Intelligence Chiefs Accuse China Of IP Theft & Online Deception

The Five Eyes countries' intelligence chiefs have accused China of intellectual property theft and using the Internet for hacking and spying against the nations.

In joint statement, officials from the United States, Britain, Canada, Australia and New Zealand, known as the Five Eyes intelligence sharing network made the comments following meetings with private companies at the US centre of technology innovation in Silicon Valley.

This comes alongside a new warning to tens of thousands of British businesses of the risk of having their Intellectual Property (IP) stolen.

More than 20,000 people in the UK have now been approached covertly online by Chinese spies, according to Ken McCallum, the head of MI5.  He was speaking at an unprecedented public appearance of the security chiefs of the Five Eyes alliance in California. At the same time, Facebook's parent company Meta has taken down thousands of false-front accounts on Facebook, Instagram, TikTok, TwitterX, and Substack to reduce the spread disinformation.

The phrase “cognitive warfare” doesn’t often appear in news stories, but it’s the crucial concept behind China’s latest efforts to use social media to target its foes.

Chinese government and military publications say that cognitive operations aim to capture the mind of one’s foes, shaping an adversary’s thoughts and perceptions and consequently their decisions and actions. Unlike US military doctrine and strategic thinkers, 

China's military has put cognitive warfare on par with the other domains of warfare and believes it key to victory without war.

Information Disturbance

Information Disturbance uses official social media accounts to push and shape a narrative in specific ways. When a typical user spends several hours a day on social media, it is no surprise that Chinese agencies attempt to control the cognition of individuals and communities. Their goal is to achieve an “invisible manipulation” and "invisible embedding" of information production “to shape the target audience's macro framework for recognising, defining, and understanding events,” according to Professors Duan Wenling and Liu Jiali,of  China’s National Defense University.

They describe it as “publishing specific information on social media to influence the target audience's understanding of the real combat situation, and then shape their positions and change their actions.” Today, the concept of Information Disturbance in action is amply demonstrated by events in Ukraine and in Gaza,

The tactics used include the concept of Discourse Competition aimed at reinforcing pre-existing biases and manipulate emotions to influence and deepen a desired narrative. Another tactic is Public Opinion Blackout - this  aims to flood social media with a specific narrative to influence the direction of public opinion.  The main tool for this are bot networks that promote the chosen narrative, with the objective of cancelling alternative views. 

The goal is to generate confusion in the target audience's understanding of the truth and promote anxiety and suspicion to create a sense of insecurity and mistrust. 

China, through extensive research and development of their own platforms, understands the power of social media to shape narratives and cognition over events and actions.  Social media platforms are now viewed as one of the battlefields in this conflict.
 

It seeks to use the Internet as a powerful communication channel to influence conflict, subvert elections and promote stories that serve its long-term national interests.

PLA Daily:    CISA:    DefenseOne:     BBC:     NYTImes:   Reuters:      Image: pixabay

You Might Also Read: 

The Limits Of Social Media Soft Power:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Latest Trends In Email Threats
How Cybercriminals Could Be Infiltrating Your Supply Chain »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clifford Chance

Clifford Chance

Clifford Chance are one of the world's pre-eminent law firms with resources across five continents. Practice areas include Cyber Security & Information Protection

Penta Security

Penta Security

Founded on its data encryption technology, Penta Security is a leading provider of web and data security products, solutions and services.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Schneider Downs

Schneider Downs

Schneider Downs & Co. provides accounting, tax and business advisory services through innovative thought leaders who deliver their expertise to meet the individual needs of each client.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.