Here's the tactic that makes China's espionage activities so eff

Business Insider 
  •  
  •  
 

 

 

View gallery

.
chinese hackers china cyber
(YouTube/NTDTV) 
Chinese hacker of the People's Liberation Army. 

As the US still attempts to formulate a response to China's massive hack of the US government's Office of Personnel Management — a breach that affected some 22 million people, including federal employees with security clearances — the massive size and scope of Beijing's intelligence gathering operations continues to come into focus.

 

Unlike other nations, China uses a broad array of both professional and citizen spies to gather data, Peter Mattis explains for War On The Rocks. 

As Mattis describes it, the first level of Chinese intelligence-gathering resembles that of just about any other government. A Ministry of State Security carries out surveillance of targets within China and monitors potential threats, while the Ministry of Public Security has control over China's national databases and surveillance networks. 

China also has various levels of military intelligence organizations within the People's Liberation Army. Most of the operatives for these organizations are also based in China, although Mattis notes that "defense attachés and clandestine collectors do operate abroad."

This also isn't all that different from how countries normally operate. The US has some 17 intelligence agencies, several of which are organized under branches of the military. They weren't under the oversight of a single Director of National Intelligence until 2005.

Where China begins to differ from other nations is its use of operatives who aren't intelligence professionals and who may technically be outside Beijing's already sprawling security sector. According to Mattis, Chinese media agencies and their foreign-based journalists have likely collected non-classified data on such sensitive topics as foreign governments' stances towards Tibet or the South China Sea. These journalists then file reports directly to the Central Committee in Beijing. 

"Although most Chinese journalists are not intelligence officers and do not recruit clandestine sources, good journalists can provide information that is not publicly available, but also not classified," Mattis writes

 

View gallery

.
china
(Kim Kyung-Hoon/Reuters) 
A paramilitary policeman salutes outside the Great Hall of the People in Beijing. 

Mattis also describes "market incentives for economic espionage:" The process by which Beijing facilitates the theft of intellectual property from other countries by providing state support for their cover activities. 

 

In July of 2014, Canadian authorities arrested a Chinese entrepreneur at the request of the FBI. The entrepreneur, Su Bin, and two China-based accomplices hacked into the networks of Boeing and other US defense contractors from 2009 to 2013. 

Bin allegedly stole data for 32 different US projects, including data related the F-22 and the F-35 fighter jets, as well as Boeing's C-17 cargo plane. US authorities believe Bin and his colleagues tried to sell the stolen intelligence to state-owned companies within China. 

China's People's Liberation Army also carries out cyber attacks and cyber espionage against US companies in order to help boost the Chinese economy. In particular, Chinese hackers have been proven to have stolen US trade secrets related to nuclear power, metal, solar production, and the defense industries. 

In addition to using civilians to gather non-classified but sensitive material, Beijing has also facilitated a process for Chinese academics to gather potentially sensitive technological information, and built up institutions capable of rapidly building upon technological espionage gains.

For instance, the Institute of Scientific and Technical Information of China (ISTIC) catalogues foreign scientific publications, facilitates graduate programs for research around the world, and supports the professional development of academics throughout the country. This centralization of technological information has played an important role in China's rapid modernization, andsources tell Mattis that ISTIC likely reduced the cost of scientific research by 40-50%, while cutting research time by upwards of 70%. 

所有跟帖: 

怎么都带着钢盔打电脑?干啥呢? -黄玫瑰888- 给 黄玫瑰888 发送悄悄话 黄玫瑰888 的博客首页 (0 bytes) () 08/19/2015 postreply 17:52:23

...军政人员偷情忙... LOL -望自远方- 给 望自远方 发送悄悄话 望自远方 的博客首页 (0 bytes) () 08/19/2015 postreply 17:57:58

常来归坛,防板砖 -soccer88- 给 soccer88 发送悄悄话 soccer88 的博客首页 (0 bytes) () 08/19/2015 postreply 18:07:29

這盔戴在頭上最省事,不礙手不占地方。撲食文盲又一典范。 -南天北云- 给 南天北云 发送悄悄话 南天北云 的博客首页 (0 bytes) () 08/19/2015 postreply 19:36:44

是很奇怪,机房里用电脑为什么要带钢盔?又不是野战军。 -蒙得- 给 蒙得 发送悄悄话 蒙得 的博客首页 (0 bytes) () 08/20/2015 postreply 07:47:31

借这楼请问楼上各位Ontology是神马意思? -飞鱼ff- 给 飞鱼ff 发送悄悄话 (0 bytes) () 08/19/2015 postreply 18:16:38

哇塞,这个可是阿里斯多德的难题哦,好像希腊神话里有不少。可是中国文化里缺了这一根筋,这就是老被老印打败还不服气的原因。 -lluvia- 给 lluvia 发送悄悄话 (2028 bytes) () 08/19/2015 postreply 21:44:33

多谢米莎莎!太不好意思了,还是不完全明白 -飞鱼ff- 给 飞鱼ff 发送悄悄话 (395 bytes) () 08/19/2015 postreply 22:44:34

呵呵,不把老杜叫出来恐怕不行了。 -lluvia- 给 lluvia 发送悄悄话 (3475 bytes) () 08/20/2015 postreply 01:02:03

多谢米莎莎码那么多字,以后要找你请教了 -飞鱼ff- 给 飞鱼ff 发送悄悄话 (387 bytes) () 08/20/2015 postreply 06:04:05

请教谈不上,只是有点体会而已。 -lluvia- 给 lluvia 发送悄悄话 (1424 bytes) () 08/20/2015 postreply 09:51:22

每次看米莎莎复杂点的贴都觉得好深奥,好有学问。我经常读下来好像也没看懂。惭愧死了。面壁去了。 -黄玫瑰888- 给 黄玫瑰888 发送悄悄话 黄玫瑰888 的博客首页 (0 bytes) () 08/20/2015 postreply 13:37:35

跟你一起面,云雾了绕的 -飞鱼ff- 给 飞鱼ff 发送悄悄话 (0 bytes) () 08/20/2015 postreply 19:47:40

老杜来了可以用桌布解说ontology -飞鱼ff- 给 飞鱼ff 发送悄悄话 (58 bytes) () 08/20/2015 postreply 06:26:19

讲得不错. -pta- 给 pta 发送悄悄话 pta 的博客首页 (56 bytes) () 08/20/2015 postreply 13:40:38

这星期还有这一篇 -beijing-mom- 给 beijing-mom 发送悄悄话 (6879 bytes) () 08/20/2015 postreply 07:16:24

赫赫,这个有点酷。连吃饭都要靠人家施舍,还谈什么东海南海对抗? -lluvia- 给 lluvia 发送悄悄话 (599 bytes) () 08/20/2015 postreply 09:24:58

那个袁隆平不是老早就搞出杂交水稻了?难道不能杂交玉米?呵呵。 -黄玫瑰888- 给 黄玫瑰888 发送悄悄话 黄玫瑰888 的博客首页 (86 bytes) () 08/20/2015 postreply 13:41:13

请您先登陆,再发跟帖!