India-China 2020 Border conflict

Status
Not open for further replies.

another_armchair

New Member
Joined
Feb 28, 2019
Messages
12,096
Likes
54,387
Country flag
Tech Giants Are Giving China a Vital Edge in Espionage
U.S. officials say private Chinese firms have been enlisted to process stolen data for their country’s spy agencies.

In 2017, as U.S. President Donald Trump began his trade war with China, another battle raged behind the scenes. The simmering, decadelong conflict over data between Chinese and U.S. intelligence agencies was heating up, driven both by the ambitions of an increasingly confident Beijing and by the conviction of key players in the new administration in Washington that China was presenting an economic, political, and national security challenge on a scale the United States had not faced for decades—if ever.

Beijing was giving China hawks in the United States plenty of ammunition. That same year, hackers working for China’s People’s Liberation Army would mastermind a massive breach of Equifax, one of the United States’ largest credit reporting firms. The military-linked hackers absconded with a dizzying amount of personal data, including Social Security numbers, home addresses, birth dates, driver’s license numbers, and credit card information. Roughly 145 million Americans had their personal data exposed by the hack.


The Trump administration’s China policies were probably the most antagonistic of any U.S. presidency since the height of the Cold War in the 1960s. Still, even within the administration, key China advisors were divided. “In the first year [of the Trump era] at the National Security Council, we were arguing and debating the direction [of China policy],” recalled Robert Spalding, who served as the council’s senior director for strategic planning until early 2018. The environment shifted in 2018, Spalding said, after the advent of the administration’s National Security Strategy, its decision to escalate the trade war, and the departure of Susan Thornton, the State Department’s top Asia policy official, who Spalding says stymied attempts by the FBI and Department of Justice to take a more aggressive tack on China-related prosecutions. (Thornton declined to comment.)


But for some critics, the administration’s shifting rationales undermined its credibility on China and technology issues. A number of Trump administration officials emphasized the national security threats posed by Chinese tech giants, while others—most notably Trump himself—intimated that these companies’ access to U.S. goods and markets were bargaining chips in the ongoing trade war. ZTE, a major Chinese telecommunications firm, was almost driven out of business after the administration, citing national security, banned American suppliers from working with it—until Trump granted the company a reprieve, seemingly as part of trade-related negotiations with Chinese leader Xi Jinping. “President Xi of China, and I, are working together to give massive Chinese phone company, ZTE, a way to get back into business, fast. Too many jobs in China lost. Commerce Department has been instructed to get it done!” Trump tweeted in May 2018.


A full-court press by the administration on Huawei, the world’s largest telecom equipment firm, lost momentum after the president floated dropping an extradition request against a Huawei executive arrested in Canada for sanctions evasion in exchange for trade relief. Administration officials also shifted from hinting about the company’s current malicious activities on behalf of China’s spy services to emphasizing the threat it might pose in the future, once it had monopolized much of the world’s telecom infrastructure.


This was a fair worry. Chinese industry has always been, to some extent, subordinated or intertwined with the party-state, although the origins of these ties are often murky. The People’s Liberation Army was a dominant player in Chinese firms for decades, owning businesses from hospitals to condom factories; the Chinese Communist Party has itself repeatedly attempted to force military divestiture to fight corruption.


But the embrace between China’s intelligence services and Chinese businesses has gotten tighter, U.S. officials say. In 2017, under Xi’s intensifying authoritarianism, Beijing promulgated a new national intelligence law that compels Chinese businesses to work with Chinese intelligence and security agencies whenever they are requested to do so—a move that codified “what was pretty much what was going on for many years before, though corruption had tempered it” previously, a former senior CIA official said.





In the final years of the Obama administration, national security officials had directed U.S. spy agencies to step up their intelligence collection on the relationship between the Chinese state and China’s private industrial behemoths. By the advent of the Trump era, this effort had borne fruit, with the U.S. intelligence community piecing together voluminous evidence on coordination—including back-and-forth data transfers—between ostensibly private Chinese companies and that country’s intelligence services, according to current and former U.S. officials. There was evidence of close public-private cooperation occurring on “a daily basis,” according to a former Trump-era national security official. “Those commercial entities are the commercial wing of the party,” the source said. “They of course cooperate with intelligence services to achieve the party’s goals.”

“THOSE COMMERCIAL ENTITIES ARE THE COMMERCIAL WING OF THE PARTY,” THE SOURCE SAID. “THEY OF COURSE COOPERATE WITH INTELLIGENCE SERVICES TO ACHIEVE THE PARTY’S GOALS.”

Beijing’s access to, and ability to sift through, troves of pilfered and otherwise obtained data “gives [China] vast opportunities to target people in foreign governments, private industries, and other sectors around the world—in order to collect additional information they want, such as research, technology, trade secrets, or classified information,” said William Evanina, the United States’ top counterintelligence official. “Chinese technology companies play a key role in processing this bulk data and making it useful for China’s intelligence services,” he said.


In what amounts to intelligence tasking, China’s spy services order private Chinese companies with big-data analytics capabilities to “condition”—that is, work up or process—massive sets of information, including from hacks like the massive breach of the U.S. Office of Personnel Management (OPM), that have intelligence value, according to current and former officials. This data then promptly flows back to Chinese state entities, they say.


“Just imagine on any given day, if NSA and CIA are collecting information, say, on the [Chinese military], and we could bring back seven, eight, 10, 15 petabytes of data, give it to Google or Amazon or Microsoft, and say, ‘Hey, condition this on the weekend. We want all these analytics; get it back to us next week.’ That’s what they do. They have Alibaba and they have Baidu. We don’t have that,” a current senior intelligence official said.

Market Value and Reach of Key Chinese Tech Companies
VALUES ARE APPROXIMATE AS OF DEC. 18.


Research by Chloe Hadavas/Foreign Policy; Sources: Morning Star, Fortune, Bloomberg, Investopedia, Technode

By co-opting Chinese companies’ data-processing capabilities, U.S. officials say, Beijing’s spy agencies can rapidly sift through massive amounts of information to find key nuggets of intelligence value—for example, to help identify an undercover CIA operative by cross-checking real-time travel intelligence with other sources gathered by China’s Ministry of State Security (MSS). And by outsourcing these expensive data-processing functions to private companies, Chinese intelligence agencies can also exploit these commercial capabilities at a scale they don’t possess themselves or don’t want to build in-house, officials say. Alibaba and Baidu did not respond to multiple requests for comment.


The cooperation hasn’t always been frictionless. “The private companies are hostages to it,” a former counterintelligence executive said. “Arguments ensue.” Sometimes, U.S. intelligence officials would learn about “pissed-off employees” at Chinese companies upset about “doing extra work” on behalf of Chinese intelligence, the former executive said. But they were obligated to comply. “All the major Chinese firms have benefited from knowing, at various points, how to not be too big to fail the party,” the former senior CIA official said. The companies’ at-times begrudging cooperation with Beijing’s intelligence agencies is still, in the end, a subordination to them.


Many Chinese tech firms “probably want to be normal tech companies, and don’t want to deal with these ideological expectations, or the national security expectations,” said Elsa Kania, a China expert and adjunct senior fellow at the Center for a New American Security. “Most Chinese tech companies are not that dissimilar to their counterparts in Silicon Valley. The difference is they are trying to operate within a system where there are incentives and expectations to cultivate closer relations with the government, or the potential for retribution should they step out of line on some front.”

Chinese companies walk a tricky line when talking about such ties. Publicly, and especially in English, they deny any links to Beijing’s intelligence or military apparatus. Huawei, which has faced a flood of accusations about these links, implausibly claims to be owned by its employees. At home, though, the same companies repeatedly avow their loyalty to the party and willingness to assist the security services.


Some connections are more deep-seated. For instance, the former senior CIA official said that, based on “high-confidence reporting,” the CIA concluded that the Chinese tech giant Tencent, which operates the ultrapopular WeChat messaging service, received funding from the Ministry of State Security early on in its foundation. The organization, China’s chief civilian intelligence agency, provided a “seed investment,” this former official said, “when they were trying to build out the Great Firewall and the monitoring technology.”


“This is entirely false,” Tencent said. “Our history as an entrepreneurial start-up is well known, funded first by our founders and then IDG and PCCW, and we’ve been a public company with transparent ownership for over 16 years.”


Cooperation picked up “when WeChat became a thing; the MSS came to them regarding monitoring things and shutting them down when necessary,” said the former senior CIA official. “It’s not that Tencent or [its founder] Pony Ma are dancing to the tune of what the MSS says, but if at any point China’s security services need assistance, they are providing it.”


“Tencent, like any other company operating in China, complies with [Chinese] law in a transparent way,” Tencent said. “The allegations beyond this are completely false.”


China's President Xi Jinping and U.S. President Donald Trump review the Chinese honor guards during a welcome ceremony at the Great Hall of the People in Beijing on Nov. 9, 2017.

China’s President Xi Jinping and U.S. President Donald Trump review the Chinese honor guards during a welcome ceremony at the Great Hall of the People in Beijing on Nov. 9, 2017. FRED DUFOUR/AFP via Getty Images

Economic espionage by China’s spy agencies has benefited mainland companies for many years, with data hacked or otherwise stolen by China’s intelligence services flowing toward the private sector to give Chinese firms a leg up against the competition. While intellectual property theft is common—and often driven by the private sector—in China, the state has long played a key role in industrial espionage. America’s firms, with their hefty government and military contracts, became juicy targets in the online era. “It’s well understood that you’ve had some flow of information from Chinese intelligence agencies to private sector entities,” said Sean Kanuck, who served as the U.S. national intelligence officer for cyber issues from 2011 to 2016.


