Uncategorized

The Little Man (JAP Undercover Intelligence in China)

[Intelligence-High School Debate] Ep.9 - Korea/China/Japan Should Publish a Unified History Textbook

Pepin said He deserves a sentence of no more than 24 months, noting that He faces certain deportation when his sentence concludes, and potential separation from his children, who are U. Despite the scope of the investigation, no one else was charged. The others in the suspected network - the ship captain, the Shanghai broker, the traveling partner and another Oakland suspect - were not arrested.

The fate of the first shipment of radiation-hardened chips - the ones that got away - is unknown. Three different law enforcement agencies have primary responsibility: Each relies on regulators from the State, Commerce and Treasury departments, with help from the Pentagon, to determine which products can be exported where. Agencies approach the task differently. FBI agents view technology smuggling as a counter-espionage challenge.

Commerce agents focus on enforcing the licensing of dual-use items, products that potentially have both military and civilian applications. Homeland Security agents tap a global network of customs informants and foreign police. Each agency also has distinct crime-fighting powers. Only Commerce agents can issue administrative sanctions. Only Homeland Security agents can search packages at the border without a warrant. State and Treasury officials who are not federal agents can issue administrative and financial sanctions for regulatory violations.

As part of a big export-regulation overhaul in , the Obama Administration created the Export Enforcement Coordination Center - known as the E2C2 - to guide a government-wide approach. The center also includes senior FBI and Commerce agents.


  1. The Chinese navy “dismembers” Japan.
  2. Memoirs of Fanny Hill.
  3. Unexpected Places.
  4. Chinese intelligence activity abroad?
  5. Satire on a Sad Second Millennium: A Religious Perspective.
  6. Navigation menu!

After it opened, E2C2 officials say, the new entity produced some quick results. By comparing resources and data, agents say they were surprised to find that in 60 percent of their investigations, two different agencies were investigating the same target. The Obama plan calls for creating a single law-enforcement agency.

But that would take an act of Congress, and some Commerce officials are actively resisting the change. The E2C2 is just one piece of a four-part export overhaul proposed in The larger initiative includes changes to export restriction lists, licensing procedures, computer infrastructure and law enforcement coordination. Today, senior administration officials describe the project as a work in progress. Most changes have been made by executive order, without congressional legislation. White House and State Department officials said the project had a few false starts, but is now progressing well.

Similar changes are expected in coming months, and this worries some counter-proliferation agents. In interviews, a dozen agents said they fear the changes will make it easier to smuggle military-grade technology to China. The White House official and a senior Commerce Department official said this worry is overblown.

Each requires legislation, and there is little interest in Congress, officials say. By Duff Wilson and John Shiffman. Filed December 18, Their orders come indirectly from the Chinese government and take the form of shopping lists that are laundered through companies with ties to Beijing. The recruits who buy the weapons and system components for those companies are scientists, students and businessmen, and they appear to be motivated more by profit than ideology. Today, investigations into arms trafficking linked to China have swelled to at least active cases - up by more than 50 percent since , according to a Reuters review of confidential U.

The total number is likely higher than because the count does not include many cases that began as regulatory inquiries or investigations into other crimes. About two-thirds of the cases prosecuted by U. Such was the case of Lian Yang, a year-old software engineer who once worked for Microsoft Corp and had family ties to an anti-government group in China. In March , the father of two pleaded guilty to conspiracy to violate U. Yang served nearly 11 months in prison and another four months under house arrest.

He was released in March. Yang said a college friend in China had approached him about buying the microchips. But that friend, Yang said, was simply a businessman like himself, looking to obtain the components for another buyer - and ultimately, for the Chinese government. Reuters reviewed confidential investigative records gathered by the FBI, including hours of secret recordings, transcripts and emails.

They show Yang as an arms trafficking novice, motivated by money and casting about for others willing to help him for a cut of the profits. In emails and transcripts from an FBI undercover operation, Yang spoke of the urgency to obtain the U. They have the funds. Later, as his plans shrank, he was working on a much smaller sale to net a few thousand dollars. Reuters reviewed arms export and embargo cases brought by the U. Of the cases, 66 - almost one in four - involved China. The cases reveal layers of buyers and sellers that connect to Beijing.

