CNSA news, Updates and Discussions

rockdog

Senior Member
Joined
Dec 29, 2010
Messages
4,111
Likes
2,959
Country flag
“Congratulations to the China National Space Administration on receiving the first images from the Zhurong Mars rover!” Nelson said. “As the international scientific community of robotic explorers on Mars grows, the United States and the world look forward to the discoveries Zhurong will make to advance humanity’s knowledge of the Red Planet. I look forward to future international discoveries, which will help inform and develop the capabilities needed to land human boots on Mars.”

 

johnq

Senior Member
Joined
May 30, 2009
Messages
2,165
Likes
4,352
Will China Steal Its Way to a Space Race Victory?
If the United States does not start making some changes, China could soon become the world’s leader in space exploration.

Well, China just did it again.

China’s state-owned rocket manufacturer, the China Academy of Launch Vehicle Technology (CALT), recently released a video showcasing a new rocket that appears to be a near carbon copy of SpaceX’s Starship rocket.

While this news is concerning, it shouldn’t come as much of a shock. For years, the Pentagon has been warning legislators that China is building up an arsenal of space weaponry that’s not only incredibly similar to our own but also puts America’s space infrastructure at a significant disadvantage. Richard Fisher, an expert in China’s military affairs at the International Assessment and Strategy Center, put it this way, “[China] is aiming to achieve control of low earth orbit in order to defeat the United States on Earth.”

While Fisher put it bluntly, he isn’t wrong. From 2011 to 2013 alone, China carried out thirteen successful hacks on NASA computers. So, the communist regime certainly isn’t above stealing tech and intellectual property from private U.S. space contractors such as Elon Musk’s SpaceX.

In fact, SpaceX has been one of China’s prime targets. The apparent copy of Starship is not the first time that SpaceX has seemingly been the subject of China’s theft. Musk has already claimed that China stole software from his car company, Tesla, which is a national security problem since SpaceX also uses that same software.

None of this should come as a surprise considering how closely Musk is intertwined with China. Not only has Musk moved more of his operations to the country, but the communist regime also helped Tesla secure over $1 billion in loans back in 2019. This concerns America’s foreign policy because China’s Military Civil Fusion strategy mandates Chinese entities work in tandem with their government when necessary to advance its strategic interests. By operating so close to the Chinese—and in some cases, even on the communist regime’s turf—Musk is making it far too easy for the country to lift his technology for its predatory purposes.

At a recent online seminar, former NASA administrator Daniel Goldin warned that if the United States does not start making some changes, China could soon become the world’s leader in space exploration. He’s right. In this new space race, we need all the help we can get. We can’t and shouldn’t exclude any company or contractor from participating in helping us defeat China. At the same time, however, rules need to be put in place to ensure the safety and security of American lives.

Past legislative attempts have been made to prevent China from benefiting from its business ties with private U.S. space entities. Last year, former Senator Cory Gardner proposed amendments to the NASA Authorization Act that would have ordered the Government Accountability Office to review NASA contractors for any business ties to China and consider any involvement with China when awarding contracts. While Congress didn’t take up this legislative language last year, it might be worth re-visiting and re-proposing these amendments to protect America’s national security interests. Regardless of whether Gardner’s solution represents the best approach, however, it’s clear that Congress needs to do something to confront this growing threat from China before it’s too late.
Most Chinese students and workers in US have been sent by Chinese Communist Party (CCP) to steal intellectual property (IP) from US companies, universities, and government organizations like NASA. The only way to stop CCP from stealing more IP is to stop all Chinese from entering US, as well as taking all IP offline to safeguard it from Chinese hackers.
 

rockdog

Senior Member
Joined
Dec 29, 2010
Messages
4,111
Likes
2,959
Country flag
China just successfully launched its space station core module “Tianhe” 4 weeks ago, and now is attacking US space station now.

 

Abdus Salem killed

New Member
Joined
Mar 10, 2021
Messages
4,103
Likes
15,759
Lol.



I think we can all feel very proud that our Chinese beat their Chinese!

View attachment 92200
Hello mods this Chinese is sharing fake news that this is new news while it's news from 2017 from international chemistry Olympiad and one of the participants is an Korean will you allow such propoganda


@Indx TechStyle
 

SexyChineseLady

Senior Member
Joined
Oct 3, 2016
Messages
5,105
Likes
3,958
Hello mods this Chinese is sharing fake news that this is new news while it's news from 2017 from international chemistry Olympiad and one of the participants is an Korean will you allow such propoganda


@Indx TechStyle
Which one is the Korean? Dinesh who posted tweet is Indian-American.
 

ketaki

Regular Member
Joined
Mar 19, 2021
Messages
551
Likes
2,686
Country flag
Hello mods this Chinese is sharing fake news that this is new news while it's news from 2017 from international chemistry Olympiad and one of the participants is an Korean will you allow such propoganda


@Indx TechStyle
i have reported his posts as CCP propaganda many many times...looks like DFI MODs are trying to make babaji proud
1622217655901.png
 

johnq

Senior Member
Joined
May 30, 2009
Messages
2,165
Likes
4,352
More on how the roots of Chinese scientific research lie in IP theft from the US:
Report finds US is failing to stop China from stealing research
The United States government has failed to stop China from stealing intellectual property from American universities and lacks a comprehensive strategy for dealing with the threat, a congressional report concluded Monday.

