The newly released IntSights analytics report, “The Dark Side of China: The Evolution of a Global Cyber Power,” makes the case that the country is a force to be reckoned with. The piece emphasizes the role played by the Chinese Communist Party (CCP) in unleashing the restrictions within China to “take what it needs.”
The conclusion is consistent with the analysis by Huang Xianghuai of the CCP Central Committee Party School in his essay, “Emphasizing and Strengthening the Party’s Ideological Work.” In his report, translated and released in August by the Center for Strategic International Studies, he bluntly details how the external messaging and the internal messaging of the CCP are at odds with each other. The former calls for peace and harmony, while the latter colors the relationship with the outside world in dark tones.
Huang noted during the CCP’s 19th National Congress in 2017, General Secretary Xi Jinping declared, “The significance of scientific socialism’s success in China is very important for Marxism, scientific socialism and world socialism. … Ideology determines the direction and development path of cultural progress.”
China’s appetite for taking what it needs is sufficiently evident with the series of arrests, indictments and research reports that highlight the theft of intellectual property from the west. For example, the telecom company NORTEL—an article in Canada’s Global News describes the years of fleecing the company by China’s military and the concomitant ascension of Huawei as a global telecommunication company.
It is in this vein that the IntSight report offers evidence that China’s been feeding on the investments of others and highlights China’s efforts to own the cyber battlefield with discussion on four distinct target sets: India, Australia, Hong Kong and cultural and religious organizations.
The IntSights report concludes with the identification of four evolving threats:
One should believe China will do exactly what it says it will do. The bottom line is, China’s actions are driven by the CCP, and industries and government alike should continue to be alert to the targeting of their personnel, technology and intellectual properties. Security protocols should envelop all engagements with China, as there is no expectation that China will take its foot off the gas in its efforts to aggressively acquire intellectual property and technology it determines it needs for its own purposes.
It is your information, protect it.
When it comes to detecting phishing and social engineering threats, slow response times are detrimental. Automate online brand protection to take…
Interesting development in Germany to restore phonetics that were erased by the Nazis Before the Nazi dictatorship some Jewish names…
Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's…
via the comic delivery system monikered Randall Munroe resident at XKCD! Permalink
Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's…
It's December, so you know what that means: Predictions for what's to come for cyber in 2021. We brought together…