{"id":574,"date":"2015-09-15T17:06:05","date_gmt":"2015-09-15T17:06:05","guid":{"rendered":"http:\/\/54.201.249.27\/?p=574"},"modified":"2015-09-15T17:06:05","modified_gmt":"2015-09-15T17:06:05","slug":"china-makes-hackers-an-offer-they-cant-refuse","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/china-makes-hackers-an-offer-they-cant-refuse\/","title":{"rendered":"CSO Online: China makes hackers an offer they can\u2019t refuse"},"content":{"rendered":"

When China identifies a potential hacker with promise, they show up to their home with automatic weapons to give them, and their family, a choice of hacking for the government, or being shipped away.<\/p>\n

In the first of a series of The Irari Report webcasts on Chinese hacking and cyberespionage, Ira Winkler and Araceli Treu Gomes interview Lt. Col. (retired) William Hagestad II, former US Marine Intelligence Officer, expert on foreign cyberwarfare capability, and author of\u00a0Chinese Cyber Crime: China\u2019s Hacking Underworld<\/a>\u00a0about Chinese hackers. Lt. Col. Hagestad details how China drafts hackers into their military ranks. He then goes into how they come to believe that they are performing a patriotic duty for their country.<\/p>\n

Hagestad then goes into how Chinese government hackers feel animosity to the US and other western countries. He also discusses how Chinese hackers ostracize other hackers who obtain employment at foreign companies.<\/p>\n

 <\/p>\n

Read the original post on CSO Online<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

When China identifies a potential hacker with promise, they show up to their home with automatic weapons to give them, and their family, a choice of hacking for the government, or being shipped away.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/574"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=574"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/574\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}