In one recent case, investigative records contain the names of 31 Chinese companies - almost all of them state-controlled - that sought to buy smuggled military-grade communications gear. In another case, a Chinese procurement network used a series of five bank transfers between China and California to cloak a half-million dollar purchase of satellite components.

About a third of the cases linked to China involved military aerospace technology, such as the radiation-hardened microchips. The individuals trying to obtain these components in the United States ranged from business people to professors, from citizens of China to permanent U. Many had access to technology that cannot legally be exported to China - or enough technical know-how to try to get it.

About a year before the FBI began its investigation, Yang attended a wedding where he posed for a photograph next to another guest - former U. Secretary of State Condoleezza Rice. He took company files, including design data for missiles, rockets and drones, to a technical conference in China. A handful of Americans also have been recently convicted. An export control manager at a Pennsylvania manufacturer falsified records that allowed dozens of sensitive communications devices to be shipped to China and other nations. Two items could be legal to export with U.

Five - including the microchips - were totally restricted because of their importance to weapons systems. Yang had left China for the United States in and became a U. He sponsored his parents, too; his mother, he said in interviews with Reuters, had been persecuted by the Chinese government for her involvement in the spiritual movement Falun Gong. His wife ran a travel agency. They owned two houses in a Seattle suburb; one was paid off and occupied by his parents. In the months that followed the ceremony, Yang and Bailey, himself an entrepreneur, worked together to sell water equipment and liquid crystal displays to companies in China - items that are legal to export.

Both say these business efforts flopped. According to a March email from Yang, the parts were meant for China Aerospace Science and Technology Corp, the state-owned satellite and missile maker. They were radiation-hardened versions that would be illegal to send to China. Even so, Bailey wrote in the email: Bailey also wrote that the LCDs - which were legal to export to China - would have to be sold first. But I never had any intention of doing anything illegal or anything to hurt this country and never made any provision to do so. Yang and Bailey had a falling out, and Yang pursued other partners.

As Yang presented his plans to try to buy military technology that China sought, his family friend wore a wire. Carbon fiber such as this cannot be exported to China without the permission of the U. They discussed a cover story. The family friend, who had experience in international trade, played along. He told Yang that he had already approached two U. The FBI recording captured Yang and the friend talking about setting up a Nevada front company that would claim to want the chips for research.

Andaluca is an upscale restaurant in downtown Seattle with subdued lighting and high-backed booths that are ideal for private conversation. The men claimed to know people who could forge paperwork and get radiation-hardened microchips. According to their secret recording, the agents drew out Yang on the ultimate buyers - the Chinese government - and the potential size of the deal.

Using a standard undercover technique, the agents steered Yang to confirm that he understood what he was proposing to do was illegal. Just before ordering dessert, Yang explained how he believed his effort was actually aiding the United States by helping the balance of trade. Then, they all got the cheesecake. Yang picked up the tab. About three months later, on Dec. His China connections had not come up with upfront money after all. He had already bought a ticket from Vancouver to Beijing for the following day. Yang met the undercover agents in Seattle. They gave him the chips. He handed them the money.

Within minutes, Yang was arrested. He was charged with conspiracy to violate the federal arms trafficking law. His lawyer negotiated a guilty plea for a reduced sentence. Before he began his prison term, Yang said he told his young sons he would be away on business - in China. Bank robbers in the United States are likely to be sentenced to longer prison terms than individuals involved in illegally sending military technology abroad. A typical prison sentence for a bank robber is more than five years. A Reuters review of convictions for arms trafficking or arms embargo violations during the past eight years shows offenders received a median sentence of 21 months.

In , the Department of Justice asked the U. Sentencing Commission to set five-year mandatory minimum sentences for violating the Arms Export Control Act. The commission declined, highlighting the need to distinguish between cases with little impact on national security - like gun-smuggling to Mexico - and trafficking that involved missiles or weapons of mass destruction. The commission also said prosecutors sought lesser sentences for defendants who were cooperative, even in the most serious cases.

