39:
204:, were tracking down Chinese dissidents in the United States to pressure them to return to China for prosecution. In October 2020 FBI Director Christopher Wray said that "when it couldn’t locate a Fox Hunt target, the Chinese government sent an emissary to visit the victim’s family here in the United States. And the message they said to pass on? The target had two options: Return to China promptly or commit suicide. And what happens when Fox Hunt targets do refuse to return to China? Their family members, both here in the United States and in China, have been threatened and coerced; and those back in China have even been arrested for leverage." In July 2021,
858:, Chair of the Department of Chemistry and Chemical Biology at Harvard University. Dr. Lieber was also the Principal Investigator of the Lieber Research Group at Harvard University, giving him direct access to information on nanoscience. The grants he received to oversee this work required him to disclose any foreign financial transactions. In 2011, Dr. Lieber was granted the title of "Strategic Scientist" at the Wuhan University of Technology. He received this role under China's
862:, which seeks to bring the expertise of prominent scientists to China and has been accused of stealing foreign information. He was required to work for the Wuhan lab for at least 9 months out of the year, and he got paid $ 50,000 per month. Dr. Lieber failed to inform the relevant institutions of his role, and he outright lied about his involvement in the program in 2018 and 2019.
38:
309:
recipient opens an email attachment, apparently from a familiar source, containing a program which embeds in the recipient's computer. The remotely controlled program allows an attacker to access the recipient's email, send sensitive documents to specific addresses and turns on such instruments as web cameras or microphones.
794:
As of 2019, four people have been arrested in the US as a result of investigations into this economic espionage and theft of trade secrets. Yanjun Xu, a senior intelligence officer of the MSS, was arrested in
Belgium and extradited to the US and is alleged to have been involved in recruiting company
529:
indicted five
Chinese military officers for cyber espionage and stealing trade secrets. It was alleged that the officers hacked into the computers of six U.S. companies to steal information that would provide an economic advantage to Chinese competitors, including Chinese state-owned enterprises. The
521:
and over 20 other companies. Google said that the attacks originated from China, and it would "review the feasibility" of its business operations in China as a result of the incident. According to Google, at least 20 other companies in a variety of sectors were also targeted by the attacks. According
313:
Just using cyber means, Chinese government hackers have stolen more of our personal and corporate data than every other nation combined. The harm from the
Chinese government’s economic espionage isn’t just that its companies pull ahead based on illegally gotten technology. While they pull ahead, they
287:
has discovered evidence that China
General Nuclear Power (CGN) has been engaged in a conspiracy to steal US nuclear secrets stretching back almost two decades. Both CGN and one of the corporation’s senior advisers, Szuhsiung Ho, have been charged with conspiring to help the Chinese government develop
271:
National
Laboratories. China is known to have stolen classified information on the W-56 Minuteman II ICBM, the W-62 Minuteman III ICBM, the W-70 Lance short-range ballistic missile (SRBM), the W-76 Trident C-4 submarine-launched ballistic missile (SLBM), the W-78 Minuteman III Mark 12A ICBM, the W-87
3251:
Xu made his initial appearance in federal court in
Cincinnati, Ohio, on Wednesday. According to court papers, he is a deputy division director for the Ministry of State Security, which is China's intelligence and security agency, in Jiangsu Province. His job, prosecutors say, was to obtain technical
584:
The protection of the South China Sea is highly important to the U.S. because a
Chinese Cyber Unit has already succeeded in an intrusion into the Philippine's government and military networks. Military documents, internal communications, and other sensitive materials related to the dispute were lost
129:
Much technology acquisition occurs through commerce and commercial regulations. The regulatory and commercial environment in China pressures
American and other foreign companies to transfer technology, capital and manufacturing expertise, especially in defense-related or dual-use industries such as
125:
such as libraries, research institutions and unclassified databases. Chinese travelers are recruited to carry out specific intelligence activities, and China debriefs returnees from exchange programs, trade missions and scientific-cooperation programs. Chinese citizens may be coerced to cooperate.
717:
In July 2020, the United States
Department of Justice charged two Chinese hackers who allegedly targeted intellectual property and confidential business information, including COVID-19 research. The two hackers allegedly worked with the Guangdong State Security Department of the Ministry of State
2695:
An indictment was unsealed today against Wu
Yingzhuo, Dong Hao and Xia Lei, all of whom are Chinese nationals and residents of China, for computer hacking, theft of trade secrets, conspiracy and identity theft directed at U.S. and foreign employees and computers of three corporate victims in the
308:
China conducts political and corporate espionage to access the networks of financial, defense and technology companies and research institutions in the United States. Email attachments attempting to enter the networks of U.S. companies and organizations exploit security weaknesses in software. A
180:
called China the "greatest long-term threat" to the United States. He said that "the FBI is now opening a new China-related counterintelligence case every 10 hours. Of the nearly 5,000 active counterintelligence cases currently under way across the country, almost half are related to China." For
790:
and industrial processes data with the aim of transitioning component manufacturing to Chinese companies. The report stated that the operations involved both cyber intrusion and theft as well as HUMINT operations, in most cases using a piece of code custom written for this industrial espionage
228:
had been roaming the United States pressuring Chinese immigrant communities, with the spies performing stalking in plain sight and hiring a US-based private investigator. For example, in a 2018 New Jersey court case a former Chinese official living in the U.S. was sued by the Wuhan-based Xinba
3202:
The human intelligence efforts included one by a now-indicted MSS intelligence officer to recruit an insider at LEAP-X manufacturer General Electric. The same officer also recruited a China-born US Army reservist who was an expert at assessing turbine engine schematics. So far, at least four
368:
seem to target strategic industries in which China lags; attacks on defense companies target weapons-systems information, and attacks on technology companies seek source code critical to software applications. Operation Aurora emphasized what senior U.S. government officials have called an
2888:
The cyberintruders also infiltrated the networks of the United Nations, the A.F.L.-C.I.O., and ministries of foreign affairs and finance worldwide. The hack of the A.F.L.-C.I.O. focused on issues surrounding the negotiations over the Trans-Pacific Partnership, a trade deal that excluded
883:(rainbow) project, named as a play-on-words related to stamping out Red communist bandits. According to academic Wendy Cheng, the KMT's likely first arrest of a U.S. student based on surveillance conducted in the U.S. was that of University of Wisconsin graduate student Hwang Chii-ming.
229:
Construction Group. The expatriate was harassed outside of court and received notes threatening his family. Later he received a video from his family in China imploring him to return with a staged shot implying the video was coerced by the Chinese government according to investigators.
197:. The alleged Chinese spy later participated in fundraising for Swalwell's 2014 congressional election bid and helped place an intern inside Swalwell's congressional office. FBI gave Swalwell a "defensive briefing" in 2015, informing him that woman was a suspected Chinese agent.
66:
of U.S. companies in order to support China's long-term military and commercial development. Chinese government agencies and affiliated personnel have been accused of using a number of methods to obtain U.S. technology (using U.S. law to avoid prosecution), including
530:
Chinese government commented that the charges were "made-up", and the indictment would damage trust between the two nations. Although the indictments have been called relatively meaningless, they could limit travel by the officers due to U.S. extradition treaties.
878:
From the 1964 to 1991, there were scores of reported instances of the KMT spying on Taiwanese students across twenty-one different U.S. college campuses. Student informants to the KMT were part of a surveillance infrastructure called the as the
42:
U.S. Department of Justice among others announced 23 criminal charges (Financial Fraud, Money Laundering, Conspiracy to Defraud the United States, Theft of Trade Secret Technology and Sanctions Violations, etc.) against Huawei and its CFO
646:, and used that access to compromise those companies' clients. The Cloudhopper attacks began no later than 2014, and included targets in Brazil, Germany, India, Japan, the United Arab Emirates, the United Kingdom, and the United States.
2617:
721:
In July 2021, the Justice Department credited four Chinese nationals (accused of working for the MSS) with a hacking campaign targeting government, academic, and private institutions; the individuals were each charged with one count of
253:
arsenal. Information is collected through espionage, reviews of U.S. technical and academic publications and interaction with U.S. scientists. China tasks a large number of individuals to collect small pieces of information (which are
2696:
financial, engineering and technology industries between 2011 and May 2017. The three Chinese hackers work for the purported China-based Internet security firm Guangzhou Bo Yu Information Technology Company Limited (a/k/a "Boyusec").
3219:
1118:
258:
and analyzed), and individual agents can more easily escape suspicion. U.S. government personnel suspect that China's intelligence-gathering efforts directed towards the development of modern nuclear weapons are focused on the
569:
The People's Liberation Army (PLA) was tied to economic espionage involving stolen business plans, intellectual property, and infringed on private conversations from Westinghouse Electric and United States Steel Corporation.
2938:
1385:
3528:, Hearing on "Enforcement of Federal Espionage Laws." Testimony before the Subcommittee on Crime, Terrorism, and Homeland Security of the House Committee on the Judiciary, U.S. House of Representatives, January 29, 2008.
2711:
3190:"Cyber Theft, Humint Helped China Cut Corners on Passenger Jet - Beijing likely saved a lot of time and billions of dollars by copying components for its C919 plane from others, a new report from CrowdStrike says"
336:
reported "a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google". According to investigators, the Google
2774:
314:
push our companies and workers behind. And that harm—company failures, job losses—has been building for a decade to the crush that we feel today. It’s harm felt across the country in a whole range of industries.
3361:
2207:
He did not maintain any internet presence under his name in English or Chinese, or under an alternative spelling Zhen Cheng Li. He may have used an alias or avoided using public internet accounts altogether.
3275:
He was detained in Belgium on 1 April at the request of the US. He was later indicted by an Ohio grand jury on four charges of conspiring to commit economic espionage and attempting to steal trade secrets.
