ChinaWiki
Search
  • Home
  • All
  • Travel
  • Singers
  • Hot
  • Movie
  • Music
  • Personage
  • ScenicSpot
  • Food
  • Provinces
  • Opera
  • WebSite
  • Insurance
  • Banks
  • Dynasty
  • Hotels
  • Idiom
  • Schools
  • Performers
Home > List > News > Hot

The United States has started using this method to steal trade secrets from Chinese companies

Time: 2024-12-22 21:30:39 Author: ChinaWiki.net

A few days ago, the National Internet Emergency Center announced two cyber attacks by the United States against large scientific and technological enterprises and institutions in China

According to Tan Zhu's statistics on the recent two years of cyber attacks in the United States, the main body of US attacks is changing. In addition to well-known entities such as the Central Intelligence Agency (CIA), the US military is increasingly launching cyber attacks against foreign countries

Why did such a change occur

Tan Zhu has previously sorted out the intelligence agencies in the United States, which can be divided into:

individual intelligence agencies such as the Central Intelligence Agency (CIA)

intelligence agencies of the US Department of Justice, including the Federal Bureau of Investigation (FBI) and the National Security Intelligence Agency (ONI)

intelligence agencies under the respective business departments of the US Treasury, Department of Energy, State Department, etc.

the US Cyber Command (USCYBERCOM) of the military system

Now, a large number of cyber attacks against foreign countries are carried out by the US Cyber Command.. The US Cyber Command is under the jurisdiction of the US Department of Defense and is an intelligence agency of the US military

That is to say, the US military has become the main body of cyber attacks

This can also be confirmed in the policies of the United States. In the newly released National Cybersecurity Strategy Implementation Plan of the United States this year, the number of times the term "US Department of Defense" appears has increased by about 30% compared to last year

The newly added section mentions the implementation of the US Department of Defense Cybersecurity Strategy, which is the first strategy developed by the US Department of Defense based on major cyberspace operations

Looking at this strategy, Tan Zhu found that its operational implications were very clear, explicitly mentioning the need to "win national wars in cyberspace and establish asymmetric advantages over other countries"

Previously, the US Cyber Command had conducted 37 "forward hunting" operations in 20 countries around the world, conducting militarized cyber attacks and operations by dispatching cyber warfare forces overseas. Now, such actions are still intensifying

To better understand the US military's emphasis on cyber attack capability, we can start with these two cases announced by the National Internet Emergency Center

These two cases involve a certain advanced material design and research unit and a large high-tech enterprise in smart energy and digital information in China, respectively, and the stolen information is commercial secrets

In cyber attacks, stealing trade secret information is mainly aimed at gaining a competitive advantage in economic competition. Trade secret information includes the assets, personnel, internal organizational structure, development direction, and other information of the enterprise. But the purpose of stealing this information is not limited to this, and the United States can further launch other destructive actions based on this

Last year, a study funded by the US State Department found that China has a leading advantage in all 12 categories of advanced materials, and 7 categories are significantly ahead, including nanoscale materials, coating materials, advanced composite materials, etc

It is worth noting that this study has also become a reference information for the US China Economic and Security Review Commission, an official organization specialized in evaluating China's economic development

These materials are mainly used in industries such as semiconductors, aerospace, and medical devices. These industries are precisely the key sectors in which the United States plans to engage in strategic competition with China

In the face of these issues, the solution proposed by the US economic and trade authorities is to contain China's development through "decoupling and chain breaking". But the thinking of the US military is more direct

The United States Military Academy at West Point has an institution dedicated to providing intellectual support to the US military - the Institute of Modern Warfare. This year, the agency conducted research on the US military's views on national security and found that US military strategists, planners, and combatants are frustrated with China's rise and tend to take action

Therefore, the US military holding this mindset will have more dangerous strategic goals, including "significantly weakening the Chinese economy" and "seeking complete decoupling of the two economies"

In addition, the US military targets Chinese companies not only for economic purposes

The other event announced this time involves the fields of energy and digital information, which belong to the critical information infrastructure sector. Currently, most of the critical information infrastructure in countries around the world is operated by enterprises, but they affect national security. This incident reflects that national security remains the focus of US cyber attacks on us, and this has not changed for a long time