The commission recommended tougher punishment when national security is most compromised, specifically mentioning arms trafficking to China.

Breakout: Inside China's military buildup

But that change would require action by the U. The latest night-vision technology, such as these goggles, is among the items that are illegal to export from the United States to China. The Reuters analysis shows that individuals who break the law receive far different penalties than do corporations. Companies generally paid fines in the millions of dollars; individuals often served prison time.

For instance, Ryan Mathers, a year-old Marine in Hawaii, helped to sell stolen military night-vision devices through eBay in to buyers in Hong Kong, Japan and Poland and to undercover agents posing as Hong Kong buyers. Mathers pleaded guilty and was sent to prison for four years. Prosecutors said the actions threatened American soldiers and harmed national security. Since its conviction, ITT has received billions of dollars in new Pentagon contracts. In , the company was removed from special federal monitoring over the matter. The defense arm of ITT was spun off in as Exelis.

Talley, spokesman for Exelis, declined to say whether anyone at ITT was reprimanded or fired in the night vision case. The distinction between how individuals and corporations are punished for arms export and embargo violations often comes down to what the government believes it can prove, said Daniel Richman, a former federal prosecutor who teaches criminal law at Columbia University. In all sorts of white collar cases, he said, prosecutors may be loath to go after low-level employees in big companies if the government believes — but cannot prove — that illegal activity was ordered by executives.

Peter Wolff Jr, the public defender who represented Mathers, took exception to how the government handles such cases. Filed December 19, Germany, France and Britain. Chinese destroyers have French sonar, anti-submarine-warfare helicopters and surface-to-air missiles.

Above the battlefield, British jet engines drive PLA fighter bombers and anti-ship strike aircraft. The latest Chinese surveillance aircraft are fitted with British airborne early warning radars. But perhaps the most strategic item obtained by China on its European shopping spree is below the waterline: Emulating the rising powers of last century - Germany, Japan and the Soviet Union - China is building a powerful submarine fleet, including domestically built Song and Yuan-class boats. This deadly capability has been built around robust and reliable engine technology from Germany, a core member of the U.

MTU declined to answer questions about transfers to the Chinese navy, future deliveries or whether it supplies technical support or servicing. Transfers of European technology to the Chinese military are documented in SIPRI data, official EU arms trade figures and technical specifications reported in Chinese military publications. They say the engines and technology the PLA is incorporating from Europe and Russia fall short of the latest equipment in service with the United States and its allies in Asia, including Japan, South Korea and Australia.

This leaves the PLA a generation behind and struggling to integrate gear from a range of different suppliers, they say. Even if it deploys less than the best gear, Beijing can achieve its strategic goal of blunting U. European hardware and know-how fills critical gaps, however. The European Union has had an official embargo on arms shipments to China since the Tiananmen crackdown. Washington imposes even tighter restrictions on transfers of U. EU governments approved the sale of aircraft, warships, imaging equipment, tanks, chemical agents and ammunition, according to official figures.

France was by far the biggest EU supplier, accounting for almost 2 billion euros of these licenses. The United Kingdom ranked second with almost million euros, followed by Italy with million euros. The value of German export licenses for weapons was a relatively modest 32 million euros in the decade to Examples of such technology include many kinds of diesel engines.

The same applies to transfers of commercial aerospace design software that can be used for fighters, bombers and unmanned aerial vehicles. Arms industry experts say dual-use transfers are almost certainly more valuable to the PLA than the actual weapons Europe has delivered. The EU lacks a consistent system for tracking these transfers amid the vast flow of goods, services and intellectual property to China. Europe shipped goods worth They say this reflects the loose structure of the EU, where each member state interprets the restrictions differently according to domestic law, regulations and trade policies.

