U.S. Developing Sanctions Against China over Cyberthefts
Obama is developing unprecedented economic sanctions against Chinese who have benefited from government cybertheft of U.S. trade secrets.
Obama is developing unprecedented economic sanctions against Chinese who have benefited from government cybertheft of U.S. trade secrets.
Approaching Beijing on the basis of strength and example, not weakness and appeasement.
As tensions increase between China and the United States over the value of the yuan, human rights violations, alleged cyber attacks, and disputed maritime territories, among other issues, how should the Obama administration conduct the upcoming...
First codenamed "Dancing Panda" by U.S. officials was detected in April 2010, according to a top secret NSA briefing from 2014.
Hong Kong has a provision on national security law-Article 23, stating that it can enact laws to prohibit any act of treason, secession, sedition, or subversion.
New language in the rules calls for a “national security review” of the technology industry — including network and other products and services — and foreign investment.
The dialogues will help pave the way for President Xi Jinping's state visit to the U.S. in September.
Deep Panda is one of several hacking groups that cybersecurity companies accuse of hacking U.S. networks.
Chinese intruders' attack gave them “administrator privileges” into Office of Personnel Management computer networks.
The attackers compromised websites frequented by Chinese journalists as well as China’s Muslim Uighur ethnic minority.
U.S. officials said the probe into a massive breach of federal government networks has yielded growing signs of a direct Chinese role.
Hacks possibly compromised the personal data of 4 million current and former federal employees.
A newly drafted Chinese anti-terrorism law, if enacted in its current form, will empower Beijing to expand its already nearly unchecked policing of the...
China concerned about New Zealand and U.S. intelligence plan to hack Chinese government buildings in Auckland.
IBM is running into Obama pressure to persuade Beijing to drop new measures that require American companies to hand over technology in exchange for market access.
Tsinghua Unigroup in talks to buy a controlling stake in Hewlett-Packard unit H3C Technologies.
It's unclear how she would manage two of America's most important and complex relationships.
“There’s no smoking gun...,but all signs point to China” Bryce Boland told TechCrunch.
Obama used existing authority to impose economic sanctions on North Korea, but the new order will expand his options.
Hijacking the computers of millions of innocent Internet users around the world shows China's disregard for Internet governance norms.
In recent attacks on sites that try to help Internet users in China circumvent censorship, the Great Firewall appears to have been used as a weapon.
GreatFire.org’s “mirrored” websites and the Internet bandwidth-sharing service Lantern have allowed users to access the open Internet.
IBM must help China build its IT industry rather than viewing the country solely as a sales destination or manufacturing base.
An updated military document for the first time admits that the Chinese government sponsors offensive cyber units.
GreatFire.org has been under an unprecedented denial-of-service attack, receiving more than 2 billion requests per hour.
Obama this week said China would have to change the draft law if it were "to do business with the United States".
Top Internet regulator has warned foreign companies to behave if they want to stay in China’s $450 billion technology market.
U.S. brands Cisco, Apple, Intel, McAfee and Citrix Systems may be the first to suffer.
Common spoke about dreams of better lives, including “people in Hong Kong fighting for democracy."
This may be a quantum leap year for an initiative that accelerates data transfers close to the speed of light with no hacking threats through so-called quantum communications technology.
Within months, China plans to open the world's...
On the streets of the neon-lit Chinese city of Shenyang, you'll find a restaurant, hotel, and other businesses owned and operated by the North Korean government. You'll also find a secret network of North Korean hackers, known as Bureau 121,...
Research Associate Amy Chang explores the political, economic, and military objectives of China’s cybersecurity apparatus; reveals drivers and intentions of Chinese activity in cyberspace; and analyzes the development of Beijing’s cybersecurity...
What does it mean for cybersecurity?
China says rules aim to 'Help Build a Clean Cyberspace' and safeguard national security
After years of cyberattacks on the networks of high-profile government targets like the Pentagon, Chinese hackers appear to have turned their attention to far more obscure federal agencies.
Chinese hackers in March broke into the computer networks of the United States government agency that houses the personal information of all federal employees, according to senior American officials.
U.S. Secretary of State John Kerry and Treasury Secretary Jack Lew are in Beijing this week for the sixth session of the high level bilateral diplomatic exchange known as the Strategic and Economic Dialogue. We asked contributors what's likely to...
Using Chinese government websites, academic databases and foreign security expertise, The Wall Street Journal assembled an overview of some secret operations of China's global monitoring organization, the Third Department of the People's...
In May, the U.S. announced the indictment of five Chinese hackers for breaking into the computers of U.S. companies. The men went by code names like UglyGorilla and KandyGoo. A recent report revealed that the hackers, who worked for Unit 61398 of...
Chinese officials are ramping up political and economic pressure on the United States following indictments against five members of the Chinese Army on charges of economic cyberespionage.
China Youth Daily claimed that Cisco, “carries on intimately with the U.S. government and military, exploiting its market advantage in the Chinese information networks."
A Chinese Internet information body said an investigation has confirmed "the existence of snooping activities directed against China" by the U.S., as exposed by former National Security Agency contractor Edward Snowden.
China will establish new procedures to assess potential security problems with Internet technology and services used by sectors “related to national security and the public interest.”
Prosecutors building a case against Wang Dong, one of five Chinese military hackers indicted for economic espionage, were helped by Wang’s apparent willingness to break a cardinal rule of spying: Leave no tracks.
On Monday, the United States Attorney General Eric Holder accused China of hacking American industrial giants such as...
New documents show that the U.S. National Security Agency penetrated the large Chinese telecommunications firm Huawei, gathering information about its operations.
Government committee is established to manage western threats to cyber and national security.
Researchers at Symantec Corp have discovered a group of highly sophisticated hackers operating for hire out of China, a U.S. computer security company said, and it linked them to some of the best-known espionage attacks in recent years....
Defense Secretary Hagel called a new U.S.-China cyberaffairs working group a ‘venue for addressing issues of mutual concern.’ His Chinese counterpart, General Chang Wanquan, denied there was a problem.
A prominent computer security firm has warned that the Dalai Lama’s Chinese-language website has been compromised with malicious software that is infecting computers of visitors with software that could be used for spying.
Beijing has started to glean political intelligence from the same systems they restrict access to.
The reason why both Americans and Chinese have become so nostalgic for the great Nixon/Kissinger-Mao Zedong/Zhou Enlai breakthrough in 1972 is because that was the last time that Sino-U.S. relations experienced a dramatic breakthrough. Now, most...
To complete the unprecedented task of forging new-type relationship between the world’s largest developing nation and largest developed nation, trust-building is the first step.
U.S. Treasury Secretary Jack Lew has said he will keep up pressure on China over cyber security, especially stealing of intellectual property and trade secrets, which he sees as separate from other Internet-related issues between the two...
For today’s ChinaFile Conversation we asked contributors to react to the following excerpt from an op-ed published on Monday June 17 in the...
Officials always think what they do is necessary, and firmly believe they do what is best for the state and the people. But the lesson that people should learn from history is the need to limit state power, says Ai Weiwei.
According to a number of confidential sources, a highly secretive unit of the National Security Agency (NSA), called the Office of Tailored Access Operations (TAO), has successfully penetrated Chinese computer and telecommunications systems for...
The C.F.R.-sponsored Independent Task Force report finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks.