Monday, May 28, 2018

rationalizing Chinee hacking at the top of American government

9-18-15
-2nd Artillery Corps, PLA  http://printarchive.epochtimes.com/a1/en/us/dal/2015/09-Sept/18/a3_Final.pdf
.............................................................................

Do not hesitate to join the PLA's Second Artillery Corps and defend our motherland.  http://blog.chinadaily.com.cn/thread-1441946-1-1.html
.........................................................................................................................................................
autumn 2015, he DoD estimated China of having approximately 20 DF-5  liquid-fueled ICBMs, with 10 of them being DF-5B variants containing MIRVs (3 to 8 warheads per missile).  https://en.wikipedia.org/wiki/DF-5    http://asian-defence-news.blogspot.co.uk/2015/09/plas-new-df-5b-liquid-fuel-icbm.html
.................................................................................................
                rationalizing Chinee hacking at the top of American government:
halloween 2017     J. Michael Daniel, who served as Obama's White House cybersecurity coordinator. After all, despite the nagging exceptions, as much as 90 percent of Chinese hacking incidents targeting the US private sector did disappear following the agreement, according to numbers from both FireEye and security firm Crowdstrike. "I think it continues to be a success.  It did what it was intended to do: It shifted Chinese thinking and behavior."
And as for the remaining cases of US corporate penetrations that FireEye and other cybersecurity companies continue to point to?  "There's an understanding that you’re not going to reduce intrusions into private companies to zero," Daniel says.  "We never expected that every single instance of stealing intellectual property or trade secrets for commercial gain would go away."
Daniel argues the few cases in which China has continued to hack American companies could be false flags or misattributions, where non-Chinese activity has been mistakenly pinned on Chinese.  They could be traditional espionage, using companies as footholds to get into governmental targets.  Or they could be rogue Chinese hacker groups moonlighting for private interests, conducting corporate espionage without the government's involvement.
"The Chinese government doesn’t have complete and total control over all these Chinese hacker groups," Daniel says.  "Some of that activity may not be the Chinese government, but the companies that it would benefit, hiring those hackers to conduct these operations."
But playing down violations of the agreement could be shrewd pragmatism as much as a lack of a smoking gun, says Robert Knake, a director of cybersecurity policy in the Obama administration who served until early 2015, before the US-China agreement was made.  "It’s not always a bright-line bureaucratic decision," Knake says.   "Will you get the outcome you want by declaring someone in violation? Or do you get it by validating the agreement and then quietly pushing them?"
Knake notes it's possible the Trump administration is focused on its escalating conflict with North Korea, and doesn't want to ruffle its relationship with a key ally in the region.  "The thinking could be, 'let’s not start a fight with China too, we need them on North Korea,'" Knake says.  https://www.wired.com/story/china-tests-limits-of-us-hacking-truce/
......................
4-11-18   It’s reportedly been happening since before Trump targeted tariffs at the nation.
Backstory: China is responsible for as much as 80 percent of all intellectual-property theft against US companies, according to the US Commission on Intellectual Property Theft. In 2015, China agreed to stop hacking the US for trade secrets. Until then, IP theft cost the US economy $300 billion a year. More recently, Trump placed tariffs on many imports to punish China for stealing American tech know-how.
The news:  Axios reports that new security research shows China expanded state-sanctioned hacking for US patents and other trade secrets throughout 2017, targeting tech companies, law firms, and medical manufacturers, among others.
https://www.technologyreview.com/the-download/610850/china-has-been-hacking-american-ip-again/
......................................
11-30-17  Prosecutors in the United States this week quietly outed what appears to be a Chinese state-linked hacking ring, an escalation in Washington’s campaign to pressure China over its trade practices and efforts to steal intellectual property from U.S. firms. 
In an indictment unsealed on Monday, federal prosecutors in Pittsburgh allege that a trio of Chinese nationals and their cybersecurity firm Boyusec hacked three companies — industrial giant Siemens, the economic analysis firm Moody’s, and the GPS navigation company Trimble — and made off with sensitive company documents.  http://foreignpolicy.com/2017/11/30/feds-quietly-reveal-chinese-state-backed-hacking-operation/
...........................................................................
JANUARY 31, 2016 
Over the next two years, hackers stole some 630,000 files from Boeing related to the C-17, the third most expensive plane that the Pentagon has ever developed, with research and development costs of $3.4 billion. They obtained detailed drawings; measurements of the wings and fuselage, and other parts; outlines of the pipeline and electric wiring systems; and flight test data – a gold mine for any criminal looking to sell information on the black market. But the hackers, according to the Federal Bureau of Investigation, already had a buyer: Su Bin, a Chinese national and aerospace professional living in Canada.   https://www.csmonitor.com/World/Asia-Pacific/2016/0131/Why-China-hacks-the-world

RELATED STORIES

  

No comments:

Post a Comment