Geography plays a role, too: The distance between Europe and Asia means there is ambivalence about the rapid growth of Chinese military power. From Europe, China looks like an opportunity, not a threat. The embargo is nevertheless an embarrassment for Beijing; senior Chinese officials routinely call for it to be lifted, and pressure from Washington keeps it in place. That means the sale of complete weapons like the pan-European Eurofighter, German submarines or Spanish aircraft carriers remain impossible for the foreseeable future. In the meantime, Europe has discovered a lucrative trade selling components, particularly if they incorporate dual-use technologies that fall outside the embargo.

Guided missile destroyer Haikou. The challenge is to adapt this range of components and know-how into locally built weapons. The European engine maker will also supply gear boxes, propellers and propulsion control systems for the ships from its Danish manufacturing unit, it said. The company also provided some selected services and spare parts including fuel equipment. He added that Pielstick brand engines supplied to the PLA navy by Chinese licensees were not subject to export approval.

When the boat was raised, rescuers found all 70 of its crew dead. The outcome of any inquiry was never made public. Since then, submariners all over the world have speculated about what went wrong aboard Ming class submarine number , a Chinese copy of an obsolete Russian design. Most agree it was probably a fault with its diesels. Either way, the outcome was catastrophic.

In , Tognum opened a joint venture with Norinco to assemble large, high speed MTU diesel engines and emergency generators at a plant in the city of Datong in Shanxi Province. Submarine diesel technology is hardly new, but these engines are built to exacting standards to ensure reliability under extreme conditions. MTU has been building them for more than 50 years. Each of the Chinese submarines has three MTU diesels, according to technical specifications listed in Chinese military affairs journals and websites.

A Chinese navy nuclear submarine. The PLA has a small but growing fleet of atomic subs. In its promotional brochures, MTU says almost of these engines in service with submarines around the world have each racked up over , hours in operation. Some have also been fitted to nuclear submarines as back-up power plants, the company says. MTU also sells different versions of the series for use in locomotives, power generation and mining.

A spokesman for the Federal Office for Economics and Export Control BAFA , the German authority that has to approve dual-use exports, said exports of diesel engines built especially for military use would be illegal. Top quality diesel engines like the MTU designs minimize vibration and noise, reducing the risk of detection by enemy sonar. In the hands of a capable crew, modern diesel submarines can be fiendishly difficult to detect. When using their electric motors, they are significantly stealthier than nuclear submarines such as those in service with the United States, naval warfare experts say.

For a relatively modest investment, a diesel electric sub could sink a hugely expensive aircraft carrier or surface warship. Chinese subs and warships. China is building a navy that can break out of its confined coastal waters to counter regional rivals. The PLA navy has already demonstrated this capability. In , a Song class submarine shocked the U. Navy when it surfaced about five miles from the U. The Chinese boat had been undetected while it was apparently shadowing the U.

PLA submarines are becoming much more active. Recorded Chinese submarine patrols increased steadily from four in to 18 in , according to U. S Naval Intelligence data supplied in response to freedom of information requests from a Federation of American Scientists researcher, Hans M. Navy official declined to comment on German delivery of diesel engines to China, but said the United States is well aware of the challenges such submarines pose. By David Lague and Charlie Zhu. Filed December 20, The Chinese military-industrial complex wanted to master the science for an alternative nuclear reactor.

So, it turned to a storied American institute. But even as China bulks up its military muscle through means ranging from espionage to heavy spending, it is pursuing this aspect of its technology game plan with the blessing — and the help — of the United States. China has enlisted a storied partner for its thorium push: Oak Ridge National Laboratory. The Tennessee lab, as it happens, helped pioneer thorium reactors.

The Pentagon and the energy industry later sidelined this technology in favor of uranium. The Chinese are now enthusiastically tapping that know-how, in an example of how the rising Asian superpower is scouring the world for all sorts of technology needed to catch up to America in a broad array of scientific fields. But the element also has possible military applications as an energy source in naval vessels. He and other experts note that most of the U.

At a time when the U. The Chinese plan to cool their experimental reactors with molten salts. This is sharply different from the pressurized water-cooling systems used in most uranium-fueled nuclear plants.

