Status of Chinese People

About China and Chinese people's living condition

  • China Organ Harvesting Report, in 19 languages

  • Torture methods used by China police

  • Censorship

  • Massive protests & riots in China

  • Top 9 Posts (In 48 hours)

  • All Topics

  • Books to Read

    1. A China More Just, Gao Zhisheng
    2.Officially Sanctioned Crime in China, He Qinglian
    Will the Boat Sink the Water? Chen Guidi, Wu Chuntao
    Losing the New China, Ethan Gutmann
    Nine Commentaries on The Communist Party, the Epochtimes
  • Did you know

    Reporters Without Borders said in it’s 2005 special report titled “Xinhua: the world’s biggest propaganda agency”, that “Xinhua remains the voice of the sole party”, “particularly during the SARS epidemic, Xinhua has for last few months been putting out news reports embarrassing to the government, but they are designed to fool the international community, since they are not published in Chinese.”
  • RSS Feeds for Category

    Organ Harvesting

    Human Rights

    Made in China







    Feed address for any specific category is Category address followed by 'Feed/'.

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 222 other followers

Clearer Than Ever: Chinese Government’s Link to Cyber Espionage

Posted by Author on February 20, 2013

It has become an article of faith in the information security world that the Chinese government is behind many advanced persistent threats (APTs)—sophisticated, long-term cyber-attacks that target companies for their intellectual property and trade secrets. Expressing the belief is easy, but proving it has been another matter. But one security firm may have the proof.
“It’s very difficult to identify the extent of the risk,” says Peter Toren, a former federal prosecutor in the Computer Crimes & Intellectual Property Section of the U.S. Department of Justice; Toren is now an IP and computer crimes expert with Weisbrod Matteis & Copley and author of Intellectual Property and Computer Crimes.

“In computer hacking, you really only learn about the successful hacks, and even then it’s only the proverbial tip of the iceberg,” Toren says. “Many companies are reluctant for a variety of reasons to report a breach.”
“It’s also very difficult, especially with China, to identify who’s sponsoring the attacks,” Toren adds. “In China, the line between the private enterprise and the state-owned enterprise can be very muddy and blurred. It’s very difficult to distinguish between the two.”
However, Toren notes that about 30 percent of the cases the U.S. government has brought under the Economic Espionage Act of 1996 have had some sort of Chinese connection. The first trial conviction under the act involved Dongfan Chung, a Chinese native working as an engineer at Boeing. Chung spent 30 years providing U.S. aerospace technologies to China, including details on the U.S. Space Shuttle Program and Delta IV rocket. He was sentenced to 16 years in prison in February 2010.
U.S., Allies Must Pressure China to Stop Cyber Espionage
“There is a rich history over the centuries of governments and militaries conducting espionage on each other to better understand each other’s plans, intentions and capabilities,” U.S. Rep. Mike Rogers, chairman of the House Intelligence Committee, said in the opening statement of a hearing on cyber threats in 2011.
“These espionage activities over the years, however, have largely been focused on collecting intelligence on foreign governments and militaries, not on brazen and wide-scale theft of intellectual property from foreign commercial competitors,” he added. “You don’t have to look far these days to find a press report about another firm, like Google, whose networks have been penetrated by Chinese cyber espionage and have lost valuable corporate intellectual property.”

– Resouece: CIO

Sorry, the comment form is closed at this time.

%d bloggers like this: