Thursday, September 5, 2019

Chinese cyber activity in US

During the 1960s and 1970s Liu was responsible for naval research and development before heading national military research.[2]  He was also the top commander of the troops enforcing martial law to suppress the Tiananmen Square protests in June 3–4, 1989.[3]  From 1992 to 1997 Liu was a member of the Politburo Standing Committee.  https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Liu_Huaqing.html
........……………………………………………………….......
6-22-17   Director of National Intelligence Dan Coats recently told lawmakers that Chinese hacking against U.S. targets is ongoing but “at volumes significantly lower” than in 2015.  https://www.cyberscoop.com/china-ssf-cyber-command-strategic-support-force-pla-nsa-dod/
………………………………………
12-11-18  NEW YORK (Reuters)    A senior U.S. intelligence official said on Tuesday that Chinese cyber activity in the United States had risen in recent months, targeting critical infrastructure in what may be attempts to lay the groundwork for future disruptive attacks….Rob Joyce, a former White House cyber adviser for President Donald Trump, did not elaborate.  A spokeswoman for the NSA said Joyce was referring to digital attacks against the U.S. energy, financial, transportation and healthcare sectors.  https://www.reuters.com/article/us-usa-cyber-china/chinas-hacking-against-u-s-on-the-rise-u-s-intelligence-official-idUSKBN1OA1TB
…… ………………………………………..
12-12-18 WASHINGTON    Chinese corporate espionage has metastasized into a critical national and economic security threat, top federal investigative officials told U.S. senators on Wednesday, issuing stark warnings that Beijing is exploiting American technology to develop its own economy.  https://www.wsj.com/articles/senate-sifts-evidence-of-chinese-cyberespionage-11544635251
…… ………………………………………..
12-20-18    Starting around 2014, APT10 also targeted “managed service providers,” which Deputy Attorney General Rod Rosenstein described in a press conference as “firms that are trusted to store, process and protect commercial data, including intellectual property, and other confidential business information.”  This separate slice of the hacking campaign gave the group access to the computers and networks in at least 12 different countries, including those of a number of unnamed consulting companies, health care and biotechnology companies, and a “global financial institution.”  Two of the compromised managed service providers were Hewlett Packard Enterprise and IBM, according to Reuters….
  Rosenstein specifically mentioned that the industries targeted in the hacking campaign line up with the ones core to the Chinese government’s “Made in China 2025” plan, which is meant to extend the country’s economic influence throughout the world.
  The DOJ says the hacking group operated in a number of locations throughout China, but the agency specifically names the city of Tianjin as a hub for APT10.  They’re accused of working with the Tianjin bureau of China’s Ministry of State Security, the government’s intelligence agency. https://www.theverge.com/2018/12/20/18150275/chinese-hackers-stealing-data-nasa-ibm-charged
Zhu (shown) and Zhang of APT10  have also been charged with wire fraud and identity theft.
…………………………………………………………………
  William Priestap, head of FBI counterintelligence division, joined two other senior security officials in outlining what they described as Beijing’s long-term campaign to undermine the United States’ economic and technological dominance and the government’s efforts to counter it.
  China’s Communist Party “dominates every facet of Chinese life,” from religion to freedom of expression and business, Priestap said at a Senate Judiciary Committee hearing.  “It is therefore alarming that the Chinese government’s economic aggression, including its relentless theft of U.S. assets, is positioning China to supplant us as the world’s superpower.” …
  Assistant Attorney General John Demers said:  “The playbook is simple — rob, replicate and replace.  Rob the American company of its intellectual property.  Replicate the technology.  And replace the American company in the Chinese market and one day in the global market.” …
  “It’s all we need to know about the intention of the Confucius Institutes,” said Mulvenon, general manager of the special programs division of SOS International, an intelligence contractor.  The United Front Work Department of CCP is “at the heart of [China’s] influence efforts” overseas, he said….Mulvenon also testified that according to the website of the Chinese government’s Thousand Talents Program, an effort launched in 2008 to recruit experts overseas and pay them to aid China’s modernization, the program lists more than 300 U.S. government researchers who have accepted Chinese payment.     https://www.washingtonpost.com/world/national-security/top-fbi-official-warns-of-strategic-threat-from-china-through-economic-and-other-forms-of-espionage/2018/12/12/38067ee2-fe36-11e8-83c0-b06139e540e5_story.html
...................……………………………………..
5-6-19   
-The server room at Symantec in Culver City, Calif.  The company provided the first evidence that Chinese state-sponsored hackers had acquired some of the National Security Agency’s cybertools before other hackers.  
CreditCreditMichal Czerwonka for The New York Times     https://www.nytimes.com/2019/05/06/us/politics/china-hacking-cyber.html
.............CreditCreditMichal Czerwonka for The New York Times

No comments:

Post a Comment