Data shows that in the first quarter of this year alone, there were over 2000 cyber attacks from the United States mainland and its overseas military bases worldwide, targeting multiple countries including China, mainly critical information infrastructure and other targets

The high frequency is due to the low threshold for launching network attacks

The two incidents announced this time have one thing in common, that is, the attackers used vulnerabilities in computer software or systems to invade the company's servers, place trojans, control the company's equipment, and complete the theft

This type of network attack technique is very common and lacks specificity. Vulnerabilities are widely present in computer software and systems, and discovering and fixing vulnerabilities is a dynamic management process that makes it difficult to completely avoid their occurrence

The National Defense University, which is directly affiliated with the US military system, has a saying: A high school student cannot spend a few nights crouching in front of a keyboard to create an F-22 fighter jet, but it is enough to create a cyber attack weapon that can destroy large enterprises and military networks

The person who first said this sentence had served in the US military and was responsible for network operations

This statement not only proves that cyber attacks are easy to launch, but also reflects the intention of the US military to develop cyber attack capabilities

This change can be seen from the changes in the US military budget

From the above figure, it can be seen that the US Cyber Command has different branches of cyber command. Originally, these military branches were each responsible for providing funding to their own cyber warfare units. In 2022, the US Congress granted the US Cyber Command greater budgetary authority to directly control the planning, projects, budgeting, and execution of US cyber warfare forces

This means that the US military's cyber warfare capabilities are beginning to integrate

In 2022, a report from the US Government Accountability Office found various problems with the method of forming cyber forces by each military branch. Another survey of frontline officers from multiple military branches found that there is a phenomenon of uneven skill training among the network forces of different military branches, and their collaborative combat capabilities are also deteriorating

It is precisely in the face of these issues that the call for establishing an independent cyber force is growing

Independent forces mean the ability to operate independently, but the US cyber forces have inherent flaws

From the job distribution of the US Cyber Command, it can be seen that only one part is truly responsible for operations, and there are two other parts: the Cyber Defense Force and the National Cyber Mission Force. As the name suggests, they are mainly responsible for defense and information technology support work

Statistics show that less than 3% of the US Cyber Command actually carries out cyber operations

That is to say, the US cyber forces originally focused more on defense capabilities

Therefore, in the past two years, building offensive forces has become a key direction of the US Cyber Command

This year, the US Cyber Command allocated nearly $90 million to build an offensive cyber platform. At the same time, in this year's US defense budget, multiple projects for building cyber weapons explicitly mention the need to incorporate offensive networks into actual combat operations, create lethal cyber warfare tools, and achieve comprehensive cyber offensive operations

In this context, it is timely and necessary for us to announce the US cyber attack on our large technology enterprise institutions. Because while building its cyber warfare capabilities, the United States is also attempting to shape international rules in cyberspace

Currently, there are two sets of international rules regarding cyberspace: the United States advocates that cyber attacks should be classified as legal and illegal, cyber attacks for national security, military, intelligence, and other reasons are legal, and only commercial espionage is illegal. So the United States has always disguised its attacks as legitimate and accused other countries of commercial espionage. Countries represented by China advocate the theory of cyber sovereignty, stating that any form of cyber attack is illegal

The reason why the United States has such a binary division is to facilitate its own fabrication of "security" reasons to launch cyber attacks on other countries at any time, because the United States adopts a "presumption of guilt" approach - after sorting out the process of launching cyber attacks by the United States, Tan Zhu found that as long as it believes that the other party "may" pose a security threat to the United States, it will unilaterally launch cyber attacks

This time, the United States launched cyber attacks on Chinese companies for its own competitive interests, stealing trade secrets, which clearly does not even comply with the United States' own "legitimate" reasons. This also thoroughly exposes the hypocrisy of the United States' binary division of cyber attacks

This once again demonstrates that the United States' malicious intentions to suppress China have not changed. If there is no competition, then steal and rob. This is the essence of bandits

ChinaWiki


Chinese Edition

 

Ask a Question
Question Summary (100 characters)
Details (2,000 characters)
Name Country Email
 
Reply
Details (2,000 characters)
Name Country Email
Captcha captcha
Related Articles
  • 1.National Post Office: more than 1.74 billion express packages were delivered during the Dragon Boat Festival holiday

    People's daily, Beijing, June 15 (reporter Qiao Xuefeng) - the reporter learned from the state post office that during the Dragon Boat Festival holiday in 2021, the national postal express industry maintains a good situation of overall safe, stable, high

    Time 2021-06-15
  • 2.After six months of trial, the Kwai Chung announced that it will cancel the "big week" from July 1st and will work overtime as required.

