China's Surveillance State Extends Beyond Its Borders

The Chinese state is widely using technology not only to track its own citizens, but to exert power beyond its borders. A new US Senate Report accuses china of  of "digital authoritarianism" and warns that China's mounting influence on the digital sphere could soon overshadow that of the US and expresses concern about its export of surveillance technology.

Last month two Chinese Hackers working with the Chinese Ministry of State Security (MSS) were charged by the US Justice Department with global computer intrusion campaign targeting intellectual property and confidential business information, including COVID-19 research

Prosecutors said the two men spied on a Massachusetts biotech firm in January which was known to be researching possible cures for Covid-19. They also hacked a Maryland company less than a week after it said it was researching Covid-19. Officials called the men private hackers who occasionally received support from Chinese intelligence agents, including an officer from the MSS. “Today’s indictment demonstrates the serious consequences the Chinese MSS and its proxies will face if they continue to deploy malicious cyber tactics to either steal what they cannot create or silence what they do not want to hear,” said an FBI spokesman.

Following the US Dept. of Justice’s announcement of charges relating to cyber-attacks against institutions in 11 countries, including the UK, the British Foreign Secretary Dominic Raab said: “China is engaged in malicious cyber-attacks against commercial, medical and academic institutions, including those working to respond to the coronavirus pandemic.... Our message to governments prepared to enable these activities is clear: the UK will continue to counter those conducting such cyber attacks, and work with our allies to hold perpetrators to account and deter further malicious activity around the world.”

The US Justice Department stated that two Chinese hackers, infiltrated the Australian defence contractor’s web server. The hackers stole a significant number of documents, including source code for the company's products.

The US government also accused hackers of compromising network of a solar energy engineering firm in Australia. In the initial reports, Australia did not reveal the suspects, but the sources confirmed China to be responsible behind the series of cyber-attacks.The FBI also accused China of trying to hack into universities and drug companies working on possible COVID-19 vaccines.

US Dept.of Justice:       GovUK:       BBC:       BBC:    Kalkin Media:       Reuters:
 

You Might Also Read:

The Geopolitics of Cyber Security:

 

« Secret Brexit Documents Hacked By Russians
The Cyber Security Threat From Employees »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

BrandShield

BrandShield

BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution.

Cylera

Cylera

Cylera is a Healthcare IoT cybersecurity and intelligence company built in close partnership with healthcare providers.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Galvanick

Galvanick

Galvanick enables your operations and IT teams to protect your industrial systems and networks against digital threats.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.

NST Cyber

NST Cyber

NST Cyber provides comprehensive Threat Exposure Management to Global banks and Forbes 2000 companies.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.