Here's the tactic that makes China's espionage activities so eff

來源: lluvia 2015-08-19 14:39:53 [] [舊帖] [給我悄悄話] 本文已被閱讀: 次 (37811 bytes)

Here's the tactic that makes China's espionage activities so effective

Business Insider 
  •  
  •  
 

 

 

View gallery

.
chinese hackers china cyber
(YouTube/NTDTV) 
Chinese hacker of the People's Liberation Army. 

As the US still attempts to formulate a response to China's massive hack of the US government's Office of Personnel Management — a breach that affected some 22 million people, including federal employees with security clearances — the massive size and scope of Beijing's intelligence gathering operations continues to come into focus.

 

Unlike other nations, China uses a broad array of both professional and citizen spies to gather data, Peter Mattis explains for War On The Rocks. 

As Mattis describes it, the first level of Chinese intelligence-gathering resembles that of just about any other government. A Ministry of State Security carries out surveillance of targets within China and monitors potential threats, while the Ministry of Public Security has control over China's national databases and surveillance networks. 

China also has various levels of military intelligence organizations within the People's Liberation Army. Most of the operatives for these organizations are also based in China, although Mattis notes that "defense attachés and clandestine collectors do operate abroad."

This also isn't all that different from how countries normally operate. The US has some 17 intelligence agencies, several of which are organized under branches of the military. They weren't under the oversight of a single Director of National Intelligence until 2005.

Where China begins to differ from other nations is its use of operatives who aren't intelligence professionals and who may technically be outside Beijing's already sprawling security sector. According to Mattis, Chinese media agencies and their foreign-based journalists have likely collected non-classified data on such sensitive topics as foreign governments' stances towards Tibet or the South China Sea. These journalists then file reports directly to the Central Committee in Beijing. 

"Although most Chinese journalists are not intelligence officers and do not recruit clandestine sources, good journalists can provide information that is not publicly available, but also not classified," Mattis writes

 

View gallery

.
china
(Kim Kyung-Hoon/Reuters) 
A paramilitary policeman salutes outside the Great Hall of the People in Beijing. 

Mattis also describes "market incentives for economic espionage:" The process by which Beijing facilitates the theft of intellectual property from other countries by providing state support for their cover activities. 

 

In July of 2014, Canadian authorities arrested a Chinese entrepreneur at the request of the FBI. The entrepreneur, Su Bin, and two China-based accomplices hacked into the networks of Boeing and other US defense contractors from 2009 to 2013. 

Bin allegedly stole data for 32 different US projects, including data related the F-22 and the F-35 fighter jets, as well as Boeing's C-17 cargo plane. US authorities believe Bin and his colleagues tried to sell the stolen intelligence to state-owned companies within China. 

China's People's Liberation Army also carries out cyber attacks and cyber espionage against US companies in order to help boost the Chinese economy. In particular, Chinese hackers have been proven to have stolen US trade secrets related to nuclear power, metal, solar production, and the defense industries. 

In addition to using civilians to gather non-classified but sensitive material, Beijing has also facilitated a process for Chinese academics to gather potentially sensitive technological information, and built up institutions capable of rapidly building upon technological espionage gains.

For instance, the Institute of Scientific and Technical Information of China (ISTIC) catalogues foreign scientific publications, facilitates graduate programs for research around the world, and supports the professional development of academics throughout the country. This centralization of technological information has played an important role in China's rapid modernization, andsources tell Mattis that ISTIC likely reduced the cost of scientific research by 40-50%, while cutting research time by upwards of 70%. 