    In June 24th, the Kwai Fu announced that it would cancel the week and week from July 1st, and the staff would work overtime as required. The company pays overtime wages to employees according to relevant regulations, pays 2 times the wages to employees on

    Time 2021-06-24
  • 3.3-year-old children in swimming pool "upside down"! Xuzhou 11-year-old's textbook style saving lives

    The 11-year-old boy on one side immediately rescued him,

    Time 2021-06-26
  • 4.Two graduates did not hesitate to help the elderly who fell down

    June 22, Nanjing, Jiangsu. An old cyclist accidentally fell down and the electric car was pressed on his leg, making him unable to move. Seeing this, two young people rushed to the rescue immediately and left silently after the police contacted the elderl

    Time 2021-06-29
  • 5.Two men from Shandong went to Shengzhou, Zhejiang Province to find their relatives. They learned that they were brothers

    According to Shengzhou police in Shaoxing, Zhejiang Province, two Shandong men went to Shengzhou, Shaoxing, Zhejiang Province to look for relatives. After meeting their relatives in Shengzhou, they learned that they were brothers with blood thicker than w

    Time 2021-12-08
  • 6.Sun WuKong (The Monkey King)

    The Monkey King (also known as the Great Sage of Qi Tian, the Sun Walker, and the Buddha) is one of the main characters in the Chinese classical magic novel Journey to the West (said to be written by Wu Chengen). It was bred from the immortal stone that c

    Time 2022-09-21
  • 7.Jack Ma appears in Alibaba's new global headquarters park

    On November 29th, according to a reporter from The Paper, Alibaba founder Jack Ma appeared in the Alibaba Xixi C area located in Hangzhou Future Science and Technology City. This is the area that Alibaba officially put into use in May this year and is als

    Time 2024-11-29
  • 8.Holding a cocktail party to celebrate the 25th anniversary of Macau's return to the motherland

    About 1400 people, including He Houhua, Vice Chairman of the National Committee of the Chinese People's Political Consultative Conference, Cen Haohui, Chief Executive of the Macao Special Administrative Region, Cui Shi'an and He Yicheng, f

    Time 2024-12-21
  • 9.Xi Jinping cares about the new chapter of cooperation and development between the two regions

    In the new neighborhoods of Hengqin Macau, familiar living scenes can be seen everywhere, such as dark green road signs, Portuguese style stone faced plazas, and single license plate cars passing by, making Macau residents feel like they are on familiar s

    Time 2024-12-22
  • 10.Joint maritime patrols between China and Vietnam demonstrate mutual trust

    According to the Russian Sputnik News Agency website on December 28, the 17th annual meeting of China Vietnam joint patrol in the Beibu Gulf was successfully held in Guangzhou a few days ago. In an interview with Sputnik News Agency, Chinese experts

    Time 2024-12-31
  • 11.Chinese concrete paves the way for African prosperity

    In many ways, the future of Uganda's economy is paved with concrete from China. Although it may sound like a fairy tale in the field of infrastructure, it is an undeniable fact

    Time 2025-01-19
  • 12.By 2025, China will comprehensively expand domestic demand

    General Secretary Xi Jinping emphasized the need to actively expand domestic demand and create more consumption scenarios to continuously unleash consumption and investment potential. When deploying key tasks for 2025, the Central Economic Work Conference

    Time 2025-02-05
Website directory
About
News
History
Culture
Laws
Others
LearningChineseMandarin
About Us Privacy
Copyright © 2019-2025 chinawiki.net All rights reserved. China, an ancient and beautiful oriental country.