HOME

TheInfoList



OR:

The United States has often accused the
government of the People's Republic of China The Government of the People's Republic of China () is an authoritarian political system in the People's Republic of China under the exclusive political leadership of the Chinese Communist Party (CCP). It consists of legislative, executive, m ...
of attempting to unlawfully acquire U.S. military technology and
classified information Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to know, ...
as well as trade secrets of U.S. companiesFinkle, J. Menn, J., Viswanatha, J
''U.S. accuses China of cyber spying on American companies.''
Reuters, Mon 19 May 2014 6:04pm EDT.
Clayton, M
''US indicts five in China's secret 'Unit 61398' for cyber-spying.''
Christian Science Monitor, May 19, 2014
in order to support China's long-term military and commercial development. Chinese government agencies and affiliated personnel have been accused of using a number of methods to obtain U.S. technology (using U.S. law to avoid prosecution), including espionage, exploitation of commercial entities, and a network of scientific, academic and business contacts. Prominent espionage cases include Larry Wu-Tai Chin,
Katrina Leung Katrina Leung (; born 1954) is a former high value Federal Bureau of Investigation (FBI) informant and Ministry of State Security (MSS) agent who, on April 9, 2003, was indicted by the United States Department of Justice for "Unauthorized copyi ...
, Gwo-Bao Min,
Chi Mak Chi Mak (; born 28 September 1940) was a Chinese-born naturalized American citizen who worked as an engineer for California-based defense contractor Power Paragon, a part of L-3 Communications. In 2007, Mak was found guilty of conspiring to export ...
and Peter Lee.Global Security
"Ministry of State Security Operations."
(accessed March 11, 2010).
Wortzel, p. 6. In addition to traditional espionage, China partners civilian-in-name Chinese companies with American businesses to acquire technology and economic data and uses
cyber spying Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for personal, ...
to penetrate the computer networks of U.S. businesses and government agencies, such as the 2009
Operation Aurora Operation Aurora was a series of cyber attacks conducted by advanced persistent threats such as the Elderwood Group based in Beijing, China, with ties to the People's Liberation Army. First publicly disclosed by Google on January 12, 2010, in ...
and the 2015
Office of Personnel Management data breach In June 2015, the United States Office of Personnel Management (OPM) announced that it had been the target of a data breach targeting personnel records. Approximately 22.1 million records were affected, including records related to government emplo ...
. U.S. law enforcement officials have identified China as the most active foreign power involved in the illegal acquisition of American technology.


