Knowledge (XXG)

Chinese espionage in the United States

Source đź“ť

28: 193:, were tracking down Chinese dissidents in the United States to pressure them to return to China for prosecution. In October 2020 FBI Director Christopher Wray said that "when it couldn’t locate a Fox Hunt target, the Chinese government sent an emissary to visit the victim’s family here in the United States. And the message they said to pass on? The target had two options: Return to China promptly or commit suicide. And what happens when Fox Hunt targets do refuse to return to China? Their family members, both here in the United States and in China, have been threatened and coerced; and those back in China have even been arrested for leverage." In July 2021, 847:, Chair of the Department of Chemistry and Chemical Biology at Harvard University. Dr. Lieber was also the Principal Investigator of the Lieber Research Group at Harvard University, giving him direct access to information on nanoscience. The grants he received to oversee this work required him to disclose any foreign financial transactions. In 2011, Dr. Lieber was granted the title of "Strategic Scientist" at the Wuhan University of Technology. He received this role under China's 851:, which seeks to bring the expertise of prominent scientists to China and has been accused of stealing foreign information. He was required to work for the Wuhan lab for at least 9 months out of the year, and he got paid $ 50,000 per month. Dr. Lieber failed to inform the relevant institutions of his role, and he outright lied about his involvement in the program in 2018 and 2019. 27: 298:
recipient opens an email attachment, apparently from a familiar source, containing a program which embeds in the recipient's computer. The remotely controlled program allows an attacker to access the recipient's email, send sensitive documents to specific addresses and turns on such instruments as web cameras or microphones.
783:
As of 2019, four people have been arrested in the US as a result of investigations into this economic espionage and theft of trade secrets. Yanjun Xu, a senior intelligence officer of the MSS, was arrested in Belgium and extradited to the US and is alleged to have been involved in recruiting company
518:
indicted five Chinese military officers for cyber espionage and stealing trade secrets. It was alleged that the officers hacked into the computers of six U.S. companies to steal information that would provide an economic advantage to Chinese competitors, including Chinese state-owned enterprises. The
510:
and over 20 other companies. Google said that the attacks originated from China, and it would "review the feasibility" of its business operations in China as a result of the incident. According to Google, at least 20 other companies in a variety of sectors were also targeted by the attacks. According
302:
Just using cyber means, Chinese government hackers have stolen more of our personal and corporate data than every other nation combined. The harm from the Chinese government’s economic espionage isn’t just that its companies pull ahead based on illegally gotten technology. While they pull ahead, they
276:
has discovered evidence that China General Nuclear Power (CGN) has been engaged in a conspiracy to steal US nuclear secrets stretching back almost two decades. Both CGN and one of the corporation’s senior advisers, Szuhsiung Ho, have been charged with conspiring to help the Chinese government develop
260:
National Laboratories. China is known to have stolen classified information on the W-56 Minuteman II ICBM, the W-62 Minuteman III ICBM, the W-70 Lance short-range ballistic missile (SRBM), the W-76 Trident C-4 submarine-launched ballistic missile (SLBM), the W-78 Minuteman III Mark 12A ICBM, the W-87
3240:
Xu made his initial appearance in federal court in Cincinnati, Ohio, on Wednesday. According to court papers, he is a deputy division director for the Ministry of State Security, which is China's intelligence and security agency, in Jiangsu Province. His job, prosecutors say, was to obtain technical
573:
The protection of the South China Sea is highly important to the U.S. because a Chinese Cyber Unit has already succeeded in an intrusion into the Philippine's government and military networks. Military documents, internal communications, and other sensitive materials related to the dispute were lost
118:
Much technology acquisition occurs through commerce and commercial regulations. The regulatory and commercial environment in China pressures American and other foreign companies to transfer technology, capital and manufacturing expertise, especially in defense-related or dual-use industries such as
114:
such as libraries, research institutions and unclassified databases. Chinese travelers are recruited to carry out specific intelligence activities, and China debriefs returnees from exchange programs, trade missions and scientific-cooperation programs. Chinese citizens may be coerced to cooperate.
706:
In July 2020, the United States Department of Justice charged two Chinese hackers who allegedly targeted intellectual property and confidential business information, including COVID-19 research. The two hackers allegedly worked with the Guangdong State Security Department of the Ministry of State
2684:
An indictment was unsealed today against Wu Yingzhuo, Dong Hao and Xia Lei, all of whom are Chinese nationals and residents of China, for computer hacking, theft of trade secrets, conspiracy and identity theft directed at U.S. and foreign employees and computers of three corporate victims in the
297:
China conducts political and corporate espionage to access the networks of financial, defense and technology companies and research institutions in the United States. Email attachments attempting to enter the networks of U.S. companies and organizations exploit security weaknesses in software. A
169:
called China the "greatest long-term threat" to the United States. He said that "the FBI is now opening a new China-related counterintelligence case every 10 hours. Of the nearly 5,000 active counterintelligence cases currently under way across the country, almost half are related to China." For
779:
and industrial processes data with the aim of transitioning component manufacturing to Chinese companies. The report stated that the operations involved both cyber intrusion and theft as well as HUMINT operations, in most cases using a piece of code custom written for this industrial espionage
217:
had been roaming the United States pressuring Chinese immigrant communities, with the spies performing stalking in plain sight and hiring a US-based private investigator. For example, in a 2018 New Jersey court case a former Chinese official living in the U.S. was sued by the Wuhan-based Xinba
3191:
The human intelligence efforts included one by a now-indicted MSS intelligence officer to recruit an insider at LEAP-X manufacturer General Electric. The same officer also recruited a China-born US Army reservist who was an expert at assessing turbine engine schematics. So far, at least four
357:
seem to target strategic industries in which China lags; attacks on defense companies target weapons-systems information, and attacks on technology companies seek source code critical to software applications. Operation Aurora emphasized what senior U.S. government officials have called an
2877:
The cyberintruders also infiltrated the networks of the United Nations, the A.F.L.-C.I.O., and ministries of foreign affairs and finance worldwide. The hack of the A.F.L.-C.I.O. focused on issues surrounding the negotiations over the Trans-Pacific Partnership, a trade deal that excluded
872:(rainbow) project, named as a play-on-words related to stamping out Red communist bandits. According to academic Wendy Cheng, the KMT's likely first arrest of a U.S. student based on surveillance conducted in the U.S. was that of University of Wisconsin graduate student Hwang Chii-ming. 218:
Construction Group. The expatriate was harassed outside of court and received notes threatening his family. Later he received a video from his family in China imploring him to return with a staged shot implying the video was coerced by the Chinese government according to investigators.
186:. The alleged Chinese spy later participated in fundraising for Swalwell's 2014 congressional election bid and helped place an intern inside Swalwell's congressional office. FBI gave Swalwell a "defensive briefing" in 2015, informing him that woman was a suspected Chinese agent. 55:
of U.S. companies in order to support China's long-term military and commercial development. Chinese government agencies and affiliated personnel have been accused of using a number of methods to obtain U.S. technology (using U.S. law to avoid prosecution), including
519:
Chinese government commented that the charges were "made-up", and the indictment would damage trust between the two nations. Although the indictments have been called relatively meaningless, they could limit travel by the officers due to U.S. extradition treaties.
867:
From the 1964 to 1991, there were scores of reported instances of the KMT spying on Taiwanese students across twenty-one different U.S. college campuses. Student informants to the KMT were part of a surveillance infrastructure called the as the
31:
U.S. Department of Justice among others announced 23 criminal charges (Financial Fraud, Money Laundering, Conspiracy to Defraud the United States, Theft of Trade Secret Technology and Sanctions Violations, etc.) against Huawei and its CFO
635:, and used that access to compromise those companies' clients. The Cloudhopper attacks began no later than 2014, and included targets in Brazil, Germany, India, Japan, the United Arab Emirates, the United Kingdom, and the United States. 2606: 710:
In July 2021, the Justice Department credited four Chinese nationals (accused of working for the MSS) with a hacking campaign targeting government, academic, and private institutions; the individuals were each charged with one count of
242:
arsenal. Information is collected through espionage, reviews of U.S. technical and academic publications and interaction with U.S. scientists. China tasks a large number of individuals to collect small pieces of information (which are
2685:
financial, engineering and technology industries between 2011 and May 2017. The three Chinese hackers work for the purported China-based Internet security firm Guangzhou Bo Yu Information Technology Company Limited (a/k/a "Boyusec").
3208: 1107: 247:
and analyzed), and individual agents can more easily escape suspicion. U.S. government personnel suspect that China's intelligence-gathering efforts directed towards the development of modern nuclear weapons are focused on the
558:
The People's Liberation Army (PLA) was tied to economic espionage involving stolen business plans, intellectual property, and infringed on private conversations from Westinghouse Electric and United States Steel Corporation.
2927: 1374: 3517:, Hearing on "Enforcement of Federal Espionage Laws." Testimony before the Subcommittee on Crime, Terrorism, and Homeland Security of the House Committee on the Judiciary, U.S. House of Representatives, January 29, 2008. 2700: 3179:"Cyber Theft, Humint Helped China Cut Corners on Passenger Jet - Beijing likely saved a lot of time and billions of dollars by copying components for its C919 plane from others, a new report from CrowdStrike says" 325:
reported "a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google". According to investigators, the Google
2763: 303:
push our companies and workers behind. And that harm—company failures, job losses—has been building for a decade to the crush that we feel today. It’s harm felt across the country in a whole range of industries.
3350: 2196:
He did not maintain any internet presence under his name in English or Chinese, or under an alternative spelling Zhen Cheng Li. He may have used an alias or avoided using public internet accounts altogether.
3264:
He was detained in Belgium on 1 April at the request of the US. He was later indicted by an Ohio grand jury on four charges of conspiring to commit economic espionage and attempting to steal trade secrets.
1835: 859:
During its period of martial law on Taiwan (1949–1987) the Kuomintang (KMT) government of the Republic of China surveilled Taiwanese abroad, most often in Japan and in the United States. The United States
2840:
President Donald Trump's unwillingness to ditch Apple's iPhone in favor of more secure hardware has granted Chinese and Russian spies an open door into his private phone conversations, according to a new
1754: 2251: 2671: 175: 2827: 2067: 350:. According to the newspaper, the "attacks appear to be part of a broader computer espionage campaign against American news media companies that have reported on Chinese leaders and corporations." 2959: 1895: 1647: 1521: 3026: 894:, the Taiwan government operated one of the two most active anti-dissident networks within the United States, with agents infiltrated within universities and campus organizations and large-scale 3059: 1491: 2990: 2610: 2004: 1554: 3576: 1617: 887:
while at the East-West Center library. Chen was convicted of sedition at a July 1968 trial and sentenced to seven years of imprisonment. Chen was released in 1971 after receiving amnesty.
2183: 19: 1865: 659:
In March 2019, iDefense reported that Chinese hackers had launched cyberattacks on dozens of academic institutions in an attempt to gain information on technology being developed for the
3284: 2126: 1702: 3095: 4016: 2311: 292: 380:
In January 2024, US authorities stated that they disrupted an operation by the Chinese state advanced persistent threat called "Volt Typhoon" to target US critical infrastructure.
825:
university. The suspected intelligence operative, known as Christine Fang, developed extensive ties with politicians at local and national levels between 2011 and 2015, including
3790: 2937: 1366: 1281: 555:
is reported to have been engaged in espionage against maritime-related subjects. FireEye reported that the information targeted was likely of commercial and economic importance.
377:. The ban was enacted, citing the security risk of leaving Americans’ personal data exposed. However, on September 28, 2020, the ban was temporarily blocked by a federal judge. 2281: 3747: 3317: 1587: 931: 891: 2043: 609: 2708: 1312: 3617: 2158: 4181: 3543: 2753: 2901: 1075: 3571: 2093: 1779: 154:
to China, and U.S. officials prevented a Chinese man from shipping a new, high-speed computer used in classified projects (including nuclear-weapons development) from
139: 1080: 3757: 3340: 461:, using servers primarily based in China, was reported as tapping into the classified documents of government and private organizations in 103 countries (including 3129: 3993: 2864: 1939: 1825: 986: 87:
In addition to traditional espionage, China partners civilian-in-name Chinese companies with American businesses to acquire technology and economic data and uses
395: 389: 334:
accounts of Chinese human-rights activists. At least 34 other companies have been attacked, including Yahoo, Symantec, Adobe, Northrop Grumman and Dow Chemical.
3490:
The Unanimous and Bipartisan Report of the House Select Committee on U.S. National Security and Military Commercial Concerns with the People's Republic of China
1728: 3969: 2241: 1102: 531:
charged three Chinese employees of Guangzhou Bo Yu Information Technology Company Limited with hacking into corporate entities in the United States, including
3780: 3372: 2663: 344: 2640: 3933: 3178: 2819: 830: 4252: 2064: 4247: 2951: 2411: 1887: 1639: 1513: 485: 96: 3018: 2333: 1545:"A suspected Chinese spy slept with at least 2 mayors and got close to Democratic Rep. Eric Swalwell in a years-long intelligence campaign, report says" 3049: 1996: 1483: 1344: 119:
computers, to their Chinese partners as part of doing business in China's huge, lucrative markets. Chinese agents purchase high-tech equipment through
4092: 3987: 3822: 3775: 3229: 2982: 2796: 1670: 1544: 956: 406:, cyber-espionage, compromise of Hillary Clinton's illicit classified email server as noted by the intelligence community inspector general, or poor 3632: 3603: 135: 102:
During its martial law period (1949–1987) the Republic of China government on Taiwan spied on its citizens abroad, especially in the United States.
99:. U.S. law enforcement officials have identified China as the most active foreign power involved in the illegal acquisition of American technology. 1609: 365:
officially extended restrictions against Chinese-owned apps by signing two executive orders that would ban U.S. residents from doing business with
4237: 402:
operation, codenamed "Honey Bear", was unable to definitively determine the source of the compromises, though theories include the existence of a
2173: 784:
insiders at multiple aerospace and aviation companies like GE Aviation to gain knowledge about technologies including those involving the use of
1857: 4171: 2565: 1006: 826: 315:
Countering Threats Posed by the Chinese Government Inside the U.S., Remarks at Ronald Reagan Presidential Library and Museum, January 21, 2022)
253: 227: 150:
every year. Between October 2002 and January 2003 five Chinese businessmen were accused of illegally shipping equipment and trade secrets from
3276: 2359: 4082: 4037: 3536: 3158: 2136: 1135: 672: 418: 941: 605:, with China reportedly attempting to influence the President by identifying and influencing the people Trump is regularly in contact with. 343:
reported that it was the victim of hacking attempts originating from China during the previous four months after it published an article on
4087: 4011: 3637: 3458: 3085: 2589: 951: 676: 434: 2307: 570:
new Littoral combat ship. These blueprints of U.S. weapon and control systems were stolen to advance the development of Chinese weaponry.
414:, then the deputy director of the National Clandestine Service for Counterintelligence, was initially skeptical that a mole was to blame. 1973: 230:
Select Committee on U.S. National Security and Military and Commercial Concerns with the People's Republic of China report, known as the
138:
officials rating China's industrial-espionage and theft operations as the leading threat to U.S. technological security. In 2021, Acting
110:
China has used a variety of methods to gather intelligence in the United States. Individuals attempt to obtain targeted information from
4267: 4262: 4257: 3694: 3672: 3627: 3581: 3054: 2667: 1273: 895: 688: 528: 4126: 3939: 3827: 3812: 3752: 3708: 3622: 748: 624: 481: 239: 183: 81: 77: 60:, exploitation of commercial entities, and a network of scientific, academic and business contacts. Prominent espionage cases include 2389: 946: 3742: 3434: 2274: 971: 801: 265: 206: 3723: 3307: 2891: 1577: 3477: 2472: 2027: 3529: 1304: 4201: 3889: 3817: 3662: 2664:"U.S. Charges Three Chinese Hackers Who Work at Internet Security Firm for Hacking Three Corporations for Commercial Advantage" 1222: 861: 273: 2218: 581:-affiliated contractor. The compromised material reportedly included information on a project dubbed "Sea Dragon", as well as 4242: 4062: 3795: 3682: 3677: 3426: 249: 1141: 1456: 3852: 2441: 2386:"Foreign Ministry Spokesperson Qin Gang's Remarks on the So-called Chinese Cyber-Spy Ring Invading Computers in Countries" 926: 864:
often cooperated with or allowed the KMT to surveil Taiwanese students and other Taiwanese migrants in the United States.
699:
officers for stealing confidential business information and intellectual property from U.S. commercial firms and planting
578: 257: 804:
cancelled the visas of 1,000 Chinese students and researchers. The authorities claimed that the students had ties to the
4121: 4072: 4067: 3903: 3874: 3805: 3767: 3699: 3610: 3121: 1931: 1021: 155: 2854: 4232: 4166: 4052: 3713: 936: 3586: 805: 696: 396:
dismantling CIA intelligence networks in the country, killing and arresting a large number of CIA assets within China
2503: 4176: 4151: 3667: 3552: 2739:
Piiparinen, Anni. 2015. “The Chinese Cyber Threat in the South China Sea.” The Diplomat. The Diplomat. September 18
902: 879:
student Chen Yu-Hsi was arrested by the KMT government based on its surveillance of Chen in the United States. The
632: 497: 3504: 4211: 4206: 4114: 3975: 2730:
Abad-Santos, A. (2018). China Is Winning the Cyber War Because They Hacked U.S. Plans for Real War. The Atlantic.
2632: 1457:"Top counterintelligence official Mike Orlando on foreign espionage threats facing U.S. - "Intelligence Matters"" 617: 563: 442: 4131: 3839: 3718: 3556: 668: 450: 3730: 2534: 2415: 2337: 3472: 2701:"Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries" 1334: 3862: 3689: 2896: 2098: 1209: 880: 3908: 3884: 3209:"In a first, a Chinese spy is extradited to the U.S. after stealing technology secrets, Justice Dept. says" 2786: 4136: 3951: 3800: 640: 48: 1729:"FBI arrests five in alleged 'Operation Fox Hunt' plot to stalk and pressure citizens to return to China" 189:
In 2015, the Obama administration protested to Beijing after discovering that Chinese agents, as part of
127:. China also uses state-run firms to purchase American companies with access to the targeted technology. 4156: 4109: 4104: 4099: 3642: 1339: 976: 848: 776: 744: 712: 286: 235: 147: 876: 577:
In January and February 2018, Chinese state cyber actors reportedly stole 614 gigabytes of data from a
3373:"Harvard University Professor and Two Chinese Nationals Charged in Three Separate China Related Cases" 821:
reported an investigation into the case of a suspected Chinese spy who was enrolled as a student at a
3898: 3857: 2561: 1026: 981: 664: 536: 438: 374: 131: 3492:("The Cox Report"). Select Committee, U.S. House of Representatives (Washington, DC: Regnery, 1999). 656:
in its servers. The report was widely disputed by the sources and companies who were named therein.
4057: 3495: 3213: 3022: 2363: 785: 649: 399: 310: 307: 166: 44: 3154: 1703:"FBI Director Christopher Wray's Remarks at Press Conference Regarding China's Operation Fox Hunt" 731:
In an effort to steal the technology to enable Chinese companies to supply the components for the
4141: 3999: 3913: 3867: 3785: 3521: 3192:
individuals have been arrested in connection with China's campaign targeting aerospace companies.
2859: 2791: 2508: 2246: 2131: 1755:"Operation Fox Hunt: How China Exports Repression Using a Network of Spies Hidden in Plain Sight" 736: 720: 660: 593: 586: 582: 339: 190: 120: 2586: 511:
to McAfee, "this is the highest profile attack of its kind that we have seen in recent memory."
