28:
193:, were tracking down Chinese dissidents in the United States to pressure them to return to China for prosecution. In October 2020 FBI Director Christopher Wray said that "when it couldn’t locate a Fox Hunt target, the Chinese government sent an emissary to visit the victim’s family here in the United States. And the message they said to pass on? The target had two options: Return to China promptly or commit suicide. And what happens when Fox Hunt targets do refuse to return to China? Their family members, both here in the United States and in China, have been threatened and coerced; and those back in China have even been arrested for leverage." In July 2021,
847:, Chair of the Department of Chemistry and Chemical Biology at Harvard University. Dr. Lieber was also the Principal Investigator of the Lieber Research Group at Harvard University, giving him direct access to information on nanoscience. The grants he received to oversee this work required him to disclose any foreign financial transactions. In 2011, Dr. Lieber was granted the title of "Strategic Scientist" at the Wuhan University of Technology. He received this role under China's
851:, which seeks to bring the expertise of prominent scientists to China and has been accused of stealing foreign information. He was required to work for the Wuhan lab for at least 9 months out of the year, and he got paid $ 50,000 per month. Dr. Lieber failed to inform the relevant institutions of his role, and he outright lied about his involvement in the program in 2018 and 2019.
27:
298:
recipient opens an email attachment, apparently from a familiar source, containing a program which embeds in the recipient's computer. The remotely controlled program allows an attacker to access the recipient's email, send sensitive documents to specific addresses and turns on such instruments as web cameras or microphones.
783:
As of 2019, four people have been arrested in the US as a result of investigations into this economic espionage and theft of trade secrets. Yanjun Xu, a senior intelligence officer of the MSS, was arrested in
Belgium and extradited to the US and is alleged to have been involved in recruiting company
518:
indicted five
Chinese military officers for cyber espionage and stealing trade secrets. It was alleged that the officers hacked into the computers of six U.S. companies to steal information that would provide an economic advantage to Chinese competitors, including Chinese state-owned enterprises. The
510:
and over 20 other companies. Google said that the attacks originated from China, and it would "review the feasibility" of its business operations in China as a result of the incident. According to Google, at least 20 other companies in a variety of sectors were also targeted by the attacks. According
302:
Just using cyber means, Chinese government hackers have stolen more of our personal and corporate data than every other nation combined. The harm from the
Chinese government’s economic espionage isn’t just that its companies pull ahead based on illegally gotten technology. While they pull ahead, they
276:
has discovered evidence that China
General Nuclear Power (CGN) has been engaged in a conspiracy to steal US nuclear secrets stretching back almost two decades. Both CGN and one of the corporation’s senior advisers, Szuhsiung Ho, have been charged with conspiring to help the Chinese government develop
260:
National
Laboratories. China is known to have stolen classified information on the W-56 Minuteman II ICBM, the W-62 Minuteman III ICBM, the W-70 Lance short-range ballistic missile (SRBM), the W-76 Trident C-4 submarine-launched ballistic missile (SLBM), the W-78 Minuteman III Mark 12A ICBM, the W-87
3240:
Xu made his initial appearance in federal court in
Cincinnati, Ohio, on Wednesday. According to court papers, he is a deputy division director for the Ministry of State Security, which is China's intelligence and security agency, in Jiangsu Province. His job, prosecutors say, was to obtain technical
573:
The protection of the South China Sea is highly important to the U.S. because a
Chinese Cyber Unit has already succeeded in an intrusion into the Philippine's government and military networks. Military documents, internal communications, and other sensitive materials related to the dispute were lost
118:
Much technology acquisition occurs through commerce and commercial regulations. The regulatory and commercial environment in China pressures
American and other foreign companies to transfer technology, capital and manufacturing expertise, especially in defense-related or dual-use industries such as
114:
such as libraries, research institutions and unclassified databases. Chinese travelers are recruited to carry out specific intelligence activities, and China debriefs returnees from exchange programs, trade missions and scientific-cooperation programs. Chinese citizens may be coerced to cooperate.
706:
In July 2020, the United States
Department of Justice charged two Chinese hackers who allegedly targeted intellectual property and confidential business information, including COVID-19 research. The two hackers allegedly worked with the Guangdong State Security Department of the Ministry of State
2684:
An indictment was unsealed today against Wu
Yingzhuo, Dong Hao and Xia Lei, all of whom are Chinese nationals and residents of China, for computer hacking, theft of trade secrets, conspiracy and identity theft directed at U.S. and foreign employees and computers of three corporate victims in the
297:
China conducts political and corporate espionage to access the networks of financial, defense and technology companies and research institutions in the United States. Email attachments attempting to enter the networks of U.S. companies and organizations exploit security weaknesses in software. A
169:
called China the "greatest long-term threat" to the United States. He said that "the FBI is now opening a new China-related counterintelligence case every 10 hours. Of the nearly 5,000 active counterintelligence cases currently under way across the country, almost half are related to China." For
779:
and industrial processes data with the aim of transitioning component manufacturing to Chinese companies. The report stated that the operations involved both cyber intrusion and theft as well as HUMINT operations, in most cases using a piece of code custom written for this industrial espionage
217:
had been roaming the United States pressuring Chinese immigrant communities, with the spies performing stalking in plain sight and hiring a US-based private investigator. For example, in a 2018 New Jersey court case a former Chinese official living in the U.S. was sued by the Wuhan-based Xinba
3191:
The human intelligence efforts included one by a now-indicted MSS intelligence officer to recruit an insider at LEAP-X manufacturer General Electric. The same officer also recruited a China-born US Army reservist who was an expert at assessing turbine engine schematics. So far, at least four
357:
seem to target strategic industries in which China lags; attacks on defense companies target weapons-systems information, and attacks on technology companies seek source code critical to software applications. Operation Aurora emphasized what senior U.S. government officials have called an
2877:
The cyberintruders also infiltrated the networks of the United Nations, the A.F.L.-C.I.O., and ministries of foreign affairs and finance worldwide. The hack of the A.F.L.-C.I.O. focused on issues surrounding the negotiations over the Trans-Pacific Partnership, a trade deal that excluded
872:(rainbow) project, named as a play-on-words related to stamping out Red communist bandits. According to academic Wendy Cheng, the KMT's likely first arrest of a U.S. student based on surveillance conducted in the U.S. was that of University of Wisconsin graduate student Hwang Chii-ming.
218:
Construction Group. The expatriate was harassed outside of court and received notes threatening his family. Later he received a video from his family in China imploring him to return with a staged shot implying the video was coerced by the Chinese government according to investigators.
186:. The alleged Chinese spy later participated in fundraising for Swalwell's 2014 congressional election bid and helped place an intern inside Swalwell's congressional office. FBI gave Swalwell a "defensive briefing" in 2015, informing him that woman was a suspected Chinese agent.
55:
of U.S. companies in order to support China's long-term military and commercial development. Chinese government agencies and affiliated personnel have been accused of using a number of methods to obtain U.S. technology (using U.S. law to avoid prosecution), including
519:
Chinese government commented that the charges were "made-up", and the indictment would damage trust between the two nations. Although the indictments have been called relatively meaningless, they could limit travel by the officers due to U.S. extradition treaties.
867:
From the 1964 to 1991, there were scores of reported instances of the KMT spying on Taiwanese students across twenty-one different U.S. college campuses. Student informants to the KMT were part of a surveillance infrastructure called the as the
31:
U.S. Department of Justice among others announced 23 criminal charges (Financial Fraud, Money Laundering, Conspiracy to Defraud the United States, Theft of Trade Secret Technology and Sanctions Violations, etc.) against Huawei and its CFO
635:, and used that access to compromise those companies' clients. The Cloudhopper attacks began no later than 2014, and included targets in Brazil, Germany, India, Japan, the United Arab Emirates, the United Kingdom, and the United States.
2606:
710:
In July 2021, the Justice Department credited four Chinese nationals (accused of working for the MSS) with a hacking campaign targeting government, academic, and private institutions; the individuals were each charged with one count of
242:
arsenal. Information is collected through espionage, reviews of U.S. technical and academic publications and interaction with U.S. scientists. China tasks a large number of individuals to collect small pieces of information (which are
2685:
financial, engineering and technology industries between 2011 and May 2017. The three Chinese hackers work for the purported China-based Internet security firm Guangzhou Bo Yu Information Technology Company Limited (a/k/a "Boyusec").
3208:
1107:
247:
and analyzed), and individual agents can more easily escape suspicion. U.S. government personnel suspect that China's intelligence-gathering efforts directed towards the development of modern nuclear weapons are focused on the
558:
The People's Liberation Army (PLA) was tied to economic espionage involving stolen business plans, intellectual property, and infringed on private conversations from Westinghouse Electric and United States Steel Corporation.
2927:
1374:
3517:, Hearing on "Enforcement of Federal Espionage Laws." Testimony before the Subcommittee on Crime, Terrorism, and Homeland Security of the House Committee on the Judiciary, U.S. House of Representatives, January 29, 2008.
2700:
3179:"Cyber Theft, Humint Helped China Cut Corners on Passenger Jet - Beijing likely saved a lot of time and billions of dollars by copying components for its C919 plane from others, a new report from CrowdStrike says"
325:
reported "a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google". According to investigators, the Google
2763:
303:
push our companies and workers behind. And that harm—company failures, job losses—has been building for a decade to the crush that we feel today. It’s harm felt across the country in a whole range of industries.
3350:
2196:
He did not maintain any internet presence under his name in English or Chinese, or under an alternative spelling Zhen Cheng Li. He may have used an alias or avoided using public internet accounts altogether.
3264:
He was detained in Belgium on 1 April at the request of the US. He was later indicted by an Ohio grand jury on four charges of conspiring to commit economic espionage and attempting to steal trade secrets.
