{"id":566,"date":"2015-09-11T17:36:14","date_gmt":"2015-09-11T17:36:14","guid":{"rendered":"http:\/\/54.201.249.27\/?p=566"},"modified":"2015-09-11T17:36:14","modified_gmt":"2015-09-11T17:36:14","slug":"hacking-and-espionage-fuel-chinas-growth","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/hacking-and-espionage-fuel-chinas-growth\/","title":{"rendered":"Epoch Times: How Hacking and Espionage Fuel China\u2019s Growth"},"content":{"rendered":"

Elements of China\u2019s military, state, business, and academia have been interwoven over decades and organized around one goal: stealing secrets from the West. This regime of theft takes with impunity, powering China\u2019s economy and high-tech military, while robbing the United States alone of trillions in value each year.<\/p>\n

Very late in the game, the United States has started to respond. The U.S. Justice Department made headlines in May 2014 by indicting five Chinese military hackers from Unit 61398 for their alleged role in economic theft.<\/p>\n

The system, however, doesn\u2019t stop at military hackers. Organizations throughout China work as \u201ctransfer centers\u201d that process stolen information into usable designs. Official programs facilitate the theft. And the whole system runs through a corrupt nexus among government officials, military officers, business executives, and academics throughout China.<\/p>\n

There is a nearly constant stream of news stories about cyberattacks and spies stealing technology from the West, but the true scale of the cyberattacks and breaches by spies goes far beyond what\u2019s reported.<\/p>\n

This article is the last of a\u00a0four-part investigative series<\/a><\/strong>\u00a0that has been two years in the making. Tapping the knowledge of intelligence and security experts, it reveals the inner workings of a state-sanctioned program to rob the West and feed China\u2019s economic growth and military strength.<\/p>\n

\u201cWe are seeing only a fraction of actual data breaches reported in the U.S. Many of the data breaches reported in 2014 were of retailers, where compromised consumer personally identifiable information (PII) is required to be reported,\u201d said Casey Fleming, chairman and CEO of BLACKOPS Partners Corp.<\/p>\n

Read the full article on The Epoch Times<\/a><\/p>\n

 <\/p>\n

Read the 4-part series Murder, Money and Spies<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Elements of China\u2019s military, state, business, and academia have been interwoven over decades and organized around one goal: stealing secrets from the West. This regime of theft takes with impunity, powering China\u2019s economy and high-tech military, while robbing the United States alone of trillions in value each year.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6,8],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/566"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=566"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/566\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}