Status of Chinese People

About China and Chinese people's living condition

  • China Organ Harvesting Report, in 19 languages

  • Torture methods used by China police

  • Censorship

  • Massive protests & riots in China

  • Top 9 Posts (In 48 hours)

  • All Topics

  • Books to Read

    1. A China More Just, Gao Zhisheng
    2.Officially Sanctioned Crime in China, He Qinglian
    Will the Boat Sink the Water? Chen Guidi, Wu Chuntao
    Losing the New China, Ethan Gutmann
    Nine Commentaries on The Communist Party, the Epochtimes
  • Did you know

    Reporters Without Borders said in it’s 2005 special report titled “Xinhua: the world’s biggest propaganda agency”, that “Xinhua remains the voice of the sole party”, “particularly during the SARS epidemic, Xinhua has for last few months been putting out news reports embarrassing to the government, but they are designed to fool the international community, since they are not published in Chinese.”
  • RSS Feeds for Category

    Organ Harvesting

    Human Rights

    Made in China







    Feed address for any specific category is Category address followed by 'Feed/'.

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 222 other followers

China Is USA’s #1 Cyber Threat: U.S. Govt. Report

Posted by Author on February 14, 2013

A new report by the National Intelligence Estimate confirms that China is America’s biggest cyber threat.

The report is classified, but people with knowledge of the findings spoke to The Washington Post on the condition of anonymity.

“The United States is the target of a massive, sustained cyber-espionage campaign that is threatening the country’s economic competitiveness,” according to the article. “The report, which represents the consensus view of the U.S. intelligence community, describes a wide range of sectors that have been the focus of hacking over the past five years, including energy, finance, information technology, aerospace and automotive.”

But other industries have been targeted as of late, including the media and the U.S. Federal Government.

In recent weeks, The Washington Post, The New York Times, The Wall Street Journal and Bloomberg disclosed cyber attacks traced back to China. Twitter was also hacked, but the origins of that attack remain unknown. But perhaps the most disturbing case of cyber-espionage involves the Federal Reserve and Department of Energy.

Related: Federal Reserve Gets Hacked!

These types of attacks threaten the economic competitiveness of America. While the intelligence report does not put a dollar figure on the financial impact of these cyber attacks, some experts believe it is upwards of $10 billion, according to WaPo.

For decades, China has been trying to speed up its technical prowess by both stealing technology and data from America and buying up U.S. companies. A recent Wall Street Journal article details how China has been trying to acquire American assets at a faster and faster clip.

While many of the bigger deals pursued by China have been rejected by the U.S. government due to security concerns, many of the smaller acquisitions have managed to be approved.

“Last year, Chinese buyers agreed to spend more than $10 billion in 46 deals to acquire U.S. companies or stakes in U.S. firms, according to Dealogic,” the WSJ reports. “The volume was higher than the Chinese total from 2009 through 2011 combined.”

The sale of battery maker A123 in January to China’s largest automotive components manufacturer for roughly $250 million is the latest deal to get approved by the U.S. government. A123 makes batteries for commercial electric cars, but it also develops technology used by the military. The acquisition of a company with military ties was worrisome; thus the sale to the Chinese firm only involved A123’s commercial division. But many experts assert that there is much overlap between the technologies used for commercial and military purposes.

Daily Ticker, Feb 11, 2013

Sorry, the comment form is closed at this time.

%d bloggers like this: