-
Chinese government hackers steal designs of advanced U.S. weapons systems
The Chinese government has been conducting a broad, sustained, and disciplined campaign of cyberattacks against U.S. government agencies, critical infrastructure, private companies, and news organizations. The public version of a study prepared for the Pentagon by the Defense Science Board now says that Chinese government hackers have also been able to penetrate the computer networks of all the major U.S. defense contractors, stealing the designs and specifications of the most advanced weapon system in the U.S. arsenal, and gaining insights into broad technologies on which U.S. military advances are based.
-
-
Report: U.S. companies should consider counter-hacking Chinese hackers
A group studying how the United States should respond to the sustained campaign of cyberattacks conducted by Chinese government hackers against U.S. companies, said the United States should seriously consider a campaign of retaliatory cyberattacks against the hackers.
-
-
U.S. to help protect private companies from malicious cyberattacks
The U.S. government said it will help protect private companies from cyber attacks. DHS secretary Janet Napolitano said a system is being developed which will monitor Internet traffic directed to critical infrastructure businesses and block attacks on software programs.
-
-
U.S.: China orchestrating broad cyberattack campaign against U.S.
The Obama administration accused China’s military of orchestrating a campaign of cyberattacks against American government computer systems and defense contractors for the purpose of identifying “military capabilities that could be exploited during a crisis.” Cyber experts estimate that about 90 percent of all cyberattacks in the United States originate in China, but these estimates have typically been offered by private-sector experts. The Pentagon’s annual report to Congress, released Monday, is the first government document specifically and explicitly to assert that the People’s Liberation Army (PLA) is behind a sustained, systematic campaign of cyberattacks on the United States in an effort to gain a strategic advantage over the United States. The report also pointedly notes that Chinese investments in U.S. companies aim to help this cyberattacks campaign.
-
-
China, U.S. to team up on cybersecurity
Secretary of State John Kerry announced on Saturday that China and the United States will join forces to start a working group on cybersecurity.Kerry’s announcement follows several attempts for a dialogue on the topic between the two sides.
-
-
Chinese companies acquire German tech firms
In recent years, a number of Chinese companies have either bought German firms outright or acquired a shareholding in them. This investment activity is being driven by a desire to gain access to state-of-the-art technology. Most of the new owners are not interested in draining their newly acquired companies of knowledge.
-
-
U.S. responds to China’s cyberattacks with anti-theft trade strategy
The Obama administration yesterday (Wednesday) unveiled the details of a broad strategy to counter the systemic theft by Chinese government agencies of U.S. trade and technology and trade secrets. The administration’s plan calls for new diplomatic push to discourage intellectual property theft abroad and better coordination at home to help U.S. companies protect themselves.
-
-
Chinese set to buy yet another U.S. taxpayer-backed hi-tech firm
Lawmakers yesterday expressed their concerns about the likelihood that U.S. taxpayer dollars could end up bolstering the Chinese economy. The lawmakers reacted to reports that a Chinese firm, Zhejiang Geely Holding Group, is leading the list of companies bidding for a majority stake in government-backed Fisker Automotive, and that the only serious rival of that Chinese company is a Chinese auto maker. Fisker’s main battery supplier — U.S. government-backed A123 Systems – has already been acquired by a separate Chinese firm.
-
-
U.S. weighing retaliatory measures against China for hacking campaign
As incontrovertible evidence emerged for the role of Chinese government in initiating and orchestrating the massive, sustained Chinese hacking campaign against U.S. private companies, government agencies, and critical infrastructure assets, the administration has intensified discussions of retaliatory measures the United States may take against China.
-
-
Chinese government orchestrates cyberattacks on U.S.: experts
For more than a decade now, China has engaged in a sustained, systemic, and comprehensive campaign of cyber attacks against the United States. The Chinese government has enlisted China’s sprawling military and civilian intelligence services, with their armies of cyber-specialists, in a cyber-campaign aiming to achieve three goals: steal Western industrial secrets and give them to Chinese companies, so these companies could compete and weaken their Western rivals; hasten China’s march toward regional, then global, economic hegemony; achieve deep penetration of U.S. critical infrastructure in order to gain the ability to disrupt and manipulate American critical infrastructure – and paralyze it during times of crisis and conflict. A detailed 60-page study, to be released today , offers, for the first time, proof that the most sophisticated Chinese hacker groups, groups conducting the most threatening attacks on the United States, are affiliated with the headquarters of China’s military intelligence lead unit — PLA Unit 61398.
-
-
U.S. to adopt tougher stance toward China’s persistent cyberattacks
The Obama administration let it be known that it is examining the adoption of a more assertive stance against China in response to a persistent cyber-espionage campaign waged by Chinese government hackers against U.S. companies and government agencies. The administration is preparing a new National Intelligence Estimate (NIE) which will detail the cyberthreat, particularly from China, as a growing economic problem.
-
-
Chinese hackers attack the New York Times
Since 2008, Chinese government hackers have been targeting Western news organizations to identify and intimidate their Chinese sources and contacts, as well as to anticipate stories that could hurt the reputation of Chinese leaders. Chinese hackers have repeatedly infiltrated the computer systems of the New York Times over the last four months, following an investigation by the paper that revealed that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings. Security experts hired by the Times have determined that the attacks started from the same university computers used by the Chinese military to attack U.S. military contractors in the past.
-
-
Chinese hackers infiltrate Wall Street Journal’s computer systems
Chinese hackers with government connections have infiltrated the computer systems of the Wall Street Journal, in the second such Chinese attack on a major U.S. media outlet. WSJ says the hackers were trying to monitor its coverage of Chinese affairs.
-
-
Pentagon to bolster U.S cyberwar capabilities
The Department of Defense is planning an expansion of the U.S. Cyber Command, and the Pentagon plans on recruiting thousands of code crackers, online security professionals, and hackers in order to assemble the nation’s largest cyber army ever.
-
-
Naturalized security threats retain their U.S. citizenship
There is a surprising number of naturalized citizens in the United States who have been charged and convicted of serious national security crimes — including terrorism, espionage, and theft of sensitive information and technology — in the last several years. A new study compares the relative ease with which aliens naturalize with the difficulty in stripping them of citizenship, even when they prove to be national security threats who have gamed the system.
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
By Etienne Soula and Lea George
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Romania, Foreign Election Interference, and a Dangerous U.S. Retreat
The Romanian election is but one example of recent foreign election interference incidents. The Russian interference in 2016 U.S. election led Congress, on bipartisan basis, and the relevant agencies in the executive branch, to make many changes to address this threat, but under the new administration, “the U.S. is now moving full steam ahead to completely destroy its defenses against that threat,” Katie Kedian writes. All of the positive U.S. government developments “have been dismantled or severely downgraded,” leaving “the U.S. public less informed and less safe from foreign interference.”