific and Indian oceans. Chinese land units have taken part in border security and anti-terrorism exercises organised by the six-nation Shanghai Co-operation Organisation.

Co-operation with the US navy, the predominant maritime force in the region, has been more limited, although China will take part next year in the US-organised multinational Rim of the Pacific exercises, the world’s largest maritime exercise. source – Guardian UK.

by NTEB News Desk

Pentagon: Chinese Government Waging Cyberattacks.

The Pentagon for the first time used its annual report on China to directly assert that Beijing’s government and military have conducted computer-based attacks against the U.S., including efforts to steal information from federal agencies.

In a new report on the Chinese military, the Defense Department goes a small step further than it has gone in the past, when it said that cyber-attacks originated in China and may be linked to Beijing’s use of civilian experts in clandestine attacks against American companies. But over the past year, U.S. government officials and private cyber-security experts have increasingly stepped up accusations that the Chinese government is directly involved in cyber espionage against the U.S.

In February, a U.S.-based cyber-security firm, Mandiant, issued a report accusing a secret Chinese military unit in Shanghai of years of cyber-attacks against more than 140 companies, a majority of them American.

The Pentagon report, released Monday, said that, “In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military.”

It said China is using its cyber capabilities to collect intelligence against U.S. diplomatic, economic and defense programs. And the report warned that the computer skills needed for such espionage is similar to those needed to conduct cyber-warfare.

The new wording in the report continues an escalating effort by U.S. officials to call out the Chinese on the cyber-attacks and to press for a more open dialogue with Beijing on the problem.

The annual report also provides a detailed overview of China’s military progression.

In assessing the latest developments, the report said Beijing’s leaders are increasingly looking to the People’s Liberation Army to perform missions that reach beyond China’s periphery. It contributed, for example, to supporting evacuation operations in Libya, sent a hospital ship to Latin America and took on leadership roles in United Nations peace operations.

“To advance its broader strategic objectives and self-proclaimed ‘core interests,’ China is pursuing a robust and systematic military modernization program,” the report said.

The report said China is modernizing its short-range ballistic missile force and is acquiring greater numbers of conventional medium-range missiles to increase the range at which it can conduct precision strikes against land targets and naval ships, including aircraft carriers, operating far from China’s shores.



© Copyright 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Pentagon: Espionage Fuels China’s Fast-Paced Military Buildup.

WASHINGTON — China is using espionage to acquire technologies to fuel its fast-paced military modernization program, the Pentagon said on Monday in an annual report that for the first time accused Beijing of trying to break into U.S. defense computer networks.

In its 83-page annual report to Congress on Chinese military developments, the Pentagon also cited progress in Beijing’s effort to develop advanced-technology stealth aircraft and build an aircraft carrier fleet to project power further offshore.

The report said China’s cyber-snooping was a “serious concern” that pointed to an even greater threat because the “skills required for these intrusions are similar to those necessary to conduct computer network attacks.”

“The U.S. government continued to be targeted for [cyber] intrusions, some of which appear to be attributable directly to the Chinese government and military,” it said, adding the main purpose of the hacking was to gain information to benefit defense industries, military planners and government leaders.

A spokeswoman said it was the first time the annual Pentagon report had cited Beijing for targeting U.S. defense networks. Despite concerns over the intrusions, a senior U.S. defense official said his main worry was China’s over lack of transparency about its military intentions.

“What concerns me is the extent to which China’s military modernization occurs in the absence of the type of openness and transparency that others are certainly asking of China,” David Helvey, deputy assistant secretary of defense for East Asia, told a Pentagon briefing on the report.

Helvey welcomed Chinese moves toward greater openness but said there were still many unanswered questions and warned of the “potential implications and consequences of that lack of transparency on the security calculations of others in the region.”

The annual China report, which Congress began requesting in 2000, comes amid ongoing tensions in the region due to China’s military assertiveness and expansive claims of sovereignty over disputed islands and shoals. Beijing has ongoing territorial disputes with the Philippines, Japan and other neighbors.

Beijing’s publicly announced defense spending has grown at an inflation-adjusted pace of nearly 10 percent annually over the past decade, but Helvey said China’s actual outlays were thought to be higher.

China announced a 10.7 percent increase in military spending to $114 billion in March, the Pentagon report said. Publicly announced defense spending for 2012 was $106 billion, but actual pending for 2012 could range between $135 billion and $215 billion, it said. U.S. defense spending is more than double that, at more than $500 billion.

The report highlighted China’s continuing efforts to gain access to sophisticated military technology to fuel its modernization program.

It cited a laundry list of methods, including “state-sponsored industrial and technical espionage to increase the level of technologies and expertise available to support military research, development and acquisition.”

“China continues to engage in activities designed to support military procurement and modernization,” the report said. “These include economic espionage, theft of trade secrets, export control violations, and technology transfer.”

Dean Cheng, an analyst at the conservative Heritage Foundation think tank, said he was surprised by the number of cases of human espionage — as opposed to just cyber-prying — cited in the report.

“This is a PLA that is extensively, comprehensively modernizing . . . they’re pushing across the board,” Cheng said. “China is also comprehensively engaging in espionage.”

China tested its second advanced stealth fighter in as many years in October 2012, highlighting its “continued ambition to produce advanced fifth-generation fighter aircraft,” the report said. Neither aircraft of its stealth aircraft is expected to achieve effective operational capability before 2018, it said.

Last year also saw China commission its first domestically produced aircraft carrier, the report said. China currently has one aircraft carrier purchased abroad and conducted its first takeoff and landing from the ship in November, the report said.

It predicted China would spend three to four years training and integrating the ship into its fleet before having a fully operational aircraft carrier capability.

© 2013 Thomson/Reuters. All rights reserved.

What Do You Need?.

I was driving down the highway last night when a luxury car whizzed past. I noticed a streak of gleaming white and something else that caught my attention. Emblazoned on its license plate was one simple word: needy. I laughed out loud, appreciating the humor and audacity of such a self-designation. That car made me think about the enormous spread between what we think will make us happy (things like luxury cars) and what really does make us happy.

It’s no secret that human beings are wired for pleasure. It’s what fuels our materialistic instincts. We get a quick rush from buying things. A friend of mine sells expensive laboratory equipment to hospitals. At the end of the day, she says, the purchasing decision is always an emotional one. Hospital employees, it seems, get a kick out of buying the latest, greatest gadgets and machines for labs and operating rooms.

Though it’s natural to enjoy buying things, we all know that such pleasures can become addictive. To keep the rush going, we have to keep buying more stuff. Doing so can empty our souls as well as our wallets, making us dependent on shallow pleasures.

If you doubt this, spend a little time taking inventory of all you own. Maybe your vice is shoes or clothes. Or maybe it’s being up on the latest in technology. Or maybe you think a new car or new decor for your home will make you feel good. But let’s be honest: how many of your possessions have given you anything resembling the peace your heart desires?

Ann Spangler

Ann Spangler is an award-winning writer and speaker.

Tag Cloud