1835:
859:
During its period of martial law on Taiwan (1949–1987) the Kuomintang (KMT) government of the Republic of China surveilled Taiwanese abroad, most often in Japan and in the United States. The United States
2840:
President Donald Trump's unwillingness to ditch Apple's iPhone in favor of more secure hardware has granted Chinese and Russian spies an open door into his private phone conversations, according to a new
1754:
2251:
2671:
175:
2827:
2067:
350:. According to the newspaper, the "attacks appear to be part of a broader computer espionage campaign against American news media companies that have reported on Chinese leaders and corporations."
2959:
1895:
1647:
1521:
3026:
894:, the Taiwan government operated one of the two most active anti-dissident networks within the United States, with agents infiltrated within universities and campus organizations and large-scale
3059:
1491:
2990:
2610:
2004:
1554:
3576:
1617:
887:
while at the East-West Center library. Chen was convicted of sedition at a July 1968 trial and sentenced to seven years of imprisonment. Chen was released in 1971 after receiving amnesty.
2183:
19:
1865:
659:
In March 2019, iDefense reported that Chinese hackers had launched cyberattacks on dozens of academic institutions in an attempt to gain information on technology being developed for the
3284:
2126:
1702:
3095:
4016:
2311:
292:
380:
In January 2024, US authorities stated that they disrupted an operation by the Chinese state advanced persistent threat called "Volt Typhoon" to target US critical infrastructure.
825:
university. The suspected intelligence operative, known as Christine Fang, developed extensive ties with politicians at local and national levels between 2011 and 2015, including
3790:
2937:
1366:
1281:
555:
is reported to have been engaged in espionage against maritime-related subjects. FireEye reported that the information targeted was likely of commercial and economic importance.
377:. The ban was enacted, citing the security risk of leaving Americans’ personal data exposed. However, on September 28, 2020, the ban was temporarily blocked by a federal judge.
2281:
3747:
3317:
1587:
931:
891:
2043:
609:
2708:
1312:
3617:
2158:
4181:
3543:
2753:
2901:
1075:
3571:
2093:
1779:
154:
to China, and U.S. officials prevented a Chinese man from shipping a new, high-speed computer used in classified projects (including nuclear-weapons development) from
139:
1080:
3757:
3340:
461:, using servers primarily based in China, was reported as tapping into the classified documents of government and private organizations in 103 countries (including
3129:
3993:
2864:
1939:
1825:
986:
87:
In addition to traditional espionage, China partners civilian-in-name Chinese companies with American businesses to acquire technology and economic data and uses
395:
389:
334:
accounts of Chinese human-rights activists. At least 34 other companies have been attacked, including Yahoo, Symantec, Adobe, Northrop Grumman and Dow Chemical.
3490:
The Unanimous and Bipartisan Report of the House Select Committee on U.S. National Security and Military Commercial Concerns with the People's Republic of China
1728:
3969:
2241:
1102:
531:
charged three Chinese employees of Guangzhou Bo Yu Information Technology Company Limited with hacking into corporate entities in the United States, including
3780:
3372:
2663:
344:
2640:
3933:
3178:
2819:
830:
4252:
2064:
4247:
2951:
2411:
1887:
1639:
1513:
485:
96:
3018:
2333:
1545:"A suspected Chinese spy slept with at least 2 mayors and got close to Democratic Rep. Eric Swalwell in a years-long intelligence campaign, report says"
3049:
1996:
1483:
1344:
119:
computers, to their Chinese partners as part of doing business in China's huge, lucrative markets. Chinese agents purchase high-tech equipment through
4092:
3987:
3822:
3775:
3229:
2982:
2796:
1670:
1544:
956:
406:, cyber-espionage, compromise of Hillary Clinton's illicit classified email server as noted by the intelligence community inspector general, or poor
3632:
3603:
135:
102:
During its martial law period (1949–1987) the Republic of China government on Taiwan spied on its citizens abroad, especially in the United States.
99:. U.S. law enforcement officials have identified China as the most active foreign power involved in the illegal acquisition of American technology.
1609:
365:
officially extended restrictions against Chinese-owned apps by signing two executive orders that would ban U.S. residents from doing business with
4237:
402:
operation, codenamed "Honey Bear", was unable to definitively determine the source of the compromises, though theories include the existence of a
2173:
784:
insiders at multiple aerospace and aviation companies like GE Aviation to gain knowledge about technologies including those involving the use of
1857:
4171:
2565:
1006:
826:
315:
Countering Threats Posed by the Chinese Government Inside the U.S., Remarks at Ronald Reagan Presidential Library and Museum, January 21, 2022)
253:
227:
150:
every year. Between October 2002 and January 2003 five Chinese businessmen were accused of illegally shipping equipment and trade secrets from
3276:
2359:
4082:
4037:
3536:
3158:
2136:
1135:
672:
418:
941:
605:, with China reportedly attempting to influence the President by identifying and influencing the people Trump is regularly in contact with.
343:
reported that it was the victim of hacking attempts originating from China during the previous four months after it published an article on
4087:
4011:
3637:
3458:
3085:
2589:
951:
676:
434:
2307:
570:
new Littoral combat ship. These blueprints of U.S. weapon and control systems were stolen to advance the development of Chinese weaponry.
414:, then the deputy director of the National Clandestine Service for Counterintelligence, was initially skeptical that a mole was to blame.
1973:
230:
Select Committee on U.S. National Security and Military and Commercial Concerns with the People's Republic of China report, known as the
138:
officials rating China's industrial-espionage and theft operations as the leading threat to U.S. technological security. In 2021, Acting
110:
China has used a variety of methods to gather intelligence in the United States. Individuals attempt to obtain targeted information from
4267:
4262:
4257:
3694:
3672:
3627:
3581:
3054:
2667:
1273:
895:
688:
528:
4126:
3939:
3827:
3812:
3752:
3708:
3622:
748:
624:
481:
239:
183:
81:
77:
60:, exploitation of commercial entities, and a network of scientific, academic and business contacts. Prominent espionage cases include
2389:
946:
3742:
3434:
2274:
971:
801:
265:
206:
3723:
3307:
2891:
1577:
3477:
2472:
2027:
3529:
1304:
4201:
3889:
3817:
3662:
2664:"U.S. Charges Three Chinese Hackers Who Work at Internet Security Firm for Hacking Three Corporations for Commercial Advantage"
1222:
861:
273:
2218:
581:-affiliated contractor. The compromised material reportedly included information on a project dubbed "Sea Dragon", as well as
4242:
4062:
3795:
3682:
3677:
3426:
249:
1141:
1456:
3852:
2441:
2386:"Foreign Ministry Spokesperson Qin Gang's Remarks on the So-called Chinese Cyber-Spy Ring Invading Computers in Countries"
926:
864:
often cooperated with or allowed the KMT to surveil Taiwanese students and other Taiwanese migrants in the United States.
699:
officers for stealing confidential business information and intellectual property from U.S. commercial firms and planting
578:
257:
804:
cancelled the visas of 1,000 Chinese students and researchers. The authorities claimed that the students had ties to the
4121:
4072:
4067:
3903:
3874:
3805:
3767:
3699:
3610:
3121:
1931:
1021:
155:
2854:
4232:
4166:
4052:
3713:
936:
3586:
805:
696:
396:
dismantling CIA intelligence networks in the country, killing and arresting a large number of CIA assets within China
2503:
4176:
4151:
3667:
3552:
2739:
Piiparinen, Anni. 2015. “The Chinese Cyber Threat in the South China Sea.” The Diplomat. The Diplomat. September 18
902:
879:
student Chen Yu-Hsi was arrested by the KMT government based on its surveillance of Chen in the United States. The
632:
497:
3504:
4211:
4206:
4114:
3975:
2730:
Abad-Santos, A. (2018). China Is Winning the Cyber War Because They Hacked U.S. Plans for Real War. The Atlantic.
2632:
1457:"Top counterintelligence official Mike Orlando on foreign espionage threats facing U.S. - "Intelligence Matters""
617:
563:
442:
4131:
3839:
3718:
3556:
668:
450:
3730:
2534:
2415:
2337:
3472:
2701:"Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries"
1334:
3862:
3689:
2896:
2098:
1209:
880:
3908:
3884:
3209:"In a first, a Chinese spy is extradited to the U.S. after stealing technology secrets, Justice Dept. says"
2786:
4136:
3951:
3800:
640:
48:
1729:"FBI arrests five in alleged 'Operation Fox Hunt' plot to stalk and pressure citizens to return to China"
189:
In 2015, the Obama administration protested to Beijing after discovering that Chinese agents, as part of
127:. China also uses state-run firms to purchase American companies with access to the targeted technology.
4156:
4109:
4104:
4099:
3642:
1339:
976:
848:
776:
744:
712:
286:
235:
147:
876:
577:
In January and February 2018, Chinese state cyber actors reportedly stole 614 gigabytes of data from a
3373:"Harvard University Professor and Two Chinese Nationals Charged in Three Separate China Related Cases"
821:
reported an investigation into the case of a suspected Chinese spy who was enrolled as a student at a
3898:
3857:
2561:
1026:
981:
664:
536:
438:
374:
131:
3492:("The Cox Report"). Select Committee, U.S. House of Representatives (Washington, DC: Regnery, 1999).
656:
in its servers. The report was widely disputed by the sources and companies who were named therein.
4057:
3495:
3213:
3022:
2363:
785:
649:
399:
310:
307:
166:
44:
3154:
1703:"FBI Director Christopher Wray's Remarks at Press Conference Regarding China's Operation Fox Hunt"
731:
In an effort to steal the technology to enable Chinese companies to supply the components for the
4141:
3999:
3913:
3867:
3785:
3521:
3192:
individuals have been arrested in connection with China's campaign targeting aerospace companies.
2859:
2791:
2508:
2246:
2131:
1755:"Operation Fox Hunt: How China Exports Repression Using a Network of Spies Hidden in Plain Sight"
736:
720:
660:
593:
586:
582:
339:
190:
120:
2586:
511:
to McAfee, "this is the highest profile attack of its kind that we have seen in recent memory."