As far back as 2000, according to Steve Ryan, the former deputy director of the National Security Agency’s Threat Operations Center, U.S. officials observed Chinese cyberoperations aimed at piercing U.S. defense contractors—something that was occurring “on a regular basis” by around 2006 onward, Ryan said. The Chinese were “just robbing the defense industrial base blind, in certain areas, in certain technologies,” he recalled. “And then we would just watch them form a company that would then put that U.S.-side interest out of business. We saw that time and again.” These cyber-incursions became ubiquitous, with Chinese state hackers successfully compromising the networks of contractors to the Pentagon’s U.S. Transportation Command 20 times in a single year, according to a 2014 Senate Armed Service Committee report. In 2018, Chinese operatives successfully hacked a U.S. Navy contractor, pilfering highly sensitive information related to the development of submarine missiles.

American officials stewed as China rolled out new fighter jets and other weapons systems copied from stolen U.S. designs. Using their own technical spying capabilities, U.S. intelligence officials also observed hacked information being transferred from data centers controlled by Chinese intelligence agencies to quasi-private, quasi-public Chinese defense businesses. Years ago, though, this purloined data would remain with Chinese companies for “competitive uses,” said a former senior NSA official. It was like “a gift to be used effectively” from Chinese intelligence to its defense sector partners, this person recalled. This earlier model of cooperation, however, was unidirectional, with data passed from China’s spies to its own industrial base, as part of Beijing’s race for technological parity with Washington.


But the use of private Chinese conglomerates to provide the know-how and data-processing firepower for China’s intelligence apparatus represents a new stage in this evolution, U.S. officials say. “The companies they are using are portraying themselves as large, legitimate, multinationals that have footprints across jurisdictions,” said the former Trump-era national security official. “These are not simply tiny little . . . defense contractors working inside China. They are major multinationals with footprints all over the world.” China’s “use of their private sector entities furthers not only their intelligence gathering, but processing,” said Ryan, the former top NSA official.


Key legal restrictions and cultural norms mean American spy agencies cannot induce U.S. firms to sift through the fruits of its own cyberspying; they have had to build these data analysis capabilities for themselves, U.S. officials say. And they cannot, for example, commandeer private U.S. companies’ data-processing power to help them create a composite picture of what the Chinese know about, say, U.S. government employees based on Beijing’s prior hacks. But synthesizing these parallel databases has been a priority for U.S. officials, who have worked to mirror image at least some of what they believe the Chinese possess, according to three current and former senior officials. This can be a laborious process. “It took us forever to condition” the data from the OPM breach, the current senior intelligence official said.


But when U.S. officials eventually analyzed all this data, the picture that emerged about what, in fact, the Chinese knew was not a pretty one. U.S. intelligence reporting on the subject is “sickening to your stomach,” the senior intelligence official said.

“Look at Equifax. Add Anthem, the financial stuff, Marriott, there’s nothing they don’t know about us,” said the current official, referring to a series of breaches of U.S. firms perpetrated by Chinese hackers. “We are constantly trying to mimic what they do know” about Americans who might be targets for Chinese spies, they said. “And then we marry that up with intelligence that we get about what their interests are. Then we go back and give defensive briefs” to these potential targets, the current senior official said. “That’s kind of the new business model we have right now.”


China might be testing out a “new business model” as well, Trump-era officials fear. During the first few years of the Trump administration, conversations “bounced around” at the National Security Council and within U.S. intelligence agencies on how China’s hunt for security through data—through, for instance, synthesizing data from Marriot, Equifax, OPM, and other hacked organizations to identify U.S. spies—may have converged with its larger economic objectives, according to the former Trump-era national security official. The thinking “is still relatively immature” in that area, this source said. But U.S. officials believe China may be leveraging stolen personal information to attempt to undermine the American economy, through putting companies under financial stress in strategically important business sectors, even if these companies don’t perform classified work.


These datasets might also be used to benefit Chinese businesses in other ways, officials say. “If I’m looking to expand a hotel chain or expand into the international travel market, having United Airlines, Marriot, or American Airlines customer records” could provide Chinese firms clear potential advantages “for due diligence and market research purposes,” said Kanuck, the former top U.S. cyber-focused intelligence official. Likewise, Kanuck said, the hack of Anthem could give Chinese firms obvious insights into the U.S. health care market. The massive data tranches could also be used as inputs to build better algorithms for artificial intelligence programs, officials say.


While some of this weaponized data could be derived from hacks, Trump-era officials also worried that attempted investments in U.S. firms by some Chinese businesses was aimed at gaining control over personal data in U.S. companies’ possession—which could then be passed back to the Chinese intelligence services. The Trump administration’s increased use of the Committee on Foreign Investment in the United States process—in which an interagency group reviews foreign purchases for national security threats—to block takeovers of some U.S. companies by Chinese firms was partially driven by these fears, officials say.

Then Chinese Vice President Xi Jinping invites then U.S. Vice President Joe Biden to view an honor guard during a welcome ceremony inside the Great Hall of the People in Beijing on Aug. 18, 2011. Lintao Zhang/Getty Images

Then-Chinese Vice President Xi invites then-U.S. Vice President Joe Biden to view an honor guard during a welcome ceremony inside the Great Hall of the People in Beijing on Aug. 18, 2011. Lintao Zhang/Getty Images

Navigating the U.S.-China relationship will be the most momentous foreign-policy challenge for the incoming Biden administration. But in the vanishingly small world of bipartisan officialdom, the integrated threat posed by Beijing may represent the last great unifying issue in the national security sphere. The Biden administration’s China strategy seems likely to be a difference in degree from its predecessor, not in kind.



For American national security officials, deep worries about the Chinese government’s relationships with its world-spanning private sector companies—including telecom giants like Huawei, massive e-commerce platforms like Alibaba, and social media behemoths like ByteDance, which operates the TikTok platform—will increasingly influence the U.S.-Beijing relationship. China has already succeeded in isolating one out of every five humans on the planet from the global data ecosystem; now, in a defensive mirror image, U.S. policymakers are instituting more stringent controls aimed at segregating Americans’ data from Chinese companies—and, by extension, Beijing’s formidable intelligence apparatus.

Driven by fears over internal instability and external threats to its rule, the Chinese Communist Party has determined that data security is tantamount to regime security. But this strategy creates some internal tensions for Beijing. “The Chinese cybersecurity system today requires backdoors into every single company and individual in China,” said a former senior intelligence analyst. “And they are willing to admit that these [backdoors] could enable attackers and may decrease the cybersecurity of the companies.”

This is a trade-off China’s leaders seem willing to make, at least for now—even though these policies may catalyze an economic decoupling with China’s most important trading partner, and even though this decoupling might itself drive domestic instability. Meanwhile, the bear hug between Chinese intelligence and Chinese industry continues to squeeze together ever more tightly. After all, said the former senior intelligence analyst, “this is a country with omnipresence in its companies.”

 

another_armchair

New Member
Joined
Feb 28, 2019
Messages
12,096
Likes
54,387
Country flag
Beijing Ransacked Data as U.S. Sources Went Dark in China
As Xi consolidated power, U.S. officials struggled to read China’s new ruler.

In early 2013, as Communist Party General Secretary Xi Jinping prepared to assume the Chinese presidency, very few people in the West had any idea what kind of leader he was. In January of that year, the New York Times’ Nick Kristof, an experienced China correspondent, wrote that Xi “will spearhead a resurgence of economic reform, and probably some political easing as well.”

It was a radically mistaken assessment. But even inside the U.S. government, knowledge of China—and its intensions—was at a low point. During the 2000s, U.S. intelligence had operated with relative confidence against Beijing. But during China’s biggest political transition in decades, American officials were looking through an increasingly opaque glass.

The twin disasters of the Office of Personnel Management (OPM) hack, which had helped the Chinese to identify undercover U.S. intelligence officials, and the obliteration of the CIA’s network of Chinese assets significantly “affected the quality of insight” into what the United States understood about events in that country, according to a former U.S. national security official. There was a noticeable decrease in high-quality intelligence reporting percolating up to senior policymakers, this source recalled. “Things weren’t the same.”


And as U.S. officials struggled to try and grasp what was happening on the other side of the Pacific, China was doubling down on a hacking spree that would see unprecedented amounts of data stolen and fed into an increasingly sophisticated intelligence apparatus.


At the time, White House officials trying to craft new China policies debated Xi’s character and intentions, a senior Obama-era official said. Administration officials were split in their views on Xi. There was a “set of analysis” that led some to argue that Xi was a possible reformer: a product of the Chinese Communist Party (CCP), yes, but a leader capable of ameliorating some of the excesses of the Chinese system, this former official recalled. Others, however, argued that Xi was a “neo-Maoist”: that is, a dangerous hard-liner. The difference in views was “very stark,” this person recalled.


Other officials who served under U.S. President Barack Obama recall more consensus regarding the new Chinese president. “There was never any romanticism about Xi,” said the former national security official. But ultimately, this source said, “no one was able to foresee the kind of leader he was to become.” And, as the Xi-led purges soon revealed, “the Communist Party leadership didn’t see it either,” this official recalled.


Inside the CIA, senior officials were also divided about Xi’s rise, if perhaps more skeptical than at the White House, a former senior CIA official recalled. “There was some wishful thinking that Xi would come in and promote some kind of continued reform,” this source said. “But the vast majority [within the agency] thought the party was moving toward the strongman model, [the idea] that China should stand up and become more aggressive in its viewpoint. Within elite party corners that was a big debate at the time.” But “what CIA was hearing from sources pointed to a re-centralization for the party to maintain power,” this person recalled.


“There was concern in Washington about what Xi was going to pursue, both in terms of domestic liberties, but also his approach to America,” said Gail Helt, a former CIA China analyst. “The Chinese Communist Party is corrupt, to put it mildly, but there were initial indicators that he was going to clean up that corruption, there was a little glimmer of hope. Then it was clear that he was going to purge and create a personality cult.”


Some of the gaps in intelligence were because U.S. officials had grown more cautious. There was “reluctance or concern or anxiety about putting our officers in the field given that our protective shield had been punctured [by the OPM breach],” recalled the former national security official. “We didn’t fully know what they knew about us.” Subsequently, “dozens of postings” for CIA officers scheduled for assignments in China were canceled, according to The Perfect Weapon, a 2018 book by David Sanger. “CIA, for many years, was not willing to do forward facing ops in China,” because its confidence was so shaken by the asset roll-up and other breaches, said a former senior intelligence analyst.

China was also hardening its digital defenses against U.S. spying during 2012-2014, the former analyst said. It was “a gradual change over a year or two, as Chinese leaders started incorporating insights into increasing their control over their own internet space.” Intelligence collection by U.S. cyberspies suffered as a result. China’s tightening domestic-focused digital surveillance dragnet—like its increasing use of biometrics and closed-circuit TV—also made U.S. intelligence gathering there more difficult, former officials say.

Prior leaks had accentuated the difficulty of even routine communications by U.S. officials with their Chinese counterparts. The release of a massive tranche of U.S. diplomatic cables by WikiLeaks in 2010 and 2011 left some Chinese officials, whose relatively frank discussions with their American counterparts were documented in the cables, dangerously exposed at home. (Two Chinese government or state media sources named in the cables, for instance, had their careers stymied after the leak.) In the past, this type of relatively open diplomatic intercourse had played an important role in helping U.S. officials form a picture of China. “Chinese officials became much more reluctant to talk after [the WikiLeaks cables], because they didn’t believe we could keep it a secret,” recalled a current State Department official with extensive experience in China.

A screen shows the sentencing of Bo Xilai in Beijing on Sept. 2, 2013. The former Chinese politician was sentenced to life imprisonment for bribery, embezzlement, and abuse of power.

A screen shows the sentencing of Bo Xilai in Beijing on Sept. 2, 2013. The former Chinese politician was sentenced to life imprisonment for bribery, embezzlement, and abuse of power. Feng Li/Getty Images

And while the United States maintained significant eavesdropping and cyberspying capabilities against China, Chinese officials were becoming much more reluctant to talk on many channels. This wasn’t just out of the knowledge, revealed by the Edward Snowden leaks and other disclosures, that the United States might be intercepting communications; it was also out of fears that they were under surveillance by China’s own security services, according to a former Defense Intelligence Agency official. In the aftermath of the Bo Xilai affair in 2012—the first of Xi’s purges of the party, which felled both top-level government officials and army officers—Chinese officials became even more devoted to face-to-face meetings for any sensitive matter. “Disclosure of state secrets,” intentional or otherwise, was one of the most common charges brought against Xi’s targets.


As Xi began a comprehensive purge of the party and restructuring of the state, the answers about his character and intentions became clearer—at least to some members of the Obama administration. “The debates over what kind of leader Xi was going to be, that got settled pretty early for some of us,” the Obama-era official recalled. “Some did not see that as quickly.”


For this official, the meeting between Xi and Obama in 2013 in Southern California was an immediate revelation. It “wasn’t even an open question anymore” that Xi would rule with increasing authoritarianism, this person said. Over the next few years, Xi’s hard-line policies would extend into almost every area of Chinese life, from the estimated 1 million Uighurs subjected to detention, surveillance, and torture in Xinjiang; to a mass clampdown on freedom of speech; to supposed anti-corruption purges that swept up hundreds of thousands of Chinese officials. But the U.S. administration often remained reluctant to act, said the Obama-era official.

Meanwhile, the hacks continued. Beijing’s spies were ransacking Americans’ data at an almost Olympian scale. In addition to masterminding the OPM breach, hackers linked to Chinese intelligence would filch private information from over 383 million individuals, including passport and credit card data, in a massive 2014 compromise of the hotel giant Marriott; pilfer personal information from over 78 million Americans in a 2014 breach of Anthem, the major health insurance provider; breach the networks of American Airlines, United Airlines, and Sabre, a top travel reservation provider (and key target for China’s travel intelligence program); and burrow into computer systems belonging to the U.S. Department of the Navy, stealing sensitive data linked to over 100,000 naval personnel, among other penetrations of the U.S. private and public sectors. The Chinese “were always a Hoover, sucking up mountains of data beyond anything else in the world,” recalled a former senior National Security Agency official.

U.S. intelligence and national security officials, in particular, were becoming increasingly incensed by China’s actions. The Obama administration began to take more aggressive steps against Chinese cyberspying, indicting five Chinese military hackers in 2014 for a massive espionage campaign targeting U.S. companies—the first-ever public U.S. indictment of nation-state hackers—and threatening Beijing with sanctions. But senior U.S. officials under Obama still believed there were key, if narrowing, areas to carve out mutual cooperation with their Chinese counterparts.


