Prayer zone for a better, empowering, inspiring, promoting, prospering, progressing and more successful life through Christ Jesus

Posts tagged ‘People’s Liberation Army’

China F-35: Secrets Stolen From US Show Up in Its Stealth Fighter.

China obtained F-35 secrets through an extensive cyber spy operation carried out in 2007 against U.S. defense contractor Lockheed Martin, U.S. officials and defense analysts said, and they have shown up China’s new stealth fighter jet.

Codenamed Operation Byzantine Hades, the multiyear cyber-espionage operation yielded sensitive technology about the United States’ latest fighter jet which in turn was incorporated into the development of China’s new J-20 fighter, the Washington Times reported.

According to Defense officials, a Chinese military unit known as the Technical Reconnaissance Bureau (TRF), located in the nation’s Chengdu province, was behind the cyber-espionage. Once the data had been acquired, the TRF is said to have transferred it to the state-run Aviation Industry Corp. of China, which then used that stolen data in building the J-20 fighter jet, the Washington Free Beaconreported.

Urgent: Do You Approve Or Disapprove of President Obama’s Job Performance? Vote Now in Urgent Poll 

Having started 10 years ago, the F-35 development program is a joint venture between Lockheed Martin and the Pentagon that has cost $392 billion, making it the Pentagon’s most expensive weapons program ever. The program’s original price tag was $233 billion; however it ballooned due to delays brought on by cost overruns.

Referred to as a “fifth-generation” warplane, the F-35 fighter jet will be replacing the popular F-16 and more than a dozen other warplanes that are currently in use by the United States and foreign governments around the world.

As of late 2013, the U.S. partner countries of Britain, Canada, Australia, Norway, the Netherlands, Italy, Turkey and Denmark, Israel, and Japan have already ordered F-35 fighter jets from Lockheed Martin.

Also known as the Joint Strike Fighter, the F-35 is said to be the most technically-advanced plane in the United States’ arsenal with 7.5 million lines of computer code controlling its weapons system, which is triple the amount of coding currently used in the top Air Force fighter, the Government Accountability Office told The Wall Street Journal.

“You’ve seen significant improvements in Chinese military capabilities through their willingness to spend, their acquisitions of advanced Russian weapons, and from their cyber-espionage campaign,” James A. Lewis, a cyber-policy expert at the Center for Strategic and International Studies, told The Washington Post. “Ten years ago, I used to call the [People’s Liberation Army] the world’s largest open-air military museum. I can’t say that now.”

In addition to the apparent cyber theft of secrets pertaining to the F-35’s development, China has also reportedly accessed other U.S. weapons systems, including the Patriot missile system, Terminal High Altitude Area Defense, and the Army’s ballistic missile interceptor program.

Editor’s Note: ObamaCare Is Here. Are You Prepared?

Related Stories:

© 2014 Newsmax. All rights reserved.
By Michael Mullins

Why China Is Practicing for an Invasion of Taiwan.

Image: Why China Is Practicing for an Invasion of Taiwan

Supply trucks cross a river during China’s Mission 2013B last month, practice for an invasion of Taiwan. (China Online)

The perception that U.S. leadership in the world is flagging likely inspired China to conduct a large-scale military drill using 20,000 troops this month in what experts say was a mock invasion of Taiwan. The danger lies not in how the United States reacts to the drill, which was broadcast to the world, but in not reacting at all and continuing to take great pains not to describe China as an enemy.

Click here to read the full analysis from top intelligence experts at

© 2013 Newsmax. All rights reserved.


China’s Military Is Preparing For War In Cyberspace.

As an unsaved world prepares to go through the coming Great Tribulation, we see that the next great battlefield will be ” in the air”. And no surprise, the Devil is the Prince of the power of the air.

“Wherein in time past ye walked according to the course of this world, according to the prince of the power of the air, the spirit that now worketh in the children of disobedience:” Ephesians 2:2

From WFB: China’s military is preparing for war in cyberspace involving space attacks on satellites and the use of both military and civilian personnel for a digital “people’s war,” according to an internal Chinese defense report.