91:
to penetrate the computer networks of U.S. businesses and government agencies, such as the 2009
18:
For a list of individuals suspected or convicted of spying on the United States for China, see
3735: 3430: 2159:"Report: Hillary Clinton's private email server was hacked by China | Al Arabiya English" 2035: 1965: 1773: 1677: 1214: 1131: 844: 653: 61: 836:. She was reportedly having sexual or romantic relationships with at least two mayors in the 441:
official Paul Strassmann said that 735,598 computers in the U.S. were "infested with Chinese
4196: 3963: 3596: 2477: 1549: 1001: 760: 503: 403: 92: 3781:
Committee for Safeguarding National Security of the Hong Kong Special Administrative Region
3591: 3508: 3312: 3186: 2823: 2593: 2446: 2385: 2071: 1582: 1484:"FBI Director Wray warns of Chinese hacking, espionage threats against American companies" 1111: 1084: 1011: 996: 817: 477: 747:
indictment, from 2010 to 2015 the Chinese cyberthreat actor Turbine Panda, linked to the
261:
Peacekeeper ICBM and the W-88 Trident D-5 SLBM and weapon-design concepts and features.
4186: 4161: 3945: 3847: 3654: 789: 716: 567: 198: 197:
reported that Operation Fox Hunt, nominally focused on economic crimes, was targeting "
2607:"Beijing denies corporate cyber spying charge against five Chinese military officials" 178:, was in the past targeted by a Chinese woman believed to be a clandestine officer of 4226: 4005: 3514: 906: 833: 755:
Bureau, penetrated a number of the C919's foreign components manufacturers including
213:". ProPublica reported that a team of Communist Party operatives and police based in 171: 65: 3253: 2926:
Bing, Christopher; Stubbs, Jack; Menn, Joseph. Finkle, Jim; Oatis, Jonathan (eds.).
2721:
Segal, A. (2018). How China is preparing for cyberwar. The Christian Science Monitor
2208: 2125:
Mazzetti, Mark; Goldman, Adam; Schmidt, Michael S.; Apuzzo, Matthew (May 20, 2017).
1204: 1189:
Helft, Miguel and John Markoff, "In Rebuke of China, Focus Falls on Cybersecuirty,"
4077: 3981: 2178: 602: 454: 362: 354: 327: 88: 52: 33: 1888:"Hinkley Point C: case against Chinese firm has the feel of a modern spy thriller" 1443:
Annual Report to Congress on the Military Power of the People's Republic of China,
1367:"Navy officer accused of passing secrets faces espionage and prostitution charges" 613: 433:
alleged that China was actively involved in cyberwarfare, accusing the country of
1125: 417:
In January 2018, a former CIA officer named Jerry Chun Shing Lee was arrested at
4047: 2983:"Security researcher source in Supermicro chip hack report casts doubt on story" 2820:"Trump refuses to give up iPhones, Chinese and Russian spies eavesdrop on calls" 764: 740: 540: 437:; China denied knowledge of these attacks. In September 2007 former senior U.S. 411: 202: 73: 2855:"Hacked European Cables Reveal a World of Anxiety About Trump, Russia and Iran" 2094:"U.S. Disables Chinese Hacking Operation That Targeted Critical Infrastructure" 1610:"Top GOP lawmakers call for Swalwell to be removed from Intelligence Committee" 80:(MSS) maintains a bureau dedicated to espionage against the United States, the 4042: 3957: 3230:"U.S. Charges Alleged Chinese Government Spy With Stealing U.S. Trade Secrets" 1016: 966: 884: 732: 692: 645: 532: 515: 421:, on suspicion of helping dismantle the CIA's network of informants in China. 407: 347: 231: 194: 151: 3308:"Exclusive: How a suspected Chinese spy gained access to California politics" 3086:"Building China's Comac C919 airplane involved a lot of hacking, report says" 2039: 1681: 1218: 4191: 3345: 3241:
information and trade secrets from foreign aviation and aerospace companies.
2952:"Bloomberg stands by Chinese chip story as Apple, Amazon ratchet up denials" 2242:"Ex-C.I.A. Officer Suspected of Compromising Chinese Informants Is Arrested" 913: 809: 768: 597:
reported that Russia and China are routinely eavesdropping on calls from an
244: 124: 57: 840:, according to a former elected official and a U.S. intelligence official. 652:
by the People's Liberation Army in an operation to implant microchips with
562:
Chinese hackers have stolen information on the Patriot missile system, the
3122:"China-linked cyberspies Turbine PANDA targeted aerospace firms for years" 2787:"When Trump Phones Friends, the Chinese and the Russians Listen and Learn" 2754:"China hacked sensitive U.S. Navy undersea warfare plans: Washington Post" 1671:"Obama Administration Warns Beijing About Covert Agents Operating in U.S." 3423:
Island X: Taiwanese Student Migrants, Campus Spies, and Cold War Activism
3258: 2213: 1461: 991: 961: 822: 458: 551:
Since at least 2013, a Chinese espionage group called TEMP.Periscope by
394:
Between 2010 and 2012, intelligence breaches led to Chinese authorities
3499: 2932: 2758: 2704: 1932:"Google China cyberattack part of vast espionage campaign, experts say" 1830: 837: 752: 700: 552: 210: 69: 2928:"Exclusive: China hacked HPE, IBM and then attacked clients - sources" 2752:
Walsh, Eric (June 8, 2018). Berlowitz, Phil; Dalgleish, James (eds.).
4146: 2662:
Department of Justice, Office of Public Affairs (November 27, 2017).
2442:"U.S. and key allies accuse China of Microsoft Exchange cyberattacks" 1514:"For NY Times, no news is fit to print about Rep. Swalwell and a spy" 1263:
Second Edition, (New York, NY: Random House Reference, 2004), p. 125.
772: 756: 598: 507: 446: 430: 370: 366: 322: 1640:"Eric Swalwell and the spy: A lesson in how China is undermining us" 608:
According to the cybersecurity firm Area 1, hackers working for the
2174:"'Very discreet': arrested CIA spy kept a low profile in Hong Kong" 883:
alleged that Chen had read communist literature including works by
3090: 2127:"Killing C.I.A. Informants, China Crippled U.S. Spying Operations" 1578:"Exclusive: Suspected Chinese spy targeted California politicians" 623:
As part of a campaign called Cloudhopper, hackers working for the
462: 449:
capable of carrying out unsophisticated yet potentially dangerous
331: 214: 179: 143: 111: 40: 26: 3776:
Office for Safeguarding National Security of the CPG in the HKSAR
3277:"US cancels 1,000 China student visas, claiming ties to military" 3048:
Office of Public Affairs, Department of Justice (July 21, 2020).
2535:"US blames China for hacks, opening new front in cyber offensive" 277:
nuclear material in a manner that is in clear breach of US law."
3050:"People around the globe are divided in their opinions of China" 1104:
US indicts five in China's secret 'Unit 61398' for cyber-spying.
469: 268:(CGN) with stealing nuclear secrets from the United States. The 146:
stole between $ 200 billion and $ 600 billion worth of American
3525: 2065:
TikTok ban: Judge rules app won't be blocked in the US, for now
1826:"U.S. tightens controls on China imports of nuclear components" 234:, warned that China has stolen classified information on every 3234: 3019:"Chinese hackers target North American and Asian universities" 2539: 2209:"Ex-CIA officer Jerry Chun Shing Lee held over secret records" 2079: 2075: 628: 445:"; computers infected in this manner can theoretically form a 162: 3341:"Democrat Eric Swalwell linked to spy suspect Christine Fang" 3306:
Allen-Ebrahimian, Bethany; Dorfman, Zach (December 8, 2020).
1576:
Allen-Ebrahimian, Bethany; Dorfman, Zach (December 8, 2020).
2473:"Microsoft Exchange hack caused by China, US and allies say" 679:. The attacks have been underway since at least April 2017. 2892:"Ghosts in the Clouds: Inside China's Major Corporate Hack" 1205:"FBI Sees Big Threat From Chinese Spies; Businesses Wonder" 739:
operations. According to a report from cybersecurity firm
473: 1930:
Cha, Ariana Eunjung; Nakashima, Ellen (January 14, 2010).
502:
In December 2009 and January 2010 a cyberattack, known as
358:
increasingly serious cyber threat to critical industries.
272:
reported: "According to the US Department of Justice, the
2785:
Rosenberg, Matthew; Haberman, Maggie (October 24, 2018).
2082:; published September 28, 2020; accessed February 7, 2021 1077:
U.S. accuses China of cyber spying on American companies.
855:
Republic of China (Taiwan) espionage in the United States
843:
In January 2020, the U.S. Department of Justice arrested
20:
List of Chinese spy cases in the United States of America
2853:
Sanger, David E.; Erlanger, Steven (December 18, 2018).
2502:
Kanno-Youngs, Zolan; Sanger, David E. (July 19, 2021).
1997:"Hackers in China Attacked The Times for Last 4 Months" 912:
The KMT ordered the 1984 assassination of U.S. citizen
812:. The U.S. began revoking these visas on June 1, 2020. 484:
of perpetrating several cyberattacks, most notably the
1303:
Markoff, John; Rosenberg, Matthew (February 3, 2017).
293:
Chinese information operations and information warfare
616:
in order to gain information on negotiations for the
435:
cyber-attacks on India, Germany and the United States
2334:"Researchers: Cyber spies break into govt computers" 1124:
Mattis, Peter; Brazil, Matthew (November 15, 2019).