91:
to penetrate the computer networks of U.S. businesses and government agencies, such as the 2009
18:
For a list of individuals suspected or convicted of spying on the United States for China, see
3735:
3430:
2159:"Report: Hillary Clinton's private email server was hacked by China | Al Arabiya English"
2035:
1965:
1773:
1677:
1214:
1131:
844:
653:
61:
836:. She was reportedly having sexual or romantic relationships with at least two mayors in the
441:
official Paul Strassmann said that 735,598 computers in the U.S. were "infested with Chinese
4196:
3963:
3596:
2477:
1549:
1001:
760:
503:
403:
92:
3781:
Committee for Safeguarding National Security of the Hong Kong Special Administrative Region
3591:
3508:
3312:
3186:
2823:
2593:
2446:
2385:
2071:
1582:
1484:"FBI Director Wray warns of Chinese hacking, espionage threats against American companies"
1111:
1084:
1011:
996:
817:
477:
747:
indictment, from 2010 to 2015 the Chinese cyberthreat actor Turbine Panda, linked to the
261:
Peacekeeper ICBM and the W-88 Trident D-5 SLBM and weapon-design concepts and features.
4186:
4161:
3945:
3847:
3654:
789:
716:
567:
198:
197:
reported that Operation Fox Hunt, nominally focused on economic crimes, was targeting "
2607:"Beijing denies corporate cyber spying charge against five Chinese military officials"
178:, was in the past targeted by a Chinese woman believed to be a clandestine officer of
4226:
4005:
3514:
906:
833:
755:
Bureau, penetrated a number of the C919's foreign components manufacturers including
213:". ProPublica reported that a team of Communist Party operatives and police based in
171:
65:
3253:
2926:
Bing, Christopher; Stubbs, Jack; Menn, Joseph. Finkle, Jim; Oatis, Jonathan (eds.).
2721:
Segal, A. (2018). How China is preparing for cyberwar. The Christian Science Monitor
2208:
2125:
Mazzetti, Mark; Goldman, Adam; Schmidt, Michael S.; Apuzzo, Matthew (May 20, 2017).
1204:
1189:
Helft, Miguel and John Markoff, "In Rebuke of China, Focus Falls on Cybersecuirty,"
4077:
3981:
2178:
602:
454:
362:
354:
327:
88:
52:
33:
1888:"Hinkley Point C: case against Chinese firm has the feel of a modern spy thriller"
1443:
Annual Report to Congress on the Military Power of the People's Republic of China,
1367:"Navy officer accused of passing secrets faces espionage and prostitution charges"
613:
433:
alleged that China was actively involved in cyberwarfare, accusing the country of
1125:
417:
In January 2018, a former CIA officer named Jerry Chun Shing Lee was arrested at
4047:
2983:"Security researcher source in Supermicro chip hack report casts doubt on story"
2820:"Trump refuses to give up iPhones, Chinese and Russian spies eavesdrop on calls"
764:
740:
540:
437:; China denied knowledge of these attacks. In September 2007 former senior U.S.
411:
202:
73:
2855:"Hacked European Cables Reveal a World of Anxiety About Trump, Russia and Iran"
2094:"U.S. Disables Chinese Hacking Operation That Targeted Critical Infrastructure"
1610:"Top GOP lawmakers call for Swalwell to be removed from Intelligence Committee"
80:(MSS) maintains a bureau dedicated to espionage against the United States, the
4042:
3957:
3230:"U.S. Charges Alleged Chinese Government Spy With Stealing U.S. Trade Secrets"
1016:
966:
884:
732:
692:
645:
532:
515:
421:, on suspicion of helping dismantle the CIA's network of informants in China.
407:
347:
231:
194:
151:
3308:"Exclusive: How a suspected Chinese spy gained access to California politics"
3086:"Building China's Comac C919 airplane involved a lot of hacking, report says"
2039:
1681:
1218:
4191:
3345:
3241:
information and trade secrets from foreign aviation and aerospace companies.
2952:"Bloomberg stands by Chinese chip story as Apple, Amazon ratchet up denials"
2242:"Ex-C.I.A. Officer Suspected of Compromising Chinese Informants Is Arrested"
913:
809:
768:
597:
reported that Russia and China are routinely eavesdropping on calls from an
244:
124:
57:
840:, according to a former elected official and a U.S. intelligence official.
652:
by the People's Liberation Army in an operation to implant microchips with
562:
Chinese hackers have stolen information on the Patriot missile system, the
3122:"China-linked cyberspies Turbine PANDA targeted aerospace firms for years"
2787:"When Trump Phones Friends, the Chinese and the Russians Listen and Learn"
2754:"China hacked sensitive U.S. Navy undersea warfare plans: Washington Post"
1671:"Obama Administration Warns Beijing About Covert Agents Operating in U.S."
3423:
Island X: Taiwanese Student Migrants, Campus Spies, and Cold War Activism
3258:
2213:
1461:
991:
961:
822:
458:
551:
Since at least 2013, a Chinese espionage group called TEMP.Periscope by
394:
Between 2010 and 2012, intelligence breaches led to Chinese authorities
3499:
2932:
2758:
2704:
1932:"Google China cyberattack part of vast espionage campaign, experts say"
1830:
837:
752:
700:
552:
210:
69:
2928:"Exclusive: China hacked HPE, IBM and then attacked clients - sources"
2752:
Walsh, Eric (June 8, 2018). Berlowitz, Phil; Dalgleish, James (eds.).
4146:
2662:
Department of Justice, Office of Public Affairs (November 27, 2017).
2442:"U.S. and key allies accuse China of Microsoft Exchange cyberattacks"
1514:"For NY Times, no news is fit to print about Rep. Swalwell and a spy"
1263:
Second Edition, (New York, NY: Random House Reference, 2004), p. 125.
772:
756:
598:
507:
446:
430:
370:
366:
322:
1640:"Eric Swalwell and the spy: A lesson in how China is undermining us"
608:
According to the cybersecurity firm Area 1, hackers working for the
2174:"'Very discreet': arrested CIA spy kept a low profile in Hong Kong"
883:
alleged that Chen had read communist literature including works by
3090:
2127:"Killing C.I.A. Informants, China Crippled U.S. Spying Operations"
1578:"Exclusive: Suspected Chinese spy targeted California politicians"
623:
As part of a campaign called Cloudhopper, hackers working for the
462:
449:
capable of carrying out unsophisticated yet potentially dangerous
331:
214:
179:
143:
111:
40:
26:
3776:
Office for Safeguarding National Security of the CPG in the HKSAR
3277:"US cancels 1,000 China student visas, claiming ties to military"
3048:
Office of Public Affairs, Department of Justice (July 21, 2020).
2535:"US blames China for hacks, opening new front in cyber offensive"
277:
nuclear material in a manner that is in clear breach of US law."
3050:"People around the globe are divided in their opinions of China"
1104:
US indicts five in China's secret 'Unit 61398' for cyber-spying.
469:
268:(CGN) with stealing nuclear secrets from the United States. The
146:
stole between $ 200 billion and $ 600 billion worth of American
3525:
2065:
TikTok ban: Judge rules app won't be blocked in the US, for now
1826:"U.S. tightens controls on China imports of nuclear components"
234:, warned that China has stolen classified information on every
3234:
3019:"Chinese hackers target North American and Asian universities"
2539:
2209:"Ex-CIA officer Jerry Chun Shing Lee held over secret records"
2079:
2075:
628:
445:"; computers infected in this manner can theoretically form a
162:
3341:"Democrat Eric Swalwell linked to spy suspect Christine Fang"
3306:
Allen-Ebrahimian, Bethany; Dorfman, Zach (December 8, 2020).
1576:
Allen-Ebrahimian, Bethany; Dorfman, Zach (December 8, 2020).
2473:"Microsoft Exchange hack caused by China, US and allies say"
679:. The attacks have been underway since at least April 2017.
2892:"Ghosts in the Clouds: Inside China's Major Corporate Hack"
1205:"FBI Sees Big Threat From Chinese Spies; Businesses Wonder"
739:
operations. According to a report from cybersecurity firm
473:
1930:
Cha, Ariana Eunjung; Nakashima, Ellen (January 14, 2010).
502:
In December 2009 and January 2010 a cyberattack, known as
358:
increasingly serious cyber threat to critical industries.
272:
reported: "According to the US Department of Justice, the
2785:
Rosenberg, Matthew; Haberman, Maggie (October 24, 2018).
2082:; published September 28, 2020; accessed February 7, 2021
1077:
U.S. accuses China of cyber spying on American companies.
855:
Republic of China (Taiwan) espionage in the United States
843:
In January 2020, the U.S. Department of Justice arrested
20:
List of Chinese spy cases in the United States of America
2853:
Sanger, David E.; Erlanger, Steven (December 18, 2018).
2502:
Kanno-Youngs, Zolan; Sanger, David E. (July 19, 2021).
1997:"Hackers in China Attacked The Times for Last 4 Months"
912:
The KMT ordered the 1984 assassination of U.S. citizen
812:. The U.S. began revoking these visas on June 1, 2020.
484:
of perpetrating several cyberattacks, most notably the
1303:
Markoff, John; Rosenberg, Matthew (February 3, 2017).
293:
Chinese information operations and information warfare
616:
in order to gain information on negotiations for the
435:
cyber-attacks on India, Germany and the United States
2334:"Researchers: Cyber spies break into govt computers"
1124:
Mattis, Peter; Brazil, Matthew (November 15, 2019).
