Intelligence Chiefs Accuse China Of IP Theft & Online Deception

The Five Eyes countries' intelligence chiefs have accused China of intellectual property theft and using the Internet for hacking and spying against the nations.

In joint statement, officials from the United States, Britain, Canada, Australia and New Zealand, known as the Five Eyes intelligence sharing network made the comments following meetings with private companies at the US centre of technology innovation in Silicon Valley.

This comes alongside a new warning to tens of thousands of British businesses of the risk of having their Intellectual Property (IP) stolen.

More than 20,000 people in the UK have now been approached covertly online by Chinese spies, according to Ken McCallum, the head of MI5.  He was speaking at an unprecedented public appearance of the security chiefs of the Five Eyes alliance in California. At the same time, Facebook's parent company Meta has taken down thousands of false-front accounts on Facebook, Instagram, TikTok, TwitterX, and Substack to reduce the spread disinformation.

The phrase “cognitive warfare” doesn’t often appear in news stories, but it’s the crucial concept behind China’s latest efforts to use social media to target its foes.

Chinese government and military publications say that cognitive operations aim to capture the mind of one’s foes, shaping an adversary’s thoughts and perceptions and consequently their decisions and actions. Unlike US military doctrine and strategic thinkers, 

China's military has put cognitive warfare on par with the other domains of warfare and believes it key to victory without war.

Information Disturbance

Information Disturbance uses official social media accounts to push and shape a narrative in specific ways. When a typical user spends several hours a day on social media, it is no surprise that Chinese agencies attempt to control the cognition of individuals and communities. Their goal is to achieve an “invisible manipulation” and "invisible embedding" of information production “to shape the target audience's macro framework for recognising, defining, and understanding events,” according to Professors Duan Wenling and Liu Jiali,of  China’s National Defense University.

They describe it as “publishing specific information on social media to influence the target audience's understanding of the real combat situation, and then shape their positions and change their actions.” Today, the concept of Information Disturbance in action is amply demonstrated by events in Ukraine and in Gaza,

The tactics used include the concept of Discourse Competition aimed at reinforcing pre-existing biases and manipulate emotions to influence and deepen a desired narrative. Another tactic is Public Opinion Blackout - this  aims to flood social media with a specific narrative to influence the direction of public opinion.  The main tool for this are bot networks that promote the chosen narrative, with the objective of cancelling alternative views. 

The goal is to generate confusion in the target audience's understanding of the truth and promote anxiety and suspicion to create a sense of insecurity and mistrust. 

China, through extensive research and development of their own platforms, understands the power of social media to shape narratives and cognition over events and actions.  Social media platforms are now viewed as one of the battlefields in this conflict.
 

It seeks to use the Internet as a powerful communication channel to influence conflict, subvert elections and promote stories that serve its long-term national interests.

PLA Daily:    CISA:    DefenseOne:     BBC:     NYTImes:   Reuters:      Image: pixabay

You Might Also Read: 

The Limits Of Social Media Soft Power:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Latest Trends In Email Threats
How Cybercriminals Could Be Infiltrating Your Supply Chain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

VXRL

VXRL

VXRL is a Hong Kong-based cybersecurity company. We provide consulting services, penetration testing, and corporate training.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

DuckDuckGoose

DuckDuckGoose

DuckDuckGoose offer advanced solutions to protect against manipulated videos, images, voices and texts.