4030: 3926: 3838: 3766: 3653: 3564: 2412:"Chinese embassy scoffs at reports of cyber spying" 2028:"Trump Executive Orders Target TikTok, WeChat Apps" 1966:"Cyberattack on Google Said to Hit Password System" 1127:
Chinese Communist Espionage: An Intelligence Primer
932:
Allegations of intellectual property theft by China
3254:"Chinese man charged with US aviation 'espionage'" 2504:"U.S. Formally Accuses China of Hacking Microsoft" 209:religious movement and, perhaps most visibly, the 4182:Residential Surveillance at a Designated Location 1753:Berg, Sebastian Rotella,Kirsten (July 22, 2021). 3572:Central Committee of the Chinese Communist Party 1274:"China Seen in Push to Gain Technology Insights" 892:United States Senate Foreign Relations Committee 735:aircraft, the Chinese engaged in both cyber and 610:People's Liberation Army Strategic Support Force 176:House Permanent Select Committee on Intelligence 300: 130:China also accesses foreign technology through 4017:Information operations and information warfare 3994:Strike Hard Campaign Against Violent Terrorism 2921: 2919: 2890:Barry, Rob; Volz, Dustin (December 30, 2019). 1669:Mazzetti, Mark; Levin, Dan (August 16, 2015). 1335:"The Unpleasant Truth About Chinese Espionage" 987:List of Chinese spy cases in the United States 3537: 3511:(Annapolis, MD: Naval Institute Press, 1994). 264:In 2016, the U.S. Justice Department charged 8: 2747: 2745: 2695: 2693: 2596:, McAfee Security Insights, January 13, 2010 1778:: CS1 maint: multiple names: authors list ( 808:and also accused some of them of conducting 800:In September 2020, it was reported that the 3934:Campaign to Suppress Counterrevolutionaries 3416: 3414: 3149: 3147: 3012: 3010: 3008: 2414:. Theaustralian.news.com.au. Archived from 2308:"China 'has .75M zombie computers' in U.S." 1305:"China's Intelligent Weaponry Gets Smarter" 1097: 1095: 1093: 972:Criticism of Confucius Institutes#Espionage 3544: 3530: 3522: 3412: 3410: 3408: 3406: 3404: 3402: 3400: 3398: 3396: 3394: 486:2021 Microsoft Exchange Server data breach 97:Office of Personnel Management data breach 4093:List of Hong Kong national security cases 3791:Independent Commission Against Corruption 3202: 3200: 2528: 2526: 2497: 2495: 2466: 2464: 2435: 2433: 1261:Spy Book: The Encyclopedia of Espionage, 1070: 1068: 957:Chinese Students and Scholars Association 898:implemented through front organizations. 390:2010–2012 killing of CIA sources in China 43:of attempting to unlawfully acquire U.S. 3633:National Defense Mobilization Commission 3120:Paganini, Pierluigi (October 18, 2019). 2120: 2118: 2116: 1858:"Spy warning on Chinese nuclear company" 1114:Christian Science Monitor, May 19, 2014 831:California's 15th congressional district 142:Director Michael Orlando estimated that 136:U.S. Immigration and Customs Enforcement 39:The United States has often accused the 3724:People's Procuratorates Judicial Police 3287:from the original on September 10, 2020 3172: 3170: 3168: 3079: 3077: 2273:O'Brien, Kellie R. (January 13, 2018). 1959: 1957: 1255: 1253: 1251: 1249: 1064: 1039: 4172:Picking quarrels and provoking trouble 3970:1983 "Strike Hard" Anti-crime Campaign 3678:provincial Public Security Departments 3464:Chinese espionage in the United States 3353:from the original on December 10, 2020 3320:from the original on December 10, 2020 3161:from the original on November 1, 2018. 3098:from the original on November 15, 2019 2904:from the original on December 31, 2019 2867:from the original on December 19, 2018 2674:from the original on December 19, 2017 2314:from the original on November 12, 2014 2306:Waterman, Shaun (September 17, 2007). 1925: 1923: 1921: 1919: 1917: 1915: 1913: 1802: 1800: 1798: 1771: 1650:from the original on December 18, 2020 1590:from the original on December 10, 2020 1557:from the original on February 24, 2021 1524:from the original on December 18, 2020 1396: 1394: 1392: 1225:from the original on February 11, 2021 1007:Russian espionage in the United States 429:In 2007 the computer security company 373:, a popular messaging platform run by 228:United States House of Representatives 3207:Nakashima, Ellen (October 10, 2018). 3132:from the original on January 12, 2020 3115: 3113: 2830:from the original on October 25, 2018 2799:from the original on October 25, 2018 2568:from the original on January 13, 2010 2287:from the original on October 11, 2019 2254:from the original on January 17, 2018 2221:from the original on January 17, 2018 2186:from the original on January 19, 2018 2007:from the original on February 2, 2013 1995:Perlroth, Nicole (January 30, 2013). 1419: 1417: 1415: 1046:Alternatively known as Zhen Cheng Li. 673:Massachusetts Institute of Technology 644:published a story which alleged that 419:John F. Kennedy International Airport 7: 2818:Campbell, Mikey (October 24, 2018). 2046:from the original on August 14, 2020 2026:Restuccia, Andrew (August 7, 2020). 1942:from the original on August 21, 2017 1543:Collman, Ashley (December 8, 2020). 1259:Polmar, Norman and Thomas B. Allen, 1087:Reuters, Mon 19 May 2014 6:04pm EDT. 1074:Finkle, J. Menn, J., Viswanatha, J. 952:Chinese intelligence activity abroad 677:Woods Hole Oceanographic Institution 585:submarine cryptographic systems and 468:In a July 2021 joint statement with 3683:city/county Public Security Bureaus 3339:Zeffman, Henry (December 9, 2020). 3062:from the original on August 2, 2020 3055:United States Department of Justice 2668:United States Department of Justice 2172:Haas, Benjamin (January 18, 2018). 1727:Macias, Amanda (October 28, 2020). 1445:(Washington, DC: July 2007), p. 29. 1144:from the original on March 27, 2021 909:was murdered while in KMT custody. 689:United States Department of Justice 663:. Some of the targets included the 384:2010–2012 compromise of CIA network 4127:Inciting subversion of state power 3940:Three-anti and Five-anti Campaigns 2993:from the original on June 18, 2019 2962:from the original on July 10, 2019 2766:from the original on June 12, 2018 2643:from the original on June 15, 2014 2240:Goldman, Adam (January 16, 2018). 1976:from the original on April 5, 2020 1620:from the original on March 2, 2021 1347:from the original on June 17, 2017 890:According to a 1979 report by the 361:On August 6, 2020, U.S. President 240:intercontinental ballistic missile 14: 4248:Cyberwarfare in the United States 3177:Vijayan, Jai (October 14, 2019). 3029:from the original on May 27, 2019 2587:"Google Attack Is Tip Of Iceberg" 2392:from the original on May 28, 2013 2092:Volz, Dustin (January 31, 2024). 1898:from the original on May 25, 2019 1868:from the original on May 25, 2019 1838:from the original on May 25, 2019 1494:from the original on July 8, 2020 1377:from the original on May 18, 2017 1315:from the original on May 28, 2017 1284:from the original on May 16, 2017 648:'s contractors in China had been 465:exiles); China denied the claim. 266:China General Nuclear Power Group 3228:Lucas, Ryan (October 10, 2018). 2707:. March 16, 2018. Archived from 2609:. China News.Net. Archived from 2564:. Google Inc. January 12, 2010. 1964:Markoff, John (April 19, 2010). 1455:Morell, Michael (May 12, 2021). 1203:Solomon, Jay (August 10, 2005). 942:Beijing–Washington cyber hotline 612:compromised the networks of the 4202:Persecution of Uyghurs in China 4088:Hong Kong national security law 3719:People's Courts Judicial Police 3501:Chinese Intelligence Operations 2533:Liptak, Kevin (July 19, 2021). 