logo
South China Sea: Chinese military says 3 Philippine aircraft expelled from Spratly Islands

South China Sea: Chinese military says 3 Philippine aircraft expelled from Spratly Islands

Yahoo21-02-2025

China's military said it had expelled three Philippine aircraft from the disputed Spratly Islands in the South China Sea on Thursday, marking the latest in a series of dangerous aerial encounters amid heightened bilateral tensions.
"On February 20, two Philippine C-208 aircraft and one N-22 aircraft illegally entered the airspace near China's Nansha Islands [China's name for the Spratlys]," said Senior Colonel Tian Junli, a spokesman for the People's Liberation Army Southern Theatre Command, in a statement on Friday.
Tian added that the PLA "maintained full control of the situation, issued warnings, and drove the aircraft away".
Do you have questions about the biggest topics and trends from around the world? Get the answers with SCMP Knowledge, our new platform of curated content with explainers, FAQs, analyses and infographics brought to you by our award-winning team.
The C-208 is a modified aircraft equipped for intelligence, surveillance and reconnaissance (ISR) operations, while the N-22 is a twin-turboprop, high-wing light utility aircraft.
The PLA also released a recording of the warning issued, delivered in both Chinese and English: "Philippine military N-22, you are endangering the security of the Chinese reef. Leave immediately and keep far off so as to avoid any misunderstanding".
The Spratly Islands are a vast group of reefs, shoals, atolls and small islets in the South China Sea. Situated around midway between Vietnam and the Philippines, and north of insular Malaysia, they are claimed - wholly or in part - by several countries in the region.
"Recently, the Philippine side has disregarded the facts, repeatedly discrediting China's legitimate actions to safeguard its rights," Tian said, referencing an incident on Tuesday when another "Philippine C-208 aircraft illegally entered China's airspace over the Scarborough Shoal, repeatedly changing its altitude".
The PLA also released 29 seconds of footage on Friday, featuring video from the warning issued by the guided-missile frigate Guangyuan, along with clips and maps that it said detailed the aircraft's erratic manoeuvres on Tuesday.
"In just 218 seconds, the aircraft descended 920 metres in an unprofessional and dangerous manner, intentionally crossing the normal flight altitude of our patrol helicopters, which could have easily led to an accidental maritime or aerial incident," Tian explained.
However, in a statement released on Wednesday, US State Department spokeswoman Tammy Bruce instead called the PLA actions "reckless", citing a Chinese navy helicopter that flew within 3 metres (10 feet) of a Philippine patrol plane during a 30-minute encounter.
Bruce condemned "unsafe and irresponsible actions by the Chinese People's Liberation Army-Navy to interfere with a Philippine maritime air operation in the vicinity of Scarborough Reef".
The disputed shoal is known as Huangyan Island in China and as Panatag Shoal or Bajo de Masinloc in the Philippines.
Manila also accused China of engaging in "dangerous" behaviour, a claim Tian dismissed in his statement on Friday, adding that the Philippines was trying to "promote its illegal claims" after "provoking trouble first and then distorting the facts".
Beijing said such tactics would ultimately be in vain. Tian reaffirmed China's stance, stating that "such provocations are futile and will not deter China from safeguarding its national sovereignty".
The PLA said its forces remained on high alert to ensure the peace and stability of the South China Sea region.
This article originally appeared in the South China Morning Post (SCMP), the most authoritative voice reporting on China and Asia for more than a century. For more SCMP stories, please explore the SCMP app or visit the SCMP's Facebook and Twitter pages. Copyright © 2025 South China Morning Post Publishers Ltd. All rights reserved.
Copyright (c) 2025. South China Morning Post Publishers Ltd. All rights reserved.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Feds vow to continue immigration enforcement ‘every day in L.A.' Here are your rights
Feds vow to continue immigration enforcement ‘every day in L.A.' Here are your rights

Los Angeles Times

timean hour ago

  • Los Angeles Times

Feds vow to continue immigration enforcement ‘every day in L.A.' Here are your rights

As the number of immigration raids has increased across Southern California over the last week, there are more questions than ever about how to handle an interaction with federal agents. Agents with Immigration and Customs Enforcement made arrests in the Garment District, specifically at Ambiance Apparel, where immigration authorities detained employees inside the clothing wholesaler, and other locations on Friday. Protests followed into the weekend, prompting the deployment of National Guard troops in downtown Los Angeles by the Trump administration. The raids are the latest in a string of high-profile immigration enforcement actions over the last week, part of President Trump's promised deportation crackdown. A few days ago, immigration agents raided a popular San Diego restaurant and made arrests, sparking a standoff with outraged residents. Agents also arrested Chinese and Taiwanese nationals at an underground nightclub in the Los Angeles area. Officials suggest many more raids are coming. 'I'm telling you what, we're going to keep enforcing law every day in L.A.,' Trum's 'border czar,' Tom Homan, told NBC News. 'Every day in L.A., we're going to enforce immigration law. I don't care if they like it or not.' Officials have not said how long the raids will last or described the larger operation. But in the deployment memo sending the National Guard to L.A., officials said 'the duration of duty shall be for 60 days or at the discretion of the Secretary of Defense. In addition, the Secretary of Defense may employ any other members of the regular Armed Forces as necessary to augment and support the protection of Federal functions and property in any number determined appropriate in his discretion.' Over the last few months, The Times has asked experts for guidance for employees and employers who find themselves in the cross-hairs. Here is a summary of what we found: If you're home alone or with family members and you hear a knock at the door, check the window, security camera or peephole so you can identify whether ICE agents are outside. When you find yourself in this situation, the first step is to keep your door closed and locked, advised advocacy groups and legal experts. You must open your door and allow agents inside your home if they present a valid search warrant. Advocates say agents must identify themselves and show you the warrant by putting it against the window or slipping it under your door. A valid warrant must be: This can be an overwhelming and scary situation. All those emotions are valid, said Pedro Trujillo, director of organizing for the Coalition for Humane Immigrant Rights. Take a moment to gather yourself, he suggests, because there isn't a time limit on the visit. If you need help verbalizing your rights, show the agent a Red Card that helps explain your rights. Red Cards can be downloaded from the website for the Immigration Legal Resource Center. By showing this card, you're affirming that you want to remain silent and wish to speak to a lawyer. The card states that the person ICE agents are inquiring about has the right to decline answering questions and signing or handing over documents based on their 5th Amendment rights under the U.S. Constitution. You can present this card to agents, whether it's a physical copy or a photo on your phone, by displaying it through the window. If ICE agents enter your home without consent, you have the right to say: 'I do not consent to this entry or search,' according to advocates. Don't physically resist. Instead, you have the right to document what happens, including: After agents have left, you have the right to reach out to and consult with a legal representative. You have the right to remain silent. For example, if you're asked about your immigration status, where you were born or how you entered the United States, you may refuse to answer or remain silent, according to the National Immigration Law Center. You can simply say, 'I want to remain silent' or 'I am exercising my right to remain silent.' Experts advise that you are not required to sign documents or provide personal information. If ICE agents are present when you're on public transportation: If ICE agents approach you while you're in the car: If you are detained or taken into custody, you have the right to reach out to an attorney and receive a phone call from an attorney. You can prove you have a lawyer by giving the officer your signed Form G-28, a federal document that details your lawyer's information and your consent to their legal representation. Don't have a lawyer? You can ask the ICE official for a list of pro-bono lawyers. You can also ask to contact the consulate, which may be able to assist you in finding a lawyer. Get familiar with the rules of the detention center you've been placed in. You can do so by asking for a copy of the Detainee Handbook to understand the detention center's rules, your rights and how you can communicate with loved ones. The book is available in 19 languages, including English, Spanish, Arabic, Bengali, French, Haitian Creole, Hindi, K'iche' (Quiché)/Kxlantzij, Mam, Portuguese, Pulaar, Punjabi, Q'eqchi' (Kekchí), Romanian, Russian, Simplified Chinese, Turkish, Vietnamese and Wolof. A raid is when ICE agents arrive at a work site without warning the employer. They can be accompanied by other agencies or appear in large numbers, according to the California Employers Assn. ICE agents can go to a business to try to find a particular person, or people, according to the National Immigration Law Center. The California Employers Assn. recommends creating a four-step response plan that should address the following: Who should be alerted: Alerting management and employee/union representatives within an organization can help reduce workplace disruption and keep employees calm, said Giuliana Gabriel, vice president of human resources at the California Employers Assn. 'Rumors and misinformation tend to create panic amongst a workforce, and some employees may even try to flee or confront agents,' she said. 'Running could give the agents reason to detain or arrest someone, so having an employee representative or member of management to maintain order and keep employees calm is advisable.' Legal counsel should immediately be notified when ICE shows up because they can help 'protect your organization and your employees from agents overstepping their boundaries or taking liberties as far as what they are authorized to do at your workplace,' she added. Authorized speakers: Examples of people who can be designated to speak with agents include the business owner or a member of the management team, such as a general manager or human resources representative. 'Ideally it would be someone familiar with your response plan, if you have one, and authorized to speak on behalf of the company,' Gabriel said. The identified person or people should be able to communicate confidently, clearly and remain composed 'while protecting the privacy of your organization and its employees,' she said. Gathering ICE agent information: You have the right to ask immigration officials which agency they represent as well as for their names, badge numbers and business cards. 'There have been reports of citizens impersonating ICE agents to target, detain and harass others,' Gabriel said. Designated waiting area: Find a conference room or office where agents can wait. This can limit workplace disruptions. Businesses should enact their response plan immediately when immigration officials arrive. Before ICE agents can enter private areas of your business (public areas are parking lots or lobbies), they must present a valid warrant to conduct their search. As when a warrant is presented at a private home, at the workplace a valid warrant must be issued by a court, have the correct name and address of the person being seized and be signed by a judge or magistrate judge. Businesses should ensure that employees know their rights and that they should refrain from engaging with ICE officials, according to the National Employment Law Project. If ICE agents have questions or requests, workers should not respond and instead direct the officials to speak with their employer.

US-China trade talks to open in London as new disputes emerge
US-China trade talks to open in London as new disputes emerge

New York Post

timean hour ago

  • New York Post

US-China trade talks to open in London as new disputes emerge

US-China trade talks in London this week are expected to take up a series of fresh disputes that have buffeted relations, threatening a fragile truce over tariffs. Both sides agreed in Geneva last month to a 90-day suspension of most of the 100%-plus tariffs they had imposed on each other in an escalating trade war that had sparked fears of recession. Since then, the US and China have exchanged angry words over advanced semiconductors that power artificial intelligence, 'rare earths' that are vital to carmakers and other industries, and visas for Chinese students at American universities. Advertisement 3 President Trump spoke at length with Chinese leader Xi Jinping by phone last Thursday in an attempt to put relations back on track. REUTERS President Trump spoke at length with Chinese leader Xi Jinping by phone last Thursday in an attempt to put relations back on track. Trump announced on social media the next day that trade talks would be held on Monday in London. The latest frictions began just a day after the May 12 announcement of the Geneva agreement to 'pause' tariffs for 90 days. Advertisement The US Commerce Department issued guidance saying the use of Ascend AI chips from Huawei, a leading Chinese tech company, could violate US export controls. That's because the chips were likely developed with American technology despite restrictions on its export to China, the guidance said. The Chinese government wasn't pleased. One of its biggest beefs in recent years has been over US moves to limit the access of Chinese companies to technology, and in particular to equipment and processes needed to produce the most advanced semiconductors. 'The Chinese side urges the US side to immediately correct its erroneous practices,' a Commerce Ministry spokesperson said. US Commerce Secretary Howard Lutnick wasn't in Geneva but will join the talks in London. Analysts say that suggests at least a willingness on the US side to hear out China's concerns on export controls. Advertisement 3 US Commerce Secretary Howard Lutnick will take part in the talks in London. One area where China holds the upper hand is in the mining and processing of rare earths. They are crucial for not only autos but also a range of other products from robots to military equipment. The Chinese government started requiring producers to obtain a license to export seven rare earth elements in April. Resulting shortages sent automakers worldwide into a tizzy. As stockpiles ran down, some worried they would have to halt production. Trump, without mentioning rare earths specifically, took to social media to attack China. Advertisement 'The bad news is that China, perhaps not surprisingly to some, HAS TOTALLY VIOLATED ITS AGREEMENT WITH US,' Trump posted on May 30. 3 China dominates the mining and processing of rare earth minerals. REUTERS The Chinese government indicated Saturday that it is addressing the concerns, which have come from European companies as well. A Commerce Ministry statement said it had granted some approvals and 'will continue to strengthen the approval of applications that comply with regulations.' The scramble to resolve the rare earth issue shows that China has a strong card to play if it wants to strike back against tariffs or other measures. Student visas don't normally figure in trade talks, but a US announcement that it would begin revoking the visas of some Chinese students has emerged as another thorn in the relationship. China's Commerce Ministry raised the issue when asked last week about the accusation that it had violated the consensus reached in Geneva. It replied that the US had undermined the agreement by issuing export control guidelines for AI chips, stopping the sale of chip design software to China and saying it would revoke Chinese student visas.

Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis'
Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis'

Boston Globe

time2 hours ago

  • Boston Globe

Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis'

Foreign hackers have increasingly identified smartphones, other mobile devices, and the apps they use as a weak link in US cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. Get Starting Point A guide through the most important stories of the morning, delivered Monday through Friday. Enter Email Sign Up It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. Advertisement 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity specialist at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' US authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real-time and able to read text messages,' said Representative Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Advertisement Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. US intelligence officials have said China poses a significant, persistent threat to US economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' US Representative John Moolenaar, Republican of Michigan and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their US operations. Advertisement Mobile devices can buy stocks, launch drones, and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords, and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators, and business leaders with texts and phone calls. It's unclear how the person obtained Wiles's connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles's number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information, or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Advertisement Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. 'We just can't share things willy-nilly.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store