-
Chinese government funds research based on stolen U.S. trade secrets
Chinese national, Kexue Huang, charged with economic espionage involving theft of trade secrets from Dow AgroSciences, a leading U.S. agricultural company; Huang published an article without Dow’s authorization through Hunan Normal University (HNU) in China, which contained Dow trade secrets; the article was based on work supported by grants from the National Natural Science Foundation of China (NSFC), an agency of the Chinese government
-
-
Surge in counterfeit items in Pentagon's supplies
The U.S. Defense Department’s supply chain is vulnerable to the infiltration of counterfeit parts, potentially jeopardizing the lives of American soldiers; government investigators examined 387 companies and organizations which supply the U.S. Department of Defense, and found 39 percent of these companies and organizations encountered counterfeit electronics during the four-year period 2005-8; the number of counterfeit incidents grew from 3,868 in 2005 to 9,356 in 2008
-
-
B-2 Stealth bomber engineer convicted of selling stealth technology to China
A federal jury convicted a former B-2 stealth bomber engineer of helping China design a stealth cruise missile; the case is one of a series of major prosecutions targeting Chinese spying on the United States; in March, Chinese-born engineer Dongfan “Greg” Chung was sentenced to more than fifteen years in prison after he was convicted of six counts of economic espionage; investigators learned about Chung while probing Chi Mak, a defense contractor engineer convicted in 2007 of conspiracy to export U.S. defense technology to China; Mak was sentenced to twenty-four years in prison in 2008
-
-
Lawmakers say Chinese investment in a U.S. steel mill poses national security risks
A Chinese steel company — China’s fourth largest — plans to invest in a Mississippi-based steel maker; this is the first investment by a Chinese company in a U.S. mill; fifty U.S. lawmakers write the U.S. Secretary of the Treasury urging him to block the deal; they argue that the investment poses a national security risk as Anshan Steel is controlled by the Chinese government
-
-
Industrial espionage puts German companies, jobs at risk
Companies failing to protect themselves from external attack risk losing their competitive edge; in the information age, the threat of industrial espionage is all too real, with thousands of jobs at stake in Germany
-
-
Lebanon: alleged Israeli spy had access to "most significant segment" of cell phone network
Lebanon arrested a high-level employee of one of the two Lebanese mobile phone networks, saying he has been working for Israeli intelligence since 1996; the authorities say he may have planted monitoring devices allowing the Israelis to tap directly into the Alfa network, one of the two major cell phone companies operating in Lebanon
-
-
Chinese nationals convicted of illegally exporting military technology to China
The Chinese broad campaign of stealing U.S. military and commercial technology intensifies, but so does the rate of conviction of Chinese and American nationals who are the foot soldiers in this campaign; two Chinese nationals are convicted in Massachusetts for illegally delivering to China electronics components used in military radar and electronic warfare
-
-
Operation targeting counterfeit network hardware from China yield convictions, seizures
Departments of Justice and DHS announce 30 convictions, more than $143 million in seizures from initiative targeting traffickers in counterfeit network hardware made in China; this counterfeit network hardware is a technological sleeper cell: the Chinese have manufactured counterfeit Cisco routers and switches and offered them at exceedingly low prices; U.S. vendors upgrading or replacing U.S. government IT systems used these counterfeit devices — and the FBI and other government agencies are now worried that the gear offers the Chinese undetectable back-doors into highly secure government and military computer system
-
-
U.S. worried about China industrial espionage activities during World's Expo
China has been engaged in a vast, well-coordinated, and resourceful espionage campaign against U.S. and European governments and companies; the systematic stealing of Western military, scientific, and industrial secrets aims to help China short-cut its path to global political and economic hegemony; China is employing its military, intelligence services, trade missions abroad, students sent to foreign universities — and Chinese-born citizens who are sent to form espionage sleeper cells; the mammoth World’s Expo, which opened in Shanghai last Friday, offers the Chinese a golden opportunity to steal even more intellectual property on the cheap
-
-
The real battle over Iran's nuclear weapons program takes place in courts, intelligence centers
Iran has a voracious appetite for technology to feed its nuclear, missile, and other military programs; while diplomats in striped suits debate the fine points of new UN sanctions on Tehran because of its nuclear weapons program, the real struggle over Iran’s capabilities is taking place in courtrooms and intelligence centers, via sting operations, front companies, and falsified shipping documents
-
-
FCC to move forward with national broadband plan
FCC will move forward on the with key recommendations in its national broadband plan — even though a federal appeals court this week undermined the agency’s legal authority to regulate high-speed Internet access; plan calls for advancing “robust and secure public safety communications networks”
-
-
Cyber espionage targets UAV manufacturers
A report tracking cyber-espionage — and cyber-industrial espionage — against U.S. defense contractors finds an intriguing trend: targeting UAV technology; UAVs are likely to remain a principle target of foreign collection activities, particularly given the growing market in UAVs, the report notes
-
-
Schmidt: private sector key to warding off cyber attacks
White House cybersecurity coordinator says the private sector is where the best defense against cyberattacks and cyber warfare can be mounted; the government can do a lot to improve U.S. cyber defenses, but the key to warding off attacks remains private-sector vigilance; one major technology Web site agrees: “This is a battle every IT security professional must fight from the foxholes”
-
-
Hamas: Israel using Facebook to recruit spies in Gaza
Hamas claims Israeli intelligence uses information Palestinians from Gaza put in their profiles on Facebook to pressure them to become spies for Israel; it is not clear how someone can be blackmailed or coerced into a risky spying career using information in the public domain, and it seems more likely Israel is using social networking to map contact networks
-
-
Top U.S. cyber official: cyber threat poses existential threat to U.S.
Senior Obama administration official: “I am convinced that given enough time, motivation and funding, a determined adversary will always — always — be able to penetrate a targeted system”; as a result: “The cyber threat can be an existential threat — meaning it can challenge our country’s very existence, or significantly alter our nation’s potential”
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.