所有跟帖: 

怎麽都帶著鋼盔打電腦?幹啥呢? -黃玫瑰888- 給 黃玫瑰888 發送悄悄話 黃玫瑰888 的博客首頁 (0 bytes) () 08/19/2015 postreply 17:52:23

...軍政人員偷情忙... LOL -望自遠方- 給 望自遠方 發送悄悄話 望自遠方 的博客首頁 (0 bytes) () 08/19/2015 postreply 17:57:58

常來歸壇,防板磚 -soccer88- 給 soccer88 發送悄悄話 soccer88 的博客首頁 (0 bytes) () 08/19/2015 postreply 18:07:29

這盔戴在頭上最省事,不礙手不占地方。撲食文盲又一典範。 -南天北雲- 給 南天北雲 發送悄悄話 南天北雲 的博客首頁 (0 bytes) () 08/19/2015 postreply 19:36:44

是很奇怪,機房裏用電腦為什麽要帶鋼盔?又不是野戰軍。 -蒙得- 給 蒙得 發送悄悄話 蒙得 的博客首頁 (0 bytes) () 08/20/2015 postreply 07:47:31

借這樓請問樓上各位Ontology是神馬意思? -飛魚ff- 給 飛魚ff 發送悄悄話 (0 bytes) () 08/19/2015 postreply 18:16:38

哇塞,這個可是阿裏斯多德的難題哦,好像希臘神話裏有不少。可是中國文化裏缺了這一根筋,這就是老被老印打敗還不服氣的原因。 -lluvia- 給 lluvia 發送悄悄話 (2028 bytes) () 08/19/2015 postreply 21:44:33

多謝米莎莎!太不好意思了,還是不完全明白 -飛魚ff- 給 飛魚ff 發送悄悄話 (395 bytes) () 08/19/2015 postreply 22:44:34

嗬嗬,不把老杜叫出來恐怕不行了。 -lluvia- 給 lluvia 發送悄悄話 (3475 bytes) () 08/20/2015 postreply 01:02:03

多謝米莎莎碼那麽多字,以後要找你請教了 -飛魚ff- 給 飛魚ff 發送悄悄話 (387 bytes) () 08/20/2015 postreply 06:04:05

請教談不上,隻是有點體會而已。 -lluvia- 給 lluvia 發送悄悄話 (1424 bytes) () 08/20/2015 postreply 09:51:22

每次看米莎莎複雜點的貼都覺得好深奧,好有學問。我經常讀下來好像也沒看懂。慚愧死了。麵壁去了。 -黃玫瑰888- 給 黃玫瑰888 發送悄悄話 黃玫瑰888 的博客首頁 (0 bytes) () 08/20/2015 postreply 13:37:35

跟你一起麵,雲霧了繞的 -飛魚ff- 給 飛魚ff 發送悄悄話 (0 bytes) () 08/20/2015 postreply 19:47:40

老杜來了可以用桌布解說ontology -飛魚ff- 給 飛魚ff 發送悄悄話 (58 bytes) () 08/20/2015 postreply 06:26:19

講得不錯. -pta- 給 pta 發送悄悄話 pta 的博客首頁 (56 bytes) () 08/20/2015 postreply 13:40:38

這星期還有這一篇 -beijing-mom- 給 beijing-mom 發送悄悄話 (6879 bytes) () 08/20/2015 postreply 07:16:24

赫赫,這個有點酷。連吃飯都要靠人家施舍,還談什麽東海南海對抗? -lluvia- 給 lluvia 發送悄悄話 (599 bytes) () 08/20/2015 postreply 09:24:58

那個袁隆平不是老早就搞出雜交水稻了?難道不能雜交玉米?嗬嗬。 -黃玫瑰888- 給 黃玫瑰888 發送悄悄話 黃玫瑰888 的博客首頁 (86 bytes) () 08/20/2015 postreply 13:41:13

請您先登陸,再發跟帖!

發現Adblock插件

如要繼續瀏覽
請支持本站 請務必在本站關閉/移除任何Adblock

關閉Adblock後 請點擊

請參考如何關閉Adblock/Adblock plus

安裝Adblock plus用戶請點擊瀏覽器圖標
選擇“Disable on www.wenxuecity.com”

安裝Adblock用戶請點擊圖標
選擇“don't run on pages on this domain”