Author Topic: Chinese hacking and other penetrations of the US  (Read 3912 times)

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72256
    • View Profile
Chinese hacking and other penetrations of the US
« on: August 31, 2018, 07:36:48 AM »
https://www.businessinsider.com/r-china-killed-cia-sources-hobbled-us-spying-from-2010-to-2012-nyt-2017-5

http://www.foxnews.com/world/2018/06/10/chinese-hackers-stole-sensitive-data-on-us-navy-submarine-weaponry-report-says.html

Also, let's use this thread for the apparent Chinese hack of Hillary as well as the Hillbillary thread.

Please feel free to back fill content from their hack of millions of US security clearance applications; the reliance of our military upon Chinese electronic chips, penetrations of our universities, Joe Biden's son, Sen. McConnell's wife's family, Sen. Diane Feinstein, etc.
« Last Edit: August 31, 2018, 07:48:37 AM by Crafty_Dog »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72256
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72256
    • View Profile


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72256
    • View Profile
Re: Chinese hacking and other penetrations of the US
« Reply #4 on: August 31, 2018, 09:16:01 PM »
Fifth post-- and not exactly on point but here it is anyway:

https://www.youtube.com/watch?v=OTSQozWP-rM

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72256
    • View Profile



Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72256
    • View Profile


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72256
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72256
    • View Profile


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72256
    • View Profile
Re: Chinese hacking and other penetrations of the US
« Reply #13 on: February 02, 2022, 03:21:29 AM »
With mass data theft, China poses threat unlike all others

FBI tries to protect U.S. technological know-how

BY BILL GERTZ THE WASHINGTON TIMES

China’s intelligence services and related hackers are engaged in a “massive, sophisticated” program to steal information as part of a technology theft campaign larger than all other foreign adversaries combined, said FBI Director Christopher A. Wray.

Additionally, Chinese intelligence agents, including professional officers, government officials and co-opted Americans, are all part of a plan to obtain valuable American proprietary technical know-how to support the ruling Communist Party regime, Mr. Wray said in a speech in California on Monday night.

The China threat today “reached a new level — more brazen, more damaging than ever before — and it’s vital that all of us focus on that threat together,” the FBI chief said. He noted that more than 2,000 FBI investigations are focused just on Chinese efforts to steal U.S. information and technology.

“There’s just no other country that presents a broader threat to our ideas, innovation and

economic security than China,” he said. “The Chinese government steals staggering volumes of information and causes deep, job-destroying damage across a wide range of industries, so much so that we’re constantly opening new cases to counter their intelligence operations about every 12 hours.”

In some of his most extensive comments on the campaign, Mr. Wray, noting the FBI’s role in battling the Soviet Union during the Cold War, said the primary adversary for the U.S. now is with China.

“Today, we in the United States and the Western world find ourselves in a very different struggle against another global adversary: the Chinese Communist Party,” he said. “There are some surface-level similarities between the threat posed by the Chinese government and the historical threat of the Soviet Union. The Chinese government also rejects the fundamental freedoms, basic human rights and democratic norms we value as Americans.”

Unlike with the Soviet Union, U.S. companies are heavily invested in China’s economy, and Beijing dispatches large numbers of students to elite U.S. universities. China also commands a far greater financial power and a more dynamic economy than the Soviet Union had before its collapse in 1991, Mr. Wray said.

He said Beijing is using its global reach and market power “to steal and threaten rather than to cooperate and build.”

“That theft, those threats, are happening right here in America literally every day,” he said.

The threat is not just economic; it also poses a challenge to American freedom, the FBI chief said.

China’s state-controlled media provided no response to Mr. Wray’s remarks.

Neal Ziring, technical director of the National Security Agency’s cybersecurity directorate, seconded the FBI chief’s warnings. He said Tuesday that Chinese threats in cyberspace are “huge.”

“The Chinese government has a large number of folks that are dedicated to doing this, spread across multiple elements of their government,” Mr. Ziring said during an online meeting of the Intelligence and National Security Alliance. “And they are very aggressive at what they do.”

