Back to news

December 8, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

US expands list of ‘Communist Chinese military companies'

by Jon Grevatt

The US Department of Defense (DoD) has identified four additional Chinese corporations that it claims have links to China's military. The companies' inclusion on the list of ‘Communist Chinese military companies' means that US investors will be prevented from buying stock in the firms from January 2021.

The new list, which takes the number of blacklisted Chinese companies to 35, features corporations that are known primarily for operations in commercial domains. They include the Semiconductor Manufacturing International Corporation (SMIC), China Construction Technology Company (CCTC), China International Engineering Consulting Corporation (CIECC), and China National Offshore Oil Corporation (CNOOC).

The DoD said these firms' inclusion on the list is aligned with US efforts to tackle China's military-civil fusion (MCF) strategy, which seeks to adopt advanced commercial technologies for military gains.

It said, “The [DoD] is determined to highlight and counter the People's Republic of China's (PRC) military-civil fusion development strategy, which supports the modernisation goals of the People's Liberation Army (PLA) by ensuring its access to advanced technologies and expertise acquired and developed by even those PRC companies, universities, and research programs that appear to be civilian entities.”

The DoD added that the list of Chinese companies will continue to be updated “with additional entities as appropriate”.

In response to the listing, China's foreign ministry spokesperson said on 4 December that the move constituted a “groundless suppression”.

https://www.janes.com/defence-news/news-detail/us-expands-list-of-communist-chinese-military-companies

On the same subject

  • 3 ways the Navy wants to protect its weapons from cyberattacks

    January 8, 2019 | International, Naval, C4ISR

    3 ways the Navy wants to protect its weapons from cyberattacks

    By: Justin Lynch They have been hacked, tricked and stolen from. Now the message is clear -- no more. The Navy is looking to support research in 36 areas that can help protect weapons systems from cyberattacks, Naval Air Systems Command said in a Jan. 7 update to a broad agency announcement. “It's not necessarily cutting edge research, but it is the first step in cybersecurity quality control that should have already been done,” said Bryson Bort, the founder and chief executive officer of Scythe, a cybersecurity platform. The Navy had admitted as much. Research into protecting the department's weapons comes amid reports that the American military suffers from sustained cyberattacks. In December, an Inspector General report found that some in the Pentagon were not taking basic cybersecurity steps to protect its ballistic missile system. Although the Pentagon's weapons are worth roughly $1.66 trillion, an October report from the Government Accountability Office found that “nearly all” American missiles, jets, ships and lethal equipment in development are vulnerable to cyberattacks. The announcement comes after Congress has mandated the Pentagon address its cyber vulnerabilities. Three of the research areas the Navy is interested are commonly described as the pillars of strong cybersecurity, no matter the institution. They include: Dynamic reconfiguration In an effort to confuse attackers, the Navy wants to research “dynamic reconfiguration.” The National Institute of Standards and Technology defines the term as “changes to router rules, access control lists, intrusion detection/prevention system parameters, and filter rules for firewalls and gateways.” "Organizations perform dynamic reconfiguration of information systems, for example, to stop attacks, to misdirect attackers, and to isolate components of systems, thus limiting the extent of the damage from breaches or compromises,” NIST officials wrote. Research by the University of Maryland's Christian Johnson found that pairing predictive analytics with dynamic reconfiguration tactics, the new approach can lead to the "successful development of learning models that identify specific classes of malware such as ransomware,” Johnson wrote in a paper for the RSA conference. Deception tactics Experts have long used strategies of physical war in digital battles, including with the use of denial and deception tactics. The Navy wants to boost understanding of this area to better secure its weapons systems. In 2015, researchers at MITRE, which conducts federally funded research, advocated for a 10-step process for planning and executing deception operations. “Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat-based cyber defense,” a team of researchers wrote. But the Intelligence Advanced Research Project Activity, the intelligence community's research arm, says that the use of deceptive software and hardware in cybersecurity is still in its infancy. “Many techniques lack rigorous experimental measures of effectiveness,” the organization said, adding that “information is insufficient to determine how defensive deception changes attacker behavior.” Artificial intelligence If there was a common denominator of the federal government's investment in cybersecurity it is the use or artificial intelligence. The Navy has embraced artificial intelligence since its Task Force Cyber Awakening project in 2015. “We see that the more we automate our networks and the more we use machines to do the heavy lifting, the better. Our brains do not have the intellectual capacity to process all of that information,” Rear Adm. Danelle Barrett, Navy Cyber Security Division Director,told Defense Systems, a trade publication, in a 2017 interview. More than half of the challenges and research opportunities announced by IARPA in 2018 involved machine learning, according to an analysis by Fifth Domain. Cyber Command has embraced the technology in a short time period, Capt. Ed Devinney, director of corporate partnerships at the body, said during the November Cyber Con conference hosted by Fifth Domain. “If you talked to anyone at the command two or three years ago about a system that would be all autonomous, you probably wouldn't get much traction. But I think there is a growing understanding and consensus that we need to operate at machine speed, especially when talking about active defense of the network,” Devinney said. He said that everyone likes to use the phrases “artificial intelligence” and “machine learning,” however “there aren't that many people who do AI very well.” https://www.fifthdomain.com/dod/2019/01/07/3-ways-the-navy-wants-to-protect-its-weapons-from-cyberattacks

  • How the Marine Corps is testing a ‘narco-boat’ for resupply efforts

    September 4, 2024 | International, Naval

    How the Marine Corps is testing a ‘narco-boat’ for resupply efforts

    The semisubmersible unmanned vessel can deliver two Naval Strike Missiles for the Corps’ anti-ship missile system.

  • Gh0st RAT Trojan Targets Chinese Windows Users via Fake Chrome Site

    July 29, 2024 | International, C4ISR, Security

    Gh0st RAT Trojan Targets Chinese Windows Users via Fake Chrome Site

    Gh0st RAT delivered via evasive Gh0stGambit in drive-by downloads, targeting Chinese-speaking Windows users with fake Chrome installers.

All news