{"id":1709,"date":"2018-07-01T16:56:14","date_gmt":"2018-07-01T16:56:14","guid":{"rendered":"http:\/\/www.blackopspartners.com\/?p=1709"},"modified":"2018-07-01T16:56:14","modified_gmt":"2018-07-01T16:56:14","slug":"chinese-economic-theft","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/chinese-economic-theft\/","title":{"rendered":"Chinese economic theft"},"content":{"rendered":"

China\u2019s ongoing cyber war against the U.S. has been underway for decades. Intent on stealing intellectual property from private industry, China\u2019s hacking and spying fuels its economic prosperity.<\/p>\n

On this episode of CyberChat, host Sean Kelley, former EPA CISO, discusses the Chinese military\u2019s for-profit ventures with Joshua Philipp, an investigative journalist at the Epoch Times, which covers national security and politics.<\/p>\n

Listen to the podcast here<\/a>.<\/p>\n

When it comes to war against the U.S., China, Iran, and Russia are key players.<\/p>\n

\u201cChina is the most aggressive and largest player in this field. Russia is more of a distant enemy in this age. A lot of what China is using now are methods Russia used during the cold war,\u201d Philipp said. He noted their tactics are laid out in Unrestricted Warfare, a book on military strategy written by Chinese generals. The book details methods of waging unconventional war through political action to cause policy changes, economic warfare or cyber attacks.<\/p>\n

Philipp said China is also targeting the U.S. through forced technology transfer, the \u201cstealing of technologies and using them to surpass the West or replace the West as the world leader.\u201d The essence of technology transfer is to transfer knowledge, skills, methodologies and technologies from one company or country to another. \u201cThis type of trans-economic theft requires a lot more planning or systems in place to achieve the goal, or a hacker army,\u201d said Philipp. He added that unit 61298, one of the 22 operational bureaus of the hacker army, focuses on waging warfare against American companies, organizations and government agencies.<\/p>\n

Philipp also said China\u2019s surveillance system uses supercomputing powers. \u201cIn the U.S., there are a lot of private companies collecting the data, but in China, everything is collected under one centralized system. The Chinese communist party has information on every purchase you make, who your friends are, what your beliefs are, what your ideologies are, facial recognition, where you are going. All of this information is collected to give you a social credit score, which determines what you can and can\u2019t do. Your freedoms are determined how well you adhere to the social credit system,\u201d said Philipp.<\/p>\n

Top Takeaways<\/h2>\n
    \n
  1. Iran, Russia and China are actively waging war against the U.S., but China is the most aggressive and largest.<\/li>\n
  2. China has a hacker army, with over 22 operational bureaus.<\/li>\n
  3. Unrestricted Warfare, a well-known Chinese military strategy book, lays out unconventional war techniques.<\/li>\n
  4. The goal behind forced technology transfer is to surpass the West.<\/li>\n
  5. China is the largest surveillance state in the world.<\/li>\n
  6. The Chinese Communist Party collects information about citizens to enforce the social credit system.<\/li>\n<\/ol>\n

     <\/p>\n

    Originally published at Federal News Radio<\/a>.<\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

    China\u2019s ongoing cyber war against the U.S. has been underway for decades. Intent on stealing intellectual property from private industry, China\u2019s hacking and spying fuels its economic prosperity. On this episode of CyberChat, host Sean Kelley, former EPA CISO, discusses the Chinese military\u2019s for-profit ventures with Joshua Philipp, an investigative journalist at the Epoch Times, […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1709"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=1709"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1709\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=1709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=1709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=1709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}