The Chinese operations are targets of U.S. intelligence agencies, including the National Security Agency, as well as private-sector security companies, he said. But more needs to be known about Chinese cyber-espionage tradecraft to better counter the threat, he said.

Asked about knowledge of Chinese hacking activities, Mr. Ziring said, “We have some good insights, but we always like to have more.”

Noting his past remarks highlighting the dangers China poses, Mr. Wray doubled down on the problem in the speech at the Ronald Reagan Presidential Library in California.

The Chinese government uses multiple avenues of attack, often in seemingly nonthreatening ways, analysts say.

For example, President Xi Jinping’s “Made in China 2025” plan targets 10 areas where China seeks to be a technological and market world leader in robotics, green energy production and vehicles, aerospace, pharmaceuticals and other industries.

Chinese spies “throw every tool in their arsenal at stealing the technology to succeed in those areas,” Mr. Wray said. “Here in the U.S., they unleash a massive, sophisticated hacking program that’s bigger than those of every other major country combined.”

The technology collectors operate from most major cities in China and often join forces with cybercriminals whom the FBI chief described as “cyber mercenaries.” He cited the example of a group of Chinese cybercriminals associated with the Ministry of State Security, the civilian spy agency, which he said stole “terabytes” of data from hundreds of companies.

“They’re not just hacking on a huge scale but causing indiscriminate damage to get to what they want, like in the recent Microsoft Exchange hack, which compromised the networks of more than 10,000 American companies in a single campaign alone,” he said.

Chinese intelligence officers support those efforts by targeting the same information, exploiting “scores of cooptees” — people who are not technically Chinese officials but take part in intelligence operations and identify sources, providing cover and communications for spy operations. The human spying networks seek to obtain secrets in nontechnical ways.

China’s government also invests in partnerships with U.S. companies that will give proxies supporting Beijing inside access to valuable technology.

“Sometimes they just wave enough money to get what they want, but often they also conceal which companies they actually control or use companies they don’t literally own but instead can control through embedded Chinese Communist Party cells,” Mr. Wray said.

One goal of the Chinese covert operations is to disguise their technology acquisition efforts from American companies and the U.S. government. The case in Ohio of Chinese intelligence officer Xu Yanjun, recently convicted of economic espionage, highlights what Mr. Wray said is an example of efforts to steal aviationrelated technology.

The FBI said Mr. Xu was engaged in getting proprietary information on an advanced aircraft engine produced by General Electric and a foreign joint venture. Mr. Xu recruited company insiders with access to sensitive data who assisted MSS hackers operating from inside China to target the same data. He also exploited his relationship with a senior information technology official to plant malware in a joint venture laptop.

As a result, the Chinese government was able to steal technology related to a composite turbofan blade technology unique to GE and is now working to produce a copy of the engine.

The operation also involved the use of the social media business platform LinkedIn, a favorite of Chinese intelligence, Mr. Wray said.

“Xu is just one Chinese intelligence officer working for an entire unit dedicated solely to stealing aviation secrets, which is just one of those 10 technology areas the Chinese government has prioritized for stealing,” he said.

Chinese government hackers also have obtained massive amounts of personal data on millions of Americans from hospitals, health insurance companies and credit card firms.

Mr. Wray said Mr. Xi’s promises in 2015 to halt the hacking of U.S. technology and supplying it to Chinese companies did not reduce the problem. “In the years since, they’ve hit ever more companies and workers,” he said.

Stolen data includes source codes from U.S. software companies, testing data and chemical designs from drug companies, and engineering designs from manufacturers.

“The common thread is that they steal the things companies can’t afford to lose, so the Chinese government’s economic theft campaign is not just unprecedented in its breadth, it’s also deeply damaging, undoing the labor, ideas and investments of decades, and leaving lives overturned in its wake,” Mr. Wray said.