Get the print edition

The risks of explosions and meltdowns are lower, proponents say. The unsuccessful bill said it was in U. A reactor core, part of a molten-salt reactor experiment, at the Oak Ridge lab. What China is attempting is to turn the nuclear clock back to the mids, when Oak Ridge successfully operated a reactor with fuel derived from thorium and cooled with molten salts.

The lab also produced detailed plans for a commercial-scale power plant. Despite considerable promise, the thorium test reactor was shut down in after about five years of operation. Research was effectively shelved when the Nixon Administration decided in the s that the U. S nuclear industry would concentrate on a new generation of uranium-fueled, fast-breeder reactors. The die was cast against thorium much earlier. In the early s, an influential U.

Admiral Rickover was a towering figure in atomic energy and became known as the father of the U. He had clear reasons for his choice, engineers say. The pressurized water reactor was the most advanced, compact and technically sound at the time. Although it does not yield byproducts that can be readily used to make weapons, thorium does have military applications. The fuel could be used to power Chinese navy surface warships, including a planned fleet of aircraft carriers.

Top British naval engineers last year proposed a design for a thorium reactor to power warships. Compact thorium power plants could also be used to supply reliable power to military bases and expeditionary forces. Thorium also has military potential for the United States, experts say. Joe Sestak, a former U. Sestak says he was unaware of the extent of cooperation between the U. The younger Jiang brokered the Chinese partnership with Oak Ridge. Sorensen has been instrumental in reviving global interest in the groundbreaking work of the late American nuclear physicist Alvin Weinberg.

China’s hawks take the offensive

It was Weinberg who led research into molten-salt cooled reactors and thorium when he ran Oak Ridge from to Weinberg was eventually fired for his persistent thorium advocacy. But he had some powerful supporters. In his last scientific paper, published shortly after his death in , nuclear-weapons pioneer Edward Teller called for the construction and testing of a small, thorium-fueled reactor.


  1. China takes surveillance to new heights with flock of robotic Doves, but do they come in peace?.
  2. A Pendant a Portal and a Talking Doll.
  3. Overboard!: A True Blue-water Odyssey of Disaster and Survival!
  4. Choose the subscription that is right for you?
  5. Finding a Heart of Peace (Christian Romances Based on Timeless Tales Book 2).
  6. Le choix dune mariée - Un sentiment inoubliable (Passions) (French Edition).

Oak Ridge remains the intellectual home of this technology. Department of Energy lab still has a small research project under way on the use of molten-salt coolants for uranium-fueled reactors. Jiang Mianheng, son of former Chinese president Jiang Zemin, visited Oak Ridge in and brokered a cooperation agreement with the lab.

The deal gave the Chinese Academy of Sciences, which has a staff of 50,, the plans for a thorium reactor. In January , Jiang signed a protocol with the Department of Energy outlining the terms of joint energy research with the academy. The protocol stipulates that intellectual property arising from the joint research will be shared with the global scientific community.

It excludes sharing commercially confidential information and any other material that the parties agree to withhold. The pact also specifically rules out any military or weapons-related research. Jess Gehin, a nuclear-reactor physicist at Oak Ridge, says the pact allows the two sides to share information about their research. Jiang did not respond to requests for comment. The Shanghai Institute of Applied Physics is recruiting nuclear physicists, engineers, project managers and support staff, according to a regular stream of job advertisements it publishes online.

Its team is expected to expand to by and eventually include 1, researchers. A director at the Shanghai Institute, Li Qingnuan, and other senior researchers are wooing top young talent across China to join the project. Nuclear physicist Alvin Weinberg led research into thorium-fueled reactors when he ran Oak Ridge from to In early June, the China National Nuclear Corporation, the body overseeing all Chinese civilian and military nuclear programs, announced that state-owned China North Nuclear Fuel Company had signed an agreement with the Shanghai Institute to research and supply thorium and molten salts for the experimental reactors.

The push into thorium is part of a broader national energy strategy. Nuclear energy is a big part of the plan: China aims to have 58 gigawatts of nuclear power on the grid by , an almost five-fold increase from Thorium is a hedge on that nuclear bet. China has 15 conventional nuclear reactors online and 30 under construction. But energy authorities are also investing in a range of different technologies for the future, including advanced pressurized water reactors, fast-breeder reactors and pebble-bed reactors.

