Conversation
08.18.15

How Should the U.S. Conduct the Xi Jinping State Visit?

Evan A. Feigenbaum, Arthur Waldron & more

As tensions increase between China and the United States over the value of the yuan, human rights violations, alleged cyber attacks, and disputed maritime territories, among other issues, how should the Obama administration conduct the upcoming...

Viewpoint
04.22.15

Will China’s New Anti-Terrorism Law Mean the End of Privacy?

Scott D. Livingston

A newly drafted Chinese anti-terrorism law, if enacted in its current form, will empower Beijing to expand its already nearly unchecked policing of the...

IBM Venture With China Stirs Concerns

IBM is running into Obama pressure to persuade Beijing to drop new measures that require American companies to hand over technology in exchange for market access.

Conversation
04.01.15

New Chinese Cyberattacks: What’s to Be Done?

Steve Dickinson, Jason Q. Ng & more

Starting last week, hackers foiled a handful of software providers that promote freedom of information by helping web surfers in China reach the open Internet. The...

Caixin Media
02.09.15

In China, Quantum Communications Comes of Age

This may be a quantum leap year for an initiative that accelerates data transfers close to the speed of light with no hacking threats through so-called quantum communications technology.

Within months, China plans to open the world's...

Warring State: China’s Cybersecurity Strategy

Center for a New American Security

Research Associate Amy Chang explores the political, economic, and military objectives of China’s cybersecurity apparatus; reveals drivers and intentions of Chinese activity in cyberspace; and analyzes the development of Beijing’s cybersecurity...

Chinese Hackers Pursue Key Data on U.S. Workers

Chinese hackers in March broke into the computer networks of the United States government agency that houses the personal information of all federal employees, according to senior American officials.

Conversation
07.09.14

The U.S. and China Are At the Table: What’s At Stake?

William Adams & Zha Daojiong

U.S. Secretary of State John Kerry and Treasury Secretary Jack Lew are in Beijing this week for the sixth session of the high level bilateral diplomatic exchange known as the Strategic and Economic Dialogue. We asked contributors what's likely to...

Culture
07.01.14

Inside the Mind of a Chinese Hacker

Emily Parker

In May, the U.S. announced the indictment of five Chinese hackers for breaking into the computers of U.S. companies. The men went by code names like UglyGorilla and KandyGoo. A recent report revealed that the hackers, who worked for Unit 61398 of...

China Calls Out Cisco For Cyber Snooping

China Youth Daily claimed that Cisco, “carries on intimately with the U.S. government and military, exploiting its market advantage in the Chinese information networks."

 

Hacker Group in China Linked to Big Cyber Attacks

Researchers at Symantec Corp have discovered a group of highly sophisticated hackers operating for hire out of China, a U.S. computer security company said, and it linked them to some of the best-known espionage attacks in recent years....

Viewpoint
07.10.13

How the Snowden Affair Might End Up Helping U.S.-China Relations

Orville Schell & John Delury

The reason why both Americans and Chinese have become so nostalgic for the great Nixon/Kissinger-Mao Zedong/Zhou Enlai breakthrough in 1972 is because that was the last time that Sino-U.S. relations experienced a dramatic breakthrough. Now, most...

U.S. to Press China on Cyber Theft: Lew

U.S. Treasury Secretary Jack Lew has said he will keep up pressure on China over cyber security, especially stealing of intellectual property and trade secrets, which he sees as separate from other Internet-related issues between the two...

Conversation
06.18.13

What’s Right or Wrong with This Chinese Stance on Edward Snowden?

Shai Oster & Steve Dickinson

For today’s ChinaFile Conversation we asked contributors to react to the following excerpt from an op-ed published on Monday June 17 in the...

Conversation
06.13.13

Who’d You Rather Be Watched By: China or the U.S.?

Tai Ming Cheung, Andrew J. Nathan & more

Reports of U.S. gathering data on emails and phone calls have stoked fears of an over-reaching government spying on its citizens. Chinese artist...

NSA surveillance: The US is behaving like China

Officials always think what they do is necessary, and firmly believe they do what is best for the state and the people. But the lesson that people should learn from history is the need to limit state power, says Ai Weiwei.

 

Inside the NSA's Ultra-Secret China Hacking Group

According to a number of confidential sources, a highly secretive unit of the National Security Agency (NSA), called the Office of Tailored Access Operations (TAO), has successfully penetrated Chinese computer and telecommunications systems for...

Pages