Congressional report highlights risks of cyberwarfare with China
| Topic : Data Loss Prevention
A recent report released by the U.S.-China Economic and Security Review Commission emphasizes the potential dangers facing the U.S. in the event of cyberwarfare with China.
Conducted by Northrop Grumman Corp., an aerospace and defense technology company, the report indicates that Chinese companies are uniting with foreign partners to provide the Chinese military with state-of-the-art military and computing technology. This technology could be used to overcome American data protection measures and penetrate U.S. military, private and governmental supply networks for electronics.
The report claims that, over the past ten years, computer-based operations have become an integral component of China's military strategies. In order to meet the personnel requirements that this prioritization entails, the military has begun to recruit many civilians into its ranks. The report notes that individuals with unique skills from academia, commercial industries and potentially hacker communities have been incorporated into China's military industry.
The report concludes that, in the event of cyberwar, the Chinese would use an information warfare strategy which utilizes attacks against its enemy's command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR). Such an attack could potentially cripple a nation's critical infrastructure.
In response to the report, several U.S. government and military officials have reiterated their commitment to further developing American data protection, particularly in regards to the military. Additionally, the White House is currently working on a thorough survey of the American telecommunications landscape, with the aim of shoring up its integrity.
However, it should be noted that China has previously taken umbrage with the findings of the U.S.-China Economic and Security Review Commission, arguing that the committee has unfairly vilified the Chinese and their motivations.