The report says the FBI should be more effective and consistent in warning colleges and universities about the threat of Chinese economic and industrial espionage. It also says agencies that award research grants or provide visas for scientists don’t do enough to monitor or track the recipients and says universities themselves must do a better job identifying foreign funding sources and conflicts of interest among scientists on their campuses.

The problem is especially urgent, says the report from the Senate’s Permanent Subcommittee on Investigations, because billions of dollars in taxpayer-funded research have “contributed to China’s global rise over the last 20 years” and to its goal of being a world leader in science and technology by 2050.

“As American policy makers navigate an increasingly complicated relationship with China, it is not in our national security interest to fund China’s economic and military development with taxpayer dollars,” the report says.

The report is the most recent government study to analyze Chinese intellectual property theft on college campuses and to scrutinize the shortcomings of government agencies in addressing the problem. It focuses on Chinese programs that recruit scientists with access to cutting-edge technology in the US and incentivize them to conduct research for Beijing’s gain and even to steal the work of American academics.

In recent years, the report says, the programs have been exploited by scientists who have downloaded sensitive research files before returning to China, filed patents based on US research, lied on grant applications and failed to disclose money they’d received from Chinese institutions.

Enlarge ImageA copy of an FBI pamphlet and related emails.AP
“The US academic community is in the crosshairs of not only foreign competitors contending for the best and brightest, but also of foreign nation states that seek to transfer valuable intellectual capital and steal intellectual property,” the report states. “As the academic community looks to the federal government for guidance and direction on mitigating threats, the US government must provide effective, useful, timely and specific threat information and tools to counter the threats.”

The report takes aim at the lack of transparency in how the programs are run, recommending that agencies that distribute research grants stop funding participants in them absent full disclosure of the terms and conditions of membership.

The most prominent of the programs, known as the Thousand Talents Plan, has gone underground amid heightened US scrutiny, with some Chinese government websites deleting online references to it. But it’s continued operating. Participants are asked to sign legally binding contracts that include non-disclosure agreements and that make clear that Chinese institutions will retain the rights to at least some of the intellectual property created by the researcher in the US.

The report singles out multiple agencies for criticism, saying for instance that the National Science Foundation — which funds about a quarter of all federally funded basic research at colleges and universities — has taken insufficient steps to vet grantees and avoid misappropriation of their funds. It cites as one example a Virginia Tech researcher who was accused of using NSF grants for research he knew had already been done in China.

In a statement Monday, the NSF said it is in the process of clarifying policy guidance for researchers on requirements to disclose foreign and domestic funding. It has also barred members of its workforce from participating in talent recruitment programs operated by certain countries and has commissioned a study on how to “maintain balance between openness and security of science.”

“This is a challenging and important issue,” the NSF said.

The report says the Energy Department clarified only this year that employees and contractors are prohibited from participating in foreign talent recruitment programs and that the State Department does not systematically track visa applicants linked to China’s recruitment programs even though some applicants have stolen research in the past. The State Department said it was aware of the report and reviewing it.

In addition, the report says the FBI “has yet to develop an effective, nationwide strategy to warn universities, government laboratories and the broader public of the risks of foreign talent recruitment plans.” It says FBI headquarters did not take centralized control of the bureau’s response until the middle of last year and that the FBI itself was slow to recognize the threat from talent recruitment plans.

The Associated Press last month, relying on hundreds of pages of documents obtained through public records requests, reported that the FBI has been reaching out to colleges and universities across the countries to warn them of the threat. But the report says universities are mixed in their response. In one case, according to the report, the FBI provided a school with a list of suspected participants in the Thousand Talents Plan but did not say what to do next.

An FBI spokeswoman declined to comment on the report ahead of a Senate hearing Tuesday on the same topic.

FBI officials previously told AP that the bureau had received consistently positive feedback from universities about the outreach efforts and that the FBI is committed to helping universities understand the scope of the threat and how to protect their research. They said they consider the briefings vital because they say universities, accustomed to fostering international and collaborative environments, haven’t historically been as attentive to security as they should be.
 

Romediablo

Regular Member
Joined
Sep 8, 2020
Messages
193
Likes
783
Country flag
Its a parody of the actual Space force set up by TRump
Its more likely supports your agenda
China just successfully launched its space station core module “Tianhe” 4 weeks ago, and now is attacking US space station now.

 

johnq

Senior Member
Joined
May 30, 2009
Messages
2,165
Likes
4,352
More evidence Chinese Communist Party stole space technology from NASA:
Chinese hackers charged with stealing data from NASA, IBM, and others
At least 45 companies or agencies were compromised in a 12-year campaign sponsored by the Chinese government, the DOJ says

The Department of Justice (DOJ) has charged two Chinese nationals with being part of a decade-long, government-sponsored global hacking campaign that included the alleged theft of information from 45 US tech companies and government agencies, including NASA’s Jet Propulsion Laboratory and Goddard Space Flight Center.
The charges, announced after the US government unsealed an indictment against the two individuals on Thursday, come at a time of high tension between the US and China. In the middle of a detente in the trade war between the two countries, the US recently coordinated with Canada to arrest the CFO of Huawei, one of China’s biggest companies. The Chinese government has detained three Canadian citizens in response while demanding the executive’s release. The indictment is also just the latest in a long line of accusations that the Chinese government has sponsored or sought the theft of American technology.
“As evidenced by this investigation, the threats we face have never been more severe, or more pervasive, or more potentially damaging to our national security, and no country poses a broader, more severe long-term threat to our nation’s economy and cyber infrastructure than China,” FBI Director Christopher Wray said during a press conference Thursday. “China’s goal, simply put, is to replace the US as the world’s leading superpower, and they’re using illegal methods to get there.”
“China’s goal, simply put, is to replace the US as the world’s leading superpower”
Zhu Hua and Zhang Shilong were part of a Chinese hacking group known in the cyber security community as Advanced Persistent Threat 10, or APT10, according to the indictment. The alleged hackers went by a number of different aliases, including “Godkiller,” and the hacking operation was sometimes known as different names like “Red Apollo,” “Stone Panda,” and “POTASSIUM,” according to the charging document.
Starting around 2006 and running through this year, APT10 used an evolving set of techniques to break down network defenses, select victims, and access sensitive information, according to the DOJ. The group relied heavily on spear phishing attacks to place malware on victims’ computers. They masked themselves with seemingly legitimate email addresses, sent messages with attached documents loaded with malicious code, but named the documents in a way that made them look relevant to the company. (The DOJ describes one scenario where employees of an unnamed victim company involved in helicopter manufacturing were sent an email with the subject line “C17 Antenna problems,” and a malicious Microsoft Word document named “12-204 Side Load Testing.doc.”)
The malware gave the hackers remote access to the infected computers, and also allowed them to log employees’ keystrokes, offering up usernames and passwords. Over the course of the hacking campaign, the group accessed at least 90 computers and stole hundreds of gigabytes of data, according to the charging document. This included computers from seven companies involved in aviation, space, and satellite technology, three communications companies, a US Department of Energy National Laboratory, as well as NASA’s Goddard Space Flight Center and its Jet Propulsion Laboratory. The DOJ did not describe the specific nature of the documents that were stolen, and it’s unclear if the indictment is related to the internal memo that circulated earlier this week at NASA about a potential hack involving “Personally Identifiable Information.”
The hackers used spear phishing attacks, but also targeted gatekeepers like Hewlett Packard Enterprise
Starting around 2014, APT10 also targeted “managed service providers,” which Deputy Attorney General Rod Rosenstein described in a press conference as “firms that are trusted to store, process and protect commercial data, including intellectual property, and other confidential business information.” This separate slice of the hacking campaign gave the group access to the computers and networks in at least 12 different countries, including those of a number of unnamed consulting companies, health care and biotechnology companies, and a “global financial institution.” Two of the compromised managed service providers were Hewlett Packard Enterprise and IBM, according to Reuters.
Rosenstein specifically mentioned that the industries targeted in the hacking campaign line up with the ones core to the Chinese government’s “Made in China 2025” plan, which is meant to extend the country’s economic influence throughout the world.
The DOJ says the hacking group operated in a number of locations throughout China, but the agency specifically names the city of Tianjin as a hub for APT10. They’re accused of working with the Tianjin bureau of China’s Ministry of State Security, the government’s intelligence agency. Zhu and Zhang have also been charged with wire fraud and identity theft.
The US has long accused China of so-called economic espionage, or performing government-backed hacking for the purpose of stealing trade secrets and other confidential business information in order to benefit the country’s booming — but in many cases, still developing — industries. (Perhaps most famously, China used information gathered from hackers to copy the C-17 aircraft that was developed by Boeing and used by the US military.)
“We hope the day will come when those defendants face justice under the rule of law in an American courtroom”
The two countries reached an agreement in 2015 that was supposed to curb state-sponsored cyber attacks on both sides. And for a while it looked like both sides were adhering to it, with China arresting a handful of nationals for economic espionage shortly after the truce was signed, and the G20 officially endorsing the deal. But that agreement has apparently not stopped China from continuing such attacks, Rosenstein said Thursday.
“It is unacceptable that we continue to uncover cyber crime committed by China against America and other nations,” he said. “In 2015, China promised to stop stealing trade secrets and other confidential business information through computer hacking with the intent of providing competitive advantage to companies in the commercial sector. But the activity alleged in this indictment violates the commitment that China made” to the United States, the G20, and the international community, he said.
The two Chinese nationals named in the indictment still live in China, and so there’s very little chance that they will ever be prosecuted in the US. “We hope the day will come when those defendants face justice under the rule of law in an American courtroom,” Rosenstein said Thursday. “Until then, they and other hackers who steal from our companies for the apparent benefit of Chinese industry should remember: there is no free pass to violate American laws merely because they do so under the protection of the foreign state.”
 

Latest Replies

Global Defence

Articles

Top