Latest News:  

English>>Military

China Focus: China refutes cyber attack allegations

(Xinhua)

09:27, February 21, 2013

BEIJING, Feb. 20 (Xinhua) -- China on Wednesday refuted allegations of hacking activities as groundless, calling for international cooperation to fight cyber crime rather than criticize each other in an irresponsible way.

Foreign Ministry spokesman Hong Lei made the remarks at a regular press briefing, noting that groundless criticism is "irresponsible and unprofessional, which will not help to solve the problem."

U.S. cyber security firm Mandiant on Monday released a report which alleged that a secret Chinese military unit in Shanghai was behind years of cyber attacks against U.S. companies.

"Firmly opposing cyber attacks, China has established relevant laws and regulations to crack down on hacking," Hong said.

China has been a major victim of cyber attacks, most of which are from the United States, according to Hong.

He said China and the United States have maintained communication over the issue, adding that as cyber crime is an international problem, it should be solved through international cooperation on the basis of mutual trust and respect.

Earlier on Wednesday, China's military spokesman also said the country's armed forces had never backed any hacking activities, denouncing U.S. cyber security firm Mandiant's report as groundless both in facts and legal basis.

It was groundless in fact because it came to the conclusion that the source of attack came from China simply because of the discovery that attacks were linked to IP addresses based in China, Geng Yansheng, spokesman for the Ministry of National Defense, said at a briefing.

Firstly, as known to all, it is common for hacking attacks on the Internet to take place by peculating IP addresses that "it happens almost everyday," according to the spokesman.

Secondly, there has been no clear and consistent definition of cyber attacks around the world. The report lacks legal basis to assert cyber espionage only by cataloguing some routine cyber activities, he said.

Thirdly, cyber attacks are transnational, anonymous and deceptive with their source often difficult to identify. Releasing irresponsible information will not help solve problems, Geng added.

Statistics show that Chinese military end users connected to the Internet frequently come under cyber attack from abroad. In these cases, source IP addresses suggest that the majority of them come from the United States, Geng said.

He added, "but we do not point fingers at the United States based on the above-mentioned findings, and every country should deal with cyber security in a professional and responsible manner."

Additionally, he said, to address criticism from foreign statesmen and media outlets about hacking, the Chinese side would like to resolve the issues through joint law enforcement and consultations with other countries.

According to Geng, the Chinese Ministry of Public Security has assisted more than 50 countries and regions in investigating some 1,100 cases of cyber crime since 2004. Also, China has established bilateral law enforcement cooperation with more than 30 countries and regions, including the United States, Britain, Germany and Russia.

Lodging one-sided media accusations will not help solve problems, but only jeopardize existing cooperation, he said.

Jin Canrong, an American studies expert with the Renmin University of China, said the real motive behind the U.S. hacking accusation is to seek an upper hand in Sino-U.S. relations.

It signaled that the United States is looking for fresh topics over which to criticize China in an effort to achieve dominance, according to Jin. As the United States is losing its traditional superiority, the cards it can play are getting fewer and fewer, but accusing China of cyber attacks becomes a new one.

Against the backdrop of fiscal constraints, the U.S. military fears cut-backs in budgets, hence whipping up fear about new threats such as alleged cyber attacks from China, particularly when traditional security threats look less and less daunting, the academic said.

Furthermore, Jin added, the U.S. government is also under pressure from business, as many U.S. companies, keenly aware of competition from China, are concerned about losing their core technologies and unduly assume China is stealing from them.

We Recommend:

Chinese islet guards have dreams

Diaoyu Islands within waters 3-nautical miles

Chinese flotilla sets sail on escort missions

PLA Navy North Sea Fleet's pelagic training formation

35mm double loading anti-aircraft gun

Festive atmosphere created on missile speedboat

Email|Print|Comments(Editor:YanMeng、Wang Jinxue)

Leave your comment0 comments

  1. Name

  

Selections for you


  1. China's 14th escort fleet sails for Somali

  2. Female soldiers training in cold winter

  3. Pakistanis mourn for victims of deadly blast in Quetta

  4. Impressive moments of Beijing since 1950s

  5. Exploring top private clubs in China

  6. Employees punished to run half-naked

  7. Mo Yan's Our Jing Ke: Downfall by design

  8. Glamor Zhang Xinyi's street style

  9. Facebook targeted by hackers

  10. Online money transfers soared

Most Popular

Opinions

  1. How to build new type ties between big powers?
  2. Diplomacy to help China become global power
  3. Commentary: China sees Africa as true friend
  4. Mind your manners
  5. Football penalties 'too soft'
  6. Juvenile crime rules 'hard to follow'
  7. CCTV's Spring Festival Gala: Glory days gone
  8. Who cares for the village doctors?
  9. The weakening yen's impact on China
  10. Young climbers aim too high in China

What’s happening in China

Surrealistic impression shown in fog

  1. Companies struggle to find, keep workers
  2. City bids farewell to young hero
  3. Overfishing depleting sea resources
  4. Shanghai experiences sudden baby boom
  5. Emission limits enhanced