Methods

China has used a variety of methods to gather intelligence in the United States.Polmar, Norman and Thomas B. Allen, ''Spy Book: The Encyclopedia of Espionage, ''Second Edition, (New York, NY: Random House Reference, 2004), p. 125. Individuals attempt to obtain targeted information from open sources such as libraries, research institutions and unclassified databases. Chinese travelers are recruited to carry out specific intelligence activities, and China debriefs returnees from exchange programs, trade missions and scientific-cooperation programs.Eftimiades, p. 28. Chinese citizens may be coerced to cooperate.Wortzel, p. 5. Much technology acquisition occurs through commerce and commercial regulations. The regulatory and commercial environment in China pressures American and other foreign companies to transfer technology, capital and manufacturing expertise, especially in defense-related or dual-use industries such as computers, to their Chinese partners as part of doing business in China's huge, lucrative markets.Wortzel, p. 4. Chinese agents purchase high-tech equipment through
front organization A front organization is any entity set up by and controlled by another organization, such as intelligence agencies, organized crime groups, terrorist organizations, secret societies, banned organizations, religious or political groups, advocacy ...
s in
Hong Kong Hong Kong ( (US) or (UK); , ), officially the Hong Kong Special Administrative Region of the People's Republic of China (abbr. Hong Kong SAR or HKSAR), is a List of cities in China, city and Special administrative regions of China, special ...
. China also uses state-run firms to purchase American companies with access to the targeted technology. China also accesses foreign technology through
industrial espionage Industrial espionage, economic espionage, corporate spying, or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security. While political espionage is conducted or orchestrated by governme ...
, with
U.S. Immigration and Customs Enforcement The U.S. Immigration and Customs Enforcement (ICE) is a federal law enforcement agency under the U.S. Department of Homeland Security. ICE's stated mission is to protect the United States from the cross-border crime and illegal immigration tha ...
officials rating China's industrial-espionage and theft operations as the leading threat to U.S. technological security. In 2021, Acting NCSC Director Michael Orlando estimated that
China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's List of countries and dependencies by population, most populous country, with a Population of China, population exceeding 1.4 billion, slig ...
stole between $200 billion and $600 billion worth of American
intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
every year. Between October 2002 and January 2003 five Chinese businessmen were accused of illegally shipping equipment and trade secrets from
California California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the m ...
to China, and U.S. officials prevented a Chinese man from shipping a new, high-speed computer used in classified projects (including nuclear-weapons development) from
Sandia National Laboratories Sandia National Laboratories (SNL), also known as Sandia, is one of three research and development laboratories of the United States Department of Energy's National Nuclear Security Administration (NNSA). Headquartered in Kirtland Air Force Bas ...
. In July 2020, FBI Director
Christopher A. Wray Christopher Asher Wray (born December 17, 1966) is an American attorney who is the eighth Director of the Federal Bureau of Investigation, serving since 2017. From 2003 to 2005, Wray served as Assistant Attorney General in charge of the Crimin ...
called China the "greatest long-term threat" to the United States. He said that "the FBI is now opening a new China-related counterintelligence case every 10 hours. Of the nearly 5,000 active counterintelligence cases currently under way across the country, almost half are related to China." For example, Eric Swalwell, who serves on the House Permanent Select Committee on Intelligence, was in the past targeted by a Chinese woman believed to be a clandestine officer of
China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's List of countries and dependencies by population, most populous country, with a Population of China, population exceeding 1.4 billion, slig ...
's Ministry of State Security. The alleged Chinese spy later participated in fundraising for Swalwell's 2014 congressional election bid and helped place an intern inside Swalwell's congressional office. FBI gave Swalwell a "defensive briefing" in 2015, informing him that woman was a suspected Chinese agent. In 2015, the Obama administration protested to Beijing after discovering that Chinese agents, as part of
Operation Fox Hunt Operation Fox Hunt ( zh, 猎狐专项行动, p=Liè hú zhuānxiàng xíngdòng, s=猎狐专项行动) is a Chinese covert global operation whose purported aim is anti-corruption under Chinese Communist Party general secretary Xi Jinping's adminis ...
, were tracking down Chinese dissidents in the United States to pressure them to return to China for prosecution. In October 2020 FBI Director Christopher Wray said that "when it couldn’t locate a Fox Hunt target, the Chinese government sent an emissary to visit the victim’s family here in the United States. And the message they said to pass on? The target had two options: Return to China promptly or commit suicide. And what happens when Fox Hunt targets do refuse to return to China? Their family members, both here in the United States and in China, have been threatened and coerced; and those back in China have even been arrested for leverage." In July 2021,
ProPublica ProPublica (), legally Pro Publica, Inc., is a nonprofit organization based in New York City. In 2010, it became the first online news source to win a Pulitzer Prize, for a piece written by one of its journalists''The Guardian'', April 13, 2010P ...
reported that Operation Fox Hunt, nominally focused on economic crimes, was targeting "
Tibetans The Tibetan people (; ) are an East Asian ethnic group native to Tibet. Their current population is estimated to be around 6.7 million. In addition to the majority living in Tibet Autonomous Region of China, significant numbers of Tibetans liv ...
, Hong Kongers, followers of the
Falun Gong Falun Gong (, ) or Falun Dafa (; literally, "Dharma Wheel Practice" or "Law Wheel Practice") is a new religious movement.Junker, Andrew. 2019. ''Becoming Activists in Global China: Social Movements in the Chinese Diaspora'', pp. 23–24, 33, 119 ...
religious movement and, perhaps most visibly, the
Uyghurs The Uyghurs; ; ; ; zh, s=, t=, p=Wéiwú'ěr, IPA: ( ), alternatively spelled Uighurs, Uygurs or Uigurs, are a Turkic peoples, Turkic ethnic group originating from and culturally affiliated with the general region of Central Asia, Cent ...
". ProPublica reported that a team of Communist Party operatives and police based in
Wuhan Wuhan (, ; ; ) is the capital of Hubei Province in the People's Republic of China. It is the largest city in Hubei and the most populous city in Central China, with a population of over eleven million, the ninth-most populous Chinese city a ...
had been roaming the United States pressuring Chinese immigrant communities, with the spies performing stalking in plain sight and hiring a US-based private investigator. For example, in a 2018 New Jersey court case a former Chinese official living in the U.S. was sued by the Wuhan-based Xinba Construction Group. The expatriate was harassed outside of court and received notes threatening his family, later he received a video from his family in China imploring him to return with a staged shot implying the video was coerced by the Chinese government according to investigators.


Nuclear espionage

A 1999
United States House of Representatives The United States House of Representatives, often referred to as the House of Representatives, the U.S. House, or simply the House, is the lower chamber of the United States Congress, with the Senate being the upper chamber. Together they ...
Select Committee on U.S. National Security and Military and Commercial Concerns with the People's Republic of China report, known as the Cox Report, warned that China has stolen classified information on every
thermonuclear warhead A thermonuclear weapon, fusion weapon or hydrogen bomb (H bomb) is a second-generation nuclear weapon design. Its greater sophistication affords it vastly greater destructive power than first-generation nuclear bombs, a more compact size, a lo ...
in the country's
intercontinental ballistic missile An intercontinental ballistic missile (ICBM) is a ballistic missile with a range greater than , primarily designed for nuclear weapons delivery (delivering one or more thermonuclear warheads). Conventional, chemical, and biological weapo ...
arsenal. Information is collected through espionage, reviews of U.S. technical and academic publications and interaction with U.S. scientists.deGraffenreid, p. 98. China tasks a large number of individuals to collect small pieces of information (which are collated and analyzed), and individual agents can more easily escape suspicion. U.S. government personnel suspect that China's intelligence-gathering efforts directed towards the development of modern nuclear weapons are focused on the Los Alamos, Lawrence Livermore, Sandia and Oak Ridge National Laboratories. China is known to have stolen classified information on the W-56 Minuteman II ICBM, the W-62 Minuteman III ICBM, the W-70 Lance short-range ballistic missile (SRBM), the W-76 Trident C-4 submarine-launched ballistic missile (SLBM), the W-78 Minuteman III Mark 12A ICBM, the W-87 Peacekeeper ICBM and the W-88 Trident D-5 SLBM and weapon-design concepts and features. In 2016, the U.S. Justice Department charged
China General Nuclear Power Group China General Nuclear Power Group (CGN) (), formerly China Guangdong Nuclear Power Group (), is a Chinese state-owned energy corporation under the SASAC of the State Council. In China, CGN operates nuclear plants at Daya Bay Nuclear Power Plan ...
(CGN) with stealing nuclear secrets from the United States. The ''Guardian'' reported: "According to the US Department of Justice, the FBI has discovered evidence that China General Nuclear Power (CGN) has been engaged in a conspiracy to steal US nuclear secrets stretching back almost two decades. Both CGN and one of the corporation’s senior advisers, Szuhsiung Ho, have been charged with conspiring to help the Chinese government develop nuclear material in a manner that is in clear breach of US law."


Cyberwarfare

China conducts political and corporate espionage to access the networks of financial, defense and technology companies and research institutions in the United States. Email attachments attempting to enter the networks of U.S. companies and organizations exploit security weaknesses in software. A recipient opens an email attachment, apparently from a familiar source, containing a program which embeds in the recipient's computer. The remotely controlled program allows an attacker to access the recipient's email, send sensitive documents to specific addresses and turns on such instruments as web cameras or microphones. In January 2010,
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
reported "a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google". According to investigators, the Google
cyber-attack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricte ...
targeted the
Gmail Gmail is a free email service provided by Google. As of 2019, it had 1.5 billion active users worldwide. A user typically accesses Gmail in a web browser or the official mobile app. Google also supports the use of email clients via the POP and ...
accounts of Chinese human-rights activists. At least 34 other companies have been attacked, including Yahoo, Symantec, Adobe, Northrop Grumman and Dow Chemical. In January 2013, ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'' reported that it was the victim of hacking attempts originating from China during the previous four months after it published an article on
Prime Minister A prime minister, premier or chief of cabinet is the head of the cabinet and the leader of the ministers in the executive branch of government, often in a parliamentary or semi-presidential system. Under those systems, a prime minister is ...
Wen Jiabao Wen Jiabao (born 15 September 1942) is a retired Chinese politician who served as the Premier of the State Council from 2003 to 2013. In his capacity as head of government, Wen was regarded as the leading figure behind China's economic polic ...
. According to the newspaper, the "attacks appear to be part of a broader computer espionage campaign against American news media companies that have reported on Chinese leaders and corporations." Chinese
cyber-attack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricte ...
s seem to target strategic industries in which China lags; attacks on defense companies target weapons-systems information, and attacks on technology companies seek source code critical to software applications. Operation Aurora emphasized what senior U.S. government officials have called an increasingly serious cyber threat to critical industries. On August 6, 2020, U.S. President
Donald Trump Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who served as the 45th president of the United States from 2017 to 2021. Trump graduated from the Wharton School of the University of P ...
officially extended restrictions against Chinese-owned apps by signing two executive orders that would ban U.S. residents from doing business with
TikTok TikTok, known in China as Douyin (), is a short-form video hosting service owned by the Chinese company ByteDance. It hosts user-submitted videos, which can range in duration from 15 seconds to 10 minutes. TikTok is an international version o ...
and
WeChat WeChat () is a Chinese instant messaging, social media, and mobile payment app developed by Tencent. First released in 2011, it became the world's largest standalone mobile app in 2018, with over 1 billion monthly active users. WeChat has b ...
, a popular messaging platform run by Tencent Holdings Ltd. The ban was enacted, citing the security risk of leaving Americans’ personal data exposed. However, on September 28, 2020, the ban was temporarily blocked by a federal judge.