4030:
3926:
3838:
3766:
3653:
3564:
2412:"Chinese embassy scoffs at reports of cyber spying"
2028:"Trump Executive Orders Target TikTok, WeChat Apps"
1966:"Cyberattack on Google Said to Hit Password System"
1127:
Chinese Communist Espionage: An Intelligence Primer
932:
Allegations of intellectual property theft by China
3254:"Chinese man charged with US aviation 'espionage'"
2504:"U.S. Formally Accuses China of Hacking Microsoft"
209:religious movement and, perhaps most visibly, the
4182:Residential Surveillance at a Designated Location
1753:Berg, Sebastian Rotella,Kirsten (July 22, 2021).
3572:Central Committee of the Chinese Communist Party
1274:"China Seen in Push to Gain Technology Insights"
892:United States Senate Foreign Relations Committee
735:aircraft, the Chinese engaged in both cyber and
610:People's Liberation Army Strategic Support Force
176:House Permanent Select Committee on Intelligence
300:
130:China also accesses foreign technology through
4017:Information operations and information warfare
3994:Strike Hard Campaign Against Violent Terrorism
2921:
2919:
2890:Barry, Rob; Volz, Dustin (December 30, 2019).
1669:Mazzetti, Mark; Levin, Dan (August 16, 2015).
1335:"The Unpleasant Truth About Chinese Espionage"
987:List of Chinese spy cases in the United States
3537:
3511:(Annapolis, MD: Naval Institute Press, 1994).
264:In 2016, the U.S. Justice Department charged
8:
2747:
2745:
2695:
2693:
2596:, McAfee Security Insights, January 13, 2010
1778:: CS1 maint: multiple names: authors list (
808:and also accused some of them of conducting
800:In September 2020, it was reported that the
3934:Campaign to Suppress Counterrevolutionaries
3416:
3414:
3149:
3147:
3012:
3010:
3008:
2414:. Theaustralian.news.com.au. Archived from
2308:"China 'has .75M zombie computers' in U.S."
1305:"China's Intelligent Weaponry Gets Smarter"
1097:
1095:
1093:
972:Criticism of Confucius Institutes#Espionage
3544:
3530:
3522:
3412:
3410:
3408:
3406:
3404:
3402:
3400:
3398:
3396:
3394:
486:2021 Microsoft Exchange Server data breach
97:Office of Personnel Management data breach
4093:List of Hong Kong national security cases
3791:Independent Commission Against Corruption
3202:
3200:
2528:
2526:
2497:
2495:
2466:
2464:
2435:
2433:
1261:Spy Book: The Encyclopedia of Espionage,
1070:
1068:
957:Chinese Students and Scholars Association
898:implemented through front organizations.
390:2010–2012 killing of CIA sources in China
43:of attempting to unlawfully acquire U.S.
3633:National Defense Mobilization Commission
3120:Paganini, Pierluigi (October 18, 2019).
2120:
2118:
2116:
1858:"Spy warning on Chinese nuclear company"
1114:Christian Science Monitor, May 19, 2014
831:California's 15th congressional district
142:Director Michael Orlando estimated that
136:U.S. Immigration and Customs Enforcement
39:The United States has often accused the
3724:People's Procuratorates Judicial Police
3287:from the original on September 10, 2020
3172:
3170:
3168:
3079:
3077:
2273:O'Brien, Kellie R. (January 13, 2018).
1959:
1957:
1255:
1253:
1251:
1249:
1064:
1039:
4172:Picking quarrels and provoking trouble
3970:1983 "Strike Hard" Anti-crime Campaign
3678:provincial Public Security Departments
3464:Chinese espionage in the United States
3353:from the original on December 10, 2020
3320:from the original on December 10, 2020
3161:from the original on November 1, 2018.
3098:from the original on November 15, 2019
2904:from the original on December 31, 2019
2867:from the original on December 19, 2018
2674:from the original on December 19, 2017
2314:from the original on November 12, 2014
2306:Waterman, Shaun (September 17, 2007).
1925:
1923:
1921:
1919:
1917:
1915:
1913:
1802:
1800:
1798:
1771:
1650:from the original on December 18, 2020
1590:from the original on December 10, 2020
1557:from the original on February 24, 2021
1524:from the original on December 18, 2020
1396:
1394:
1392:
1225:from the original on February 11, 2021
1007:Russian espionage in the United States
429:In 2007 the computer security company
373:, a popular messaging platform run by
228:United States House of Representatives
3207:Nakashima, Ellen (October 10, 2018).
3132:from the original on January 12, 2020
3115:
3113:
2830:from the original on October 25, 2018
2799:from the original on October 25, 2018
2568:from the original on January 13, 2010
2287:from the original on October 11, 2019
2254:from the original on January 17, 2018
2221:from the original on January 17, 2018
2186:from the original on January 19, 2018
2007:from the original on February 2, 2013
1995:Perlroth, Nicole (January 30, 2013).
1419:
1417:
1415:
1046:Alternatively known as Zhen Cheng Li.
673:Massachusetts Institute of Technology
644:published a story which alleged that
419:John F. Kennedy International Airport
7:
2818:Campbell, Mikey (October 24, 2018).
2046:from the original on August 14, 2020
2026:Restuccia, Andrew (August 7, 2020).
1942:from the original on August 21, 2017
1543:Collman, Ashley (December 8, 2020).
1259:Polmar, Norman and Thomas B. Allen,
1087:Reuters, Mon 19 May 2014 6:04pm EDT.
1074:Finkle, J. Menn, J., Viswanatha, J.
952:Chinese intelligence activity abroad
677:Woods Hole Oceanographic Institution
585:submarine cryptographic systems and
468:In a July 2021 joint statement with
3683:city/county Public Security Bureaus
3339:Zeffman, Henry (December 9, 2020).
3062:from the original on August 2, 2020
3055:United States Department of Justice
2668:United States Department of Justice
2172:Haas, Benjamin (January 18, 2018).
1727:Macias, Amanda (October 28, 2020).
1445:(Washington, DC: July 2007), p. 29.
1144:from the original on March 27, 2021
909:was murdered while in KMT custody.
689:United States Department of Justice
663:. Some of the targets included the
384:2010–2012 compromise of CIA network
4127:Inciting subversion of state power
3940:Three-anti and Five-anti Campaigns
2993:from the original on June 18, 2019
2962:from the original on July 10, 2019
2766:from the original on June 12, 2018
2643:from the original on June 15, 2014
2240:Goldman, Adam (January 16, 2018).
1976:from the original on April 5, 2020
1620:from the original on March 2, 2021
1347:from the original on June 17, 2017
890:According to a 1979 report by the
361:On August 6, 2020, U.S. President
240:intercontinental ballistic missile
14:
4248:Cyberwarfare in the United States
3177:Vijayan, Jai (October 14, 2019).
3029:from the original on May 27, 2019
2587:"Google Attack Is Tip Of Iceberg"
2392:from the original on May 28, 2013
2092:Volz, Dustin (January 31, 2024).
1898:from the original on May 25, 2019
1868:from the original on May 25, 2019
1838:from the original on May 25, 2019
1494:from the original on July 8, 2020
1377:from the original on May 18, 2017
1315:from the original on May 28, 2017
1284:from the original on May 16, 2017
648:'s contractors in China had been
465:exiles); China denied the claim.
266:China General Nuclear Power Group
3228:Lucas, Ryan (October 10, 2018).
2707:. March 16, 2018. Archived from
2609:. China News.Net. Archived from
2564:. Google Inc. January 12, 2010.
1964:Markoff, John (April 19, 2010).
1455:Morell, Michael (May 12, 2021).
1203:Solomon, Jay (August 10, 2005).
942:Beijing–Washington cyber hotline
612:compromised the networks of the
4202:Persecution of Uyghurs in China
4088:Hong Kong national security law
3719:People's Courts Judicial Police
3501:Chinese Intelligence Operations
2533:Liptak, Kevin (July 19, 2021).
1707:Federal Bureau of Investigation
862:Federal Bureau of Investigation
4238:Espionage in the United States
4063:Central Case Examination Group
3796:Hong Kong Disciplined Services
3488:deGraffenreid, Kenneth (ed.),
3427:University of Washington Press
3017:Sekine, Sara (March 6, 2019).
2471:Tucker, Eric (July 19, 2021).
2362:. Watch.ctv.ca. Archived from
1:
4253:China–United States relations
3853:Commission Against Corruption
947:China–United States trade war
927:2023 Chinese balloon incident
579:Naval Undersea Warfare Center
506:, was launched from China on
4083:Grid-style social management
4073:Death sentence with reprieve
4068:Civil Servant-Family Pair Up
3904:Correctional Services Bureau
3806:National Security Department
3638:Ministry of National Defense
3611:United Front Work Department
3577:National Security Commission
3478:Resources in other libraries
2440:Fried, Ina (July 19, 2021).
2310:United Press International.
1441:U.S. Department of Defense,
1022:United Front Work Department
627:compromised the networks of
514:In May 2014, a U.S. federal
156:Sandia National Laboratories
3628:Ministry of Public Security
3582:Central Military Commission
574:due to the cyber invasion.
4284:
4268:2010s in the United States
4263:2000s in the United States
4258:1990s in the United States
4177:Re-education through labor
3714:Judicial Administrative PP
3623:Ministry of State Security
749:Ministry of State Security
633:Hewlett Packard Enterprise
625:Ministry of State Security
498:Advanced persistent threat
495:
482:Ministry of State Security
387:
290:
284:
184:Ministry of State Security
78:Ministry of State Security
41:People's Republic of China
17:
4212:Holistic security concept
4207:Xinjiang internment camps
3976:Persecution of Falun Gong
3473:Resources in your library
2562:"A new approach to China"
1130:. Naval Institute Press.