“As cyber technology continues to develop, cyber warfare has quietly begun,” the report concludes, noting that the ability to wage cyber war in space is vital for China’s military modernization.


According to the report, strategic warfare in the past was built on nuclear weapons. “But strategic warfare in the information age is cyber warfare,” the report said.

“With the reliance of information warfare on space, cyberspace will surely become a hot spot in the struggle for cyberspace control,” the report said.

The new details of Chinese plans for cyber and space warfare were revealed in a report “Study on Space Cyber Warfare” by four engineers working at a Chinese defense research center in Shanghai.

The report presents a rare inside look of one of Beijing’s most secret military programs: Cyber warfare plans against the United States in a future conflict.

“Cyber warfare is not limited to military personnel. All personnel with special knowledge and skills on information system may participate in the execution of cyber warfare. Cyber warfare may truly be called a people’s warfare,” the report says.

People’s War was first developed by China’s Communist founder Mao Zedong as a Marxist-Leninist insurgency and guerrilla warfare concept. The article provides evidence that Chinese military theorists are adapting Mao’s peasant uprising stratagem for a future conflict with the United States.

A defense official said the report was recently circulated in military and intelligence circles. Its publication came as a surprise to many in the Pentagon because in the past, U.S. translations of Chinese military documents on similar warfighting capabilities were not translated under a directive from policy officials seeking to prevent disclosure of Chinese military writings the officials feared could upset U.S.-China relations.

A Chinese government spokesman could not be reached for comment. However, Chinese spokesmen in the past have denied reports that China engages in cyber attacks.

The study links China’s space warfare development programs with its extensive cyber warfare capabilities. Both programs are considered “trump card” weapons that would allow a weaker China to defeat a militarily stronger United States in a conflict.

“Cyber warfare is an act of war that utilizes space technology; it combines space technology and cyber technology and maintains and seizes the control of cyberspace,” the study says.

Because cyberspace relies on satellites, “space will surely be the main battlefield of cyber warfare,” the report said.

Satellites and space vehicles are considered the “outer nodes” of cyber space and “are clear targets for attack and may be approached directly,” the report said, adding that ground-based cyberspace nodes are more concealed and thus more difficult to attack.

Additionally, satellites have limited defenses and anti-jamming capabilities, leaving them very vulnerable to attack.

The report reveals that China’s military, which controls the country’s rapidly growing space program, is preparing to conduct space-based cyber warfare—“cyber reconnaissance, jamming, and attack”—from space vehicles.

Space-based cyber warfare will include three categories: space cyber attack, space cyber defense, and space cyber support. The space cyber support involves reconnaissance, targeting, and intelligence gathering.

“A space cyber-attack is carried out using space technology and methods of hard kill and soft kill,” the report said. “It ensures its own control at will while at the same time uses cyberspace to disable, weaken, disrupt, and destroy the enemy’s cyber actions or cyber installations.”

Soft-kill methods are designed to disrupt or damage cyberspace links using jamming, network cyber attacks, and “deceit” in the electromagnetic domain.

The cyber attacks include launching computer viruses, theft and tampering of data, denial of service attacks, and “detonation of [a] network bomb that can instantaneously paralyze or destroy enemy’s information network.”

“Soft kill measures are well concealed, fast in action, and the attack can be accomplished before the enemy even has time to discover it,” the report said. “Soft kill measures are deceptive and well hidden; they are difficult to detect and monitor.”

Hard-kill cyber attack weapons include missiles and other “kinetic” weapons along with directed energy, including lasers, radio frequency weapons, and particle beam weapons.

Chinese cyber warfare capabilities are one of the People’s Liberation Army’s (PLA) most closely guarded secrets, along with its anti-satellite missile and jamming program.