1707:Federal Bureau of Investigation 862:Federal Bureau of Investigation 4238:Espionage in the United States 4063:Central Case Examination Group 3796:Hong Kong Disciplined Services 3488:deGraffenreid, Kenneth (ed.), 3427:University of Washington Press 3017:Sekine, Sara (March 6, 2019). 2471:Tucker, Eric (July 19, 2021). 2362:. Watch.ctv.ca. Archived from 1: 4253:China–United States relations 3853:Commission Against Corruption 947:China–United States trade war 927:2023 Chinese balloon incident 579:Naval Undersea Warfare Center 506:, was launched from China on 4083:Grid-style social management 4073:Death sentence with reprieve 4068:Civil Servant-Family Pair Up 3904:Correctional Services Bureau 3806:National Security Department 3638:Ministry of National Defense 3611:United Front Work Department 3577:National Security Commission 3478:Resources in other libraries 2440:Fried, Ina (July 19, 2021). 2310:United Press International. 1441:U.S. Department of Defense, 1022:United Front Work Department 627:compromised the networks of 514:In May 2014, a U.S. federal 156:Sandia National Laboratories 3628:Ministry of Public Security 3582:Central Military Commission 574:due to the cyber invasion. 4284: 4268:2010s in the United States 4263:2000s in the United States 4258:1990s in the United States 4177:Re-education through labor 3714:Judicial Administrative PP 3623:Ministry of State Security 749:Ministry of State Security 633:Hewlett Packard Enterprise 625:Ministry of State Security 498:Advanced persistent threat 495: 482:Ministry of State Security 387: 290: 284: 184:Ministry of State Security 78:Ministry of State Security 41:People's Republic of China 17: 4212:Holistic security concept 4207:Xinjiang internment camps 3976:Persecution of Falun Gong 3473:Resources in your library 2562:"A new approach to China" 1130:. Naval Institute Press. 719:and conspiracy to commit 691:announced that a federal 618:Trans-Pacific Partnership 564:F-35 Joint Strike Fighter 451:denial-of-service attacks 3988:Anti-corruption campaign 3748:State Secrets Protection 3587:People's Liberation Army 2275:"Case 1:18-mj-00018-JFA" 1083:October 6, 2014, at the 849:Thousand Talents Program 806:People's Liberation Army 697:People's Liberation Army 669:University of Washington 3663:Supervisory Commissions 3507:April 11, 2020, at the 2897:The Wall Street Journal 2099:The Wall Street Journal 2032:The Wall Street Journal 1210:The Wall Street Journal 937:CIA activities in China 881:Taiwan Garrison Command 775:, and others and stole 4137:Judiciary of Hong Kong 3952:Anti-Rightist Campaign 3875:Public Security Police 3863:Unitary Police Service 3786:PLA Hong Kong Garrison 3283:. September 10, 2020. 2592:July 14, 2011, at the 2360:"CTV News: Video clip" 2070:2 October 2020 at the 1815:deGraffenreid, p. 100. 641:Bloomberg Businessweek 527:In November 2017, the 319: 49:classified information 36: 4243:Cyberwarfare by China 3909:Macau Customs Service 3731:People's Armed Police 3643:Taiwan Affairs Office 3421:Cheng, Wendy (2023). 2940:on December 21, 2018. 1806:deGraffenreid, p. 98. 1792:deGraffenreid, p. 99. 1646:. December 14, 2020. 1616:. December 15, 2020. 1520:. December 17, 2020. 1340:The New York Observer 1162:deGraffenreid, p. 30. 1110:May 20, 2014, at the 977:Cyberwarfare by China 802:U.S. State Department 777:intellectual property 745:US Justice Department 687:On May 19, 2014, the 529:Department of Justice 496:Further information: 480:, the US accused the 287:Cyberwarfare by China 236:thermonuclear warhead 148:intellectual property 30: 3899:Fire Services Bureau 3858:Macau Security Force 3496:Eftimiades, Nicholas 3262:. October 11, 2018. 3157:. October 25, 2018. 3128:. Security Affairs. 2633:"The Cyber Cold War" 2217:. January 16, 2018. 1864:. October 25, 2018. 1834:. October 11, 2018. 1027:Unrestricted Warfare 982:Industrial espionage 896:propaganda campaigns 703:on their computers. 665:University of Hawaii 439:information security 375:Tencent Holdings Ltd 174:, who serves on the 132:industrial espionage 82:United States Bureau 4122:Internet censorship 3214:The Washington Post 3023:Nikkei Asian Review 2637:The Huffington Post 1936:The Washington Post 1894:. August 11, 2016. 1193:, January 13, 2010. 827:U.S. representative 786:composite materials 400:counterintelligence 308:Director of the FBI 205:, followers of the 167:Christopher A. Wray 121:front organizations 45:military technology 4233:Espionage in China 4167:Political offences 4142:Judiciary of Macau 4053:Capital punishment 4000:Operation Fox Hunt 3848:PLA Macau Garrison 3673:Public Security PP 3379:. January 28, 2020 3126:securityaffairs.co 3084:Cimpanu, Catalin. 2981:Osborne, Charlie. 2860:The New York Times 2792:The New York Times 2711:on March 16, 2018. 2509:The New York Times 2247:The New York Times 2161:. August 28, 2018. 2132:The New York Times 2001:The New York Times 1970:The New York Times 1674:The New York Times 1400:Eftimiades, p. 28. 1343:. April 22, 2016. 1309:The New York Times 1278:The New York Times 1191:The New York Times 815:In December 2020, 721:economic espionage 695:had indicted five 661:United States Navy 654:hardware backdoors 601:used by President 594:The New York Times 587:electronic warfare 583:United States Navy 398:. A joint CIA/FBI 340:The New York Times 254:Lawrence Livermore 191:Operation Fox Hunt 37: 4220: 4219: 4152:Life imprisonment 3879:Migration Service 3709:State Security PP 3553:National security 3515:Wortzel, Larry M. 3459:Library resources 2366:on March 30, 2009 1137:978-1-68247-304-7 638:In October 2018, 537:Moody's Analytics 457:network known as 337:In January 2013, 321:In January 2010, 238:in the country's 222:Nuclear espionage 72:, Peter Lee, and 62:Larry Wu-tai Chin 4275: 4197:Two-faced person 3964:Shadian incident 3917: 3893: 3871: 3753:Cyberspace Admin 3597:Maritime Militia 3546: 3539: 3532: 3523: 3441: 3440: 3418: 3389: 3388: 3386: 3384: 3369: 3363: 3362: 3360: 3358: 3336: 3330: 3329: 3327: 3325: 3303: 3297: 3296: 3294: 3292: 3273: 3267: 3266: 3250: 3244: 3243: 3225: 3219: 3218: 3204: 3195: 3194: 3174: 3163: 3162: 3151: 3142: 3141: 3139: 3137: 3117: 3108: 3107: 3105: 3103: 3081: 3072: 3071: 3069: 3067: 3045: 3039: 3038: 3036: 3034: 3014: 3003: 3002: 3000: 2998: 2978: 2972: 2971: 2969: 2967: 2948: 2942: 2941: 2936:. Archived from 2923: 2914: 2913: 2911: 2909: 2887: 2881: 2880: 2874: 2872: 2850: 2844: 2843: 2837: 2835: 2815: 2809: 2808: 2806: 2804: 2782: 2776: 2775: 2773: 2771: 2749: 2740: 2737: 2731: 2728: 2722: 2719: 2713: 2712: 2697: 2688: 2687: 2681: 2679: 2659: 2653: 2652: 2650: 2648: 2629: 2623: 2622: 2620: 2618: 2603: 2597: 2584: 2578: 2577: 2575: 2573: 2558: 2552: 2551: 2549: 2547: 2530: 2521: 2520: 2518: 2516: 2499: 2490: 2489: 2487: 2485: 2478:Associated Press 2468: 2459: 2458: 2456: 2454: 2437: 2428: 2427: 2425: 2423: 2418:on April 8, 2009 2408: 2402: 2401: 2399: 2397: 2388:. Fmprc.gov.cn. 2382: 2376: 2375: 2373: 2371: 2356: 2350: 2349: 2347: 2345: 2340:on April 3, 2009 2336:. Archived from 2330: 2324: 2323: 2321: 2319: 2303: 2297: 2296: 2294: 2292: 2286: 2279: 2270: 2264: 2263: 2261: 2259: 2237: 2231: 2230: 2228: 2226: 2205: 2199: 2198: 2193: 2191: 2169: 2163: 2162: 2155: 2149: 2148: 2146: 2144: 2135:. Archived from 2122: 2111: 2110: 2108: 2106: 2089: 2083: 2062: 2056: 2055: 2053: 2051: 2023: 2017: 2016: 2014: 2012: 1992: 1986: 1985: 1983: 1981: 1961: 1952: 1951: 1949: 1947: 1927: 1908: 1907: 1905: 1903: 1884: 1878: 1877: 1875: 1873: 1854: 1848: 1847: 1845: 1843: 1822: 1816: 1813: 1807: 1804: 1793: 1790: 1784: 1783: 1777: 1769: 1767: 1765: 1750: 1744: 1743: 1741: 1739: 1724: 1718: 1717: 1715: 1713: 1699: 1693: 1692: 1690: 1688: 1666: 1660: 1659: 1657: 1655: 1636: 1630: 1629: 1627: 1625: 1606: 1600: 1599: 1597: 1595: 1573: 1567: 1566: 1564: 1562: 1550:Business Insider 1540: 1534: 1533: 1531: 1529: 1510: 1504: 1503: 1501: 1499: 1490:. July 7, 2020. 