719:and conspiracy to commit
691:announced that a federal
618:Trans-Pacific Partnership
564:F-35 Joint Strike Fighter
451:denial-of-service attacks
3988:Anti-corruption campaign
3748:State Secrets Protection
3587:People's Liberation Army
2275:"Case 1:18-mj-00018-JFA"
1083:October 6, 2014, at the
849:Thousand Talents Program
806:People's Liberation Army
697:People's Liberation Army
669:University of Washington
3663:Supervisory Commissions
3507:April 11, 2020, at the
2897:The Wall Street Journal
2099:The Wall Street Journal
2032:The Wall Street Journal
1210:The Wall Street Journal
937:CIA activities in China
881:Taiwan Garrison Command
775:, and others and stole
4137:Judiciary of Hong Kong
3952:Anti-Rightist Campaign
3875:Public Security Police
3863:Unitary Police Service
3786:PLA Hong Kong Garrison
3283:. September 10, 2020.
2592:July 14, 2011, at the
2360:"CTV News: Video clip"
2070:2 October 2020 at the
1815:deGraffenreid, p. 100.
641:Bloomberg Businessweek
527:In November 2017, the
319:
49:classified information
36:
4243:Cyberwarfare by China
3909:Macau Customs Service
3731:People's Armed Police
3643:Taiwan Affairs Office
3421:Cheng, Wendy (2023).
2940:on December 21, 2018.
1806:deGraffenreid, p. 98.
1792:deGraffenreid, p. 99.
1646:. December 14, 2020.
1616:. December 15, 2020.
1520:. December 17, 2020.
1340:The New York Observer
1162:deGraffenreid, p. 30.
1110:May 20, 2014, at the
977:Cyberwarfare by China
802:U.S. State Department
777:intellectual property
745:US Justice Department
687:On May 19, 2014, the
529:Department of Justice
496:Further information:
480:, the US accused the
287:Cyberwarfare by China
236:thermonuclear warhead
148:intellectual property
30:
3899:Fire Services Bureau
3858:Macau Security Force
3496:Eftimiades, Nicholas
3262:. October 11, 2018.
3157:. October 25, 2018.
3128:. Security Affairs.
2633:"The Cyber Cold War"
2217:. January 16, 2018.
1864:. October 25, 2018.
1834:. October 11, 2018.
1027:Unrestricted Warfare
982:Industrial espionage
896:propaganda campaigns
703:on their computers.
665:University of Hawaii
439:information security
375:Tencent Holdings Ltd
174:, who serves on the
132:industrial espionage
82:United States Bureau
4122:Internet censorship
3214:The Washington Post
3023:Nikkei Asian Review
2637:The Huffington Post
1936:The Washington Post
1894:. August 11, 2016.
1193:, January 13, 2010.
827:U.S. representative
786:composite materials
400:counterintelligence
308:Director of the FBI
205:, followers of the
167:Christopher A. Wray
121:front organizations
45:military technology
4233:Espionage in China
4167:Political offences
4142:Judiciary of Macau
4053:Capital punishment
4000:Operation Fox Hunt
3848:PLA Macau Garrison
3673:Public Security PP
3379:. January 28, 2020
3126:securityaffairs.co
3084:Cimpanu, Catalin.
2981:Osborne, Charlie.
2860:The New York Times
2792:The New York Times
2711:on March 16, 2018.
2509:The New York Times
2247:The New York Times
2161:. August 28, 2018.
2132:The New York Times
2001:The New York Times
1970:The New York Times
1674:The New York Times
1400:Eftimiades, p. 28.
1343:. April 22, 2016.
1309:The New York Times
1278:The New York Times
1191:The New York Times
815:In December 2020,
721:economic espionage
695:had indicted five
661:United States Navy
654:hardware backdoors
601:used by President
594:The New York Times
587:electronic warfare
583:United States Navy
398:. A joint CIA/FBI
340:The New York Times
254:Lawrence Livermore
191:Operation Fox Hunt
37:
4220:
4219:
4152:Life imprisonment
3879:Migration Service
3709:State Security PP
3553:National security
3515:Wortzel, Larry M.
3459:Library resources
2366:on March 30, 2009
1137:978-1-68247-304-7
638:In October 2018,
537:Moody's Analytics
457:network known as
337:In January 2013,
321:In January 2010,
238:in the country's
222:Nuclear espionage
72:, Peter Lee, and
62:Larry Wu-tai Chin
4275:
4197:Two-faced person
3964:Shadian incident
3917:
3893:
3871:
3753:Cyberspace Admin
3597:Maritime Militia
3546:
3539:
3532:
3523:
3441:
3440:
3418:
3389:
3388:
3386:
3384:
3369:
3363:
3362:
3360:
3358:
3336:
3330:
3329:
3327:
3325:
3303:
3297:
3296:
3294:
3292:
3273:
3267:
3266:
3250:
3244:
3243:
3225:
3219:
3218:
3204:
3195:
3194:
3174:
3163:
3162:
3151:
3142:
3141:
3139:
3137:
3117:
3108:
3107:
3105:
3103:
3081:
3072:
3071:
3069:
3067:
3045:
3039:
3038:
3036:
3034:
3014:
3003:
3002:
3000:
2998:
2978:
2972:
2971:
2969:
2967:
2948:
2942:
2941:
2936:. Archived from
2923:
2914:
2913:
2911:
2909:
2887:
2881:
2880:
2874:
2872:
2850:
2844:
2843:
2837:
2835:
2815:
2809:
2808:
2806:
2804:
2782:
2776:
2775:
2773:
2771:
2749:
2740:
2737:
2731:
2728:
2722:
2719:
2713:
2712:
2697:
2688:
2687:
2681:
2679:
2659:
2653:
2652:
2650:
2648:
2629:
2623:
2622:
2620:
2618:
2603:
2597:
2584:
2578:
2577:
2575:
2573:
2558:
2552:
2551:
2549:
2547:
2530:
2521:
2520:
2518:
2516:
2499:
2490:
2489:
2487:
2485:
2478:Associated Press
2468:
2459:
2458:
2456:
2454:
2437:
2428:
2427:
2425:
2423:
2418:on April 8, 2009
2408:
2402:
2401:
2399:
2397:
2388:. Fmprc.gov.cn.
2382:
2376:
2375:
2373:
2371:
2356:
2350:
2349:
2347:
2345:
2340:on April 3, 2009
2336:. Archived from
2330:
2324:
2323:
2321:
2319:
2303:
2297:
2296:
2294:
2292:
2286:
2279:
2270:
2264:
2263:
2261:
2259:
2237:
2231:
2230:
2228:
2226:
2205:
2199:
2198:
2193:
2191:
2169:
2163:
2162:
2155:
2149:
2148:
2146:
2144:
2135:. Archived from
2122:
2111:
2110:
2108:
2106:
2089:
2083:
2062:
2056:
2055:
2053:
2051:
2023:
2017:
2016:
2014:
2012:
1992:
1986:
1985:
1983:
1981:
1961:
1952:
1951:
1949:
1947:
1927:
1908:
1907:
1905:
1903:
1884:
1878:
1877:
1875:
1873:
1854:
1848:
1847:
1845:
1843:
1822:
1816:
1813:
1807:
1804:
1793:
1790:
1784:
1783:
1777:
1769:
1767:
1765:
1750:
1744:
1743:
1741:
1739:
1724:
1718:
1717:
1715:
1713:
1699:
1693:
1692:
1690:
1688:
1666:
1660:
1659:
1657:
1655:
1636:
1630:
1629:
1627:
1625:
1606:
1600:
1599:
1597:
1595:
1573:
1567:
1566:
1564:
1562:
1550:Business Insider
1540:
1534:
1533:
1531:
1529:
1510:
1504:
1503:
1501:
1499:
1490:. July 7, 2020.
1480:
1474:
1473:
1471:
1469:
1452:
1446:
1439:
1433:
1430:
1424:
1421:
1410:
1407:
1401:
1398:
1387:
1386:
1384:
1382:
1363:
1357:
1356:
1354:
1352:
1331:
1325:
1324:
1322:
1320:
1300:
1294:
1293:
1291:
1289:
1280:. June 6, 2013.
