Intelligence Chiefs Accuse China Of IP Theft & Online Deception

The Five Eyes countries' intelligence chiefs have accused China of intellectual property theft and using the Internet for hacking and spying against the nations.

In joint statement, officials from the United States, Britain, Canada, Australia and New Zealand, known as the Five Eyes intelligence sharing network made the comments following meetings with private companies at the US centre of technology innovation in Silicon Valley.

This comes alongside a new warning to tens of thousands of British businesses of the risk of having their Intellectual Property (IP) stolen.

More than 20,000 people in the UK have now been approached covertly online by Chinese spies, according to Ken McCallum, the head of MI5.  He was speaking at an unprecedented public appearance of the security chiefs of the Five Eyes alliance in California. At the same time, Facebook's parent company Meta has taken down thousands of false-front accounts on Facebook, Instagram, TikTok, TwitterX, and Substack to reduce the spread disinformation.

The phrase “cognitive warfare” doesn’t often appear in news stories, but it’s the crucial concept behind China’s latest efforts to use social media to target its foes.

Chinese government and military publications say that cognitive operations aim to capture the mind of one’s foes, shaping an adversary’s thoughts and perceptions and consequently their decisions and actions. Unlike US military doctrine and strategic thinkers, 

China's military has put cognitive warfare on par with the other domains of warfare and believes it key to victory without war.

Information Disturbance

Information Disturbance uses official social media accounts to push and shape a narrative in specific ways. When a typical user spends several hours a day on social media, it is no surprise that Chinese agencies attempt to control the cognition of individuals and communities. Their goal is to achieve an “invisible manipulation” and "invisible embedding" of information production “to shape the target audience's macro framework for recognising, defining, and understanding events,” according to Professors Duan Wenling and Liu Jiali,of  China’s National Defense University.

They describe it as “publishing specific information on social media to influence the target audience's understanding of the real combat situation, and then shape their positions and change their actions.” Today, the concept of Information Disturbance in action is amply demonstrated by events in Ukraine and in Gaza,

The tactics used include the concept of Discourse Competition aimed at reinforcing pre-existing biases and manipulate emotions to influence and deepen a desired narrative. Another tactic is Public Opinion Blackout - this  aims to flood social media with a specific narrative to influence the direction of public opinion.  The main tool for this are bot networks that promote the chosen narrative, with the objective of cancelling alternative views. 

The goal is to generate confusion in the target audience's understanding of the truth and promote anxiety and suspicion to create a sense of insecurity and mistrust. 

China, through extensive research and development of their own platforms, understands the power of social media to shape narratives and cognition over events and actions.  Social media platforms are now viewed as one of the battlefields in this conflict.
 

It seeks to use the Internet as a powerful communication channel to influence conflict, subvert elections and promote stories that serve its long-term national interests.

PLA Daily:    CISA:    DefenseOne:     BBC:     NYTImes:   Reuters:      Image: pixabay

You Might Also Read: 

The Limits Of Social Media Soft Power:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Latest Trends In Email Threats
How Cybercriminals Could Be Infiltrating Your Supply Chain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Softtek

Softtek

Softtek provides comprehensive software Quality Assurance and Testing that identifies the correctness, completeness, and quality level of software products.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

Cybersprint

Cybersprint

Cybersprint's Digital Risk Protection platform continuously monitors your digital footprint so you can make informed decisions on exposure to online threats, identify vulnerabilities and take action.

State e-Government Agency (SEGA) - Bulgaria

State e-Government Agency (SEGA) - Bulgaria

The State e-Government Agency (SEGA) is responsible for matters relating to electronic governance in Bulgaria.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Intel Capital

Intel Capital

Intel Capital, Intel's strategic investment organization, backs innovative technology startups and companies worldwide. We invest in a broad range of hardware, software, and services.

IPKeys Technologies

IPKeys Technologies

IPKeys delivers innovative cybersecurity and technology solutions focused on helping the federal government reduce risk and protect the US from cyberattacks.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

BIRD Cyber

BIRD Cyber

BIRD Cyber is a program to promote collaboration on cybersecurity and emerging technologies aimed at enhancing the cyber resilience of critical infrastructure.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.