One focus was on easing the visa process. In 2014, on a visit to Beijing, Obama announced that the United States and China had reached a reciprocal agreement to extend visas from their current one-year span to 10 years for business and tourist visas, and five years for student visas—a major potential boost for tourism and educational exchanges.


Some U.S. intelligence officials were aghast. On the Chinese side, the visa extension gambit was “an MSS-led endeavor,” said a current senior U.S. intelligence official, referring to the Ministry of State Security, China’s main civilian intelligence organization. “It was an intelligence-based process, where they wanted to get to a place where they could have a 10-year visa to the U.S., instant access in and out of the country without the U.S. government knowing.” There were “hundreds of meetings at the White House” on this issue, the official recalled. “Obama was hellbent on getting some negotiated pact. And the administration, as much as we argued with it, didn’t see the big deal. They saw it as a promulgation for trade and academia—all things that are true, but the entire [intelligence community] and FBI said, ‘Whoa whoa whoa, they’re going to increase their already excessive nontraditional collection activities.’”

The Scope of Key U.S. Data Breaches Tied to China
NUMBER OF INDIVIDUALS AFFECTED BY EACH BREACH


* Two separate incidents, both announced in 2015. Research by Chloe Hadavas/Foreign Policy Sources: U.S. Office of Personnel Management, U.S. Justice Department, U.S. Federal Trade Commission, Reuters, Wall Street Journal, Bank Info Security, Ars Technica

A second area of attempted cooperation was in cyberspace. In September 2015, in another flourish of public diplomacy—this time coinciding with Xi’s first state visit to Washington—Obama and Xi announced a major new bilateral accord forbidding the hacking-enabled theft of trade secrets by either country. The agreement set up a formal bilateral mechanism for dialogue, led by senior officials from both countries, wherein one side could lodge complaints against the other for purported violations.


Even these discussions, however, were riven by conflicting or contradictory perspectives among senior U.S. officials regarding China’s actions—and the United States’ own interests. Internally, Obama officials had debated the proper scope of the negotiations and the administration’s red lines—“what we would insist on in terms of taking our foot off their neck,” recalled the former national security official.


Some within the administration had dreamed of a bigger deal. For instance, four former officials say, during the run-up to the 2015 agreement, senior Obama-era officials floated the idea of expanding the potential accord to include cyberespionage directed at personal information, like the data found in the Marriott and Anthem breaches.

U.S. intelligence agencies balked. They “were adamant that discussing theft of personally identifiable information was not on the table,” recalled the former national security official. “We had spent the last months being really pissed at the Chinese for stealing our shit. I realized we weren’t as exercised within the intelligence community as I thought.” The response by the intelligence community was “emphatic and unambiguous”: Other types of hacking must be excluded from the deal. Some of the pushback was because intelligence officials simply did not believe China would abide by the accord. “We thought it was policymaker masturbation,” said former Defense Intelligence Agency Deputy Director Douglas Wise, “because there’s not a penalty for noncompliance. We took a very cynical view.” (By 2018, U.S. officials would publicly state that China was in widespread violation of the deal.)

But much of the resistance from within the intelligence bureaucracy was because U.S. cyberspies also engage in widespread hacking of personal data abroad. “At one level it’s how the game is played,” said Michael Daniel, the Obama administration’s cybersecurity czar. “It’s called espionage.” Indeed, said the former senior intelligence analyst, “the reason we didn’t come out swinging on OPM was we didn’t want to set this precedent that you can’t use cyberoperations”—that is, hacking—“to get personally identifiable information out of a country’s citizens.” Intelligence officials would not assent to an agreement they wouldn’t keep themselves.

Fundamentally, at the time, U.S. officials wanted a lot more insight into the inner workings of the Chinese government.

What they already knew was disturbing enough. By the mid-2010s, U.S. intelligence agencies had secretly burrowed into online networks controlled by the Ministry of State Security—networks where data from hacked U.S. companies and U.S. government entities was being stored, according to three former officials. In some cases, U.S. intelligence operatives watched as “bits and pieces [of this data] were being used over time,” said a former intelligence official. But the information itself was fragmentary, and the United States’ access was uneven, former officials said, so it was unclear to U.S. officials from where, exactly, this information derived—until larger hacks like those of OPM and Marriott were discovered. (Occasionally, however, U.S. officials have been able to determine the genesis of data on networks controlled by Chinese hackers that were being secretly surveilled by U.S. spies—and have quietly alerted companies to the breaches, thereby preventing much larger hacks of sensitive personal information from occurring, according to the former senior intelligence analyst.)


U.S. cyberspies were already keenly focused on Chinese data storage and processing capabilities. Within U.S. spy agencies, there was “a lot of interest in [Chinese] data centers, the technology and the hardware going into facilities that are intelligence- or military-linked,” said the same former official. “If Alibaba is running a cloud, and they have data centers inside China, well, we’ve been targeting those for a long time,” recalled the former intelligence official.

