Editor’s Note: The following report is excerpted from Joseph Farah’s G2 Bulletin, the premium online newsletter published by the founder of WND. Subscriptions are $99 a year or, for monthly trials, just $9.95 per month for credit card users, and provide instant access for the complete reports.

WASHINGTON – China’s quest to develop a cyberwarfare capability is designed to cripple the national defense infrastructure of the United States in a potential pre-emptive attack, according to a new report from the bi-partisan congressional U.S.-China Economic and Security Commission, according to a report from Joseph Farah’s G2 Bulletin.

In a 136-page report titled “Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage,” the commission asserted that Chinese advances in cyberwarfare were specifically targeting U.S. military systems.

“Chinese capabilities in computer network operations have advanced sufficiently to pose a genuine risk to U.S. military operations in the event of a conflict,” the commission said.

In recent testimony, Adm. Robert Willard, who is commander of the U.S. Pacific Command, said that the U.S. command and control system is a primary target of Chinese cyberwarfare.

The report pointed out that Chinese success in acquiring advanced cyber technologies was through joint ventures with top U.S. information technology and Internet security firms.

“Chinese commanders may elect to use critical U.S. networks carrying logistics and command and control data to collect highly valuable real-time intelligence or to corrupt the data without destroying the networks or hardware,” the report said.

For the rest of this report and other Intelligence Briefs, please go to Joseph Farah’s G2 Bulletin:

Keep in touch with the most important breaking news stories about critical developments around the globe with Joseph Farah’s G2 Bulletin, the premium, online intelligence news source edited and published by the founder of WND.

For the complete report and full immediate access to Joseph Farah’s G2 Bulletin, subscribe now.

Note: Read our discussion guidelines before commenting.