The topic of military cyber warfare was recently discussed by U.S. and Chinese military and defense officials at a meeting earlier this month of the U.S.-China Strategic and Economic Dialogue in Washington.

The Washington Free Beacon obtained a copy of the recently translated report, dated December 2012 and published in the journal Aerospace Electronic Warfare.

The journal is a bimonthly publication of the Institute 8511, part of the China Aerospace Science and Industry Corp. (CASIC), a state-run missile manufacturer and high-technology aerospace research center.

Institute 8511 develops electronic warfare offense and defense weapons, countermeasure technologies, and command and control systems for aircraft and missiles.

The institute in the past also developed China’s DF-21D anti-ship ballistic missile, a unique weapon that uses precision guidance to attack U.S. aircraft carriers at sea.

The defense official said Institute 8511 is located close to the PLA’s premier cyber warfare headquarters in Shanghai, known as Unit 61398. That unit was identified in a report last February by the security firm Mandiant as the main origin of widespread military cyber attacks on the West.

According to the report, China’s goal for cyber war calls for using high-technology weapons in cyberspace to achieve military objectives.

“Since cyberspace is boundless and transcends land, sea, air, and space, cyber warfare is not constrained by territorial land or territorial sea, and there is no difference between the front and the rear of the battlefield,” the report said. “The advantage of cyber warfare is its global nature; it has global alert, global resources, and global access.”

Additionally, war in cyberspace is not constrained by nighttime, weather, or geography and can be conducted at any time, key factors that have limited conventional warfighting in the past.

In line with Chinese military doctrine that calls for sudden attacks and the element of surprise, the report said cyberwarfare is ideal for rapid attacks that are difficult for an enemy to identify.

“This suddenness can often leave cyber warfare without a trace and without damaging the physical installation or personnel, and yet it can change the trend and outcome of war by affecting the operational effectiveness in an instance.”

A second recently translated military report by two PLA colonels calls for China to adopt a new military doctrine called “trump card and data link-centric warfare” that is based on the U.S. war fighting doctrine called “network-centric warfare.”

The two colonels, Sr. Col. Du Wenlong and Sr. Col. Xie Zhaohui, call for a new strategic concept designed to attack and defeat the United States using advanced command, control, communications, computers, intelligence, surveillance, and reconnaissance, what the military calls C4ISR and the key to conducting combined arms warfare.

The colonels call for new weapons and other military capabilities “to penetrate and to strike as quickly as possible … and ensure that our military will win the warfare under the informatized conditions.”

“Should the United States military’s transformation model of ‘network-centric warfare’ become a success, it will undoubtedly and completely change the mode and means of warfare, making warfare even more sudden and its outcome even quicker to come, generating unmatched asymmetrical advantages,” the colonels said. “This will inevitably greatly strengthen its arrogance, enabling it to have its own way to an even bigger extent and to promote its politics of hegemony.”

Publication of the new cyber warfare report provides a more recent example of the contradiction between internal Chinese military writings and public statements. A 1999 book produced for the Pentagon’s Office of Net Assessment and edited by China specialist Michael Pillsbury first reveals the contradiction.

The book, “Chinese Views of Future Warfare,” influenced many senior Pentagon and military leaders’ views of China by showing that internal Chinese military writings discussed plans for war with the United States, considered China’s main enemy. The writings contrasted sharply with frequent public statements by China that its arms buildup is purely defensive and not directed at any country.

Richard Fisher, a Chinese military affairs expert, said the Chinese report reveals China’s merger of cyber warfare and space warfare efforts.

Fisher said the Chinese military understands that U.S. satellites are critical to relaying computer data traffic and are vulnerable to direct attack.

“China has already demonstrated two anti-satellite weapons: ground based lasers in 2006 and then the SC-19 [anti-satellite] missile in 2007. A higher Medium Earth Orbit (MEO) capable ASAT called DN02 may have been tested recently,” Fisher said.

China also is pressing for a space arms agreement at the same time it is building up its space forces, Fisher said.

“The bottom line today is that China’s first priority is building the means to win wars in space while using space diplomacy to disarm its potential enemies,” he said.

U.S. cyber warfare strategy was recently disclosed in a top-secret Presidential Policy Directive-20 that was made public by former National Security Agency contractor Edward Snowden.

The directive outlines the use of military cyber attacks that “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.”

A third Chinese document from 2005 that was translated recently by the U.S. government reveals that Chinese military planners are preparing to destroy or disable up to eight Global Positioning System satellites. The satellites are critical for U.S. military precision guided missiles and bombs.

“Eliminating two groups of GPS satellites can prevent GPS satellites from providing navigation service around the clock,” the study stated. “The effect of dropping these GPS satellites on the navigation accuracy of GPS satellites is quite obvious,” the study, “Research on Voidness of GPS,” said. source – Washington Free Beacon.

by NTEB News Desk

China And Russia To Hold Massive War Games.


China will join Russia later this week for its largest-ever naval drills with a foreign partner, underlining deepening ties between the former cold war rivals along with Beijing’s desire for closer links with regional militaries.

China has long been a key customer for Russian military hardware, but only in the last decade have their militaries begun taking part in joint exercises.

China’s defence ministry said on Tuesday that its navy would send four destroyers, two guided missile frigates and a support ship for the exercises, which start on Friday in the Sea of Japan and run until 12 July.

The ships departed on Monday from the port of Qingdao, where China’s Northern Fleet is based, and headed for the rallying point in Peter the Great Bay near Vladivostok.

“This marks our navy’s single biggest deployment of military force in a China-foreign joint exercise,” the ministry said.

General Fang Fenghui, the People’s Liberation Army chief of the general staff, announced the exercises during a visit to Moscow, where he met his Russian counterpart, Valery Gerasimov. The two also announced that another round of anti-terrorism joint drills would be held in Russia’s Ural mountains from 27 July to 15 August.

In comments reported by the official Liberation Army Daily, Fang emphasised that outsiders should not consider the exercises threatening.

“The joint drill conducted by the two militaries of China and Russia do not target any third parties. Their aim is to deepen co-operation between the two militaries in the training field, boost capacity in co-ordinating military activities, and serve the purpose of safeguarding regional security and stability,” Fang said.

China began deploying ships to the anti-piracy flotilla off the coast of Somalia in 2008 and in recent years its navy has joined in a series of joint drills in the Pacific and Indian oceans. Chinese land units have taken part in border security and anti-terrorism exercises organised by the six-nation Shanghai Co-operation Organisation.

Co-operation with the US navy, the predominant maritime force in the region, has been more limited, although China will take part next year in the US-organised multinational Rim of the Pacific exercises, the world’s largest maritime exercise. source – Guardian UK.

by NTEB News Desk

Pentagon: Chinese Government Waging Cyberattacks.

The Pentagon for the first time used its annual report on China to directly assert that Beijing’s government and military have conducted computer-based attacks against the U.S., including efforts to steal information from federal agencies.

In a new report on the Chinese military, the Defense Department goes a small step further than it has gone in the past, when it said that cyber-attacks originated in China and may be linked to Beijing’s use of civilian experts in clandestine attacks against American companies. But over the past year, U.S. government officials and private cyber-security experts have increasingly stepped up accusations that the Chinese government is directly involved in cyber espionage against the U.S.

In February, a U.S.-based cyber-security firm, Mandiant, issued a report accusing a secret Chinese military unit in Shanghai of years of cyber-attacks against more than 140 companies, a majority of them American.

The Pentagon report, released Monday, said that, “In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military.”

It said China is using its cyber capabilities to collect intelligence against U.S. diplomatic, economic and defense programs. And the report warned that the computer skills needed for such espionage is similar to those needed to conduct cyber-warfare.

The new wording in the report continues an escalating effort by U.S. officials to call out the Chinese on the cyber-attacks and to press for a more open dialogue with Beijing on the problem.