1270:
1264:
1257:
1244:
1241:
1235:
1234:
1232:
1230:
1200:
1194:
1187:
1181:
1178:
1172:
1169:
1163:
1160:
1154:
1153:
1151:
1149:
1121:
1115:
1099:
1088:
1072:
1047:
1044:
1002:Operation Aurora
877:East-West Center
875:In 1968, recent
796:Higher education
761:Capstone Turbine
504:Operation Aurora
317:
311:Christopher Wray
93:Operation Aurora
4283:
4282:
4278:
4277:
4276:
4274:
4273:
4272:
4223:
4222:
4221:
4216:
4132:Judicial system
4026:
3922:
3911:
3887:
3885:Judicial Police
3865:
3834:
3762:
3690:Internet police
3668:People's Police
3649:
3560:
3557:law enforcement
3550:
3520:
3509:Wayback Machine
3484:
3483:
3482:
3467:
3466:
3462:
3450:
3445:
3444:
3437:
3425:. Seattle, WA:
3420:
3419:
3392:
3382:
3380:
3371:
3370:
3366:
3356:
3354:
3338:
3337:
3333:
3323:
3321:
3305:
3304:
3300:
3290:
3288:
3275:
3274:
3270:
3252:
3251:
3247:
3227:
3226:
3222:
3206:
3205:
3198:
3187:InformationWeek
3176:
3175:
3166:
3153:
3152:
3145:
3135:
3133:
3119:
3118:
3111:
3101:
3099:
3083:
3082:
3075:
3065:
3063:
3047:
3046:
3042:
3032:
3030:
3016:
3015:
3006:
2996:
2994:
2980:
2979:
2975:
2965:
2963:
2950:
2949:
2945:
2925:
2924:
2917:
2907:
2905:
2889:
2888:
2884:
2870:
2868:
2852:
2851:
2847:
2833:
2831:
2817:
2816:
2812:
2802:
2800:
2784:
2783:
2779:
2769:
2767:
2751:
2750:
2743:
2738:
2734:
2729:
2725:
2720:
2716:
2699:
2698:
2691:
2677:
2675:
2661:
2660:
2656:
2646:
2644:
2631:
2630:
2626:
2616:
2614:
2613:on May 21, 2014
2605:
2604:
2600:
2594:Wayback Machine
2585:
2581:
2571:
2569:
2560:
2559:
2555:
2545:
2543:
2532:
2531:
2524:
2514:
2512:
2501:
2500:
2493:
2483:
2481:
2470:
2469:
2462:
2452:
2450:
2439:
2438:
2431:
2421:
2419:
2410:
2409:
2405:
2395:
2393:
2384:
2383:
2379:
2369:
2367:
2358:
2357:
2353:
2343:
2341:
2332:
2331:
2327:
2317:
2315:
2305:
2304:
2300:
2290:
2288:
2284:
2277:
2272:
2271:
2267:
2257:
2255:
2239:
2238:
2234:
2224:
2222:
2207:
2206:
2202:
2189:
2187:
2171:
2170:
2166:
2157:
2156:
2152:
2142:
2140:
2139:on May 20, 2017
2124:
2123:
2114:
2104:
2102:
2091:
2090:
2086:
2072:Wayback Machine
2063:
2059:
2049:
2047:
2025:
2024:
2020:
2010:
2008:
1994:
1993:
1989:
1979:
1977:
1963:
1962:
1955:
1945:
1943:
1929:
1928:
1911:
1901:
1899:
1886:
1885:
1881:
1871:
1869:
1856:
1855:
1851:
1841:
1839:
1824:
1823:
1819:
1814:
1810:
1805:
1796:
1791:
1787:
1770:
1763:
1761:
1752:
1751:
1747:
1737:
1735:
1726:
1725:
1721:
1711:
1709:
1701:
1700:
1696:
1686:
1684:
1668:
1667:
1663:
1653:
1651:
1638:
1637:
1633:
1623:
1621:
1608:
1607:
1603:
1593:
1591:
1575:
1574:
1570:
1560:
1558:
1542:
1541:
1537:
1527:
1525:
1512:
1511:
1507:
1497:
1495:
1482:
1481:
1477:
1467:
1465:
1454:
1453:
1449:
1440:
1436:
1431:
1427:
1422:
1413:
1408:
1404:
1399:
1390:
1380:
1378:
1371:Washington Post
1365:
1364:
1360:
1350:
1348:
1333:
1332:
1328:
1318:
1316:
1302:
1301:
1297:
1287:
1285:
1272:
1271:
1267:
1258:
1247:
1242:
1238:
1228:
1226:
1202:
1201:
1197:
1188:
1184:
1179:
1175:
1170:
1166:
1161:
1157:
1147:
1145:
1138:
1123:
1122:
1118:
1112:Wayback Machine
1100:
1091:
1085:Wayback Machine
1073:
1066:
1061:
1056:
1051:
1050:
1045:
1041:
1036:
1031:
1012:Second Cold War
997:Gregg Bergersen
922:
916:in California.
903:Carnegie Mellon
857:
798:
729:
685:
549:
525:
500:
494:
478:Western nations
427:
392:
386:
318:
305:
304:
295:
289:
283:
224:
108:
68:, Gwo-Bao Min,
23:
12:
11:
5:
4281:
4279:
4271:
4270:
4265:
4260:
4255:
4250:
4245:
4240:
4235:
4225:
4224:
4218:
4217:
4215:
4214:
4209:
4204:
4199:
4194:
4189:
4187:Soft detention
4184:
4179:
4174:
4169:
4164:
4162:PLA Unit 61398
4159:
4154:
4149:
4144:
4139:
4134:
4129:
4124:
4119:
4118:
4117:
4112:
4107:
4097:
4096:
4095:
4085:
4080:
4075:
4070:
4065:
4060:
4055:
4050:
4045:
4040:
4038:2011 crackdown
4034:
4032:
4028:
4027:
4025:
4024:
4019:
4014:
4009:
4003:
3997:
3991:
3985:
3979:
3973:
3967:
3961:
3955:
3949:
3946:Sufan movement
3943:
3937:
3930:
3928:
3924:
3923:
3921:
3920:
3919:
3918:
3906:
3901:
3896:
3895:
3894:
3882:
3855:
3850:
3844:
3842:
3836:
3835:
3833:
3832:
3831:
3830:
3825:
3820:
3815:
3810:
3809:
3808:
3793:
3788:
3783:
3778:
3772:
3770:
3764:
3763:
3761:
3760:
3755:
3750:
3745:
3740:
3739:
3738:
3728:
3727:
3726:
3721:
3716:
3711:
3706:
3705:
3704:
3703:
3702:
3692:
3687:
3686:
3685:
3665:
3659:
3657:
3651:
3650:
3648:
3647:
3646:
3645:
3640:
3635:
3630:
3625:
3615:
3614:
3613:
3608:
3607:
3606:
3601:
3600:
3599:
3589:
3579:
3568:
3566:
3562:
3561:
3551:
3549:
3548:
3541:
3534:
3526:
3519:
3518:
3512:
3493:
3485:
3481:
3480:
3475:
3469:
3468:
3457:
3456:
3455:
3454:
3449:
3446:
3443:
3442:
3435:
3390:
3364:
3331:
3298:
3268:
3245:
3220:
3196:
3164:
3143:
3109:
3073:
3040:
3004:
2973:
2943:
2915:
2882:
2845:
2810:
2777:
2741:
2732:
2723:
2714:
2689:
2654:
2624:
2598:
2579:
2553:
2522:
2491:
2460:
2429:
2403:
2377:
2351:
2325:
2298:
2265:
2232:
2200:
2164:
2150:
2112:
2084:
2057:
2018:
1987:
1953:
1909:
1879:
1849:
1817:
1808:
1794:
1785:
1745:
1719:
1694:
1661:
1631:
1601:
1568:
1535:
1505:
1475:
1447:
1434:
1432:Wortzel, p. 3.
1425:
1423:Wortzel, p. 4.
1411:
1409:Wortzel, p. 5.
1402:
1388:
1358:
1326:
1295:
1265:
1245:
1243:Wortzel, p. 8.
1236:
1195:
1182:
1180:Wortzel, p. 9.
1173:
1171:Wortzel, p. 6.
1164:
1155:
1136:
1116:
1089:
1063:
1062:
1060:
1057:
1055:
1052:
1049:
1048:
1038:
1037:
1035:
1032:
1030:
1029:
1024:
1019:
1014:
1009:
1004:
999:
994:
989:
984:
979:
974:
969:
964:
959:
954:
949:
944:
939:
934:
929:
923:
921:
918:
856:
853:
845:Charles Lieber
797:
794:
790:turbine blades
788:in jet engine
728:
725:
717:computer fraud
684:
681:
548:
545:
524:
521:
493:
490:
426:
423:
388:Main article:
385:
382:
345:Prime Minister
301:
285:Main article:
282:
279:
223:
220:
161:In July 2020,
107:
104:
13:
10:
9:
6:
4:
3:
2:
4280:
4269:
4266:
4264:
4261:
4259:
4256:
4254:
4251:
4249:
4246:
4244:
4241:
4239:
4236:
4234:
4231:
4230:
4228:
4213:
4210:
4208:
4205:
4203:
4200:
4198:
4195:
4193:
4190:
4188:
4185:
4183:
4180:
4178:
4175:
4173:
4170:
4168:
4165:
4163:
4160:
4158:
4155:
4153:
4150:
4148:
4145:
4143:
4140:
4138:
4135:
4133:
4130:
4128:
4125:
4123:
4120:
4116:
4113:
4111:
4108:
4106:
4103:
4102:
4101:
4098:
4094:
4091:
4090:
4089:
4086:
4084:
4081:
4079:
4076:
4074:
4071:
4069:
4066:
4064:
4061:
4059:
4056:
4054:
4051:
4049:
4046:
4044:
4041:
4039:
4036:
4035:
4033:
4029:
4023:
4022:United States
4020:
4018:
4015:
4013:
4010:
4007:
4006:709 crackdown
4004:
4001:
3998:
3995:
3992:
3989:
3986:
3983:
3980:
3977:
3974:
3971:
3968:
3965:
3962:
3959:
3956:
3953:
3950:
3947:
3944:
3941:
3938:
3935:
3932:
3931:
3929:
3925:
3915:
3910:
3907:
3905:
3902:
3900:
3897:
3891:
3886:
3883:
3880:
3876:
3873:
3872:
3869:
3864:
3861:
3860:
3859:
3856:
3854:
3851:
3849:
3846:
3845:
3843:
3841:
3837:
3829:
3826:
3824:
3821:
3819:
3816:
3814:
3811:
3807:
3804:
3803:
3802:
3799:
3798:
3797:
3794:
3792:
3789:
3787:
3784:
3782:
3779:
3777:
3774:
3773:
3771:
3769:
3765:
3759:
3756:
3754:
3751:
3749:
3746:
3744:
3741:
3737:
3734:
3733:
3732:
3729:
3725:
3722:
3720:
3717:
3715:
3712:
3710:
3707:
3701:
3698:
3697:
3696:
3693:
3691:
3688:
3684:
3681:
3680:
3679:
3676:
3675:
3674:
3671:
3670:
3669:
3666:
3664:
3661:
3660:
3658:
3656:
3652:
3644:
3641:
3639:
3636:
3634:
3631:
3629:
3626:
3624:
3621:
3620:
3619:
3618:State Council
3616:
3612:
3609:
3605:
3602:
3598:
3595:
3594:
3593:
3590:
3588:
3585:
3584:
3583:
3580:
3578:
3575:
3574:
3573:
3570:
3569:
3567:
3563:
3558:
3554:
3547:
3542:
3540:
3535:
3533:
3528:
3527:
3524:
3516:
3513:
3510:
3506:
3503:
3502:
3497:
3494:
3491:
3487:
3486:
3479:
3476:
3474:
3471:
3470:
3465:
3460:
3452:
3451:
3447:
3438:
3436:9780295752051
3432:
3428:
3424:
3417:
3415:
3413:
3411:
3409:
3407:
3405:
3403:
3401:
3399:
3397:
3395:
3391:
3378:
3374:
3368:
3365:
3352:
3348:
3347:
3342:
3335:
3332:
3319:
3315:
3314:
3309:
3302:
3299:
3291:September 10,
3286:
3282:
3278:
3272:
3269:
3265:
3261:
3260:
3255:
3249:
3246:
3242:
3237:
3236:
3231:
3224:
3221:
3216:
3215:
3210:
3203:
3201:
3197:
3193:
3188:
3184:
3180:
3173:
3171:
3169:
3165:
3160:
3156:
3150:
3148:
3144:
3131:
3127:
3123:
3116:
3114:
3110:
3097:
3093:
3092:
3087:
3080:
3078:
3074:
3061:
3057:
3056:
3051:
3044:
3041:
3028:
3024:
3020:
3013:
3011:
3009:
3005:
2992:
2988:
2984:
2977:
2974:
2961:
2957:
2953:
2947:
2944:
2939:
2935:
2934:
2929:
2922:
2920:
2916:
2903:
2899:
2898:
2893:
2886:
2883:
2879:
2866:
2862:
2861:
2856:
2849:
2846:
2842:
2829:
2825:
2821:
2814:
2811:
2798:
2794:
2793:
2788:
2781:
2778:
2765:
2761:
2760:
2755:
2748:
2746:
2742:
2736:
2733:
2727:
2724:
2718:
2715:
2710:
2706:
2702:
2696:
2694:
2690:
2686:
2673:
2669:
2665:
2658:
2655:
2642:
2638:
2634:
2628:
2625:
2612:
2608:
2602:
2599:
2595:
2591:
2588:
2583:
2580:
2567:
2563:
2557:
2554:
2542:
2541:
2536:
2529:
2527:
2523:
2511:
2510:
2505:
2498:
2496:
2492:
2480:
2479:
2474:
2467:
2465:
2461:
2449:
2448:
2443:
2436:
2434:
2430:
2417:
2413:
2407:
2404:
2391:
2387:
2381:
2378:
2365:
2361:
2355:
2352:
2339:
2335:
2329:
2326:
2313:
2309:
2302:
2299:
2283:
2276:
2269:
2266:
2253:
2249:
2248:
2243:
2236:
2233:
2220:
2216:
2215:
2210:
2204:
2201:
2197:
2185:
2181:
2180:
2175:
2168:
2165:
2160:
2154:
2151:
2138:
2134:
2133:
2128:
2121:
2119:
2117:
2113:
2101:
2100:
2095:
2088:
2085:
2081:
2077:
2073:
2069:
2066:
2061:
2058:
2045:
2041:
2037:
2033:
2029:
2022:
2019:
2006:
2002:
1998:
1991:
1988:
1975:
1971:
1967:
1960:
1958:
1954:
1941:
1937:
1933:
1926:
1924:
1922:
1920:
1918:
1916:
1914:
1910:
1897:
1893:
1889:
1883:
1880:
1867:
1863:
1859:
1853:
1850:
1837:
1833:
1832:
1827:
1821:
1818:
1812:
1809:
1803:
1801:
1799:
1795:
1789:
1786:
1781:
1775:
1760:
1756:
1749:
1746:
1734:
1730:
1723:
1720:
1708:
1704:
1698:
1695:
1683:
1679:
1675:
1672:
1665:
1662:
1649:
1645:
1641:
1635:
1632:
1619:
1615:
1611:
1605:
1602:
1589:
1585:
1584:
1579:
1572:
1569:
1556:
1552:
1551:
1546:
1539:
1536:
1523:
1519:
1515:
1509:
1506:
1493:
1489:
1485:
1479:
1476:
1464:
1463:
1458:
1451:
1448:
1444:
1438:
1435:
1429:
1426:
1420:
1418:
1416:
1412:
1406:
1403:
1397:
1395:
1393:
1389:
1376:
1372:
1368:
1362:
1359:
1346:
1342:
1341:
1336:
1330:
1327:
1314:
1310:
1306:
1299:
1296:
1283:
1279:
1275:
1269:
1266:
1262:
1256:
1254:
1252:
1250:
1246:
1240:
1237:
1224:
1220:
1216:
1212:
1211:
1206:
1199:
1196:
1192:
1186:
1183:
1177:
1174:
1168:
1165:
1159:
1156:
1143:
1139:
1133:
1129:
1128:
1120:
1117:
1113:
1109:
1106:
1105:
1098:
1096:
1094:
1090:
1086:
1082:
1079:
1078:
1071:
1069:
1065:
1058:
1053:
1043:
1040:
1033:
1028:
1025:
1023:
1020:
1018:
1015:
1013:
1010:
1008:
1005:
1003:
1000:
998:
995:
993:
990:
988:
985:
983:
980:
978:
975:
973:
970:
968:
965:
963:
960:
958:
955:
953:
950:
948:
945:
943:
940:
938:
935:
933:
930:
928:
925:
924:
919:
917:
915:
910:
908:
907:Chen Wen-chen
904:
899:
897:
893:
888:
886:
882:
878:
873:
871:
865:
863:
854:
852:
850:
846:
841:
839:
835:
834:Eric Swalwell
832:
828:
824:
820:
819:
813:
811:
807:
803:
795:
793:
791:
787:
781:
778:
774:
770:
766:
762:
758:
754:
750:
746:
742:
738:
734:
726:
724:
722:
718:
714:
708:
704:
702:
698:
694:
690:
682:
680:
678:
674:
670:
666:
662:
657:
655:
651:
647:
643:
642:
636:
634:
630:
626:
621:
619:
615:
611:
606:
604:
600:
596:
595:
590:
588:
584:
580:
575:
571:
569:
565:
560:
556:
554:
546:
544:
542:
538:
534:
530:
522:
520:
517:
512:
509:
505:
499:
491:
489:
487:
483:
479:
475:
471:
466:
464:
460:
456:
452:
448:
444:
440:
436:
432:
424:
422:
420:
415:
413:
409:
405:
401:
397:
391:
383:
381:
378:
376:
372:
368:
364:
359:
356:
355:cyber-attacks
351:
349:
346:
342:
341:
335:
333:
330:targeted the
329:
324:
316:
312:
309:
299:
294:
288:
280:
278:
275:
271:
267:
262:
259:
256:, Sandia and
255:
251:
246:
241:
237:
233:
229:
221:
219:
216:
212:
208:
204:
200:
196:
192:
187:
185:
181:
177:
173:
172:Eric Swalwell
168:
164:
159:
157:
153:
149:
145:
141:
137:
133:
128:
126:
122:
116:
113:
105:
103:
100:
98:
95:and the 2015
94:
90:
85:
83:
79:
75:
71:
67:
66:Katrina Leung
63:
59:
54:
53:trade secrets
50:
46:
42:
35:
29:
25:
21:
16:
4157:Penal system
4100:Human rights
4078:Great Cannon
4031:Other topics
4021:
3982:6521 Project
3878:
3500:
3489:
3463:
3422:
3381:. Retrieved
3376:
3367:
3355:. Retrieved
3344:
3334:
3322:. Retrieved
3311:
3301:
3289:. Retrieved
3281:The Guardian
3280:
3271:
3263:
3257:
3248:
3239:
3233:
3223:
3212:
3190:
3182:
3155:"Indictment"
3134:. Retrieved
3125:
3100:. Retrieved
3089:
3064:. Retrieved
3053:
3043:
3031:. Retrieved
2995:. Retrieved
2986:
2976:
2964:. Retrieved
2956:Ars Technica
2955:
2946:
2938:the original
2931:
2906:. Retrieved
2895:
2885:
2876:
2871:December 19,
2869:. Retrieved
2858:
2848:
2839:
2832:. Retrieved
2824:AppleInsider
2813:
2801:. Retrieved
2790:
2780:
2768:. Retrieved
2757:
2735:
2726:
2717:
2709:the original
2683:
2678:December 20,
2676:. Retrieved
2657:
2645:. Retrieved
2636:
2627:
2615:. Retrieved
2611:the original
2601:
2582:
2570:. Retrieved
2556:
2544:. Retrieved
2538:
2513:. Retrieved
2507:
2482:. Retrieved
2476:
2451:. Retrieved
2445:
2420:. Retrieved
2416:the original
2406:
2394:. Retrieved
2380:
2368:. Retrieved
2364:the original
2354:
2342:. Retrieved
2338:the original
2328:
2318:November 30,
2316:. Retrieved
2301:
2289:. Retrieved
2268:
2256:. Retrieved
2245:
2235:
2223:. Retrieved
2212:
2203:
2195:
2188:. Retrieved
2179:The Guardian
2177:
2167:
2153:
2141:. Retrieved
2137:the original
2130:
2103:. Retrieved
2097:
2087:
2060:
2048:. Retrieved
2031:
2021:
2009:. Retrieved
2000:
1990:
1978:. Retrieved
1969:
1944:. Retrieved
1935:
1900:. Retrieved
1892:The Guardian
1891:
1882:
1870:. Retrieved
1861:
1852:
1840:. Retrieved
1829:
1820:
1811:
1788:
1762:. Retrieved
1758:
1748:
1736:. Retrieved
1732:
1722:
1710:. Retrieved
1706:
1697:
1685:. Retrieved
1673:
1664:
1654:December 18,
1652:. Retrieved
1643:
1634:
1624:December 18,
1622:. Retrieved
1613:
1604:
1594:December 18,
1592:. Retrieved
1581:
1571:
1561:December 18,
1559:. Retrieved
1548:
1538:
1528:December 18,
1526:. Retrieved
1517:
1508:
1496:. Retrieved
1487:
1478:
1466:. Retrieved
1460:
1450:
1442:
1437:
1428:
1405:
1379:. Retrieved
1370:
1361:
1349:. Retrieved
1338:
1329:
1317:. Retrieved
1308:
1298:
1286:. Retrieved
1277:
1268:
1260:
1239:
1227:. Retrieved
1208:
1198:
1190:
1185:
1176:
1167:
1158:
1146:. Retrieved
1126:
1119:
1103:
1101:Clayton, M.