China’s government also is targeting people inside the United States “for personal and political retribution,” Mr. Wray said. They include perceived enemies, refugees, dissidents and minority Uyghurs in western China who the State Department declared last year were victims of a government policy of genocide.

Beijing launched its “Fox Hunt” program in 2014 under cover of an anticorruption drive but in reality “targets, captures and repatriates former Chinese citizens living overseas whom it sees as a political or financial threat,” he said.

More than 9,000 people have been forcibly repatriated as part of the Fox Hunt program, under which they are imprisoned or controlled by the government. The program was successful, Mr. Wray said, because much like Beijing’s economic espionage program, the Chinese involved disregard diplomatic norms and international law in grabbing victims.

Hundreds of people in America, primarily green card holders or naturalized citizens, are on the Fox Hunt target list.

The program is “the tip of the iceberg when it comes to the Chinese government’s transnational repression,” Mr. Wray said.

“For decades, the Chinese Communist Party has targeted, threatened and harassed U.S.-based Tibetans and Uyghurs, Falun Gong adherents, prodemocracy advocates and any others who question their legitimacy or authority,” he said.

Mr. Wray said the FBI is applying lessons learned from fighting terrorism to countering the Chinese government threat, using joint counterintelligence task forces around the country.

“The volume of criminal and threatening actions we see from the Chinese government is immense, but the good news is that our partners and allies these days are more alert to the danger than ever,” he said.

ccp

  • Power User
  • ***
  • Posts: 19756
    • View Profile
Re: Chinese hacking and other penetrations of the US
« Reply #14 on: February 02, 2022, 05:27:52 AM »
“The volume of criminal and threatening actions we see from the Chinese government is immense, but the good news is that our partners and allies these days are more alert to the danger than ever,” he said.

what a joke

they should have read this board

I remember even posting on the old Gilder board decades ago
Gilder's response - to think we could stop the Chinese is fantasy - or something like that - thus lets all lie down and let them do it.


ccp

  • Power User
  • ***
  • Posts: 19756
    • View Profile
Re: Chinese hacking and other penetrations of the US
« Reply #15 on: February 02, 2022, 05:54:10 AM »
from breitbart

Fay Wrays take on nbc:

"Reporter Pete Williams said, “Christopher Wray said when he became FBI director, the sheer amount of Chinese spying to steal American technology was a huge surprise.”

Funny he reports this NOW since he was director since when 2017ish

 :roll:


DougMacG

  • Power User
  • ***
  • Posts: 19442
    • View Profile
Re: Chinese hacking and other penetrations of the US
« Reply #16 on: February 02, 2022, 06:42:27 AM »
“Christopher Wray said when he became FBI director, the sheer amount of Chinese spying to steal American technology was a huge surprise.”

  - And what has he done about it.  Instead he targets concerned parents who speak out at school board meetings.

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3232
    • View Profile
Re: Chinese hacking and other penetrations of the US
« Reply #17 on: October 21, 2023, 07:05:52 PM »
Reposted here per our fearless leader:

Stewart Canceled
« Reply #266 on: Today at 06:37:17 PM »

Apple cancels John Stewart, citing planned segments about China and AI, among others. It’s difficult not to issue a sardonic grin when a culture warrior is given hoist by the petard he totes, but if does serve to illustrate just how deeply China has its claws sunk into sundry corners of the US. Indeed, while recovering from various surgeries I caught a lot of flicks that not only had Chinese heros inexplicably inserted into them, but likely were then re-edited to make the Chinese character(s) the star(s) of the show in other markets:

https://arstechnica.com/gadgets/2023/10/report-apple-cancels-the-problem-with-jon-stewart-over-china-ai-topics/

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72256
    • View Profile
Re: Chinese hacking and other penetrations of the US
« Reply #18 on: October 21, 2023, 07:08:19 PM »
Ha!  Fooled you!  :evil:

https://firehydrantoffreedom.com/index.php?topic=2769.msg130614#msg130614

Looks like I need to lock this one down  :-D