1480: 1474: 1473: 1471: 1469: 1452: 1446: 1439: 1433: 1430: 1424: 1421: 1410: 1407: 1401: 1398: 1387: 1386: 1384: 1382: 1363: 1357: 1356: 1354: 1352: 1331: 1325: 1324: 1322: 1320: 1300: 1294: 1293: 1291: 1289: 1280:. June 6, 2013. 1270: 1264: 1257: 1244: 1241: 1235: 1234: 1232: 1230: 1200: 1194: 1187: 1181: 1178: 1172: 1169: 1163: 1160: 1154: 1153: 1151: 1149: 1121: 1115: 1099: 1088: 1072: 1047: 1044: 1002:Operation Aurora 877:East-West Center 875:In 1968, recent 796:Higher education 761:Capstone Turbine 504:Operation Aurora 317: 311:Christopher Wray 93:Operation Aurora 4283: 4282: 4278: 4277: 4276: 4274: 4273: 4272: 4223: 4222: 4221: 4216: 4132:Judicial system 4026: 3922: 3911: 3887: 3885:Judicial Police 3865: 3834: 3762: 3690:Internet police 3668:People's Police 3649: 3560: 3557:law enforcement 3550: 3520: 3509:Wayback Machine 3484: 3483: 3482: 3467: 3466: 3462: 3450: 3445: 3444: 3437: 3425:. Seattle, WA: 3420: 3419: 3392: 3382: 3380: 3371: 3370: 3366: 3356: 3354: 3338: 3337: 3333: 3323: 3321: 3305: 3304: 3300: 3290: 3288: 3275: 3274: 3270: 3252: 3251: 3247: 3227: 3226: 3222: 3206: 3205: 3198: 3187:InformationWeek 3176: 3175: 3166: 3153: 3152: 3145: 3135: 3133: 3119: 3118: 3111: 3101: 3099: 3083: 3082: 3075: 3065: 3063: 3047: 3046: 3042: 3032: 3030: 3016: 3015: 3006: 2996: 2994: 2980: 2979: 2975: 2965: 2963: 2950: 2949: 2945: 2925: 2924: 2917: 2907: 2905: 2889: 2888: 2884: 2870: 2868: 2852: 2851: 2847: 2833: 2831: 2817: 2816: 2812: 2802: 2800: 2784: 2783: 2779: 2769: 2767: 2751: 2750: 2743: 2738: 2734: 2729: 2725: 2720: 2716: 2699: 2698: 2691: 2677: 2675: 2661: 2660: 2656: 2646: 2644: 2631: 2630: 2626: 2616: 2614: 2613:on May 21, 2014 2605: 2604: 2600: 2594:Wayback Machine 2585: 2581: 2571: 2569: 2560: 2559: 2555: 2545: 2543: 2532: 2531: 2524: 2514: 2512: 2501: 2500: 2493: 2483: 2481: 2470: 2469: 2462: 2452: 2450: 2439: 2438: 2431: 2421: 2419: 2410: 2409: 2405: 2395: 2393: 2384: 2383: 2379: 2369: 2367: 2358: 2357: 2353: 2343: 2341: 2332: 2331: 2327: 2317: 2315: 2305: 2304: 2300: 2290: 2288: 2284: 2277: 2272: 2271: 2267: 2257: 2255: 2239: 2238: 2234: 2224: 2222: 2207: 2206: 2202: 2189: 2187: 2171: 2170: 2166: 2157: 2156: 2152: 2142: 2140: 2139:on May 20, 2017 2124: 2123: 2114: 2104: 2102: 2091: 2090: 2086: 2072:Wayback Machine 2063: 2059: 2049: 2047: 2025: 2024: 2020: 2010: 2008: 1994: 1993: 1989: 1979: 1977: 1963: 1962: 1955: 1945: 1943: 1929: 1928: 1911: 1901: 1899: 1886: 1885: 1881: 1871: 1869: 1856: 1855: 1851: 1841: 1839: 1824: 1823: 1819: 1814: 1810: 1805: 1796: 1791: 1787: 1770: 1763: 1761: 1752: 1751: 1747: 1737: 1735: 1726: 1725: 1721: 1711: 1709: 1701: 1700: 1696: 1686: 1684: 1668: 1667: 1663: 1653: 1651: 1638: 1637: 1633: 1623: 1621: 1608: 1607: 1603: 1593: 1591: 1575: 1574: 1570: 1560: 1558: 1542: 1541: 1537: 1527: 1525: 1512: 1511: 1507: 1497: 1495: 1482: 1481: 1477: 1467: 1465: 1454: 1453: 1449: 1440: 1436: 1431: 1427: 1422: 1413: 1408: 1404: 1399: 1390: 1380: 1378: 1371:Washington Post 1365: 1364: 1360: 1350: 1348: 1333: 1332: 1328: 1318: 1316: 1302: 1301: 1297: 1287: 1285: 1272: 1271: 1267: 1258: 1247: 1242: 1238: 1228: 1226: 1202: 1201: 1197: 1188: 1184: 1179: 1175: 1170: 1166: 1161: 1157: 1147: 1145: 1138: 1123: 1122: 1118: 1112:Wayback Machine 1100: 1091: 1085:Wayback Machine 1073: 1066: 1061: 1056: 1051: 1050: 1045: 1041: 1036: 1031: 1012:Second Cold War 997:Gregg Bergersen 922: 916:in California. 903:Carnegie Mellon 857: 798: 729: 685: 549: 525: 500: 494: 478:Western nations 427: 392: 386: 318: 305: 304: 295: 289: 283: 224: 108: 68:, Gwo-Bao Min, 23: 12: 11: 5: 4281: 4279: 4271: 4270: 4265: 4260: 4255: 4250: 4245: 4240: 4235: 4225: 4224: 4218: 4217: 4215: 4214: 4209: 4204: 4199: 4194: 4189: 4187:Soft detention 4184: 4179: 4174: 4169: 4164: 4162:PLA Unit 61398 4159: 4154: 4149: 4144: 4139: 4134: 4129: 4124: 4119: 4118: 4117: 4112: 4107: 4097: 4096: 4095: 4085: 4080: 4075: 4070: 4065: 4060: 4055: 4050: 4045: 4040: 4038:2011 crackdown 4034: 4032: 4028: 4027: 4025: 4024: 4019: 4014: 4009: 4003: 3997: 3991: 3985: 3979: 3973: 3967: 3961: 3955: 3949: 3946:Sufan movement 3943: 3937: 3930: 3928: 3924: 3923: 3921: 3920: 3919: 3918: 3906: 3901: 3896: 3895: 3894: 3882: 3855: 3850: 3844: 3842: 3836: 3835: 3833: 3832: 3831: 3830: 3825: 3820: 3815: 3810: 3809: 3808: 3793: 3788: 3783: 3778: 3772: 3770: 3764: 3763: 3761: 3760: 3755: 3750: 3745: 3740: 3739: 3738: 3728: 3727: 3726: 3721: 3716: 3711: 3706: 3705: 3704: 3703: 3702: 3692: 3687: 3686: 3685: 3665: 3659: 3657: 3651: 3650: 3648: 3647: 3646: 3645: 3640: 3635: 3630: 3625: 3615: 3614: 3613: 3608: 3607: 3606: 3601: 3600: 3599: 3589: 3579: 3568: 3566: 3562: 3561: 3551: 3549: 3548: 3541: 3534: 3526: 3519: 3518: 3512: 3493: 3485: 3481: 3480: 3475: 3469: 3468: 3457: 3456: 3455: 3454: 3449: 3446: 3443: 3442: 3435: 3390: 3364: 3331: 3298: 3268: 3245: 3220: 3196: 3164: 3143: 3109: 3073: 3040: 3004: 2973: 2943: 2915: 2882: 2845: 2810: 2777: 2741: 2732: 2723: 2714: 2689: 2654: 2624: 2598: 2579: 2553: 2522: 2491: 2460: 2429: 2403: 2377: 2351: 2325: 2298: 2265: 2232: 2200: 2164: 2150: 2112: 2084: 2057: 2018: 1987: 1953: 1909: 1879: 1849: 1817: 1808: 1794: 1785: 1745: 1719: 1694: 1661: 1631: 1601: 1568: 1535: 1505: 1475: 1447: 1434: 1432:Wortzel, p. 3. 1425: 1423:Wortzel, p. 4. 1411: 1409:Wortzel, p. 5. 1402: 1388: 1358: 1326: 1295: 1265: 1245: 1243:Wortzel, p. 8. 1236: 1195: 1182: 1180:Wortzel, p. 9. 1173: 1171:Wortzel, p. 6. 1164: 1155: 1136: 1116: 1089: 1063: 1062: 1060: 1057: 1055: 1052: 1049: 1048: 1038: 1037: 1035: 1032: 1030: 1029: 1024: 1019: 1014: 1009: 1004: 999: 994: 989: 984: 979: 974: 969: 964: 959: 954: 949: 944: 939: 934: 929: 923: 921: 918: 856: 853: 845:Charles Lieber 797: 794: 790:turbine blades 788:in jet engine 728: 725: 717:computer fraud 684: 681: 548: 545: 524: 521: 493: 490: 426: 423: 388:Main article: 385: 382: 345:Prime Minister 301: 285:Main article: 282: 279: 223: 220: 161:In July 2020, 107: 104: 13: 10: 9: 6: 4: 3: 2: 4280: 4269: 4266: 4264: 4261: 4259: 4256: 4254: 4251: 4249: 4246: 4244: 4241: 4239: 4236: 4234: 4231: 4230: 4228: 4213: 4210: 4208: 4205: 4203: 4200: 4198: 4195: 4193: 4190: 4188: 4185: 4183: 4180: 4178: 4175: 4173: 4170: 4168: 4165: 4163: 4160: 4158: 4155: 4153: 4150: 4148: 4145: 4143: 4140: 4138: 4135: 4133: 4130: 4128: 4125: 4123: 4120: 4116: 4113: 4111: 4108: 4106: 4103: 4102: 4101: 4098: 4094: 4091: 4090: 4089: 4086: 4084: 4081: 4079: 4076: 4074: 4071: 4069: 4066: 4064: 4061: 4059: 4056: 4054: 4051: 4049: 4046: 4044: 4041: 4039: 4036: 4035: 4033: 4029: 4023: 4022:United States 4020: 4018: 4015: 4013: 4010: 4007: 4006:709 crackdown 4004: 4001: 3998: 3995: 3992: 3989: 3986: 3983: 3980: 3977: 3974: 3971: 3968: 3965: 3962: 3959: 3956: 3953: 3950: 3947: 3944: 3941: 3938: 3935: 3932: 3931: 3929: 