But there were still gaps in the U.S. spy agencies’ knowledge. At the tail end of the Obama administration, officials tasked the intelligence agencies to “elevate the Chinese counterintelligence threat in relation to other national collection priorities,” recalled a former senior National Security Council official with knowledge of intelligence issues—that is, to devote more intensive resources, in “all sorts of collection,” to spying on China. The push was “driven in large part by their growing cyber-capabilities, and their growing aggressive counterintelligence activities,” this source said.


This wider effort, recalled by three former officials, was born of the consensus that—even amid Russia’s 2016 election interference campaign—China, not Russia, had emerged as the biggest long-term counterintelligence threat to the United States. By the end of the Obama administration, the former senior NSC official recalled, it was clear that in China’s “technical collection, in their very aggressive recruitment of U.S. operatives, [it had] outstripped Russia.”

Fundamentally, Beijing’s spy services simply operated on a much larger scale than Moscow’s—and Washington’s. “One of the things where China has the advantage over pretty much everyone in this space is: If you have a nearly inexhaustible supply of human capital, then maybe you can just grab as much [data] as you can grab,” said Steve Ryan, a former deputy director of the NSA’s Threat Operations Center. “So it’s a different model on their side.”


Russia’s successes in 2016 forced senior Obama-era national security officials to discuss the country’s wider vulnerabilities, former officials said. The concern was, according to the former senior NSC official, “Will the Chinese weaponize this data they’ve accumulated over the years?”


“If they do, it has far-reaching consequences, and could be far more damaging than what Russians have done. Because they have vastly larger quantities of data than Russia does,” the former official said.


Still, some China hawks remained frustrated over what they perceived of as a lack of focus on Beijing, and especially its industrial policies. “I was fighting people to get this done, more collection on China,” said Robert Spalding, who served as the top China strategist for the chairman of the Joint Chiefs of Staff during the late Obama administration. At Spalding’s request, in 2015 the Joint Chiefs organized meetings with a suite of top intelligence officials, as well as representatives from the Commerce, Treasury, and State departments around these issues. “The [intelligence community] refused to engage,” said Spalding, who subsequently served on the National Security Council during the Trump administration.


But other former national security officials, who emphasize the time lag between high-level strategic reprioritizing of different intelligence targets and on-the-ground results, say there was an intensified focus on China around this time—including on developing greater insight into the relationship between Chinese intelligence agencies and private Chinese companies. By 2016, senior U.S. national security officials had “tasked the [intelligence community] to develop answers, setting the wheels in motion” on “the sharing between private [Chinese] companies and the MSS,” one former national security official recalled. We “were looking at the forensic trail,” they said.


The Obama administration’s increased scrutiny of the Chinese telecommunications giant ZTE helped catalyze this process, this source said: “Part of the material that was obtained within that investigation provided a breadcrumb trail to Huawei’s practices in Iran and elsewhere. But the picture was still being colored in.”


After President Donald Trump took office in early 2017, this increasingly well-developed picture would spur U.S. intelligence officials, and senior Trump administration officials, to zero in on the symbiotic relationship between China’s security apparatus and its private sector leviathans.

 

Tactical Doge

𝕱𝖔𝖔𝖑𝖘 𝖗𝖚𝖘𝖍 𝖆𝖓𝖉 𝖆𝖓𝖌𝖊𝖑𝖘 𝖋𝖊𝖆𝖗
New Member
Joined
Aug 28, 2019
Messages
9,954
Likes
60,451
Country flag
Earlier today, Rafael announced that it was awarded a $200 million contract to provide SPICE 2000 air-to-surface systems, SPIKE ATGMs, and the BNET communications system to an Asian country.

View attachment 71363

Let's see who can name the Asian country.
images (1) (1).jpeg
:hehe:
 

12arya

New Member
Joined
Oct 11, 2017
Messages
4,208
Likes
15,083
Country flag
I think that figure of 46 was announced much later (I could be wrong). However what I remember was that our own guys (MEA babus) in the *first* statment announcing that 20 of us KIA and *unknown* number of chinks killed. This is what I have an issue with. Instead of unknown they should have put out a statement like "as per the best estimates of army around 40 chinks were KIA". But it appears that MEA did not want ruffle their chink masters
when u have guys who has their heads buried under sand, this is bound to happen. these babus fail our soldiers repeatedly.
 

12arya

New Member
Joined
Oct 11, 2017
Messages
4,208
Likes
15,083
Country flag
Indian right community needs to distance itself from trump and his clown supporters. We are not like this crying EVM hack every time we lose a election and have no proof to present.

This fool was praising xi and calling him great and president for life saying we love each other.



he has bank accounts and business ventures in china. He approved the phase one deal with China.


