China's Surveillance State Extends Beyond Its Borders

The Chinese state is widely using technology not only to track its own citizens, but to exert power beyond its borders. A new US Senate Report accuses china of  of "digital authoritarianism" and warns that China's mounting influence on the digital sphere could soon overshadow that of the US and expresses concern about its export of surveillance technology.

Last month two Chinese Hackers working with the Chinese Ministry of State Security (MSS) were charged by the US Justice Department with global computer intrusion campaign targeting intellectual property and confidential business information, including COVID-19 research

Prosecutors said the two men spied on a Massachusetts biotech firm in January which was known to be researching possible cures for Covid-19. They also hacked a Maryland company less than a week after it said it was researching Covid-19. Officials called the men private hackers who occasionally received support from Chinese intelligence agents, including an officer from the MSS. “Today’s indictment demonstrates the serious consequences the Chinese MSS and its proxies will face if they continue to deploy malicious cyber tactics to either steal what they cannot create or silence what they do not want to hear,” said an FBI spokesman.

Following the US Dept. of Justice’s announcement of charges relating to cyber-attacks against institutions in 11 countries, including the UK, the British Foreign Secretary Dominic Raab said: “China is engaged in malicious cyber-attacks against commercial, medical and academic institutions, including those working to respond to the coronavirus pandemic.... Our message to governments prepared to enable these activities is clear: the UK will continue to counter those conducting such cyber attacks, and work with our allies to hold perpetrators to account and deter further malicious activity around the world.”

The US Justice Department stated that two Chinese hackers, infiltrated the Australian defence contractor’s web server. The hackers stole a significant number of documents, including source code for the company's products.

The US government also accused hackers of compromising network of a solar energy engineering firm in Australia. In the initial reports, Australia did not reveal the suspects, but the sources confirmed China to be responsible behind the series of cyber-attacks.The FBI also accused China of trying to hack into universities and drug companies working on possible COVID-19 vaccines.

US Dept.of Justice:       GovUK:       BBC:       BBC:    Kalkin Media:       Reuters:
 

You Might Also Read:

The Geopolitics of Cyber Security:

 

« Secret Brexit Documents Hacked By Russians
The Cyber Security Threat From Employees »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

Intel Capital

Intel Capital

Intel Capital, Intel's strategic investment organization, backs innovative technology startups and companies worldwide. We invest in a broad range of hardware, software, and services.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

ESC - Enterprise Security Center

ESC - Enterprise Security Center

ESC is a system house specializing exclusively in IT security - Security Implementation & Optimization, Operations, Managed Security Services.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

Cybastion

Cybastion

Cybastion develops robust world-class cybersecurity solutions tailored to suit the needs of different businesses, governments and public sector entities.

Mindcore Technologies

Mindcore Technologies

Mindcore provide cyber security services, managed IT services and IT consulting services to businesses in NJ, FL, and throughout the United States.

CERT.ar

CERT.ar

CERT.ar is the national Computer Emergency Response Team for the technical-administrative management of computer security incidents in the National Public Sector of Argentina.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.

ioSENTRIX

ioSENTRIX

ioSENTRIX offers tailored, risk-focused assessments that reduce true business risk.

Etalon Cyber

Etalon Cyber

Etalon Cyber provides a range of advanced features to ensure the highest level of security for your website.