The annual report also provides a detailed overview of China’s military progression.

In assessing the latest developments, the report said Beijing’s leaders are increasingly looking to the People’s Liberation Army to perform missions that reach beyond China’s periphery. It contributed, for example, to supporting evacuation operations in Libya, sent a hospital ship to Latin America and took on leadership roles in United Nations peace operations.

“To advance its broader strategic objectives and self-proclaimed ‘core interests,’ China is pursuing a robust and systematic military modernization program,” the report said.

The report said China is modernizing its short-range ballistic missile force and is acquiring greater numbers of conventional medium-range missiles to increase the range at which it can conduct precision strikes against land targets and naval ships, including aircraft carriers, operating far from China’s shores.



© Copyright 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Pentagon: Espionage Fuels China’s Fast-Paced Military Buildup.

WASHINGTON — China is using espionage to acquire technologies to fuel its fast-paced military modernization program, the Pentagon said on Monday in an annual report that for the first time accused Beijing of trying to break into U.S. defense computer networks.

In its 83-page annual report to Congress on Chinese military developments, the Pentagon also cited progress in Beijing’s effort to develop advanced-technology stealth aircraft and build an aircraft carrier fleet to project power further offshore.

The report said China’s cyber-snooping was a “serious concern” that pointed to an even greater threat because the “skills required for these intrusions are similar to those necessary to conduct computer network attacks.”

“The U.S. government continued to be targeted for [cyber] intrusions, some of which appear to be attributable directly to the Chinese government and military,” it said, adding the main purpose of the hacking was to gain information to benefit defense industries, military planners and government leaders.

A spokeswoman said it was the first time the annual Pentagon report had cited Beijing for targeting U.S. defense networks. Despite concerns over the intrusions, a senior U.S. defense official said his main worry was China’s over lack of transparency about its military intentions.

“What concerns me is the extent to which China’s military modernization occurs in the absence of the type of openness and transparency that others are certainly asking of China,” David Helvey, deputy assistant secretary of defense for East Asia, told a Pentagon briefing on the report.

Helvey welcomed Chinese moves toward greater openness but said there were still many unanswered questions and warned of the “potential implications and consequences of that lack of transparency on the security calculations of others in the region.”

The annual China report, which Congress began requesting in 2000, comes amid ongoing tensions in the region due to China’s military assertiveness and expansive claims of sovereignty over disputed islands and shoals. Beijing has ongoing territorial disputes with the Philippines, Japan and other neighbors.

Beijing’s publicly announced defense spending has grown at an inflation-adjusted pace of nearly 10 percent annually over the past decade, but Helvey said China’s actual outlays were thought to be higher.

China announced a 10.7 percent increase in military spending to $114 billion in March, the Pentagon report said. Publicly announced defense spending for 2012 was $106 billion, but actual pending for 2012 could range between $135 billion and $215 billion, it said. U.S. defense spending is more than double that, at more than $500 billion.

The report highlighted China’s continuing efforts to gain access to sophisticated military technology to fuel its modernization program.

It cited a laundry list of methods, including “state-sponsored industrial and technical espionage to increase the level of technologies and expertise available to support military research, development and acquisition.”

“China continues to engage in activities designed to support military procurement and modernization,” the report said. “These include economic espionage, theft of trade secrets, export control violations, and technology transfer.”

Dean Cheng, an analyst at the conservative Heritage Foundation think tank, said he was surprised by the number of cases of human espionage — as opposed to just cyber-prying — cited in the report.

“This is a PLA that is extensively, comprehensively modernizing . . . they’re pushing across the board,” Cheng said. “China is also comprehensively engaging in espionage.”

China tested its second advanced stealth fighter in as many years in October 2012, highlighting its “continued ambition to produce advanced fifth-generation fighter aircraft,” the report said. Neither aircraft of its stealth aircraft is expected to achieve effective operational capability before 2018, it said.