2010–2012 compromise of CIA network

Between 2010 and 2012, China was able to arrest or kill between 18 and 20
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
assets within China. A joint CIA/FBI
counterintelligence Counterintelligence is an activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or ...
operation, codenamed "Honey Bear", was unable to definitively determine the source of the compromises, though theories include the existence of a mole, cyber-espionage, or poor
tradecraft Tradecraft, within the intelligence community, refers to the techniques, methods and technologies used in modern espionage (spying) and generally, as part of the activity of intelligence assessment. This includes general topics or techniques ( ...
. Mark Kelton, then the deputy director of the National Clandestine Service for Counterintelligence, was initially skeptical that a mole was to blame. In January 2018, a former CIA officer named Jerry Chun Shing Lee was arrested at
John F. Kennedy International Airport John F. Kennedy International Airport (colloquially referred to as JFK Airport, Kennedy Airport, New York-JFK, or simply JFK) is the main international airport serving New York City. The airport is the busiest of the seven airports in the Avia ...
, on suspicion of helping dismantle the CIA's network of informants in China.


Cyber cases

In 2007 the computer security company
McAfee McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company head ...
alleged that China was actively involved in cyberwarfare, accusing the country of cyber-attacks on India, Germany and the United States; China denied knowledge of these attacks. In September 2007 former senior U.S. information security official Paul Strassmann said that 735,598 computers in the U.S. were "infested with Chinese
zombies A zombie (Haitian French: , ht, zonbi) is a mythological undead corporeal revenant created through the reanimation of a corpse. Zombies are most commonly found in horror and fantasy genre works. The term comes from Haitian folklore, in wh ...
"; computers infected in this manner can theoretically form a
botnet A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its conn ...
capable of carrying out unsophisticated yet potentially dangerous
denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host conne ...
s. A
cyber spying Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for personal, ...
network known as
GhostNet GhostNet () is the name given by researchers at the Information Warfare Monitor to a large-scale cyber spying operation discovered in March 2009. The operation is likely associated with an advanced persistent threat, or a network actor that sp ...
, using servers primarily based in China, was reported as tapping into the classified documents of government and private organizations in 103 countries (including
Tibet Tibet (; ''Böd''; ) is a region in East Asia, covering much of the Tibetan Plateau and spanning about . It is the traditional homeland of the Tibetan people. Also resident on the plateau are some other ethnic groups such as Monpa people, ...
an exiles); China denied the claim. In a July 2021 joint statement with
NATO The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two N ...
, the EU, and other Western nations, the US accused the Ministry of State Security of perpetrating several cyberattacks, most notably the
2021 Microsoft Exchange Server data breach A global wave of cyberattacks and data breaches began in January 2021 after four zero-day exploits were discovered in on-premises Microsoft Exchange Servers, giving attackers full access to user emails and passwords on affected servers, admin ...
.