3925: 3915: 3910: 3907: 3905: 3902: 3900: 3897: 3891: 3886: 3883: 3880: 3876: 3873: 3872: 3869: 3864: 3861: 3860: 3859: 3856: 3854: 3851: 3849: 3846: 3845: 3843: 3841: 3837: 3829: 3826: 3824: 3821: 3819: 3816: 3814: 3811: 3807: 3804: 3803: 3802: 3799: 3798: 3797: 3794: 3792: 3789: 3787: 3784: 3782: 3779: 3777: 3774: 3773: 3771: 3769: 3765: 3759: 3756: 3754: 3751: 3749: 3746: 3744: 3741: 3737: 3734: 3733: 3732: 3729: 3725: 3722: 3720: 3717: 3715: 3712: 3710: 3707: 3701: 3698: 3697: 3696: 3693: 3691: 3688: 3684: 3681: 3680: 3679: 3676: 3675: 3674: 3671: 3670: 3669: 3666: 3664: 3661: 3660: 3658: 3656: 3652: 3644: 3641: 3639: 3636: 3634: 3631: 3629: 3626: 3624: 3621: 3620: 3619: 3618:State Council 3616: 3612: 3609: 3605: 3602: 3598: 3595: 3594: 3593: 3590: 3588: 3585: 3584: 3583: 3580: 3578: 3575: 3574: 3573: 3570: 3569: 3567: 3563: 3558: 3554: 3547: 3542: 3540: 3535: 3533: 3528: 3527: 3524: 3516: 3513: 3510: 3506: 3503: 3502: 3497: 3494: 3491: 3487: 3486: 3479: 3476: 3474: 3471: 3470: 3465: 3460: 3452: 3451: 3447: 3438: 3436:9780295752051 3432: 3428: 3424: 3417: 3415: 3413: 3411: 3409: 3407: 3405: 3403: 3401: 3399: 3397: 3395: 3391: 3378: 3374: 3368: 3365: 3352: 3348: 3347: 3342: 3335: 3332: 3319: 3315: 3314: 3309: 3302: 3299: 3291:September 10, 3286: 3282: 3278: 3272: 3269: 3265: 3261: 3260: 3255: 3249: 3246: 3242: 3237: 3236: 3231: 3224: 3221: 3216: 3215: 3210: 3203: 3201: 3197: 3193: 3188: 3184: 3180: 3173: 3171: 3169: 3165: 3160: 3156: 3150: 3148: 3144: 3131: 3127: 3123: 3116: 3114: 3110: 3097: 3093: 3092: 3087: 3080: 3078: 3074: 3061: 3057: 3056: 3051: 3044: 3041: 3028: 3024: 3020: 3013: 3011: 3009: 3005: 2992: 2988: 2984: 2977: 2974: 2961: 2957: 2953: 2947: 2944: 2939: 2935: 2934: 2929: 2922: 2920: 2916: 2903: 2899: 2898: 2893: 2886: 2883: 2879: 2866: 2862: 2861: 2856: 2849: 2846: 2842: 2829: 2825: 2821: 2814: 2811: 2798: 2794: 2793: 2788: 2781: 2778: 2765: 2761: 2760: 2755: 2748: 2746: 2742: 2736: 2733: 2727: 2724: 2718: 2715: 2710: 2706: 2702: 2696: 2694: 2690: 2686: 2673: 2669: 2665: 2658: 2655: 2642: 2638: 2634: 2628: 2625: 2612: 2608: 2602: 2599: 2595: 2591: 2588: 2583: 2580: 2567: 2563: 2557: 2554: 2542: 2541: 2536: 2529: 2527: 2523: 2511: 2510: 2505: 2498: 2496: 2492: 2480: 2479: 2474: 2467: 2465: 2461: 2449: 2448: 2443: 2436: 2434: 2430: 2417: 2413: 2407: 2404: 2391: 2387: 2381: 2378: 2365: 2361: 2355: 2352: 2339: 2335: 2329: 2326: 2313: 2309: 2302: 2299: 2283: 2276: 2269: 2266: 2253: 2249: 2248: 2243: 2236: 2233: 2220: 2216: 2215: 2210: 2204: 2201: 2197: 2185: 2181: 2180: 2175: 2168: 2165: 2160: 2154: 2151: 2138: 2134: 2133: 2128: 2121: 2119: 2117: 2113: 2101: 2100: 2095: 2088: 2085: 2081: 2077: 2073: 2069: 2066: 2061: 2058: 2045: 2041: 2037: 2033: 2029: 2022: 2019: 2006: 2002: 1998: 1991: 1988: 1975: 1971: 1967: 1960: 1958: 1954: 1941: 1937: 1933: 1926: 1924: 1922: 1920: 1918: 1916: 1914: 1910: 1897: 1893: 1889: 1883: 1880: 1867: 1863: 1859: 1853: 1850: 1837: 1833: 1832: 1827: 1821: 1818: 1812: 1809: 1803: 1801: 1799: 1795: 1789: 1786: 1781: 1775: 1760: 1756: 1749: 1746: 1734: 1730: 1723: 1720: 1708: 1704: 1698: 1695: 1683: 1679: 1675: 1672: 1665: 1662: 1649: 1645: 1641: 1635: 1632: 1619: 1615: 1611: 1605: 1602: 1589: 1585: 1584: 1579: 1572: 1569: 1556: 1552: 1551: 1546: 1539: 1536: 1523: 1519: 1515: 1509: 1506: 1493: 1489: 1485: 1479: 1476: 1464: 1463: 1458: 1451: 1448: 1444: 1438: 1435: 1429: 1426: 1420: 1418: 1416: 1412: 1406: 1403: 1397: 1395: 1393: 1389: 1376: 1372: 1368: 1362: 1359: 1346: 1342: 1341: 1336: 1330: 1327: 1314: 1310: 1306: 1299: 1296: 1283: 1279: 1275: 1269: 1266: 1262: 1256: 1254: 1252: 1250: 1246: 1240: 1237: 1224: 1220: 1216: 1212: 1211: 1206: 1199: 1196: 1192: 1186: 1183: 1177: 1174: 1168: 1165: 1159: 1156: 1143: 1139: 1133: 1129: 1128: 1120: 1117: 1113: 1109: 1106: 1105: 1098: 1096: 1094: 1090: 1086: 1082: 1079: 1078: 1071: 1069: 1065: 1058: 1053: 1043: 1040: 1033: 1028: 1025: 1023: 1020: 1018: 1015: 1013: 1010: 1008: 1005: 1003: 1000: 998: 995: 993: 990: 988: 985: 983: 980: 978: 975: 973: 970: 968: 965: 963: 960: 958: 955: 953: 950: 948: 945: 943: 940: 938: 935: 933: 930: 928: 925: 924: 919: 917: 915: 910: 908: 907:Chen Wen-chen 904: 899: 897: 893: 888: 886: 882: 878: 873: 871: 865: 863: 854: 852: 850: 846: 841: 839: 835: 834:Eric Swalwell 832: 828: 824: 820: 819: 813: 811: 807: 803: 795: 793: 791: 787: 781: 778: 774: 770: 766: 762: 758: 754: 750: 746: 742: 738: 734: 726: 724: 722: 718: 714: 708: 704: 702: 698: 694: 690: 682: 680: 678: 674: 670: 666: 662: 657: 655: 651: 647: 643: 642: 636: 634: 630: 626: 621: 619: 615: 611: 606: 604: 600: 596: 595: 590: 588: 584: 580: 575: 571: 569: 565: 560: 556: 554: 546: 544: 542: 538: 534: 530: 522: 520: 517: 512: 509: 505: 499: 491: 489: 487: 483: 479: 475: 471: 466: 464: 460: 456: 452: 448: 444: 440: 436: 432: 424: 422: 420: 415: 413: 409: 405: 401: 397: 391: 383: 381: 378: 376: 372: 368: 364: 359: 356: 355:cyber-attacks 351: 349: 346: 342: 341: 335: 333: 330:targeted the 329: 324: 316: 312: 309: 299: 294: 288: 280: 278: 275: 271: 267: 262: 259: 256:, Sandia and 255: 251: 246: 241: 237: 233: 229: 221: 219: 216: 212: 208: 204: 200: 196: 192: 187: 185: 181: 177: 173: 172:Eric Swalwell 168: 164: 159: 157: 153: 149: 145: 141: 137: 133: 128: 126: 122: 116: 113: 105: 103: 100: 98: 95:and the 2015 94: 90: 85: 83: 79: 75: 71: 67: 66:Katrina Leung 63: 59: 54: 53:trade secrets 50: 46: 42: 35: 29: 25: 21: 16: 4157:Penal system 4100:Human rights 4078:Great Cannon 4031:Other topics 4021: 3982:6521 Project 3878: 3500: 3489: 3463: 3422: 3381:. Retrieved 3376: 3367: 3355:. Retrieved 3344: 3334: 3322:. Retrieved 3311: 3301: 3289:. Retrieved 3281:The Guardian 3280: 3271: 3263: 3257: 3248: 3239: 3233: 3223: 3212: 3190: 3182: 3155:"Indictment" 3134:. Retrieved 3125: 3100:. Retrieved 3089: 3064:. Retrieved 3053: 3043: 3031:. Retrieved 2995:. Retrieved 2986: 2976: 2964:. Retrieved 2956:Ars Technica 2955: 2946: 2938:the original 2931: 2906:. Retrieved 2895: 2885: 2876: 2871:December 19, 2869:. Retrieved 2858: 2848: 2839: 2832:. Retrieved 2824:AppleInsider 2813: 2801:. Retrieved 2790: 2780: 2768:. Retrieved 2757: 2735: 2726: 2717: 2709:the original 2683: 2678:December 20, 2676:. Retrieved 2657: 2645:. Retrieved 2636: 2627: 2615:. Retrieved 2611:the original 2601: 2582: 2570:. Retrieved 2556: 2544:. Retrieved 2538: 2513:. Retrieved 2507: 2482:. Retrieved 2476: 2451:. Retrieved 2445: 2420:. Retrieved 2416:the original 2406: 2394:. Retrieved 2380: 2368:. Retrieved 2364:the original 2354: 2342:. Retrieved 2338:the original 2328: 2318:November 30, 2316:. Retrieved 2301: 2289:. Retrieved 2268: 2256:. Retrieved 2245: 2235: 2223:. Retrieved 2212: 2203: 2195: 2188:. Retrieved 2179:The Guardian 2177: 2167: 2153: 2141:. Retrieved 2137:the original 2130: 2103:. Retrieved 2097: 2087: 2060: 2048:. Retrieved 2031: 2021: 2009:. Retrieved 2000: 1990: 1978:. Retrieved 1969: 1944:. Retrieved 1935: 1900:. Retrieved 1892:The Guardian 1891: 1882: 1870:. Retrieved 1861: 1852: 1840:. Retrieved 1829: 1820: 1811: 1788: 1762:. Retrieved 1758: 1748: 1736:. Retrieved 1732: 1722: 1710:. Retrieved 1706: 1697: 1685:. Retrieved 1673: 1664: 1654:December 18, 1652:. Retrieved 1643: 1634: 1624:December 18, 1622:. Retrieved 1613: 1604: 1594:December 18, 1592:. Retrieved 1581: 1571: 1561:December 18, 1559:. Retrieved 1548: 1538: 1528:December 18, 1526:. Retrieved 1517: 1508: 1496:. Retrieved 