We reviewed the Chinese intelligence community structure, the way they collect data and, as a result of the first two, also tackled the monolith myth of China in order to explain why most things you hear about Chinese cyber activities do not make sense nor survive any closer analysis. Now it is time we have a look at Chinese cyber capabilities and their use. This is Part 4 of the four part series: Chinese intelligence structures The Chinese way of collecting data [China: the monolith myth]((http://playgod.
Diversity that is China China is always seen by the West as a big, monolithic country. That nothing could be further from the truth does not shake that popular wisdom, which is typical of cultural biases and heuristics. After all, our brain is mostly wired to deal with small communities of similar people - it is nigh impossible to consider the country with the population size of China. This is Part 2 of the four part series: Chinese intelligence structures The Chinese way of collecting data This post Cyber espionage - the Chinese way China has
Just like the Russian intelligence services make a great deal of using traditional tradecraft and Western agencies prefer clear-cut approach which leaves no doubt in the asset’s mind who they are working for so the Chinese approach has a typical modus operandi… This is Part 2 of the four part series: Chinese intelligence structures This post China: The Monolith Myth Cyber espionage - the Chinese way The Chinese agents cultivate their assets for a long period of time, building friendly relations and discussing mutual benefits.
Too often we hear about the “Chinese threat” which generally makes Chinese army and polity seem like a monolithic structure: to the (uninformed) outsiders, the journalists covering the issue, and too often to the cyber security experts China is a well-organised single entity - a hivemind if there ever was one in the human history. That this kind of thinking beggars belief on even slightly closer examination just goes to show how well the sceptre of “Chinese Threat” was been sold to the general populace.
[gallery] icontherecord: Statement by Director of National Intelligence James R. Clapper on Allegations of Economic Espionage September 8, 2013 It is not a secret that the Intelligence Community collects information about economic and financial matters, and terrorist financing. What we do not do, as we have said many times, is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of - or give intelligence we collect to - US companies to enhance their international competitiveness or increase their bottom line.
Iran: How a Third Tier Cyber Power Can Still Threaten the United States | Atlantic Council I read the SitRep so you don’t have to. Unless you have time for silliness. In which case maybe you can read some other situation report that’s done by actual intelligence analysts. Anyway, the paper starts off with an interesting premise: >But what if the response came in the form of an anonymous cyber attack that shut down the New York Stock Exchange for a few hours?
Early analysis suggests that ‘Flame’ is a complex, sophisticated threat. In terms of the actual size of the programming code behind it, ‘Flame’ is massive. Depending on the source, though, ‘Flame’ is either the most dangerous, insidious malware threat ever discovered, or simply a solid cyber attack that caught much of the industry with its proverbial pants down. 'Flame': Lethal Cyberweapon or Media Hype? | PCWorld Business Center