Last year also saw China commission its first domestically produced aircraft carrier, the report said. China currently has one aircraft carrier purchased abroad and conducted its first takeoff and landing from the ship in November, the report said.

It predicted China would spend three to four years training and integrating the ship into its fleet before having a fully operational aircraft carrier capability.

© 2013 Thomson/Reuters. All rights reserved.

What Do You Need?.

I was driving down the highway last night when a luxury car whizzed past. I noticed a streak of gleaming white and something else that caught my attention. Emblazoned on its license plate was one simple word: needy. I laughed out loud, appreciating the humor and audacity of such a self-designation. That car made me think about the enormous spread between what we think will make us happy (things like luxury cars) and what really does make us happy.

It’s no secret that human beings are wired for pleasure. It’s what fuels our materialistic instincts. We get a quick rush from buying things. A friend of mine sells expensive laboratory equipment to hospitals. At the end of the day, she says, the purchasing decision is always an emotional one. Hospital employees, it seems, get a kick out of buying the latest, greatest gadgets and machines for labs and operating rooms.

Though it’s natural to enjoy buying things, we all know that such pleasures can become addictive. To keep the rush going, we have to keep buying more stuff. Doing so can empty our souls as well as our wallets, making us dependent on shallow pleasures.

If you doubt this, spend a little time taking inventory of all you own. Maybe your vice is shoes or clothes. Or maybe it’s being up on the latest in technology. Or maybe you think a new car or new decor for your home will make you feel good. But let’s be honest: how many of your possessions have given you anything resembling the peace your heart desires?

Ann Spangler

Ann Spangler is an award-winning writer and speaker.

Army Chaplain Killed in Korean War to Receive Medal of Honor.

Capt. Emil J. Kapaun, a U.S. Army chaplain killed during the Korean War, will be posthumously awarded the Medal of Honor next week by President Barack Obama for heroism displayed during combat.

The White House announced Thursday that Kapaun’s family will be in attendance for a White House ceremony set for Thursday, April 11th.

While under attack from Chinese Communist forces on Nov. 1-2, 1950, Kapaun braved enemy fire to provide medical aid and comfort to his fellow soldiers. Aware of his imminent capture, he also chose to stay behind to help treat his wounded servicemen. He also rescued an injured Chinese officer and worked with him to negotiate the safe surrender of American forces. Shortly following his capture, Kapaun confronted an enemy soldier preparing to execute a fellow American, saving his life and inspiring others to continue fighting the enemy.

The Metal of Honor is awarded to an armed forces member who serves in a distinguished manner while either engaged in an action against an American enemy or a foreign force or while serving with friendly foreign forces who are battling an opposing armed force.

To be eligible for the award, recipients must display personal bravery or self – sacrifice that clearly distinguishes them above fellow service personnel. In addition, the recipient’s conduct must be documented by incontestable proof and each recommendation must meet the standard of extraordinary merit.

© 2013 Newsmax. All rights reserved.
By Cyrus Afzali

China Mobilizes Forces, Warplanes in NKorea Border Region.

In response to mounting tensions on the Korean peninsula, China has ordered military forces on heightened alert in its border region with North Korea, according to U.S. officials, the Washington Free Beacon reports.

The Chinese People’s Liberation Army (PLA) mobilization in the northeast section of the nation began in mid-March, and includes troop movement and placing warplanes on the ready, according to the Free Beacon. Beijing took action in response to North Korea’s declaration of a “state of war” and threats to conduct missile attacks against the United States and South Korea.

In addition, China’s navy warships have been engaged in live-firing naval drills in the Yellow Sea adjacent to the Korean peninsula, apparently in solidarity with North Korea, the Free Beacon reports. U.S.-South Korean military drills — set to continue throughout April — have inflamed the government in Pyongyang.

Meanwhile, North Korea is mobilizing missile forces, officials familiar with satellite imagery of missile bases say, according to the newspaper. The satellite imagery shows Nodong medium-range missiles and their mobile launchers, the officials said.