APT 1

In December 2009 and January 2010 a cyberattack, known as
Operation Aurora Operation Aurora was a series of cyber attacks conducted by advanced persistent threats such as the Elderwood Group based in Beijing, China, with ties to the People's Liberation Army. First publicly disclosed by Google on January 12, 2010, in ...
, was launched from China on
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
and over 20 other companies. Google said that the attacks originated from China, and it would "review the feasibility" of its business operations in China as a result of the incident. According to Google, at least 20 other companies in a variety of sectors were also targeted by the attacks. According to McAfee, "this is the highest profile attack of its kind that we have seen in recent memory.""Google Attack Is Tip Of Iceberg"
, McAfee Security Insights, January 13, 2010
In May 2014, a U.S. Federal
grand jury A grand jury is a jury—a group of citizens—empowered by law to conduct legal proceedings, investigate potential criminal conduct, and determine whether criminal charges should be brought. A grand jury may subpoena physical evidence or a p ...
indicted five Chinese military officers for cybercrimes and stealing trade secrets. It was alleged that the Chinese officers hacked into the computers of six U.S. companies to steal information that would provide an economic advantage to Chinese competitors, including Chinese state-owned enterprises. China said that the charges were "made-up", and the indictment would damage trust between the two nations. Although the indictments have been called relatively meaningless, they could limit travel by the officers due to U.S. extradition treaties.


APT 3

In November 2017, the
Department of Justice A justice ministry, ministry of justice, or department of justice is a ministry or other government agency in charge of the administration of justice. The ministry or department is often headed by a minister of justice (minister for justice in a ...
charged three Chinese employees of Guangzhou Bo Yu Information Technology Company Limited with hacking into corporate entities in the United States, including
Siemens AG Siemens AG ( ) is a German multinational conglomerate corporation and the largest industrial manufacturing company in Europe headquartered in Munich with branch offices abroad. The principal divisions of the corporation are ''Industry'', ''E ...
,
Moody's Analytics Moody's Analytics is a subsidiary of Moody's Corporation established in 2007 to focus on non-rating activities, separate from Moody's Investors Service. It provides economic research regarding risk, performance and financial modeling, as well as ...
, and
Trimble Inc Trimble Inc. is an American software, hardware, and services technology company. Trimble supports global industries in building & construction, agriculture, geospatial, natural resources and utilities, governments, transportation and others. Trim ...
.