1487: 1478: 1466:. Retrieved 1460: 1450: 1442: 1437: 1428: 1405: 1379:. Retrieved 1370: 1361: 1349:. Retrieved 1338: 1329: 1317:. Retrieved 1308: 1298: 1286:. Retrieved 1277: 1268: 1260: 1239: 1227:. Retrieved 1208: 1198: 1190: 1185: 1176: 1167: 1158: 1146:. Retrieved 1126: 1119: 1103: 1101:Clayton, M. 1076: 1042: 911: 900: 889: 874: 869: 866: 858: 842: 816: 814: 799: 782: 730: 709: 705: 686: 658: 639: 637: 622: 607: 603:Donald Trump 592: 591: 576: 572: 561: 557: 550: 526: 513: 501: 476:, and other 467: 455:cyber spying 428: 416: 393: 379: 363:Donald Trump 360: 352: 338: 336: 328:cyber-attack 320: 314: 296: 281:Cyberwarfare 269: 263: 225: 203:Hong Kongers 188: 160: 129: 117: 112:open sources 109: 101: 89:cyber spying 86: 38: 34:Wanzhou Meng 24: 15: 4048:Black jails 3912: [ 3888: [ 3877:(including 3866: [ 3828:Immigration 3758:Urban Admin 3736:Coast Guard 3695:Immigration 3453:Works cited 3383:October 11, 3377:justice.gov 3357:January 26, 3324:January 26, 3183:DarkReading 3136:January 12, 3102:January 12, 2908:January 24, 2834:October 25, 2803:October 25, 2572:January 17, 2291:January 17, 2258:January 16, 2225:January 16, 2190:January 19, 2105:February 6, 2011:January 31, 1148:December 2, 780:operation. 765:GE Aviation 741:Crowdstrike 683:Indictments 650:compromised 568:U.S. Navy's 541:Trimble Inc 425:Cyber cases 412:Mark Kelton 74:Shujun Wang 51:as well as 4227:Categories 4058:Censorship 4043:610 Office 3958:Red August 3927:Operations 3818:Correction 3700:Inspection 2997:October 9, 2966:October 7, 2396:August 25, 2370:August 25, 2078:by way of 2050:August 13, 1946:August 25, 1764:August 17, 1759:ProPublica 1738:August 17, 1712:August 17, 1687:August 17, 1229:October 4, 1054:References 1017:Titan Rain 967:Cox Report 905:professor 885:Mao Zedong 733:Comac C919 715:to commit 713:conspiracy 707:Security. 693:grand jury 646:Supermicro 566:, and the 533:Siemens AG 516:grand jury 408:tradecraft 348:Wen Jiabao 291:See also: 250:Los Alamos 232:Cox Report 207:Falun Gong 195:ProPublica 152:California 4192:Shuanggui 4115:Hong Kong 3972:(1983–87) 3954:(1957–59) 3948:(1955–57) 3942:(1951–52) 3936:(1950–53) 3768:Hong Kong 3346:The Times 3066:August 6, 2040:0099-9660 1682:0362-4331 1219:0099-9660 1059:Citations 914:Henry Liu 901:In 1981, 810:espionage 769:Honeywell 727:Aerospace 258:Oak Ridge 170:example, 165:Director 125:Hong Kong 58:espionage 3655:Mainland 3565:National 3559:in China 3505:Archived 3351:Archived 3318:Archived 3285:Archived 3259:BBC News 3159:Archived 3130:Archived 3096:Archived 3060:Archived 3033:March 6, 3027:Archived 2991:Archived 2960:Archived 2902:Archived 2878:Beijing. 2865:Archived 2828:Archived 2797:Archived 2764:Archived 2672:Archived 2641:Archived 2590:Archived 2566:Archived 2546:July 19, 2515:July 19, 2484:July 19, 2453:July 19, 2422:July 29, 2390:Archived 2344:July 29, 2312:Archived 2282:Archived 2252:Archived 2219:Archived 2214:BBC News 2184:Archived 2068:Archived 2044:Archived 2005:Archived 1980:April 6, 1974:Archived 1940:Archived 1896:Archived 1866:Archived 1862:The Week 1836:Archived 1774:cite web 1648:Archived 1644:The Hill 1618:Archived 1614:The Hill 1588:Archived 1555:Archived 1522:Archived 1518:The Hill 1498:July 13, 1492:Archived 1488:The Hill 1462:CBS News 1381:June 18, 1375:Archived 1351:June 18, 1345:Archived 1319:June 18, 1313:Archived 1288:June 18, 1282:Archived 1223:Archived 1142:Archived 1108:Archived 1081:Archived 992:GhostNet 962:Cold War 920:See also 823:Bay Area 459:GhostNet 353:Chinese 306:—  270:Guardian 245:collated 199:Tibetans 4002:(2014–) 3996:(2014–) 3990:(2012–) 3823:Customs 3743:Customs 3592:Militia 3448:Sources 2933:Reuters 2841:report. 2770:June 9, 2759:Reuters 2705:FireEye 2647:June 5, 2617:May 20, 2143:May 20, 1902:May 25, 1872:May 25, 1842:May 25, 1831:Reuters 1468:May 23, 870:caihong 838:Midwest 753:Jiangsu 701:malware 614:AFL–CIO 553:FireEye 463:Tibetan 443:zombies 226:A 1999 211:Uyghurs 134:, with 106:Methods 70:Chi Mak 4147:Laogai 4012:Abroad 4008:(2015) 3984:(2009) 3978:(1999) 3966:(1975) 3960:(1966) 3801:Police 3461:about 3433:  2038:  1680:  1217:  1134:  773:Safran 757:Ametek 743:and a 737:HUMINT 675:, and 671:, the 667:, the 599:iPhone 547:APT 10 539:, and 508:Google 472:, the 447:botnet 431:McAfee 371:WeChat 367:TikTok 323:Google 313:, 76:. The 4110:Macao 4105:Tibet 3916:] 3892:] 3870:] 3840:Macau 3313:Axios 3091:ZDNet 2987:ZDNet 2447:Axios 2285:(PDF) 2278:(PDF) 1583:Axios 1034:Notes 818:Axios 523:APT 3 492:APT 1 332:Gmail 215:Wuhan 180:China 144:China 3813:Fire 3604:NDMC 3555:and 3431:ISBN 3385:2021 3359:2021 3326:2021 3293:2020 3138:2020 3104:2020 3068:2020 3035:2019 2999:2018 2968:2018 2910:2020 2873:2018 2836:2018 2805:2018 2772:2018 2680:2017 2649:2014 2619:2014 2574:2010 2548:2021 2517:2021 2486:2021 2455:2021 2424:2011 2398:2014 2372:2014 2346:2011 2320:2007 2293:2018 2260:2018 2227:2018 2192:2018 2145:2017 2107:2024 2052:2020 2036:ISSN 2013:2013 1982:2020 1948:2017 1904:2019 1874:2019 1844:2019 1780:link 1766:2022 1740:2022 1733:CNBC 1714:2022 1689:2022 1678:ISSN 1656:2020 1626:2020 1596:2020 1563:2020 1530:2020 1500:2020 1470:2021 1383:2017 1353:2017 1321:2017 1290:2017 1231:2020 1215:ISSN 1150:2019 1132:ISBN 829:for 631:and 470:NATO 453:. A 404:mole 369:and 140:NCSC 47:and 3235:NPR 2540:CNN 2080:MSN 2076:CNN 751:’s 629:IBM 274:FBI 182:'s 163:FBI 123:in 4229:: 3914:zh 3890:zh 3868:zh 3498:, 3429:. 3393:^ 3375:. 3349:. 3343:. 3316:. 3310:. 3279:. 3256:. 3238:. 3232:. 3211:. 3199:^ 3189:. 3185:. 3181:. 3167:^ 3146:^ 3124:. 3112:^ 3094:. 3088:. 3076:^ 3058:. 3052:. 3025:. 3021:. 3007:^ 2989:. 2985:. 2958:. 2954:. 2930:. 2918:^ 2900:. 2894:. 2875:. 2863:. 2857:. 2838:. 2826:. 2822:. 2795:. 2789:. 2762:. 2756:. 2744:^ 2703:. 2692:^ 2682:. 2670:. 2666:. 2639:. 2635:. 2537:. 2525:^ 2506:. 2494:^ 2475:. 2463:^ 2444:. 2432:^ 2280:. 2250:. 2244:. 2211:. 2194:. 2182:. 2176:. 2129:. 2115:^ 2096:. 2074:; 2042:. 2034:. 2030:. 2003:. 1999:. 1972:. 1968:. 1956:^ 1938:. 1934:. 1912:^ 1890:. 1860:. 1828:. 1797:^ 1776:}} 1772:{{ 1757:. 1731:. 1705:. 1676:. 1642:. 1612:. 1586:. 1580:. 1553:. 1547:. 1516:. 1486:. 1459:. 1414:^ 1391:^ 1373:. 1369:. 1337:. 1311:. 1307:. 1276:. 1248:^ 1221:. 1213:. 1207:. 1140:. 1092:^ 1067:^ 792:. 771:, 767:, 763:, 759:, 723:. 620:. 589:. 543:. 535:, 488:. 474:EU 410:. 252:, 201:, 158:. 84:. 64:, 3881:) 3545:e 3538:t 3531:v 3439:. 3387:. 3361:. 3328:. 3295:. 3217:. 3140:. 3106:. 3070:. 3037:. 3001:. 2970:. 2912:. 2807:. 2774:. 2651:. 2621:. 2576:. 2550:. 2519:. 2488:. 2457:. 2426:. 2400:. 2374:. 2348:. 2322:. 2295:. 2262:. 2229:. 2147:. 2109:. 2054:. 2015:. 1984:. 1950:. 1906:. 1876:. 1846:. 1782:) 1768:. 1742:. 1716:. 1691:. 1658:. 1628:. 1598:. 1565:. 1532:. 1502:. 1472:. 1385:. 1355:. 1323:. 1292:. 1233:. 1152:. 22:.

Index

List of Chinese spy cases in the United States of America

Wanzhou Meng
People's Republic of China
military technology
classified information
trade secrets
espionage
Larry Wu-tai Chin
Katrina Leung
Chi Mak
Shujun Wang
Ministry of State Security
United States Bureau
cyber spying
Operation Aurora
Office of Personnel Management data breach
open sources
front organizations
Hong Kong
industrial espionage
U.S. Immigration and Customs Enforcement
NCSC
China
intellectual property
California
Sandia National Laboratories
FBI
Christopher A. Wray
Eric Swalwell

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