1076:
1042:
911:
900:
889:
874:
869:
866:
858:
842:
816:
814:
799:
782:
730:
709:
705:
686:
658:
639:
637:
622:
607:
603:Donald Trump
592:
591:
576:
572:
561:
557:
550:
526:
513:
501:
476:, and other
467:
455:cyber spying
428:
416:
393:
379:
363:Donald Trump
360:
352:
338:
336:
328:cyber-attack
320:
314:
296:
281:Cyberwarfare
269:
263:
225:
203:Hong Kongers
188:
160:
129:
117:
112:open sources
109:
101:
89:cyber spying
86:
38:
34:Wanzhou Meng
24:
15:
4048:Black jails
3912: [
3888: [
3877:(including
3866: [
3828:Immigration
3758:Urban Admin
3736:Coast Guard
3695:Immigration
3453:Works cited
3383:October 11,
3377:justice.gov
3357:January 26,
3324:January 26,
3183:DarkReading
3136:January 12,
3102:January 12,
2908:January 24,
2834:October 25,
2803:October 25,
2572:January 17,
2291:January 17,
2258:January 16,
2225:January 16,
2190:January 19,
2105:February 6,
2011:January 31,
1148:December 2,
780:operation.
765:GE Aviation
741:Crowdstrike
683:Indictments
650:compromised
568:U.S. Navy's
541:Trimble Inc
425:Cyber cases
412:Mark Kelton
74:Shujun Wang
51:as well as
4227:Categories
4058:Censorship
4043:610 Office
3958:Red August
3927:Operations
3818:Correction
3700:Inspection
2997:October 9,
2966:October 7,
2396:August 25,
2370:August 25,
2078:by way of
2050:August 13,
1946:August 25,
1764:August 17,
1759:ProPublica
1738:August 17,
1712:August 17,
1687:August 17,
1229:October 4,
1054:References
1017:Titan Rain
967:Cox Report
905:professor
885:Mao Zedong
733:Comac C919
715:to commit
713:conspiracy
707:Security.
693:grand jury
646:Supermicro
566:, and the
533:Siemens AG
516:grand jury
408:tradecraft
348:Wen Jiabao
291:See also:
250:Los Alamos
232:Cox Report
207:Falun Gong
195:ProPublica
152:California
4192:Shuanggui
4115:Hong Kong
3972:(1983–87)
3954:(1957–59)
3948:(1955–57)
3942:(1951–52)
3936:(1950–53)
3768:Hong Kong
3346:The Times
3066:August 6,
2040:0099-9660
1682:0362-4331
1219:0099-9660
1059:Citations
914:Henry Liu
901:In 1981,
810:espionage
769:Honeywell
727:Aerospace
258:Oak Ridge
170:example,
165:Director
125:Hong Kong
58:espionage
3655:Mainland
3565:National
3559:in China
3505:Archived
3351:Archived
3318:Archived
3285:Archived
3259:BBC News
3159:Archived
3130:Archived
3096:Archived
3060:Archived
3033:March 6,
3027:Archived
2991:Archived
2960:Archived
2902:Archived
2878:Beijing.
2865:Archived
2828:Archived
2797:Archived
2764:Archived
2672:Archived
2641:Archived
2590:Archived
2566:Archived
2546:July 19,
2515:July 19,
2484:July 19,
2453:July 19,
2422:July 29,
2390:Archived
2344:July 29,
2312:Archived
2282:Archived
2252:Archived
2219:Archived
2214:BBC News
2184:Archived
2068:Archived
2044:Archived
2005:Archived
1980:April 6,
1974:Archived
1940:Archived
1896:Archived
1866:Archived
1862:The Week
1836:Archived
1774:cite web
1648:Archived
1644:The Hill
1618:Archived
1614:The Hill
1588:Archived
1555:Archived
1522:Archived
1518:The Hill
1498:July 13,
1492:Archived
1488:The Hill
1462:CBS News
1381:June 18,
1375:Archived
1351:June 18,
1345:Archived
1319:June 18,
1313:Archived
1288:June 18,
1282:Archived
1223:Archived
1142:Archived
1108:Archived
1081:Archived
992:GhostNet
962:Cold War
920:See also
823:Bay Area
459:GhostNet
353:Chinese
306:—
270:Guardian
245:collated
199:Tibetans
4002:(2014–)
3996:(2014–)
3990:(2012–)
3823:Customs
3743:Customs
3592:Militia
3448:Sources
2933:Reuters
2841:report.
2770:June 9,
2759:Reuters
2705:FireEye
2647:June 5,
2617:May 20,
2143:May 20,
1902:May 25,
1872:May 25,
1842:May 25,
1831:Reuters
1468:May 23,
870:caihong
838:Midwest
753:Jiangsu
701:malware
614:AFL–CIO
553:FireEye
463:Tibetan
443:zombies
226:A 1999
211:Uyghurs
134:, with
106:Methods
70:Chi Mak
4147:Laogai
4012:Abroad
4008:(2015)
3984:(2009)
3978:(1999)
3966:(1975)
3960:(1966)
3801:Police
3461:about
3433:
2038:
1680:
1217:
1134:
773:Safran
757:Ametek
743:and a
737:HUMINT
675:, and
671:, the
667:, the
599:iPhone
547:APT 10
539:, and
508:Google
472:, the
447:botnet
431:McAfee
371:WeChat
367:TikTok
323:Google
313:,
76:. The
4110:Macao
4105:Tibet
3916:]
3892:]
3870:]
3840:Macau
3313:Axios
3091:ZDNet
2987:ZDNet
2447:Axios
2285:(PDF)
2278:(PDF)
1583:Axios
1034:Notes
818:Axios
523:APT 3
492:APT 1
332:Gmail
215:Wuhan
180:China
144:China
3813:Fire
3604:NDMC
3555:and
3431:ISBN
3385:2021
3359:2021
3326:2021
3293:2020
3138:2020
3104:2020
3068:2020
3035:2019
2999:2018
2968:2018
2910:2020
2873:2018
2836:2018
2805:2018
2772:2018
2680:2017
2649:2014
2619:2014
2574:2010
2548:2021
2517:2021
2486:2021
2455:2021
2424:2011
2398:2014
2372:2014
2346:2011
2320:2007
2293:2018
2260:2018
2227:2018
2192:2018
2145:2017
2107:2024
2052:2020
2036:ISSN
2013:2013
1982:2020
1948:2017
1904:2019
1874:2019
1844:2019
1780:link
1766:2022
1740:2022
1733:CNBC
1714:2022
1689:2022
1678:ISSN
1656:2020
1626:2020
1596:2020
1563:2020
1530:2020
1500:2020
1470:2021
1383:2017
1353:2017
1321:2017
1290:2017
1231:2020
1215:ISSN
1150:2019
1132:ISBN
829:for
631:and
470:NATO
453:. A
404:mole
369:and
140:NCSC
47:and
3235:NPR
2540:CNN
2080:MSN
2076:CNN
751:’s
629:IBM
274:FBI
182:'s
163:FBI
123:in
4229::
3914:zh
3890:zh
3868:zh
3498:,
3429:.
3393:^
3375:.
3349:.
3343:.
3316:.
3310:.
3279:.
3256:.
3238:.
3232:.
3211:.
3199:^
3189:.
3185:.
3181:.
3167:^
3146:^
3124:.
3112:^
3094:.
3088:.
3076:^
3058:.
3052:.
3025:.
3021:.
3007:^
2989:.
2985:.
2958:.
2954:.
2930:.
2918:^
2900:.
2894:.
2875:.
2863:.
2857:.
2838:.
2826:.
2822:.
2795:.
2789:.
2762:.
2756:.
2744:^
2703:.
2692:^
2682:.
2670:.
2666:.
2639:.
2635:.
2537:.
2525:^
2506:.
2494:^
2475:.
2463:^
2444:.
2432:^
2280:.
2250:.
2244:.
2211:.
2194:.
2182:.
2176:.
2129:.
2115:^
2096:.
2074:;
2042:.
2034:.
2030:.
2003:.
1999:.
1972:.
1968:.
1956:^
1938:.
1934:.
1912:^
1890:.
1860:.
1828:.
1797:^
1776:}}
1772:{{
1757:.
1731:.
1705:.
1676:.
1642:.
1612:.
1586:.
1580:.
1553:.
1547:.
1516:.
1486:.
1459:.
1414:^
1391:^
1373:.
1369:.
1337:.
1311:.
1307:.
1276:.
1248:^
1221:.
1213:.
1207:.
1140:.
1092:^
1067:^
792:.
771:,
767:,
763:,
759:,
723:.
620:.
589:.
543:.
535:,
488:.
474:EU
410:.
252:,
201:,
158:.
84:.
64:,
3881:)
3545:e
3538:t
3531:v
3439:.
3387:.
3361:.
3328:.
3295:.
3217:.
3140:.
3106:.
3070:.
3037:.
3001:.
2970:.
2912:.
2807:.
2774:.
2651:.
2621:.
2576:.
2550:.
2519:.
2488:.
2457:.
2426:.
2400:.
2374:.
2348:.
2322:.
2295:.
2262:.
2229:.
2147:.
2109:.
2054:.
2015:.
1984:.
1950:.
1906:.
1876:.
1846:.
1782:)
1768:.
1742:.
1716:.
1691:.
1658:.
1628:.
1598:.
1565:.
1532:.
1502:.
1472:.
1385:.
1355:.
1323:.
1292:.
1233:.
1152:.
22:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.