APT 10

Since at least 2013, a Chinese espionage group called TEMP.Periscope by
FireEye Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company founded in 2022. It has been involved in the detection and prevention of major cyber attacks. It provides hardware, software, and services to investigat ...
is reported to have been engaged in espionage against maritime-related subjects. FireEye reported that the information targeted was likely of commercial and economic importance. The People's Liberation Army (PLA) was tied to economic espionage involving stolen business plans, intellectual property, and infringed on private conversations from Westinghouse Electric and United States Steel Corporation. Chinese hackers have stolen information on the Patriot missile system, the
F-35 Joint Strike Fighter The Lockheed Martin F-35 Lightning II is an American family of single-seat, single-engine, all-weather stealth multirole combat aircraft that is intended to perform both air superiority and strike missions. It is also able to provide ele ...
, and the U.S. Navy's new Littoral combat ship. These blueprints of U.S. weapon and control systems were stolen to advance the development of Chinese weaponry. The protection of the South China Sea is highly important to the U.S. because a Chinese Cyber Unit has already succeeded in an intrusion into the Philippine's government and military networks. Military documents, internal communications, and other sensitive materials related to the dispute were lost due to the cyber invasion. In January and February 2018, Chinese hackers reportedly stole 614 gigabytes of data from a
Naval Undersea Warfare Center The Naval Undersea Warfare Center (NUWC) is the United States Navy's full-spectrum research, development, test and evaluation, engineering and fleet support center for submarines, autonomous underwater systems, and offensive and defensive weapons ...
-affiliated contractor. The compromised material reportedly included information on a project dubbed "Sea Dragon", as well as
United States Navy The United States Navy (USN) is the maritime service branch of the United States Armed Forces and one of the eight uniformed services of the United States. It is the largest and most powerful navy in the world, with the estimated tonnage ...
submarine cryptographic systems and
electronic warfare Electronic warfare (EW) is any action involving the use of the electromagnetic spectrum (EM spectrum) or directed energy to control the spectrum, attack an enemy, or impede enemy assaults. The purpose of electronic warfare is to deny the opponent ...
. ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'' reported that Russia and China are routinely eavesdropping on calls from an iPhone used by President
Donald Trump Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who served as the 45th president of the United States from 2017 to 2021. Trump graduated from the Wharton School of the University of P ...
, with China reportedly attempting to influence the President by identifying and influencing the people Trump is regularly in contact with. According to the cybersecurity firm Area 1, hackers working for the People's Liberation Army Strategic Support Force compromised the networks of the
AFL–CIO The American Federation of Labor and Congress of Industrial Organizations (AFL–CIO) is the largest federation of unions in the United States. It is made up of 56 national and international unions, together representing more than 12 million ac ...
in order to gain information on negotiations for the
Trans-Pacific Partnership The Trans-Pacific Partnership (TPP), or Trans-Pacific Partnership Agreement, was a highly contested proposed trade agreement between 12 Pacific Rim economies, Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New Zealand, Pe ...
. As part of a campaign called Cloudhopper, hackers working for the Ministry of State Security compromised the networks of IBM and
Hewlett Packard Enterprise The Hewlett Packard Enterprise Company (HPE) is an American multinational information technology company based in Spring, Texas, United States. HPE was founded on November 1, 2015, in Palo Alto, California, as part of the splitting of the ...
, and used that access to compromise those companies' clients. The Cloudhopper attacks began no later than 2014, and included targets in Brazil, Germany, India, Japan, the United Arab Emirates, the United Kingdom, and the United States. In October 2018, ''
Bloomberg Businessweek ''Bloomberg Businessweek'', previously known as ''BusinessWeek'', is an American weekly business magazine published fifty times a year. Since 2009, the magazine is owned by New York City-based Bloomberg L.P. The magazine debuted in New York City ...
'' published a story which alleged that
Supermicro Super Micro Computer, Inc., dba Supermicro, is an information technology company based in San Jose, California. It has manufacturing operations in the Silicon Valley, the Netherlands and at its Science and Technology Park in Taiwan. Founded on ...
's contractors in China had been compromised by the People's Liberation Army to implant microchips with
hardware backdoor Hardware backdoors are backdoors in hardware, such as code inside hardware or firmware of computer chips. The backdoors may be directly implemented as hardware Trojans in the integrated circuit. Hardware backdoors are intended to undermine se ...
s in its servers. The report was widely disputed by the sources and companies who were named therein. In March 2019, iDefense reported that Chinese hackers had launched cyberattacks on dozens of academic institutions in an attempt to gain information on technology being developed for the
United States Navy The United States Navy (USN) is the maritime service branch of the United States Armed Forces and one of the eight uniformed services of the United States. It is the largest and most powerful navy in the world, with the estimated tonnage ...
. Some of the targets included the
University of Hawaii A university () is an institution of higher (or tertiary) education and research which awards academic degrees in several academic disciplines. Universities typically offer both undergraduate and postgraduate programs. In the United States, th ...
, the
University of Washington The University of Washington (UW, simply Washington, or informally U-Dub) is a public research university in Seattle, Washington. Founded in 1861, Washington is one of the oldest universities on the West Coast; it was established in Seatt ...
, the
Massachusetts Institute of Technology The Massachusetts Institute of Technology (MIT) is a private land-grant research university in Cambridge, Massachusetts. Established in 1861, MIT has played a key role in the development of modern technology and science, and is one of th ...
, and
Woods Hole Oceanographic Institution The Woods Hole Oceanographic Institution (WHOI, acronym pronounced ) is a private, nonprofit research and higher education facility dedicated to the study of marine science and engineering. Established in 1930 in Woods Hole, Massachusetts, i ...
. The attacks have been underway since at least April 2017.


Indictments

On May 19, 2014, the
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United Stat ...
announced that a Federal
grand jury A grand jury is a jury—a group of citizens—empowered by law to conduct legal proceedings, investigate potential criminal conduct, and determine whether criminal charges should be brought. A grand jury may subpoena physical evidence or a p ...
had indicted five
People's Liberation Army The People's Liberation Army (PLA) is the principal military force of the China, People's Republic of China and the armed wing of the Chinese Communist Party (CCP). The PLA consists of five Military branch, service branches: the People's ...
officers for stealing confidential business information and intellectual property from U.S. commercial firms and planting
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depr ...
on their computers. In July 2020, the United States Department of Justice charged two Chinese hackers who allegedly targeted intellectual property and confidential business information, including COVID-19 research. The two hackers allegedly worked with the Guangdong State Security Department of the Ministry of State Security. In July 2021, the Justice Department credited four Chinese nationals (accused of working for the MSS) with a hacking campaign targeting government, academic, and private institutions; the individuals were each charged with one count of
conspiracy A conspiracy, also known as a plot, is a secret plan or agreement between persons (called conspirers or conspirators) for an unlawful or harmful purpose, such as murder or treason, especially with political motivation, while keeping their agr ...
to commit
computer fraud Computer fraud is a cybercrime and the act of using a computer to take or alter electronic data, or to gain unlawful use of a computer or system. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, ...
and conspiracy to commit economic espionage.


