{"id":1999,"date":"2018-12-21T13:29:07","date_gmt":"2018-12-21T13:29:07","guid":{"rendered":"http:\/\/www.blackopspartners.com\/?p=1999"},"modified":"2018-12-21T13:29:07","modified_gmt":"2018-12-21T13:29:07","slug":"fbi-director-christopher-wrays-remarks-regarding-indictment-of-chinese-hackers","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/fbi-director-christopher-wrays-remarks-regarding-indictment-of-chinese-hackers\/","title":{"rendered":"FBI Director Christopher Wray\u2019s Remarks Regarding Indictment of Chinese Hackers"},"content":{"rendered":"\n

Remarks prepared for delivery.<\/em><\/p>\n\n\n\n

Thank you, Deputy Attorney General Rosenstein.<\/p>\n\n\n\n

As evidenced by this investigation, the threats we face have never been more pervasive or more potentially damaging to our national security. And no country poses a broader, more severe, and long-term threat to our nation\u2019s economy and cyber infrastructure than China.<\/p>\n\n\n\n

China\u2019s goal, simply put, is to replace the U.S. as the world\u2019s leading superpower\u2014and they\u2019re breaking the law to get there. They\u2019re using an expanding set of non-traditional and illegal methods. And Chinese state-sponsored actors are the most active perpetrators of economic espionage against us.<\/p>\n\n\n\n

In short, they seek to strengthen themselves and weaken the United States. And while we welcome fair competition, we cannot and will not tolerate illegal hacking, stealing, and cheating.<\/p>\n\n\n\n

Now, we\u2019re not talking about the Chinese people as a whole. We\u2019re focused on state-sponsored actors engaged in illegal behavior. These aren\u2019t just Chinese officials, employed by the Chinese government. They can be hackers, businessmen, researchers, or front companies acting on behalf of state actors. And often they\u2019re recruiting or co-opting employees of American companies\u2014people who are trusted insiders.<\/p>\n\n\n\n

As noted, the actors named in this indictment were members of a hacking group operating in China that is associated with the Chinese Ministry of State Security\u2014a group known as APT 10. The members of APT 10 conducted major computer intrusion campaigns, targeting U.S. government agencies and companies both in the U.S. and around the world, and stealing hundreds of gigabytes of intellectual property and confidential business information.<\/p>\n\n\n\n

The list of victim companies reads like a \u201cWho\u2019s Who\u201d of the global economy\u2014from biotechnology to agriculture to health care, and from oil and gas exploration to NASA.<\/p>\n\n\n\n

Healthy competition is good for the global economy. Criminal conduct is not. Rampant theft is not. Cheating is not.<\/p>\n\n\n\n

There\u2019s no light on this issue between the United States and our law-abiding international partners. We\u2019re all standing shoulder-to-shoulder to condemn this conduct.<\/p>\n\n\n\n

The scope of this investigation was broad, as you might imagine, including our FBI field offices in New Orleans, New York, Sacramento, San Antonio, and Houston.<\/p>\n\n\n\n

And we\u2019re incredibly grateful not only to our DOJ colleagues, but to our partners at the Naval Criminal Investigative Service, the Defense Criminal Investigative Service, and the Department of Homeland Security for their work. We also appreciate our partners in the Department of Defense\u2019s Computer Forensic Laboratory, who worked with us as we analyzed hundreds of malware samples. With this malware, FBI and NCIS investigators found key links between major victims and APT 10\u2019s \u201ccommand and control\u201d infrastructure.<\/p>\n\n\n\n

After identifying additional victims here in the United States and around the world, the FBI\u2019s Cyber Action Team\u2014our elite rapid deployment unit\u2014and our cyber counterparts at DHS deployed to multiple locations to provide technical support and investigative assistance. And we worked with our counterparts in the NCIS to investigate APT 10\u2019s theft of personally identifiable information from more than 100,000 U.S. Naval service members.<\/p>\n\n\n\n

We\u2019re deeply concerned about American innovation ending up in the wrong hands, including by nation-states like China, intent on stealing the fruits of our research, our economic investment, our development, and our hard work for their own gain.<\/p>\n\n\n\n

This is conduct that hurts American businesses, American jobs, and American consumers. The Chinese government\u2019s not pulling any punches. They want what we have so they can get the upper hand on us. And they\u2019re highly strategic in their approach\u2014they\u2019re playing the long game.<\/p>\n\n\n\n

But let me make it perfectly clear: No country should be able to flout the rule of law So we\u2019re going to keep tackling this illegal behavior with everything we\u2019ve got\u2014every investigative technique, every piece of intelligence, and every partnership, from our federal, state, local, and international partners, to our private sector, community, and academic partners.<\/p>\n\n\n\n

And we\u2019re going to keep calling out this state-sponsored behavior for what it is\u2014illegal, unethical, and unfair.<\/p>\n\n\n\n

It\u2019s going to take all of us working together to protect our economic security and our way of life. The American people expect and deserve no less.<\/p>\n\n\n\n

Read more at <\/em>FBI.gov<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Remarks prepared for delivery. Thank you, Deputy Attorney General Rosenstein. As evidenced by this investigation, the threats we face have never been more pervasive or more potentially damaging to our national security. And no country poses a broader, more severe, and long-term threat to our nation\u2019s economy and cyber infrastructure than China. China\u2019s goal, simply […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1999"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=1999"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1999\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=1999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=1999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=1999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}