China has little uranium but massive reserves of thorium. So, the prospect of cheaper nuclear power with secure supplies of fuel is a powerful attraction. Enthusiasm for exploiting this alternative to uranium is on the rise across the world, even as the cleanup continues from the Fukushima nuclear accident in Japan. A new generation of scientists and nuclear engineers argue that thorium could be the key to realizing a dream of safe, cheap and plentiful nuclear power for an energy hungry world.

Second Sino-Japanese War

Thorium deposits, estimated to be about four times more abundant than uranium, are widely distributed: Sources told the South China Morning Post that more than 30 military and government agencies have deployed the birdlike drones and related devices in at least five provinces in recent years. The vast area, which borders Mongolia, Russia, Kazakhstan, Kyrgyzstan, Tajikistan, Afghanistan, Pakistan and India, is home to a large Muslim population and has long been viewed by Beijing as a hotbed for separatism.

As a result, the region and its people have been subjected to heavy surveillance from the central government. Another researcher involved in the Dove project said the aim was to develop a new generation of drones with biologically inspired engineering that could evade human detection and even radar. The team conducted almost 2, test flights before deploying the drones in real-life situations, said the researcher, who asked not to be named due to the sensitivity of the programme.

Surveillance under the sea: The flock paid no attention whatsoever to the drone flying above, the person said. Humans have been obsessed by the idea of flight since the dawn of time. And in the century or so since Wilbur and Orville Wright briefly took to the skies at Kitty Hawk, engineers and scientists have been trying to decode the secrets of bird flight to improve aircraft performance.

Birds are incredibly efficient fliers. The bar-tailed godwit, for instance, despite weighing only grams 10 ounces flies 11,km 6, miles non-stop from Alaska to New Zealand every autumn. The epic journey takes just eight days. Each machine is fitted with a high-definition camera, GPS antenna, flight control system and data link with satellite communication capability.

The flapping mechanism comprises a pair of crank-rockers driven by an electric motor, while the wings themselves can deform slightly when moving up and down, which generates not only lift but also thrust to drive the drone forward. Specially designed software helps to counter any jerky movements to ensure the on-board camera achieves sharp images and stable video.

Make informed decisions with the FT.

Aware of the dangers such stealth drones pose to conventional detection systems, radar scientists have been looking at new ways to spot and track small, low-altitude targets flying at slow speed. These include the holographic radar, which is capable of producing three-dimensional images of flying objects and has been hailed as a significant step forward in detection technology. The Dove is not the only avian drone to have been developed in China.

In , the US Army bought more than 30 drones from Florida-based Prioria Robotics that were designed to look like birds of prey. Between and Yang Wang, a Chinese immigrant to Canada, admitted to providing intelligence to the Ministry of State Security , including on the activities of Falun Gong.

Around June , the National Research Council was reportedly penetrated by Chinese state-sponsored hackers. China is suspected of having a long history of espionage in the United States against military and industrial secrets, often resorting to direct espionage, exploitation of commercial entities, and a network of scientific, academic, and business contacts.

Naturalized citizen Dongfan Chung, an engineer working with Boeing , was the first person convicted under the Economic Espionage Act of Department of Justice investigation into the fund-raising activities had uncovered evidence that Chinese agents sought to direct contributions from foreign sources to the Democratic National Committee DNC before the presidential campaign. The Chinese embassy in Washington, D. China's espionage and cyber attacks against the US government and business organizations are a major concern, according to the seventh annual report issued September to the US Congress of the U.

In the Chinese government was accused of secretly copying information from the laptop of Commerce Secretary Carlos Gutierrez during a trade mission to Beijing in order to gain information on American corporations. In November the United States arrested four people in Los Angeles on suspicion of being involved in a Chinese spy ring.