Aerospace

In an effort to steal the technology to enable Chinese companies to supply the components for the
Comac C919 The Comac C919 is a narrow-body airliner developed by Chinese aircraft manufacturer Comac. The development program was launched in 2008. Production of the prototype began in December 2011, with the first prototype being ready on 2 November 2 ...
aircraft, the Chinese engaged in both cyber and humanint operations. According to a report from cybersecurity firm Crowdstrike and a
US Justice Department The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United State ...
indictment, from 2010 to 2015 the Chinese cyberthreat actor Turbine Panda, linked to the Ministry of State Security’s
Jiangsu Jiangsu (; ; pinyin: Jiāngsū, alternatively romanized as Kiangsu or Chiangsu) is an eastern coastal province of the People's Republic of China. It is one of the leading provinces in finance, education, technology, and tourism, with it ...
Bureau, penetrated a number of the C919's foreign components manufacturers including Ametek,
Capstone Turbine Capstone Green Energy, formerly Capstone Turbine Corporation, was incorporated in 1988 as a California based gas turbine manufacturer that specializes in microturbine power along with heating and cooling cogeneration systems. Key to the Capstone ...
,
GE Aviation GE Aviation, a subsidiary of General Electric, is headquartered in Evendale, Ohio, outside Cincinnati. GE Aviation is among the top aircraft engine suppliers, and offers engines for the majority of commercial aircraft. GE Aviation is part of t ...
,
Honeywell Honeywell International Inc. is an American publicly traded, multinational conglomerate corporation headquartered in Charlotte, North Carolina. It primarily operates in four areas of business: aerospace, building technologies, performance ma ...
,
Safran Safran S.A. is a French multinational company that designs, develops and manufactures aircraft engines, rocket engines as well as various aerospace and defense-related equipment or their components. It was formed by a merger between SNECMA a ...
, and others and stole
intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
and industrial processes data with the aim of transitioning component manufacturing to Chinese companies. The report stated that the operations involved both cyber intrusion and theft as well as
HUMINT Human intelligence (abbreviated HUMINT and pronounced as ''hyoo-mint'') is intelligence gathered by means of interpersonal contact, as opposed to the more technical intelligence gathering disciplines such as signals intelligence (SIGINT), imager ...
operations, in most cases using a piece of code custom written for this industrial espionage operation. As of 2019, four people have been arrested in the US as a result of investigations into this economic espionage and theft of trade secrets. Yanjun Xu, a senior intelligence officer of the MSS, was arrested in Belgium and extradited to the US and is alleged to have been involved in recruiting company insiders at multiple aerospace and aviation companies like GE Aviation to gain knowledge about technologies including those involving the use of
composite materials A composite material (also called a composition material or shortened to composite, which is the common name) is a material which is produced from two or more constituent materials. These constituent materials have notably dissimilar chemical or ...
in jet engine .


Higher education

In September 2020, it was reported that the U.S. cancelled the visas of 1,000 Chinese students and researchers. The authorities claimed that the students had ties with the Chinese military and also accused some of them of conducting espionage. The U.S. began revoking these visas June 1, 2020. In December 2020, ''
Axios Axios commonly refers to: * Axios (river), a river that runs through Greece and North Macedonia * ''Axios'' (website), an American news and information website Axios may also refer to: Brands and enterprises * Axios, a brand of suspension produ ...
'' reported an investigation into the case of a suspected Chinese spy who was enrolled as a student at a
Bay Area The San Francisco Bay Area, often referred to as simply the Bay Area, is a populous region surrounding the San Francisco, San Pablo, and Suisun Bay estuaries in Northern California. The Bay Area is defined by the Association of Bay Area Gov ...
university. The suspected intelligence operative, known as Christine Fang, developed extensive ties with politicians at local and national levels between 2011 and 2015, including U.S. representative for
California's 15th congressional district California's 15th congressional district is a congressional district in the U.S. state of California. The district is currently represented by . Currently, the district includes most of San Mateo County and the southeast side of San Francisco. ...
Eric Swalwell. She was reportedly having sexual or romantic relationships with at least two mayors in the
Midwest The Midwestern United States, also referred to as the Midwest or the American Midwest, is one of four Census Bureau Region, census regions of the United States Census Bureau (also known as "Region 2"). It occupies the northern central part of ...
, according to a former elected official and a U.S. intelligence official. In January 2020, the U.S. Department of Justice arrested Charles Lieber, Chair of the Department of Chemistry and Chemical Biology at Harvard University. Dr. Lieber was also the Principal Investigator of the Lieber Research Group at Harvard University, giving him direct access to information on nanoscience. The grants he received to oversee this work required him to disclose any foreign financial transactions. In 2011, Dr. Lieber was granted the title of "Strategic Scientist" at the Wuhan University of Technology. He received this role under China's Thousand Talents Program, which seeks to bring the expertise of prominent scientists to China and has been accused of stealing foreign information. He was required to work for the Wuhan lab for at least 9 months out of the year, and he got paid $50,000 per month. Dr. Lieber failed to inform the relevant institutions of his role, and he outright lied about his involvement in the program in 2018 and 2019.