1846:
870:
During its period of martial law on Taiwan (1949–1987) the Kuomintang (KMT) government of the Republic of China surveilled Taiwanese abroad, most often in Japan and in the United States. The United States
2851:
President Donald Trump's unwillingness to ditch Apple's iPhone in favor of more secure hardware has granted Chinese and Russian spies an open door into his private phone conversations, according to a new
1765:
2262:
2682:
186:
2838:
2078:
361:. According to the newspaper, the "attacks appear to be part of a broader computer espionage campaign against American news media companies that have reported on Chinese leaders and corporations."
2970:
1906:
1658:
1532:
3037:
905:, the Taiwan government operated one of the two most active anti-dissident networks within the United States, with agents infiltrated within universities and campus organizations and large-scale
3070:
1502:
3001:
2621:
2015:
1565:
3587:
1628:
898:
while at the East-West Center library. Chen was convicted of sedition at a July 1968 trial and sentenced to seven years of imprisonment. Chen was released in 1971 after receiving amnesty.
2194:
30:
1876:
670:
In March 2019, iDefense reported that Chinese hackers had launched cyberattacks on dozens of academic institutions in an attempt to gain information on technology being developed for the
3295:
2137:
1713:
3106:
4027:
2322:
303:
391:
In January 2024, US authorities stated that they disrupted an operation by the Chinese state advanced persistent threat called "Volt Typhoon" to target US critical infrastructure.
836:
university. The suspected intelligence operative, known as Christine Fang, developed extensive ties with politicians at local and national levels between 2011 and 2015, including
3801:
2948:
1377:
1292:
566:
is reported to have been engaged in espionage against maritime-related subjects. FireEye reported that the information targeted was likely of commercial and economic importance.
388:. The ban was enacted, citing the security risk of leaving Americans’ personal data exposed. However, on September 28, 2020, the ban was temporarily blocked by a federal judge.
2292:
3758:
3328:
1598:
942:
902:
2054:
620:
2719:
1323:
3628:
2169:
4192:
3554:
2764:
2912:
1086:
3582:
2104:
1790:
165:
to China, and U.S. officials prevented a Chinese man from shipping a new, high-speed computer used in classified projects (including nuclear-weapons development) from
150:
1091:
3768:
3351:
472:, using servers primarily based in China, was reported as tapping into the classified documents of government and private organizations in 103 countries (including
3140:
4004:
2875:
1950:
1836:
997:
98:
In addition to traditional espionage, China partners civilian-in-name Chinese companies with American businesses to acquire technology and economic data and uses
406:
400:
345:
accounts of Chinese human-rights activists. At least 34 other companies have been attacked, including Yahoo, Symantec, Adobe, Northrop Grumman and Dow Chemical.
3501:
The Unanimous and Bipartisan Report of the House Select Committee on U.S. National Security and Military Commercial Concerns with the People's Republic of China
1739:
3980:
2252:
1113:
542:
charged three Chinese employees of Guangzhou Bo Yu Information Technology Company Limited with hacking into corporate entities in the United States, including
3791:
3383:
2674:
355:
2651:
3944:
3189:
2830:
841:
4263:
2075:
4258:
2962:
2422:
1898:
1650:
1524:
496:
107:
3029:
2344:
1556:"A suspected Chinese spy slept with at least 2 mayors and got close to Democratic Rep. Eric Swalwell in a years-long intelligence campaign, report says"
3060:
2007:
1494:
1355:
130:
computers, to their Chinese partners as part of doing business in China's huge, lucrative markets. Chinese agents purchase high-tech equipment through
4103:
3998:
3833:
3786:
3240:
2993:
2807:
1681:
1555:
967:
417:, cyber-espionage, compromise of Hillary Clinton's illicit classified email server as noted by the intelligence community inspector general, or poor
3643:
3614:
146:
113:
During its martial law period (1949–1987) the Republic of China government on Taiwan spied on its citizens abroad, especially in the United States.
110:. U.S. law enforcement officials have identified China as the most active foreign power involved in the illegal acquisition of American technology.
1620:
376:
officially extended restrictions against Chinese-owned apps by signing two executive orders that would ban U.S. residents from doing business with
4248:
413:
operation, codenamed "Honey Bear", was unable to definitively determine the source of the compromises, though theories include the existence of a
2184:
795:
insiders at multiple aerospace and aviation companies like GE Aviation to gain knowledge about technologies including those involving the use of
1868:
4182:
2576:
1017:
837:
326:
Countering Threats Posed by the Chinese Government Inside the U.S., Remarks at Ronald Reagan Presidential Library and Museum, January 21, 2022)
264:
238:
161:
every year. Between October 2002 and January 2003 five Chinese businessmen were accused of illegally shipping equipment and trade secrets from
3287:
2370:
4093:
4048:
3547:
3169:
2147:
1146:
683:
429:
952:
616:, with China reportedly attempting to influence the President by identifying and influencing the people Trump is regularly in contact with.
354:
reported that it was the victim of hacking attempts originating from China during the previous four months after it published an article on
4098:
4022:
3648:
3469:
3096:
2600:
962:
687:
445:
2318:
581:
new Littoral combat ship. These blueprints of U.S. weapon and control systems were stolen to advance the development of Chinese weaponry.
425:, then the deputy director of the National Clandestine Service for Counterintelligence, was initially skeptical that a mole was to blame.
1984:
241:
Select Committee on U.S. National Security and Military and Commercial Concerns with the People's Republic of China report, known as the
149:
officials rating China's industrial-espionage and theft operations as the leading threat to U.S. technological security. In 2021, Acting
121:
China has used a variety of methods to gather intelligence in the United States. Individuals attempt to obtain targeted information from
4278:
4273:
4268:
3705:
3683:
3638:
3592:
3065:
2678:
1284:
906:
699:
539:
4137:
3950:
3838:
3823:
3763:
3719:
3633:
759:
635:
492:
250:
194:
92:
88:
71:, exploitation of commercial entities, and a network of scientific, academic and business contacts. Prominent espionage cases include
2400:
957:
3753:
3445:
2285:
982:
812:
276:
217:
3734:
3318:
2902:
1588:
3488:
2483:
2038:
3540:
1315:
4212:
3900:
3828:
3673:
2675:"U.S. Charges Three Chinese Hackers Who Work at Internet Security Firm for Hacking Three Corporations for Commercial Advantage"
1233:
872:
284:
2229:
592:-affiliated contractor. The compromised material reportedly included information on a project dubbed "Sea Dragon", as well as
4253:
4073:
3806:
3693:
3688:
3437:
260:
1152:
1467:
3863:
2452:
2397:"Foreign Ministry Spokesperson Qin Gang's Remarks on the So-called Chinese Cyber-Spy Ring Invading Computers in Countries"
937:
875:
often cooperated with or allowed the KMT to surveil Taiwanese students and other Taiwanese migrants in the United States.
710:
officers for stealing confidential business information and intellectual property from U.S. commercial firms and planting
589:
268:
815:
cancelled the visas of 1,000 Chinese students and researchers. The authorities claimed that the students had ties to the
4132:
4083:
4078:
3914:
3885:
3816:
3778:
3710:
3621:
3132:
1942:
1032:
166:
2865:
4243:
4177:
4063:
3724:
947:
3597:
816:
707:
407:
dismantling CIA intelligence networks in the country, killing and arresting a large number of CIA assets within China
2514:
17:
4187:
4162:
3678:
3563:
2750:
Piiparinen, Anni. 2015. “The Chinese Cyber Threat in the South China Sea.” The Diplomat. The Diplomat. September 18
913:
890:
student Chen Yu-Hsi was arrested by the KMT government based on its surveillance of Chen in the United States. The
643:
508:
3515:
4222:
4217:
4125:
3986:
2741:
Abad-Santos, A. (2018). China Is Winning the Cyber War Because They Hacked U.S. Plans for Real War. The Atlantic.
2643:
1468:"Top counterintelligence official Mike Orlando on foreign espionage threats facing U.S. - "Intelligence Matters""
628:
574:
453:
4142:
3850:
3729:
3567:
679:
461:
3741:
2545:
2426:
2348:
3483:
2712:"Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries"
1345:
3873:
3700:
2907:
2109:
1220:
891:
3919:
3895:
3220:"In a first, a Chinese spy is extradited to the U.S. after stealing technology secrets, Justice Dept. says"
2797:
4147:
3962:
3811:
651:
59:
1740:"FBI arrests five in alleged 'Operation Fox Hunt' plot to stalk and pressure citizens to return to China"
200:
In 2015, the Obama administration protested to Beijing after discovering that Chinese agents, as part of
138:. China also uses state-run firms to purchase American companies with access to the targeted technology.
4167:
4120:
4115:
4110:
3653:
1350:
987:
859:
787:
755:
723:
297:
246:
158:
887:
588:
In January and February 2018, Chinese state cyber actors reportedly stole 614 gigabytes of data from a
3384:"Harvard University Professor and Two Chinese Nationals Charged in Three Separate China Related Cases"
832:
reported an investigation into the case of a suspected Chinese spy who was enrolled as a student at a
3909:
3868:
2572:
1037:
992:
675:
547:
449:
385:
142:
3503:("The Cox Report"). Select Committee, U.S. House of Representatives (Washington, DC: Regnery, 1999).
667:
in its servers. The report was widely disputed by the sources and companies who were named therein.
4068:
3506:
3224:
3033:
2374:
796:
660:
410:
321:
318:
177:
55:
3165:
1714:"FBI Director Christopher Wray's Remarks at Press Conference Regarding China's Operation Fox Hunt"
742:
In an effort to steal the technology to enable Chinese companies to supply the components for the
4152:
4010:
3924:
3878:
3796:
3532:
3203:
individuals have been arrested in connection with China's campaign targeting aerospace companies.
2870:
2802:
2519:
2257:
2142:
1766:"Operation Fox Hunt: How China Exports Repression Using a Network of Spies Hidden in Plain Sight"
747:
731:
671:
604:
597:
593:
350:
201:
131:
2597:
522:
to McAfee, "this is the highest profile attack of its kind that we have seen in recent memory."
102:
to penetrate the computer networks of U.S. businesses and government agencies, such as the 2009
29:
For a list of individuals suspected or convicted of spying on the United States for China, see
3746:
3441:
2170:"Report: Hillary Clinton's private email server was hacked by China | Al Arabiya English"
2046:
1976:
1784:
1688:
1225:
1142:
855:
664:
72:
847:. She was reportedly having sexual or romantic relationships with at least two mayors in the
452:
official Paul Strassmann said that 735,598 computers in the U.S. were "infested with Chinese
4207:
3974:
3607:
2488:
1560:
1012:
771:
514:
414:
103:
3792:
Committee for Safeguarding National Security of the Hong Kong Special Administrative Region
3602:
3519:
3323:
3197:
2834:
2604:
2457:
2396:
2082:
1593:
1495:"FBI Director Wray warns of Chinese hacking, espionage threats against American companies"
1122:
1095:
1022:
1007:
828:
488:
758:
indictment, from 2010 to 2015 the Chinese cyberthreat actor Turbine Panda, linked to the
272:
Peacekeeper ICBM and the W-88 Trident D-5 SLBM and weapon-design concepts and features.
4197:
4172:
3956:
3858:
3665:
800:
727:
578:
209:
208:
reported that Operation Fox Hunt, nominally focused on economic crimes, was targeting "
2618:"Beijing denies corporate cyber spying charge against five Chinese military officials"
189:, was in the past targeted by a Chinese woman believed to be a clandestine officer of
4237:
4016:
3525:
917:
844:
766:
Bureau, penetrated a number of the C919's foreign components manufacturers including
224:". ProPublica reported that a team of Communist Party operatives and police based in
182:
76:
3264:
2937:
Bing, Christopher; Stubbs, Jack; Menn, Joseph. Finkle, Jim; Oatis, Jonathan (eds.).
2732:
Segal, A. (2018). How China is preparing for cyberwar. The Christian Science Monitor
2219:
2136:
Mazzetti, Mark; Goldman, Adam; Schmidt, Michael S.; Apuzzo, Matthew (May 20, 2017).
1215:
1200:
Helft, Miguel and John Markoff, "In Rebuke of China, Focus Falls on Cybersecuirty,"
4088:
3992:
2189:
613:
465:
373:
365:
338:
99:
63:
44:
1899:"Hinkley Point C: case against Chinese firm has the feel of a modern spy thriller"
1454:
Annual Report to Congress on the Military Power of the People's Republic of China,
1378:"Navy officer accused of passing secrets faces espionage and prostitution charges"
624:
444:
alleged that China was actively involved in cyberwarfare, accusing the country of
1136:
428:
In January 2018, a former CIA officer named Jerry Chun Shing Lee was arrested at
4058:
2994:"Security researcher source in Supermicro chip hack report casts doubt on story"
2831:"Trump refuses to give up iPhones, Chinese and Russian spies eavesdrop on calls"
775:
751:
551:
448:; China denied knowledge of these attacks. In September 2007 former senior U.S.
422:
213:
84:
2866:"Hacked European Cables Reveal a World of Anxiety About Trump, Russia and Iran"
2105:"U.S. Disables Chinese Hacking Operation That Targeted Critical Infrastructure"
1621:"Top GOP lawmakers call for Swalwell to be removed from Intelligence Committee"
91:(MSS) maintains a bureau dedicated to espionage against the United States, the
4053:
3968:
3241:"U.S. Charges Alleged Chinese Government Spy With Stealing U.S. Trade Secrets"
1027:
977:
895:
743:
703:
656:
543:
526:
432:, on suspicion of helping dismantle the CIA's network of informants in China.
418:
358:
242:
205:
162:
3319:"Exclusive: How a suspected Chinese spy gained access to California politics"
3097:"Building China's Comac C919 airplane involved a lot of hacking, report says"
2050:
1692:
1229:
4202:
3356:
3252:
information and trade secrets from foreign aviation and aerospace companies.
2963:"Bloomberg stands by Chinese chip story as Apple, Amazon ratchet up denials"
2253:"Ex-C.I.A. Officer Suspected of Compromising Chinese Informants Is Arrested"
924:
820:
779:
608:
reported that Russia and China are routinely eavesdropping on calls from an
255:
135:
68:
851:, according to a former elected official and a U.S. intelligence official.
663:
by the People's Liberation Army in an operation to implant microchips with
573:
Chinese hackers have stolen information on the Patriot missile system, the
3133:"China-linked cyberspies Turbine PANDA targeted aerospace firms for years"
2798:"When Trump Phones Friends, the Chinese and the Russians Listen and Learn"
2765:"China hacked sensitive U.S. Navy undersea warfare plans: Washington Post"
1682:"Obama Administration Warns Beijing About Covert Agents Operating in U.S."
3434:
Island X: Taiwanese Student Migrants, Campus Spies, and Cold War Activism
3269:
2224:
1472:
1002:
972:
833:
469:
562:
Since at least 2013, a Chinese espionage group called TEMP.Periscope by
405:
Between 2010 and 2012, intelligence breaches led to Chinese authorities
3510:
2943:
2769:
2715:
1943:"Google China cyberattack part of vast espionage campaign, experts say"
1841:
848:
763:
711:
563:
221:
80:
2939:"Exclusive: China hacked HPE, IBM and then attacked clients - sources"
2763:
Walsh, Eric (June 8, 2018). Berlowitz, Phil; Dalgleish, James (eds.).
4157:
2673:
Department of Justice, Office of Public Affairs (November 27, 2017).
2453:"U.S. and key allies accuse China of Microsoft Exchange cyberattacks"
1525:"For NY Times, no news is fit to print about Rep. Swalwell and a spy"
1274:
Second Edition, (New York, NY: Random House Reference, 2004), p. 125.
783:
767:
609:
518:
457:
441:
381:
377:
333:
1651:"Eric Swalwell and the spy: A lesson in how China is undermining us"
619:
According to the cybersecurity firm Area 1, hackers working for the
2185:"'Very discreet': arrested CIA spy kept a low profile in Hong Kong"
894:
alleged that Chen had read communist literature including works by
3101:
2138:"Killing C.I.A. Informants, China Crippled U.S. Spying Operations"
1589:"Exclusive: Suspected Chinese spy targeted California politicians"
634:
As part of a campaign called Cloudhopper, hackers working for the
473:
460:
capable of carrying out unsophisticated yet potentially dangerous
342:
225:
190:
154:
122:
51:
37:
3787:
Office for Safeguarding National Security of the CPG in the HKSAR
3288:"US cancels 1,000 China student visas, claiming ties to military"
3059:
Office of Public Affairs, Department of Justice (July 21, 2020).
2546:"US blames China for hacks, opening new front in cyber offensive"
288:
nuclear material in a manner that is in clear breach of US law."
3061:"People around the globe are divided in their opinions of China"
1115:
US indicts five in China's secret 'Unit 61398' for cyber-spying.
480:
279:(CGN) with stealing nuclear secrets from the United States. The
157:
stole between $ 200 billion and $ 600 billion worth of American
3536:
2076:
TikTok ban: Judge rules app won't be blocked in the US, for now
1837:"U.S. tightens controls on China imports of nuclear components"
245:, warned that China has stolen classified information on every
3245:
3030:"Chinese hackers target North American and Asian universities"
2550:
2220:"Ex-CIA officer Jerry Chun Shing Lee held over secret records"
2090:
2086:
639:
456:"; computers infected in this manner can theoretically form a
173:
3352:"Democrat Eric Swalwell linked to spy suspect Christine Fang"
3317:
Allen-Ebrahimian, Bethany; Dorfman, Zach (December 8, 2020).
1587:
Allen-Ebrahimian, Bethany; Dorfman, Zach (December 8, 2020).
2484:"Microsoft Exchange hack caused by China, US and allies say"
690:. The attacks have been underway since at least April 2017.
2903:"Ghosts in the Clouds: Inside China's Major Corporate Hack"
1216:"FBI Sees Big Threat From Chinese Spies; Businesses Wonder"
750:
operations. According to a report from cybersecurity firm
484:
1941:
Cha, Ariana Eunjung; Nakashima, Ellen (January 14, 2010).
513:
In December 2009 and January 2010 a cyberattack, known as
369:
increasingly serious cyber threat to critical industries.
283:
reported: "According to the US Department of Justice, the
2796:
Rosenberg, Matthew; Haberman, Maggie (October 24, 2018).
2093:; published September 28, 2020; accessed February 7, 2021
1088:
U.S. accuses China of cyber spying on American companies.
866:
Republic of China (Taiwan) espionage in the United States
854:
In January 2020, the U.S. Department of Justice arrested
31:
List of Chinese spy cases in the United States of America
2864:
Sanger, David E.; Erlanger, Steven (December 18, 2018).
2513:
Kanno-Youngs, Zolan; Sanger, David E. (July 19, 2021).
2008:"Hackers in China Attacked The Times for Last 4 Months"
923:
The KMT ordered the 1984 assassination of U.S. citizen
823:. The U.S. began revoking these visas on June 1, 2020.
495:
of perpetrating several cyberattacks, most notably the
1314:
Markoff, John; Rosenberg, Matthew (February 3, 2017).
304:
Chinese information operations and information warfare
627:
in order to gain information on negotiations for the
446:
cyber-attacks on India, Germany and the United States
2345:"Researchers: Cyber spies break into govt computers"
1135:
Mattis, Peter; Brazil, Matthew (November 15, 2019).
18:
Chinese intelligence operations in the United States
4041:
3937:
3849:
3777:
3664:
3575:
2423:"Chinese embassy scoffs at reports of cyber spying"
2039:"Trump Executive Orders Target TikTok, WeChat Apps"
1977:"Cyberattack on Google Said to Hit Password System"
1138:
Chinese Communist Espionage: An Intelligence Primer
943:
Allegations of intellectual property theft by China
3265:"Chinese man charged with US aviation 'espionage'"
2515:"U.S. Formally Accuses China of Hacking Microsoft"
220:religious movement and, perhaps most visibly, the
4193:Residential Surveillance at a Designated Location
1764:Berg, Sebastian Rotella,Kirsten (July 22, 2021).
3583:Central Committee of the Chinese Communist Party
1285:"China Seen in Push to Gain Technology Insights"
903:United States Senate Foreign Relations Committee
746:aircraft, the Chinese engaged in both cyber and
621:People's Liberation Army Strategic Support Force
187:House Permanent Select Committee on Intelligence
311:
141:China also accesses foreign technology through
4028:Information operations and information warfare
4005:Strike Hard Campaign Against Violent Terrorism
2932:
2930:
2901:Barry, Rob; Volz, Dustin (December 30, 2019).
1680:Mazzetti, Mark; Levin, Dan (August 16, 2015).
1346:"The Unpleasant Truth About Chinese Espionage"
998:List of Chinese spy cases in the United States
3548:
3522:(Annapolis, MD: Naval Institute Press, 1994).
275:In 2016, the U.S. Justice Department charged
8:
2758:
2756:
2706:
2704:
2607:, McAfee Security Insights, January 13, 2010
1789:: CS1 maint: multiple names: authors list (
819:and also accused some of them of conducting
811:In September 2020, it was reported that the
3945:Campaign to Suppress Counterrevolutionaries
3427:
3425:
3160:
3158:
3023:
3021:
3019:
2425:. Theaustralian.news.com.au. Archived from
2319:"China 'has .75M zombie computers' in U.S."
1316:"China's Intelligent Weaponry Gets Smarter"
1108:
1106:
1104:
983:Criticism of Confucius Institutes#Espionage
3555:
3541:
3533:
3423:
3421:
3419:
3417:
3415:
3413:
3411:
3409:
3407:
3405:
497:2021 Microsoft Exchange Server data breach
108:Office of Personnel Management data breach
4104:List of Hong Kong national security cases
3802:Independent Commission Against Corruption
3213:
3211:
2539:
2537:
2508:
2506:
2477:
2475:
2446:
2444:
1272:Spy Book: The Encyclopedia of Espionage,
1081:
1079:
968:Chinese Students and Scholars Association
909:implemented through front organizations.
401:2010–2012 killing of CIA sources in China
54:of attempting to unlawfully acquire U.S.
3644:National Defense Mobilization Commission
3131:Paganini, Pierluigi (October 18, 2019).
2131:
2129:
2127:
1869:"Spy warning on Chinese nuclear company"
1125:Christian Science Monitor, May 19, 2014
842:California's 15th congressional district
153:Director Michael Orlando estimated that
147:U.S. Immigration and Customs Enforcement
50:The United States has often accused the
3735:People's Procuratorates Judicial Police
3298:from the original on September 10, 2020
3183:
3181:
3179:
3090:
3088:
2284:O'Brien, Kellie R. (January 13, 2018).
1970:
1968:
1266:
1264:
1262:
1260:
1075:
1050:
4183:Picking quarrels and provoking trouble
3981:1983 "Strike Hard" Anti-crime Campaign
3689:provincial Public Security Departments
3475:Chinese espionage in the United States
3364:from the original on December 10, 2020
3331:from the original on December 10, 2020
3172:from the original on November 1, 2018.
3109:from the original on November 15, 2019
2915:from the original on December 31, 2019
2878:from the original on December 19, 2018
2685:from the original on December 19, 2017
2325:from the original on November 12, 2014
2317:Waterman, Shaun (September 17, 2007).
1936:
1934:
1932:
1930:
1928:
1926:
1924:
1813:
1811:
1809:
1782:
1661:from the original on December 18, 2020
1601:from the original on December 10, 2020
1568:from the original on February 24, 2021
1535:from the original on December 18, 2020
1407:
1405:
1403:
1236:from the original on February 11, 2021
1018:Russian espionage in the United States
440:In 2007 the computer security company
384:, a popular messaging platform run by
239:United States House of Representatives
3218:Nakashima, Ellen (October 10, 2018).
3143:from the original on January 12, 2020
3126:
3124:
2841:from the original on October 25, 2018
2810:from the original on October 25, 2018
2579:from the original on January 13, 2010
2298:from the original on October 11, 2019
2265:from the original on January 17, 2018
2232:from the original on January 17, 2018
2197:from the original on January 19, 2018
2018:from the original on February 2, 2013
2006:Perlroth, Nicole (January 30, 2013).
1430:
1428:
1426:
1057:Alternatively known as Zhen Cheng Li.
684:Massachusetts Institute of Technology
655:published a story which alleged that
430:John F. Kennedy International Airport
7:
2829:Campbell, Mikey (October 24, 2018).
2057:from the original on August 14, 2020
2037:Restuccia, Andrew (August 7, 2020).
1953:from the original on August 21, 2017
1554:Collman, Ashley (December 8, 2020).
1270:Polmar, Norman and Thomas B. Allen,
1098:Reuters, Mon 19 May 2014 6:04pm EDT.
1085:Finkle, J. Menn, J., Viswanatha, J.
963:Chinese intelligence activity abroad
688:Woods Hole Oceanographic Institution
596:submarine cryptographic systems and
479:In a July 2021 joint statement with
3694:city/county Public Security Bureaus
3350:Zeffman, Henry (December 9, 2020).
3073:from the original on August 2, 2020
3066:United States Department of Justice
2679:United States Department of Justice
2183:Haas, Benjamin (January 18, 2018).
1738:Macias, Amanda (October 28, 2020).
1456:(Washington, DC: July 2007), p. 29.
1155:from the original on March 27, 2021
920:was murdered while in KMT custody.
700:United States Department of Justice
674:. Some of the targets included the
395:2010–2012 compromise of CIA network
4138:Inciting subversion of state power
3951:Three-anti and Five-anti Campaigns
3004:from the original on June 18, 2019
2973:from the original on July 10, 2019
2777:from the original on June 12, 2018
2654:from the original on June 15, 2014
2251:Goldman, Adam (January 16, 2018).
1987:from the original on April 5, 2020
1631:from the original on March 2, 2021
1358:from the original on June 17, 2017
901:According to a 1979 report by the
372:On August 6, 2020, U.S. President
251:intercontinental ballistic missile
25:
4259:Cyberwarfare in the United States
3188:Vijayan, Jai (October 14, 2019).
3040:from the original on May 27, 2019
2598:"Google Attack Is Tip Of Iceberg"
2403:from the original on May 28, 2013
2103:Volz, Dustin (January 31, 2024).
1909:from the original on May 25, 2019
1879:from the original on May 25, 2019
1849:from the original on May 25, 2019
1505:from the original on July 8, 2020
1388:from the original on May 18, 2017
1326:from the original on May 28, 2017
1295:from the original on May 16, 2017
659:'s contractors in China had been
476:exiles); China denied the claim.
277:China General Nuclear Power Group
3239:Lucas, Ryan (October 10, 2018).
2718:. March 16, 2018. Archived from
2620:. China News.Net. Archived from
2575:. Google Inc. January 12, 2010.
1975:Markoff, John (April 19, 2010).
1466:Morell, Michael (May 12, 2021).
1214:Solomon, Jay (August 10, 2005).
953:Beijing–Washington cyber hotline
623:compromised the networks of the
4213:Persecution of Uyghurs in China
4099:Hong Kong national security law
3730:People's Courts Judicial Police
3512:Chinese Intelligence Operations
2544:Liptak, Kevin (July 19, 2021).
1718:Federal Bureau of Investigation
873:Federal Bureau of Investigation
4249:Espionage in the United States
4074:Central Case Examination Group
3807:Hong Kong Disciplined Services
3499:deGraffenreid, Kenneth (ed.),
3438:University of Washington Press
3028:Sekine, Sara (March 6, 2019).
2482:Tucker, Eric (July 19, 2021).
2373:. Watch.ctv.ca. Archived from
1:
4264:China–United States relations
3864:Commission Against Corruption
958:China–United States trade war
938:2023 Chinese balloon incident
590:Naval Undersea Warfare Center
517:, was launched from China on
4094:Grid-style social management
4084:Death sentence with reprieve
4079:Civil Servant-Family Pair Up
3915:Correctional Services Bureau
3817:National Security Department
3649:Ministry of National Defense
3622:United Front Work Department
3588:National Security Commission
3489:Resources in other libraries
2451:Fried, Ina (July 19, 2021).
2321:United Press International.
1452:U.S. Department of Defense,
1033:United Front Work Department
638:compromised the networks of
525:In May 2014, a U.S. federal
167:Sandia National Laboratories
3639:Ministry of Public Security
3593:Central Military Commission
585:due to the cyber invasion.
4295:
4279:2010s in the United States
4274:2000s in the United States
4269:1990s in the United States
4188:Re-education through labor
3725:Judicial Administrative PP
3634:Ministry of State Security
760:Ministry of State Security
644:Hewlett Packard Enterprise
636:Ministry of State Security
509:Advanced persistent threat
506:
493:Ministry of State Security
398:
301:
295:
195:Ministry of State Security
89:Ministry of State Security
52:People's Republic of China
28:
4223:Holistic security concept
4218:Xinjiang internment camps
3987:Persecution of Falun Gong
3484:Resources in your library
2573:"A new approach to China"
1141:. Naval Institute Press.
730:and conspiracy to commit
702:announced that a federal
629:Trans-Pacific Partnership
575:F-35 Joint Strike Fighter
462:denial-of-service attacks
3999:Anti-corruption campaign
3759:State Secrets Protection
3598:People's Liberation Army
2286:"Case 1:18-mj-00018-JFA"
1094:October 6, 2014, at the
860:Thousand Talents Program
817:People's Liberation Army
708:People's Liberation Army
680:University of Washington
3674:Supervisory Commissions
3518:April 11, 2020, at the
2908:The Wall Street Journal
2110:The Wall Street Journal
2043:The Wall Street Journal
1221:The Wall Street Journal
948:CIA activities in China
892:Taiwan Garrison Command
786:, and others and stole
4148:Judiciary of Hong Kong
3963:Anti-Rightist Campaign
3886:Public Security Police
3874:Unitary Police Service
3797:PLA Hong Kong Garrison
3294:. September 10, 2020.
2603:July 14, 2011, at the
2371:"CTV News: Video clip"
2081:2 October 2020 at the
1826:deGraffenreid, p. 100.
652:Bloomberg Businessweek
538:In November 2017, the
330:
60:classified information
47:
4254:Cyberwarfare by China
3920:Macau Customs Service
3742:People's Armed Police
3654:Taiwan Affairs Office
3432:Cheng, Wendy (2023).
2951:on December 21, 2018.
1817:deGraffenreid, p. 98.
1803:deGraffenreid, p. 99.
1657:. December 14, 2020.
1627:. December 15, 2020.
1531:. December 17, 2020.
1351:The New York Observer
1173:deGraffenreid, p. 30.
1121:May 20, 2014, at the
988:Cyberwarfare by China
813:U.S. State Department
788:intellectual property
756:US Justice Department
698:On May 19, 2014, the
540:Department of Justice
507:Further information:
491:, the US accused the
298:Cyberwarfare by China
247:thermonuclear warhead
159:intellectual property
41:
3910:Fire Services Bureau
3869:Macau Security Force
3507:Eftimiades, Nicholas
3273:. October 11, 2018.
3168:. October 25, 2018.
3139:. Security Affairs.
2644:"The Cyber Cold War"
2228:. January 16, 2018.
1875:. October 25, 2018.
1845:. October 11, 2018.
1038:Unrestricted Warfare
993:Industrial espionage
907:propaganda campaigns
714:on their computers.
676:University of Hawaii
450:information security
386:Tencent Holdings Ltd
185:, who serves on the
143:industrial espionage
93:United States Bureau
4133:Internet censorship
3225:The Washington Post
3034:Nikkei Asian Review
2648:The Huffington Post
1947:The Washington Post
1905:. August 11, 2016.
1204:, January 13, 2010.
838:U.S. representative
797:composite materials
411:counterintelligence
319:Director of the FBI
216:, followers of the
178:Christopher A. Wray
132:front organizations
56:military technology
4244:Espionage in China
4178:Political offences
4153:Judiciary of Macau
4064:Capital punishment
4011:Operation Fox Hunt
3859:PLA Macau Garrison
3684:Public Security PP
3390:. January 28, 2020
3137:securityaffairs.co
3095:Cimpanu, Catalin.
2992:Osborne, Charlie.
2871:The New York Times
2803:The New York Times
2722:on March 16, 2018.
2520:The New York Times
2258:The New York Times
2172:. August 28, 2018.
2143:The New York Times
2012:The New York Times
1981:The New York Times
1685:The New York Times
1411:Eftimiades, p. 28.
1354:. April 22, 2016.
1320:The New York Times
1289:The New York Times
1202:The New York Times
826:In December 2020,
732:economic espionage
706:had indicted five
672:United States Navy
665:hardware backdoors
612:used by President
605:The New York Times
598:electronic warfare
594:United States Navy
409:. A joint CIA/FBI
351:The New York Times
265:Lawrence Livermore
202:Operation Fox Hunt
48:
4231:
4230:
4163:Life imprisonment
3890:Migration Service
3720:State Security PP
3564:National security
3526:Wortzel, Larry M.
3470:Library resources
2377:on March 30, 2009
1148:978-1-68247-304-7
649:In October 2018,
548:Moody's Analytics
468:network known as
348:In January 2013,
332:In January 2010,
249:in the country's
233:Nuclear espionage
83:, Peter Lee, and
73:Larry Wu-tai Chin
16:(Redirected from
4286:
4208:Two-faced person
3975:Shadian incident
3928:
3904:
3882:
3764:Cyberspace Admin
3608:Maritime Militia
3557:
3550:
3543:
3534:
3452:
3451:
3429:
3400:
3399:
3397:
3395:
3380:
3374:
3373:
3371:
3369:
3347:
3341:
3340:
3338:
3336:
3314:
3308:
3307:
3305:
3303:
3284:
3278:
3277:
3261:
3255:
3254:
3236:
3230:
3229:
3215:
3206:
3205:
3185:
3174:
3173:
3162:
3153:
3152:
3150:
3148:
3128:
3119:
3118:
3116:
3114:
3092:
3083:
3082:
3080:
3078:
3056:
3050:
3049:
3047:
3045:
3025:
3014:
3013:
3011:
3009:
2989:
2983:
2982:
2980:
2978:
2959:
2953:
2952:
2947:. Archived from
2934:
2925:
2924:
2922:
2920:
2898:
2892:
2891:
2885:
2883:
2861:
2855:
2854:
2848:
2846:
2826:
2820:
2819:
2817:
2815:
2793:
2787:
2786:
2784:
2782:
2760:
2751:
2748:
2742:
2739:
2733:
2730:
2724:
2723:
2708:
2699:
2698:
2692:
2690:
2670:
2664:
2663:
2661:
2659:
2640:
2634:
2633:
2631:
2629:
2614:
2608:
2595:
2589:
2588:
2586:
2584:
2569:
2563:
2562:
2560:
2558:
2541:
2532:
2531:
2529:
2527:
2510:
2501:
2500:
2498:
2496:
2489:Associated Press
2479:
2470:
2469:
2467:
2465:
2448:
2439:
2438:
2436:
2434:
2429:on April 8, 2009
2419:
2413:
2412:
2410:
2408:
2399:. Fmprc.gov.cn.
2393:
2387:
2386:
2384:
2382:
2367:
2361:
2360:
2358:
2356:
2351:on April 3, 2009
2347:. Archived from
2341:
2335:
2334:
2332:
2330:
2314:
2308:
2307:
2305:
2303:
2297:
2290:
2281:
2275:
2274:
2272:
2270:
2248:
2242:
2241:
2239:
2237:
2216:
2210:
2209:
2204:
2202:
2180:
2174:
2173:
2166:
2160:
2159:
2157:
2155:
2146:. Archived from
2133:
2122:
2121:
2119:
2117:
2100:
2094:
2073:
2067:
2066:
2064:
2062:
2034:
2028:
2027:
2025:
2023:
2003:
1997:
1996:
1994:
1992:
1972:
1963:
1962:
1960:
1958:
1938:
1919:
1918:
1916:
1914:
1895:
1889:
1888:
1886:
1884:
1865:
1859:
1858:
1856:
1854:
1833:
1827:
1824:
1818:
1815:
1804:
1801:
1795:
1794:
1788:
1780:
1778:
1776:
1761:
1755:
1754:
1752:
1750:
1735:
1729:
1728:
1726:
1724:
1710:
1704:
1703:
1701:
1699:
1677:
1671:
1670:
1668:
1666:
1647:
1641:
1640:
1638:
1636:
1617:
1611:
1610:
1608:
1606:
1584:
1578:
1577:
1575:
1573:
1561:Business Insider
1551:
1545:
1544:
1542:
1540:
1521:
1515:
1514:
1512:
1510:
1501:. July 7, 2020.
1491:
1485:
1484:
1482:
1480:
1463:
1457:
1450:
1444:
1441:
1435:
1432:
1421:
1418:
1412:
1409:
1398:
1397:
1395:
1393:
1374:
1368:
1367:
1365:
1363:
1342:
1336:
1335:
1333:
1331:
1311:
1305:
1304:
1302:
1300:
1291:. June 6, 2013.
1281:
1275:
1268:
1255:
1252:
1246:
1245:
1243:
1241:
1211:
1205:
1198:
1192:
1189:
1183:
1180:
1174:
1171:
1165:
1164:
1162:
1160:
1132:
1126:
1110:
1099:
1083:
1058:
1055:
1013:Operation Aurora
888:East-West Center
886:In 1968, recent
807:Higher education
772:Capstone Turbine
515:Operation Aurora
328:
322:Christopher Wray
104:Operation Aurora
21:
4294:
4293:
4289:
4288:
4287:
4285:
4284:
4283:
4234:
4233:
4232:
4227:
4143:Judicial system
4037:
3933:
3922:
3898:
3896:Judicial Police
3876:
3845:
3773:
3701:Internet police
3679:People's Police
3660:
3571:
3568:law enforcement
3561:
3531:
3520:Wayback Machine
3495:
3494:
3493:
3478:
3477:
3473:
3461:
3456:
3455:
3448:
3436:. Seattle, WA:
3431:
3430:
3403:
3393:
3391:
3382:
3381:
3377:
3367:
3365:
3349:
3348:
3344:
3334:
3332:
3316:
3315:
3311:
3301:
3299:
3286:
3285:
3281:
3263:
3262:
3258:
3238:
3237:
3233:
3217:
3216:
3209:
3198:InformationWeek
3187:
3186:
3177:
3164:
3163:
3156:
3146:
3144:
3130:
3129:
3122:
3112:
3110:
3094:
3093:
3086:
3076:
3074:
3058:
3057:
3053:
3043:
3041:
3027:
3026:
3017:
3007:
3005:
2991:
2990:
2986:
2976:
2974:
2961:
2960:
2956:
2936:
2935:
2928:
2918:
2916:
2900:
2899:
2895:
2881:
2879:
2863:
2862:
2858:
2844:
2842:
2828:
2827:
2823:
2813:
2811:
2795:
2794:
2790:
2780:
2778:
2762:
2761:
2754:
2749:
2745:
2740:
2736:
2731:
2727:
2710:
2709:
2702:
2688:
2686:
2672:
2671:
2667:
2657:
2655:
2642:
2641:
2637:
2627:
2625:
2624:on May 21, 2014
2616:
2615:
2611:
2605:Wayback Machine
2596:
2592:
2582:
2580:
2571:
2570:
2566:
2556:
2554:
2543:
2542:
2535:
2525:
2523:
2512:
2511:
2504:
2494:
2492:
2481:
2480:
2473:
2463:
2461:
2450:
2449:
2442:
2432:
2430:
2421:
2420:
2416:
2406:
2404:
2395:
2394:
2390:
2380:
2378:
2369:
2368:
2364:
2354:
2352:
2343:
2342:
2338:
2328:
2326:
2316:
2315:
2311:
2301:
2299:
2295:
2288:
2283:
2282:
2278:
2268:
2266:
2250:
2249:
2245:
2235:
2233:
2218:
2217:
2213:
2200:
2198:
2182:
2181:
2177:
2168:
2167:
2163:
2153:
2151:
2150:on May 20, 2017
2135:
2134:
2125:
2115:
2113:
2102:
2101:
2097:
2083:Wayback Machine
2074:
2070:
2060:
2058:
2036:
2035:
2031:
2021:
2019:
2005:
2004:
2000:
1990:
1988:
1974:
1973:
1966:
1956:
1954:
1940:
1939:
1922:
1912:
1910:
1897:
1896:
1892:
1882:
1880:
1867:
1866:
1862:
1852:
1850:
1835:
1834:
1830:
1825:
1821:
1816:
1807:
1802:
1798:
1781:
1774:
1772:
1763:
1762:
1758:
1748:
1746:
1737:
1736:
1732:
1722:
1720:
1712:
1711:
1707:
1697:
1695:
1679:
1678:
1674:
1664:
1662:
1649:
1648:
1644:
1634:
1632:
1619:
1618:
1614:
1604:
1602:
1586:
1585:
1581:
1571:
1569:
1553:
1552:
1548:
1538:
1536:
1523:
1522:
1518:
1508:
1506:
1493:
1492:
1488:
1478:
1476:
1465:
1464:
1460:
1451:
1447:
1442:
1438:
1433:
1424:
1419:
1415:
1410:
1401:
1391:
1389:
1382:Washington Post
1376:
1375:
1371:
1361:
1359:
1344:
1343:
1339:
1329:
1327:
1313:
1312:
1308:
1298:
1296:
1283:
1282:
1278:
1269:
1258:
1253:
1249:
1239:
1237:
1213:
1212:
1208:
1199:
1195:
1190:
1186:
1181:
1177:
1172:
1168:
1158:
1156:
1149:
1134:
1133:
1129:
1123:Wayback Machine
1111:
1102:
1096:Wayback Machine
1084:
1077:
1072:
1067:
1062:
1061:
1056:
1052:
1047:
1042:
1023:Second Cold War
1008:Gregg Bergersen
933:
927:in California.
914:Carnegie Mellon
868:
809:
740:
696:
560:
536:
511:
505:
489:Western nations
438:
403:
397:
329:
316:
315:
306:
300:
294:
235:
119:
79:, Gwo-Bao Min,
34:
23:
22:
15:
12:
11:
5:
4292:
4290:
4282:
4281:
4276:
4271:
4266:
4261:
4256:
4251:
4246:
4236:
4235:
4229:
4228:
4226:
4225:
4220:
4215:
4210:
4205:
4200:
4198:Soft detention
4195:
4190:
4185:
4180:
4175:
4173:PLA Unit 61398
4170:
4165:
4160:
4155:
4150:
4145:
4140:
4135:
4130:
4129:
4128:
4123:
4118:
4108:
4107:
4106:
4096:
4091:
4086:
4081:
4076:
4071:
4066:
4061:
4056:
4051:
4049:2011 crackdown
4045:
4043:
4039:
4038:
4036:
4035:
4030:
4025:
4020:
4014:
4008:
4002:
3996:
3990:
3984:
3978:
3972:
3966:
3960:
3957:Sufan movement
3954:
3948:
3941:
3939:
3935:
3934:
3932:
3931:
3930:
3929:
3917:
3912:
3907:
3906:
3905:
3893:
3866:
3861:
3855:
3853:
3847:
3846:
3844:
3843:
3842:
3841:
3836:
3831:
3826:
3821:
3820:
3819:
3804:
3799:
3794:
3789:
3783:
3781:
3775:
3774:
3772:
3771:
3766:
3761:
3756:
3751:
3750:
3749:
3739:
3738:
3737:
3732:
3727:
3722:
3717:
3716:
3715:
3714:
3713:
3703:
3698:
3697:
3696:
3676:
3670:
3668:
3662:
3661:
3659:
3658:
3657:
3656:
3651:
3646:
3641:
3636:
3626:
3625:
3624:
3619:
3618:
3617:
3612:
3611:
3610:
3600:
3590:
3579:
3577:
3573:
3572:
3562:
3560:
3559:
3552:
3545:
3537:
3530:
3529:
3523:
3504:
3496:
3492:
3491:
3486:
3480:
3479:
3468:
3467:
3466:
3465:
3460:
3457:
3454:
3453:
3446:
3401:
3375:
3342:
3309:
3279:
3256:
3231:
3207:
3175:
3154:
3120:
3084:
3051:
3015:
2984:
2954:
2926:
2893:
2856:
2821:
2788:
2752:
2743:
2734:
2725:
2700:
2665:
2635:
2609:
2590:
2564:
2533:
2502:
2471:
2440:
2414:
2388:
2362:
2336:
2309:
2276:
2243:
2211:
2175:
2161:
2123:
2095:
2068:
2029:
1998:
1964:
1920:
1890:
1860:
1828:
1819:
1805:
1796:
1756:
1730:
1705:
1672:
1642:
1612:
1579:
1546:
1516:
1486:
1458:
1445:
1443:Wortzel, p. 3.
1436:
1434:Wortzel, p. 4.
1422:
1420:Wortzel, p. 5.
1413:
1399:
1369:
1337:
1306:
1276:
1256:
1254:Wortzel, p. 8.
1247:
1206:
1193:
1191:Wortzel, p. 9.
1184:
1182:Wortzel, p. 6.
1175:
1166:
1147:
1127:
1100:
1074:
1073:
1071:
1068:
1066:
1063:
1060:
1059:
1049:
1048:
1046:
1043:
1041:
1040:
1035:
1030:
1025:
1020:
1015:
1010:
1005:
1000:
995:
990:
985:
980:
975:
970:
965:
960:
955:
950:
945:
940:
934:
932:
929:
867:
864:
856:Charles Lieber
808:
805:
801:turbine blades
799:in jet engine
739:
736:
728:computer fraud
695:
692:
559:
556:
535:
532:
504:
501:
437:
434:
399:Main article:
396:
393:
356:Prime Minister
312:
296:Main article:
293:
290:
234:
231:
172:In July 2020,
118:
115:
24:
14:
13:
10:
9:
6:
4:
3:
2:
4291:
4280:
4277:
4275:
4272:
4270:
4267:
4265:
4262:
4260:
4257:
4255:
4252:
4250:
4247:
4245:
4242:
4241:
4239:
4224:
4221:
4219:
4216:
4214:
4211:
4209:
4206:
4204:
4201:
4199:
4196:
4194:
4191:
4189:
4186:
4184:
4181:
4179:
4176:
4174:
4171:
4169:
4166:
4164:
4161:
4159:
4156:
4154:
4151:
4149:
4146:
4144:
4141:
4139:
4136:
4134:
4131:
4127:
4124:
4122:
4119:
4117:
4114:
4113:
4112:
4109:
4105:
4102:
4101:
4100:
4097:
4095:
4092:
4090:
4087:
4085:
4082:
4080:
4077:
4075:
4072:
4070:
4067:
4065:
4062:
4060:
4057:
4055:
4052:
4050:
4047:
4046:
4044:
4040:
4034:
4033:United States
4031:
4029:
4026:
4024:
4021:
4018:
4017:709 crackdown
4015:
4012:
4009:
4006:
4003:
4000:
3997:
3994:
3991:
3988:
3985:
3982:
3979:
3976:
3973:
3970:
3967:
3964:
3961:
3958:
3955:
3952:
3949:
3946:
3943:
3942:
3940:
3936:
3926:
3921:
3918:
3916:
3913:
3911:
3908:
3902:
3897:
3894:
3891:
3887:
3884:
3883:
3880:
3875:
3872:
3871:
3870:
3867:
3865:
3862:
3860:
3857:
3856:
3854:
3852:
3848:
3840:
3837:
3835:
3832:
3830:
3827:
3825:
3822:
3818:
3815:
3814:
3813:
3810:
3809:
3808:
3805:
3803:
3800:
3798:
3795:
3793:
3790:
3788:
3785:
3784:
3782:
3780:
3776:
3770:
3767:
3765:
3762:
3760:
3757:
3755:
3752:
3748:
3745:
3744:
3743:
3740:
3736:
3733:
3731:
3728:
3726:
3723:
3721:
3718:
3712:
3709:
3708:
3707:
3704:
3702:
3699:
3695:
3692:
3691:
3690:
3687:
3686:
3685:
3682:
3681:
3680:
3677:
3675:
3672:
3671:
3669:
3667:
3663:
3655:
3652:
3650:
3647:
3645:
3642:
3640:
3637:
3635:
3632:
3631:
3630:
3629:State Council
3627:
3623:
3620:
3616:
3613:
3609:
3606:
3605:
3604:
3601:
3599:
3596:
3595:
3594:
3591:
3589:
3586:
3585:
3584:
3581:
3580:
3578:
3574:
3569:
3565:
3558:
3553:
3551:
3546:
3544:
3539:
3538:
3535:
3527:
3524:
3521:
3517:
3514:
3513:
3508:
3505:
3502:
3498:
3497:
3490:
3487:
3485:
3482:
3481:
3476:
3471:
3463:
3462:
3458:
3449:
3447:9780295752051
3443:
3439:
3435:
3428:
3426:
3424:
3422:
3420:
3418:
3416:
3414:
3412:
3410:
3408:
3406:
3402:
3389:
3385:
3379:
3376:
3363:
3359:
3358:
3353:
3346:
3343:
3330:
3326:
3325:
3320:
3313:
3310:
3302:September 10,
3297:
3293:
3289:
3283:
3280:
3276:
3272:
3271:
3266:
3260:
3257:
3253:
3248:
3247:
3242:
3235:
3232:
3227:
3226:
3221:
3214:
3212:
3208:
3204:
3199:
3195:
3191:
3184:
3182:
3180:
3176:
3171:
3167:
3161:
3159:
3155:
3142:
3138:
3134:
3127:
3125:
3121:
3108:
3104:
3103:
3098:
3091:
3089:
3085:
3072:
3068:
3067:
3062:
3055:
3052:
3039:
3035:
3031:
3024:
3022:
3020:
3016:
3003:
2999:
2995:
2988:
2985:
2972:
2968:
2964:
2958:
2955:
2950:
2946:
2945:
2940:
2933:
2931:
2927:
2914:
2910:
2909:
2904:
2897:
2894:
2890:
2877:
2873:
2872:
2867:
2860:
2857:
2853:
2840:
2836:
2832:
2825:
2822:
2809:
2805:
2804:
2799:
2792:
2789:
2776:
2772:
2771:
2766:
2759:
2757:
2753:
2747:
2744:
2738:
2735:
2729:
2726:
2721:
2717:
2713:
2707:
2705:
2701:
2697:
2684:
2680:
2676:
2669:
2666:
2653:
2649:
2645:
2639:
2636:
2623:
2619:
2613:
2610:
2606:
2602:
2599:
2594:
2591:
2578:
2574:
2568:
2565:
2553:
2552:
2547:
2540:
2538:
2534:
2522:
2521:
2516:
2509:
2507:
2503:
2491:
2490:
2485:
2478:
2476:
2472:
2460:
2459:
2454:
2447:
2445:
2441:
2428:
2424:
2418:
2415:
2402:
2398:
2392:
2389:
2376:
2372:
2366:
2363:
2350:
2346:
2340:
2337:
2324:
2320:
2313:
2310:
2294:
2287:
2280:
2277:
2264:
2260:
2259:
2254:
2247:
2244:
2231:
2227:
2226:
2221:
2215:
2212:
2208:
2196:
2192:
2191:
2186:
2179:
2176:
2171:
2165:
2162:
2149:
2145:
2144:
2139:
2132:
2130:
2128:
2124:
2112:
2111:
2106:
2099:
2096:
2092:
2088:
2084:
2080:
2077:
2072:
2069:
2056:
2052:
2048:
2044:
2040:
2033:
2030:
2017:
2013:
2009:
2002:
1999:
1986:
1982:
1978:
1971:
1969:
1965:
1952:
1948:
1944:
1937:
1935:
1933:
1931:
1929:
1927:
1925:
1921:
1908:
1904:
1900:
1894:
1891:
1878:
1874:
1870:
1864:
1861:
1848:
1844:
1843:
1838:
1832:
1829:
1823:
1820:
1814:
1812:
1810:
1806:
1800:
1797:
1792:
1786:
1771:
1767:
1760:
1757:
1745:
1741:
1734:
1731:
1719:
1715:
1709:
1706:
1694:
1690:
1686:
1683:
1676:
1673:
1660:
1656:
1652:
1646:
1643:
1630:
1626:
1622:
1616:
1613:
1600:
1596:
1595:
1590:
1583:
1580:
1567:
1563:
1562:
1557:
1550:
1547:
1534:
1530:
1526:
1520:
1517:
1504:
1500:
1496:
1490:
1487:
1475:
1474:
1469:
1462:
1459:
1455:
1449:
1446:
1440:
1437:
1431:
1429:
1427:
1423:
1417:
1414:
1408:
1406:
1404:
1400:
1387:
1383:
1379:
1373:
1370:
1357:
1353:
1352:
1347:
1341:
1338:
1325:
1321:
1317:
1310:
1307:
1294:
1290:
1286:
1280:
1277:
1273:
1267:
1265:
1263:
1261:
1257:
1251:
1248:
1235:
1231:
1227:
1223:
1222:
1217:
1210:
1207:
1203:
1197:
1194:
1188:
1185:
1179:
1176:
1170:
1167:
1154:
1150:
1144:
1140:
1139:
1131:
1128:
1124:
1120:
1117:
1116:
1109:
1107:
1105:
1101:
1097:
1093:
1090:
1089:
1082:
1080:
1076:
1069:
1064:
1054:
1051:
1044:
1039:
1036:
1034:
1031:
1029:
1026:
1024:
1021:
1019:
1016:
1014:
1011:
1009:
1006:
1004:
1001:
999:
996:
994:
991:
989:
986:
984:
981:
979:
976:
974:
971:
969:
966:
964:
961:
959:
956:
954:
951:
949:
946:
944:
941:
939:
936:
935:
930:
928:
926:
921:
919:
918:Chen Wen-chen
915:
910:
908:
904:
899:
897:
893:
889:
884:
882:
876:
874:
865:
863:
861:
857:
852:
850:
846:
845:Eric Swalwell
843:
839:
835:
831:
830:
824:
822:
818:
814:
806:
804:
802:
798:
792:
789:
785:
781:
777:
773:
769:
765:
761:
757:
753:
749:
745:
737:
735:
733:
729:
725:
719:
715:
713:
709:
705:
701:
693:
691:
689:
685:
681:
677:
673:
668:
666:
662:
658:
654:
653:
647:
645:
641:
637:
632:
630:
626:
622:
617:
615:
611:
607:
606:
601:
599:
595:
591:
586:
582:
580:
576:
571:
567:
565:
557:
555:
553:
549:
545:
541:
533:
531:
528:
523:
520:
516:
510:
502:
500:
498:
494:
490:
486:
482:
477:
475:
471:
467:
463:
459:
455:
451:
447:
443:
435:
433:
431:
426:
424:
420:
416:
412:
408:
402:
394:
392:
389:
387:
383:
379:
375:
370:
367:
366:cyber-attacks
362:
360:
357:
353:
352:
346:
344:
341:targeted the
340:
335:
327:
323:
320:
310:
305:
299:
291:
289:
286:
282:
278:
273:
270:
267:, Sandia and
266:
262:
257:
252:
248:
244:
240:
232:
230:
227:
223:
219:
215:
211:
207:
203:
198:
196:
192:
188:
184:
183:Eric Swalwell
179:
175:
170:
168:
164:
160:
156:
152:
148:
144:
139:
137:
133:
127:
124:
116:
114:
111:
109:
106:and the 2015
105:
101:
96:
94:
90:
86:
82:
78:
77:Katrina Leung
74:
70:
65:
64:trade secrets
61:
57:
53:
46:
40:
36:
32:
27:
19:
4168:Penal system
4111:Human rights
4089:Great Cannon
4042:Other topics
4032:
3993:6521 Project
3889:
3511:
3500:
3474:
3433:
3392:. Retrieved
3387:
3378:
3366:. Retrieved
3355:
3345:
3333:. Retrieved
3322:
3312:
3300:. Retrieved
3292:The Guardian
3291:
3282:
3274:
3268:
3259:
3250:
3244:
3234:
3223:
3201:
3193:
3166:"Indictment"
3145:. Retrieved
3136:
3111:. Retrieved
3100:
3075:. Retrieved
3064:
3054:
3042:. Retrieved
3006:. Retrieved
2997:
2987:
2975:. Retrieved
2967:Ars Technica
2966:
2957:
2949:the original
2942:
2917:. Retrieved
2906:
2896:
2887:
2882:December 19,
2880:. Retrieved
2869:
2859:
2850:
2843:. Retrieved
2835:AppleInsider
2824:
2812:. Retrieved
2801:
2791:
2779:. Retrieved
2768:
2746:
2737:
2728:
2720:the original
2694:
2689:December 20,
2687:. Retrieved
2668:
2656:. Retrieved
2647:
2638:
2626:. Retrieved
2622:the original
2612:
2593:
2581:. Retrieved
2567:
2555:. Retrieved
2549:
2524:. Retrieved
2518:
2493:. Retrieved
2487:
2462:. Retrieved
2456:
2431:. Retrieved
2427:the original
2417:
2405:. Retrieved
2391:
2379:. Retrieved
2375:the original
2365:
2353:. Retrieved
2349:the original
2339:
2329:November 30,
2327:. Retrieved
2312:
2300:. Retrieved
2279:
2267:. Retrieved
2256:
2246:
2234:. Retrieved
2223:
2214:
2206:
2199:. Retrieved
2190:The Guardian
2188:
2178:
2164:
2152:. Retrieved
2148:the original
2141:
2114:. Retrieved
2108:
2098:
2071:
2059:. Retrieved
2042:
2032:
2020:. Retrieved
2011:
2001:
1989:. Retrieved
1980:
1955:. Retrieved
1946:
1911:. Retrieved
1903:The Guardian
1902:
1893:
1881:. Retrieved
1872:
1863:
1851:. Retrieved
1840:
1831:
1822:
1799:
1773:. Retrieved
1769:
1759:
1747:. Retrieved
1743:
1733:
1721:. Retrieved
1717:
1708:
1696:. Retrieved
1684:
1675:
1665:December 18,
1663:. Retrieved
1654:
1645:
1635:December 18,
1633:. Retrieved
1624:
1615:
1605:December 18,
1603:. Retrieved
1592:
1582:
1572:December 18,
1570:. Retrieved
1559:
1549:
1539:December 18,
1537:. Retrieved
1528:
1519:
1507:. Retrieved
1498:
1489:
1477:. Retrieved
1471:
1461:
1453:
1448:
1439:
1416:
1390:. Retrieved
1381:
1372:
1360:. Retrieved
1349:
1340:
1328:. Retrieved
1319:
1309:
1297:. Retrieved
1288:
1279:
1271:
1250:
1238:. Retrieved
1219:
1209:
1201:
1196:
1187:
1178:
1169:
1157:. Retrieved
1137:
1130:
1114:
1112:Clayton, M.
1087:
1053:
922:
911:
900:
885:
880:
877:
869:
853:
827:
825:
810:
793:
741:
720:
716:
697:
669:
650:
648:
633:
618:
614:Donald Trump
603:
602:
587:
583:
572:
568:
561:
537:
524:
512:
487:, and other
478:
466:cyber spying
439:
427:
404:
390:
374:Donald Trump
371:
363:
349:
347:
339:cyber-attack
331:
325:
307:
292:Cyberwarfare
280:
274:
236:
214:Hong Kongers
199:
171:
140:
128:
123:open sources
120:
112:
100:cyber spying
97:
49:
45:Wanzhou Meng
35:
26:
4059:Black jails
3923: [
3899: [
3888:(including
3877: [
3839:Immigration
3769:Urban Admin
3747:Coast Guard
3706:Immigration
3464:Works cited
3394:October 11,
3388:justice.gov
3368:January 26,
3335:January 26,
3194:DarkReading
3147:January 12,
3113:January 12,
2919:January 24,
2845:October 25,
2814:October 25,
2583:January 17,
2302:January 17,
2269:January 16,
2236:January 16,
2201:January 19,
2116:February 6,
2022:January 31,
1159:December 2,
791:operation.
776:GE Aviation
752:Crowdstrike
694:Indictments
661:compromised
579:U.S. Navy's
552:Trimble Inc
436:Cyber cases
423:Mark Kelton
85:Shujun Wang
62:as well as
4238:Categories
4069:Censorship
4054:610 Office
3969:Red August
3938:Operations
3829:Correction
3711:Inspection
3008:October 9,
2977:October 7,
2407:August 25,
2381:August 25,
2089:by way of
2061:August 13,
1957:August 25,
1775:August 17,
1770:ProPublica
1749:August 17,
1723:August 17,
1698:August 17,
1240:October 4,
1065:References
1028:Titan Rain
978:Cox Report
916:professor
896:Mao Zedong
744:Comac C919
726:to commit
724:conspiracy
718:Security.
704:grand jury
657:Supermicro
577:, and the
544:Siemens AG
527:grand jury
419:tradecraft
359:Wen Jiabao
302:See also:
261:Los Alamos
243:Cox Report
218:Falun Gong
206:ProPublica
163:California
4203:Shuanggui
4126:Hong Kong
3983:(1983–87)
3965:(1957–59)
3959:(1955–57)
3953:(1951–52)
3947:(1950–53)
3779:Hong Kong
3357:The Times
3077:August 6,
2051:0099-9660
1693:0362-4331
1230:0099-9660
1070:Citations
925:Henry Liu
912:In 1981,
821:espionage
780:Honeywell
738:Aerospace
269:Oak Ridge
181:example,
176:Director
136:Hong Kong
69:espionage
3666:Mainland
3576:National
3570:in China
3516:Archived
3362:Archived
3329:Archived
3296:Archived
3270:BBC News
3170:Archived
3141:Archived
3107:Archived
3071:Archived
3044:March 6,
3038:Archived
3002:Archived
2971:Archived
2913:Archived
2889:Beijing.
2876:Archived
2839:Archived
2808:Archived
2775:Archived
2683:Archived
2652:Archived
2601:Archived
2577:Archived
2557:July 19,
2526:July 19,
2495:July 19,
2464:July 19,
2433:July 29,
2401:Archived
2355:July 29,
2323:Archived
2293:Archived
2263:Archived
2230:Archived
2225:BBC News
2195:Archived
2079:Archived
2055:Archived
2016:Archived
1991:April 6,
1985:Archived
1951:Archived
1907:Archived
1877:Archived
1873:The Week
1847:Archived
1785:cite web
1659:Archived
1655:The Hill
1629:Archived
1625:The Hill
1599:Archived
1566:Archived
1533:Archived
1529:The Hill
1509:July 13,
1503:Archived
1499:The Hill
1473:CBS News
1392:June 18,
1386:Archived
1362:June 18,
1356:Archived
1330:June 18,
1324:Archived
1299:June 18,
1293:Archived
1234:Archived
1153:Archived
1119:Archived
1092:Archived
1003:GhostNet
973:Cold War
931:See also
834:Bay Area
470:GhostNet
364:Chinese
317:—
281:Guardian
256:collated
210:Tibetans
4013:(2014–)
4007:(2014–)
4001:(2012–)
3834:Customs
3754:Customs
3603:Militia
3459:Sources
2944:Reuters
2852:report.
2781:June 9,
2770:Reuters
2716:FireEye
2658:June 5,
2628:May 20,
2154:May 20,
1913:May 25,
1883:May 25,
1853:May 25,
1842:Reuters
1479:May 23,
881:caihong
849:Midwest
764:Jiangsu
712:malware
625:AFL–CIO
564:FireEye
474:Tibetan
454:zombies
237:A 1999
222:Uyghurs
145:, with
117:Methods
81:Chi Mak
4158:Laogai
4023:Abroad
4019:(2015)
3995:(2009)
3989:(1999)
3977:(1975)
3971:(1966)
3812:Police
3472:about
3444:
2049:
1691:
1228:
1145:
784:Safran
768:Ametek
754:and a
748:HUMINT
686:, and
682:, the
678:, the
610:iPhone
558:APT 10
550:, and
519:Google
483:, the
458:botnet
442:McAfee
382:WeChat
378:TikTok
334:Google
324:,
87:. The
4121:Macao
4116:Tibet
3927:]
3903:]
3881:]
3851:Macau
3324:Axios
3102:ZDNet
2998:ZDNet
2458:Axios
2296:(PDF)
2289:(PDF)
1594:Axios
1045:Notes
829:Axios
534:APT 3
503:APT 1
343:Gmail
226:Wuhan
191:China
155:China
3824:Fire
3615:NDMC
3566:and
3442:ISBN
3396:2021
3370:2021
3337:2021
3304:2020
3149:2020
3115:2020
3079:2020
3046:2019
3010:2018
2979:2018
2921:2020
2884:2018
2847:2018
2816:2018
2783:2018
2691:2017
2660:2014
2630:2014
2585:2010
2559:2021
2528:2021
2497:2021
2466:2021
2435:2011
2409:2014
2383:2014
2357:2011
2331:2007
2304:2018
2271:2018
2238:2018
2203:2018
2156:2017
2118:2024
2063:2020
2047:ISSN
2024:2013
1993:2020
1959:2017
1915:2019
1885:2019
1855:2019
1791:link
1777:2022
1751:2022
1744:CNBC
1725:2022
1700:2022
1689:ISSN
1667:2020
1637:2020
1607:2020
1574:2020
1541:2020
1511:2020
1481:2021
1394:2017
1364:2017
1332:2017
1301:2017
1242:2020
1226:ISSN
1161:2019
1143:ISBN
840:for
642:and
481:NATO
464:. A
415:mole
380:and
151:NCSC
58:and
3246:NPR
2551:CNN
2091:MSN
2087:CNN
762:’s
640:IBM
285:FBI
193:'s
174:FBI
134:in
4240::
3925:zh
3901:zh
3879:zh
3509:,
3440:.
3404:^
3386:.
3360:.
3354:.
3327:.
3321:.
3290:.
3267:.
3249:.
3243:.
3222:.
3210:^
3200:.
3196:.
3192:.
3178:^
3157:^
3135:.
3123:^
3105:.
3099:.
3087:^
3069:.
3063:.
3036:.
3032:.
3018:^
3000:.
2996:.
2969:.
2965:.
2941:.
2929:^
2911:.
2905:.
2886:.
2874:.
2868:.
2849:.
2837:.
2833:.
2806:.
2800:.
2773:.
2767:.
2755:^
2714:.
2703:^
2693:.
2681:.
2677:.
2650:.
2646:.
2548:.
2536:^
2517:.
2505:^
2486:.
2474:^
2455:.
2443:^
2291:.
2261:.
2255:.
2222:.
2205:.
2193:.
2187:.
2140:.
2126:^
2107:.
2085:;
2053:.
2045:.
2041:.
2014:.
2010:.
1983:.
1979:.
1967:^
1949:.
1945:.
1923:^
1901:.
1871:.
1839:.
1808:^
1787:}}
1783:{{
1768:.
1742:.
1716:.
1687:.
1653:.
1623:.
1597:.
1591:.
1564:.
1558:.
1527:.
1497:.
1470:.
1425:^
1402:^
1384:.
1380:.
1348:.
1322:.
1318:.
1287:.
1259:^
1232:.
1224:.
1218:.
1151:.
1103:^
1078:^
803:.
782:,
778:,
774:,
770:,
734:.
631:.
600:.
554:.
546:,
499:.
485:EU
421:.
263:,
212:,
169:.
95:.
75:,
3892:)
3556:e
3549:t
3542:v
3450:.
3398:.
3372:.
3339:.
3306:.
3228:.
3151:.
3117:.
3081:.
3048:.
3012:.
2981:.
2923:.
2818:.
2785:.
2662:.
2632:.
2587:.
2561:.
2530:.
2499:.
2468:.
2437:.
2411:.
2385:.
2359:.
2333:.
2306:.
2273:.
2240:.
2158:.
2120:.
2065:.
2026:.
1995:.
1961:.
1917:.
1887:.
1857:.
1793:)
1779:.
1753:.
1727:.
1702:.
1669:.
1639:.
1609:.
1576:.
1543:.
1513:.
1483:.
1396:.
1366:.
1334:.
1303:.
1244:.
1163:.
33:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.