This idiot was all love for china and pushing for trade deals until he understood that the chinese played him like fiddle and covid is going to cost him a second term.

every single lawsuit filed by trump and his team has been thrown out of the courts with SCOTUS throwing out an other lawsuit today itself. He has not provided any proper proof at all but keeps asking for fees to fight. I have been keeping an eye on all these court proceedings and none of them have any proper evidence rather they are trying to directly throw out votes and then you have these twitter accounts talking about servers in germany and kraken russian drone shit with the most recent one being trump is a time traveler.

Trump is a business man he will take his money and be off republicans like chumps with be waiting for his 9D chess move while he swindles them and runs away. republicans need to get their shit together and contest for 2024 now and we need to start preparing using our own industrial base and weapons for what is going to come.
I don't think republicans traditionally favoured Indians. Trump was the only difference i think but yes the man his a motormouth of epic proportion. And i think that cost him dearly.
 

12arya

New Member
Joined
Oct 11, 2017
Messages
4,208
Likes
15,083
Country flag
Why does China have such unachievable territorial ambitions?
Megalomania! All commies suffer from it. Nothing surprising there.

The recent police amendment act effort by Kerala commie cm is another example of this same venereal disease that CCP too sufferers from.
 

vishnugupt

New Member
Joined
Dec 3, 2013
Messages
2,736
Likes
11,509
Country flag
I'll make it clearer for you: The Maratha empire would have been nothing more than a few battles here, few battles there, if it weren't for French generals providing Western expertise. "Ifs and buts". Unfortunate that you can bring nothing meaningful to the conversation except, arrogance?

Edit: I read and re-read your post and cannot make any sense of it. You ahve zero point, you have raised zero issue. The only thing you have raised is your adoration for the USSR. We see how advanced India is thanks to their support. BTW, you should learn what is meant by "Hindu rate of growth" while you are at it. Unfortunate.
My Friend, You Great game theory has failed and now this French adviser to Marathas. My dear Friend French were in collusion with local kings especially Mughals and Nizams to fight with British there is nothing like French wanted to establish a Free India. Infact French colonies were there till 1954. Example: Pondicherry.

As I said Westerns know nothing about third world countries issues and Zero knowledge on Geopolitics but still they pretend their guessing/delusions are absolute truth.

Apart from India's security guarantee Soviets involvement ranging from space to deep see.

It is also true that KGB had heavy involved in India's policy making but it was limited till Russian interests. Soviet involvement is one of reason for India's long poverty but this is what then Government allowed knowingly.
 

12arya

New Member
Joined
Oct 11, 2017
Messages
4,208
Likes
15,083
Country flag
Nukes will start flying. :)

The 15 days fight is not a sparing in a box like two boxer. The kinetic offences will be designed to capture massive lands and key strategic points, also reducing enemy capabilities to such an extent that either they lose or give us enough time to replenish and reorganize. The gains and atrritions or show of capabilities and intent to do more atrrition and capture more land then will be used to bring them back on the table to negotiate which they refused to do before the war.
and then our babus will give it all back as usual!
 

Indrajit

New Member
Joined
Feb 27, 2018
Messages
4,242
Likes
16,090
Country flag
I don't think republicans traditionally favoured Indians. Trump was the only difference i think but yes the man his a motormouth of epic proportion. And i think that cost him dearly.
Has been generally true but the most pro India US President was George Bush. Obama and Trump havent been bad but Bush Jr. Was the most friendly ever.
 

Indrajit

New Member
Joined
Feb 27, 2018
Messages
4,242
Likes
16,090
Country flag

Excellent article on Xi. A must read to understand the enemy we are dealing with.
 

sorcerer

New Member
Joined
Apr 13, 2013
Messages
26,919
Likes
98,474
Country flag

Leonardo Alves

Tihar Jail
Banned
Joined
Nov 22, 2015
Messages
507
Likes
1,967
Country flag
No fault of Pappu here. Blame Nayanima Basu and other experts from The Print for shady journalism and clickbait Title. Annual Summit with Japan too has been cancelled. Basu says in her article that 'Atleast Virtual Summit' could have taken place but since Russian are unhappy due to Quad, it didn't take place. God knows how can two big leaders discuss important stuff virtually since there are many limitations. Also Russian aren't cry babies to cancel summits and stuff just because something irked them. There are proper mechanism in MEA to deal with such things.
Coupta gang, what can anybody expect? They write such articles daily.
Problem is with Google which allows this but doesn't allow swarajya guys in suggestions.
This what happens when you live in liberal and woke world called silicon city.
 

Maharaj samudragupt

Kritant Parashu
Banned
Joined
Oct 9, 2020
Messages
7,650
Likes
21,952
Country flag
India on 29 april 1954 , gave away Tibet to china in return of a gurantee that they won't invade us as per the panchasheel agreement .
Nullifying the Anglo china agreement of 1904 where , we first the british indian army and later indian army kept troops at gyantse and lahotse along with telegraph lines and roads till delhi itself.
 
Status
Not open for further replies.

Articles

Top