China's Surveillance State Extends Beyond Its Borders

The Chinese state is widely using technology not only to track its own citizens, but to exert power beyond its borders. A new US Senate Report accuses china of  of "digital authoritarianism" and warns that China's mounting influence on the digital sphere could soon overshadow that of the US and expresses concern about its export of surveillance technology.

Last month two Chinese Hackers working with the Chinese Ministry of State Security (MSS) were charged by the US Justice Department with global computer intrusion campaign targeting intellectual property and confidential business information, including COVID-19 research

Prosecutors said the two men spied on a Massachusetts biotech firm in January which was known to be researching possible cures for Covid-19. They also hacked a Maryland company less than a week after it said it was researching Covid-19. Officials called the men private hackers who occasionally received support from Chinese intelligence agents, including an officer from the MSS. “Today’s indictment demonstrates the serious consequences the Chinese MSS and its proxies will face if they continue to deploy malicious cyber tactics to either steal what they cannot create or silence what they do not want to hear,” said an FBI spokesman.

Following the US Dept. of Justice’s announcement of charges relating to cyber-attacks against institutions in 11 countries, including the UK, the British Foreign Secretary Dominic Raab said: “China is engaged in malicious cyber-attacks against commercial, medical and academic institutions, including those working to respond to the coronavirus pandemic.... Our message to governments prepared to enable these activities is clear: the UK will continue to counter those conducting such cyber attacks, and work with our allies to hold perpetrators to account and deter further malicious activity around the world.”

The US Justice Department stated that two Chinese hackers, infiltrated the Australian defence contractor’s web server. The hackers stole a significant number of documents, including source code for the company's products.

The US government also accused hackers of compromising network of a solar energy engineering firm in Australia. In the initial reports, Australia did not reveal the suspects, but the sources confirmed China to be responsible behind the series of cyber-attacks.The FBI also accused China of trying to hack into universities and drug companies working on possible COVID-19 vaccines.

US Dept.of Justice:       GovUK:       BBC:       BBC:    Kalkin Media:       Reuters:
 

You Might Also Read:

The Geopolitics of Cyber Security:

 

« Secret Brexit Documents Hacked By Russians
The Cyber Security Threat From Employees »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

Netsparker

Netsparker

Netsparker provide a web application security scanner to automatically find security flaws in your websites, web applications and web services.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

Six Degrees

Six Degrees

Six Degrees is a leading secure, integrated cloud services provider. We protect UK organisations and help them thrive in the cloud by giving them secure platforms to innovate and grow.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

Secureframe

Secureframe

Companies from startups to enterprises use Secureframe to automate SOC 2 and ISO 27001 compliance, complete audits, and continuously monitor their security.

Sentor Managed Security Services

Sentor Managed Security Services

Sentor Managed Security Services is a cybersecurity company that enables organizations to exist in a digitally connected world.

FINX Capital

FINX Capital

FINX strives to solve the cybersecurity issues with its proprietary technolog, FINX SHIELD, by utilizing big data, blockchain combined with artificial intelligence.

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.

WideField Security

WideField Security

WideField Security a venture backed cybersecurity startup helps enterprise protect their identity attack surface.