See also

* Allegations of intellectual property theft by China * CIA activities in China * Beijing–Washington cyber hotline *
China–United States trade war The China–United States trade war () is an ongoing economic conflict between the People's Republic of China and the United States of America. In January 2018, U.S. President Donald Trump began setting tariffs and other trade barriers on ...
* Chinese intelligence activity abroad * Chinese Students and Scholars Association *
Cold War The Cold War is a term commonly used to refer to a period of geopolitical tension between the United States and the Soviet Union and their respective allies, the Western Bloc and the Eastern Bloc. The term '' cold war'' is used because t ...
* Cox Report * Criticism of Confucius Institutes#Espionage * Cyberwarfare by China *
Industrial espionage Industrial espionage, economic espionage, corporate spying, or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security. While political espionage is conducted or orchestrated by governme ...
* List of Chinese spy cases in the United States *
GhostNet GhostNet () is the name given by researchers at the Information Warfare Monitor to a large-scale cyber spying operation discovered in March 2009. The operation is likely associated with an advanced persistent threat, or a network actor that sp ...
*
Gregg Bergersen Gregg William Bergersen (born 1956/57) was a weapons systems policy analyst for the United States Defense Security Cooperation Agency. A director of C4ISR programs, he was found guilty of spying for the People's Republic of China. A resident of ...
*
Operation Aurora Operation Aurora was a series of cyber attacks conducted by advanced persistent threats such as the Elderwood Group based in Beijing, China, with ties to the People's Liberation Army. First publicly disclosed by Google on January 12, 2010, in ...
*
Russian espionage in the United States Russian espionage in the United States has occurred since at least the Cold War (as the Soviet Union), and likely well before. According to the United States government, by 2007 it had reached Cold War levels.
*
Second Cold War The Second Cold War, Cold War II, or the New Cold War are terms that refer to heightened political, social, ideological, informational, and military tensions in the 21st century. The term is used in the context of the tensions between th ...
*
Titan Rain Titan Rain was a series of coordinated attacks on computer systems in the United States since 2003; they were known to have been ongoing for at least three years. The attacks originated in Guangdong, China. The activity is believed to be associat ...
* United Front Work Department *
Unrestricted Warfare ''Unrestricted Warfare: Two Air Force Senior Colonels on Scenarios for War and the Operational Art in an Era of Globalization'' () is a book on military strategy written in 1999 by two colonels in the People's Liberation Army (PLA), Qiao Liang ...


Notes


References


Citations


Sources

; Works cited * deGraffenreid, Kenneth (ed.), ''The Unanimous and Bipartisan Report of the House Select Committee on U.S. National Security and Military Commercial Concerns with the People's Republic of China'' ("The Cox Report"). Select Committee, U.S. House of Representatives (Washington, DC: Regnery, 1999). * Eftimiades, Nicholas
''Chinese Intelligence Operations''
(Annapolis, MD: Naval Institute Press, 1994). * Wortzel, Larry M., Hearing on "Enforcement of Federal Espionage Laws." Testimony before the Subcommittee on Crime, Terrorism, and Homeland Security of the House Committee on the Judiciary, U.S. House of Representatives, January 29, 2008.


External links


United States and Canadian computer security researchers monitor a Chinese cyber-spying operation
* ttp://news.bbc.co.uk/2/hi/asia-pacific/8582233.stm Google decides to lift censorship in Chinabr>More journalists have their email accounts hackedGoogle reaction to Chinese cyber attackMore examples of how China steals U.S. Military SecretsChinese spy buys Pentagon secrets
{{China national security Espionage in China Espionage in the United States Cyberwarfare by China Cyberwarfare in the United States China–United States relations 1990s in the United States 2000s in the United States 2010s in the United States