North Korea is also expected to conduct a flight test of its new KN-08 road-mobile ICBM — or its intermediate-range Musudan mobile missile — and moves in this direction have also been noted, according to the officials, the Free Beacon reports.

Although North Korean forces are not expected to take action against the South while the war games continue in South Korea, the situation remains precarious, because a miscalculation could result in unintended action.

The government in Seoul has warned it would react with force to any military provocation from the North.

PLA movement near North Korea was seen in Jilin Province, and intelligence on March 19 showed the Chinese military was ordered to go to “Level One” alert status, the Beacon reports.

Massive soldier deployment was evident in Ji’an, a city in Jilin, and PLA tanks and armored personnel carriers, were reported moving near the Yalu River that separates China from North Korea.

Additionally, PLA troops and military vehicles were seen near Baishan, in Jilin province, around March 21.

PLA air force jets have also been noted flying at several border locations in China, including Yanji and Yanbian in Jilin, Kuancheng, in Hebei province, and Dandong, in Liaoning province, according to the Beacon.

China maintains a long-standing defense treaty with the North that obligates Beijing to defend Pyongyang, an agreement that was last implemented during the Korean War.

© 2013 Newsmax. All rights reserved.

By Hiram Reisner

China’s new premier rejects US hacking claims.


  • China's newly appointed Premier Li Kiqiang, right, and former Chinese Premier Wen Jiabao applaud at the closing session of the National People's Congress at the Great Hall of the People in Beijing China, Sunday, March 17, 2013. China's new leader Xi Jinping pledged a cleaner, more efficient government Sunday as the country's ceremonial legislature wrapped up a pivotal session that installed the latest generation of communist leaders in a once-a-decade transfer of power.(AP Photo/Kin Cheung)View PhotoChina’s newly appointed Premier …
  • A man listens to a news conference by newly-appointed Premier Li Keqiang who appears on a monitor screen after the closing ceremony of the National People's Congress at the Great Hall of the People in Beijing Sunday, March 17, 2013. China's new leaders pledged to run a cleaner, more efficient government and slash spending on official perks Sunday as the ceremonial legislature wrapped up a pivotal session to install a new leadership in a once-a-decade transfer of power. (AP Photo/Andy Wong)View PhotoA man listens to a news conference …

BEIJING (AP) — New Chinese Premier Li Keqiang dismissed hacking accusations against China as “groundless” on Sunday and said his government was committed to strong ties with Washington.

Referring to allegations that China’s military was behind massive hacking attacks on U.S. entities, Li reiterated Beijing’s statements that China is a major target of global hackers and opposes all such criminal activity.

“I think we should not make groundless accusations against each other but spend more time doing practical things that will contribute to cybersecurity,” Li said in his first news conference in his new role.

Li is the highest-ranking official to comment on the hacking claims made by U.S. cybersecurity firm Mandiant that provided a detailed picture of alleged cyberspying carried out by a People’s Liberation Army unit based in Shanghai.

Li said that despite their differences, conflict between the world’s largest and second-largest economies is not inevitable as long as the countries respect each other’s major concerns and manage their differences.

China’s new leaders “attach great importance” to relations that meet the “fundamental interests of people in both countries and serves the global trend of peace and development,” Li told reporters at the traditional premier’s news conference that follows the close of the annual legislative session.

China-U.S. ties have weathered a series of crises over the past year over dissidents, Chinese trade practices, opposition to Chinese investment in the U.S. and — most recently — hacking accusations. While basically stable, political ties are seen as lagging behind the economic relationship, with two-way trade hitting almost $500 billion last year, and China’s new president, Xi Jinping, isn’t expected to meet President Barack Obama until an economic summit in Russia in September.

Following Xi’s elevation, Li was appointed premier last week, with running China’s economy his main responsibility.


Associated Press

Tag Cloud