Taiwanese-American scientist Wen Ho Lee born in Nantou , Taiwan 21 December was accused and investigated on the grounds of espionage in but was acquitted of all charges except for mishandling classified data. In response to these and other reports of cyberattacks by China against the United States, Amitai Etzioni of the Institute for Communitarian Policy Studies has suggested that the United States and China should agree to a policy of mutually assured restraint with respect to cyberspace.

This would involve allowing both states to take the measures they deem necessary for their self-defense while simultaneously agreeing to refrain from taking offensive steps; it would also entail vetting these commitments. In June , the United States Office of Personnel Management OPM announced that it had been the target of a data breach targeting the records of as many as four million people. It's a treasure trove of information about everybody who has worked for, tried to work for, or works for the United States government.

Defence Secretary Dennis Richardson has stated that China is engaged in extensive espionage against Australia, and included surveillance of Chinese Australian communities. The Chinese government is suspected of orchestrating an attack on the email network used by the Parliament of Australia , allowing unauthorized access to thousands of emails and compromising the computers of several senior Australian politicians including Prime Minister Julia Gillard , Foreign Minister Kevin Rudd , and Minister of Defense Stephen Smith. Hackers either working for or on behalf of the government of China are suspected as being responsible for a cyber-espionage attack against an Australian defense company.

In , Chinese hackers infiltrated the computers of Australian National University , potentially compromising national security research conducted at the university. Jian Yang , a member of the New Zealand House of Representatives , was investigated by the New Zealand Security Intelligence Service as a possibly spy due to his links to Chinese military and intelligence schools. Experts believe that China has recently increased its spy capabilities in South America , perhaps with help from the Cuban government.

The computer security firm ESET reported that tens of thousands of blueprints were stolen from Peruvian corporations through malware , which were traced to Chinese e-mail accounts. From Wikipedia, the free encyclopedia. Chinese intelligence operations in the United States. Ministry of State Security — China". Archived from the original on 13 September Retrieved 2 April China spies threaten U. Archived from the original on 20 January The New York Times. Archived from the original on 6 February Archived from the original on 6 April Archived from the original on 10 March Retrieved 4 March Cyber attacks are growing in number and sophistication".

Archived from the original on 29 March Retrieved 7 April Australian Strategic Policy Institute. Retrieved 31 January Retrieved 25 January Retrieved 22 August Retrieved 21 August Archived from the original on May 27, He cited as an example the Conference Crew, which was founded in and has since expanded its operations early this year against critics of public and private institutions in seven countries, including the Philippines, where it collected important and strategic information that it will use for the interest and advantage of China.

Boland said the Conference Crew sponsored by the Chinese government has increased its attacks on the defense and banking industries, financial services, telecommunications, consulting and media. South China Morning Post. Retrieved August 29, Without naming names, Singapore's government said state actors were behind the attack that saw thieves take information such as names, identification numbers, and outpatient prescription details. Experts are pointing fingers at China.

Archived from the original on May 13, FireEye claims to have found evidence that the attacks were staged by two groups connected to the Chinese military. The other is known among threat researchers as APT10, or "Stone Panda"—the same group believed to be behind recent espionage efforts against US companies lobbying the Trump administration on global trade. These groups have also been joined in attacks by two "patriotic hacking" groups not directly tied to the Chinese government, Hultquist told the Journal—including one calling itself "Denounce Lotte Group" targeting the South Korean conglomerate Lotte.

Archived from the original on May 14, A cybersecurity firm in the United States believes state-sponsored Chinese hackers were trying to infiltrate an organization with connections to a US-built missile system in South Korea that Beijing firmly opposes. Chinese companies are suspected of stealing the intellectual property of Samsung Electronics and SK hynix to obtain advanced technological knowhow from them, sources familiar with the matter said Wednesday. Retrieved 27 June Archived from the original on 11 November The company is warning users today that a small percentage of Maxtor Basics Personal Storage hard drives purchased after August were shipped with a virus called "virus.

Retrieved May 13, Retrieved May 14, Liao said the named suspect was the same individual being cited in local media reports. Prosecutors asked that Zhou be taken into custody on suspicion of violating national security laws and the request was approved by the court, Liao said, adding that Zhou could be held for at least two months. Retrieved January 7,