Affichage des articles dont le libellé est Safran. Afficher tous les articles
Affichage des articles dont le libellé est Safran. Afficher tous les articles

vendredi 30 novembre 2018

Steal or Die

China Accelerates Cyberspying Efforts to Obtain U.S. Technology
By David E. Sanger and Steven Lee Myers

General Electric Aviation’s factory in Cincinnati. A Chinese intelligence official is accused of trying to obtain trade secrets from the company.

WASHINGTON — Three years ago, Barack Obama struck a stupid deal with China: Xi Jinping agreed to end his nation’s yearslong practice of breaking into the computer systems of American companies, military contractors and government agencies to obtain designs, technology and corporate secrets, usually on behalf of China’s state-owned firms.
The pact was celebrated by the Obama administration as one of the first arms-control agreements for cyberspace — and for some few months, the number of Chinese attacks plummeted.
But the "victory" was fleeting.
Soon after President Trump took office, China’s cyberespionage picked up again and, according to intelligence officials and analysts, accelerated in the last year as trade conflicts and other tensions began to poison relations between the world’s two largest economies.
The nature of China’s espionage has also changed.
The hackers of the People’s Liberation Army — whose famed Unit 61398 tore through American companies until its operations from a base in Shanghai were exposed in 2013 — were forced to stand down, some of them indicted by the United States.
But now, they have begun to be replaced by stealthier operatives in the country’s intelligence agencies.
The new operatives have intensified their focus on America’s commercial and industrial prowess, and on technologies that the Chinese believe can give them a military advantage.
That, in turn, has prompted a flurry of criminal cases, including the extraordinary arrest and extradition from Belgium of a Chinese intelligence official in October. 
Trump administration officials said the arrest reflected a more determined counterattack against a threat that has infuriated some of the country’s most powerful corporations.
“We have certainly seen the behavior change over the past year,” said Rob Joyce, President Trump’s former White House cybercoordinator, speaking at the Aspen Cyber Summit in San Francisco this month.
President Trump and administration officials often suggest that all technology-acquisition efforts by China amount to theft.
In doing so, they are blurring the line between stealing technology and negotiated deals in which corporations agree to transfer technology to Chinese manufacturing or marketing partners in return for access to China’s market — a practice American companies often view as a form of corporate blackmail but one distinct from outright theft.
The stealing of industrial designs and intellectual property — from blueprints for power plants or high-efficiency solar panels, or the F-35 fighter — is a long-running problem.
The United States Trade Representative published a report earlier this month detailing old and new examples.
But the administration has never said whether cracking down on theft and cyberattacks is part of the negotiations or simply a demand that China cease activity that Beijing has already acknowledged was illegitimate.
But as President Trump and Xi prepare to meet at the Group of 20 gathering in Argentina this weekend, China’s corporate espionage has once again emerged as a core American grievance.
Whatever the reason for the renewed hacking, it is a cautionary tale as President Trump tries to use tariffs and threats of more restrictions to strike a new trade deal with Xi, one that presumably would address, once again, the Chinese practices that Obama naively thought Xi had halted.
American trade and intelligence officials, as well as experts from private cybersecurity firms, all acknowledged that the previous agreement had completely fallen apart.
And that, they agreed, has made it still more difficult to imagine how any new agreement struck between President Trump and Xi would become a permanent solution to a problem that reaches back years, and seems rooted in completely different views of what constitutes reasonable competition.
“Our two systems are so dissimilar that I think there was never real hope that crafting an agreement like this would last that long anyway,” said Matthew Brazil, a former government official who now runs Madeira Security Consulting, a firm in San Jose, Calif.
Why the espionage has spiked again is a matter of debate.
Some officials and analysts call it a cause of the worsening trade relationships, others a symptom. Still others argued that the tightening of American export controls in critical industries like aerospace and rules on Chinese investment in Silicon Valley has led the Chinese once again to try to steal what they cannot buy.
The impetus for the 2015 accord was one of the most blatant espionage operations ever conducted by the Chinese government: the removal, over a period of more than a year, of 22 million security-clearance files on American officials, military personnel, contractors and American intelligence officers.
The Obama administration, out of embarrassment, said little about the breach, never naming the Chinese publicly — except by mistake when the director of national intelligence blurted out the truth.
American intelligence officials concluded that the Chinese were assembling a giant database of who worked with whom, and on what, in the American national security sphere, and were applying “big data” techniques to analyze the information. 
The C.I.A. could not move some officers to China, for fear their cover had been blown. 
Publicly, Obama administration officials offered millions of Americans credit protection for a few years in the wake of the data breach — as if Xi’s agents were looking for credit card numbers.
Michael Kovrig, a former Canadian diplomat who is now a China analyst for the International Crisis Group, said that China had a fundamentally different understanding of what was acceptable in espionage.
While the Central Intelligence Agency, say, would not act to help a private company gain a competitive advantage over a foreign competitor, he said, China’s Communist Party, which has control over practically all aspects of policy there, would make no such distinction.
“If you view economic growth as an existential pillar of your party’s political legitimacy and in fact your national security, it follows that you would do anything possible to maintain that competitive edge,” he said.
Indeed, the latest spike in corporate espionage cases — including some not yet made public — has focused on industries critical to Xi’s Made in China 2025 program.
That is a plan to jump ahead of the United States and others in cutting-edge industries like aerospace, automation, artificial intelligence and quantum computing.
“We are seeing it in high tech, in law firms, in insurance companies,” said Dmitri Alperovitch, one of the founders of CrowdStrike, who early in his career was one of the first to identify the teams of state-run Chinese hackers aiming at the United States.
With the arrest of the intelligence officer in Belgium in October, the Trump administration claimed it had exposed what the assistant F.B.I. director, Bill Priestap, called “the Chinese government’s direct oversight of economic espionage against the United States.”
That case involves Xu Yanjun, a deputy division director in the Jiangsu branch of the Ministry of State Security, China’s main intelligence agency.
According to a secret criminal complaint filed in Ohio in March but not unsealed until October, Xu tried to recruit an employee of General Electric Aviation and entice him to provide proprietary information about jet fan blade designs.
Instead the employee alerted the company, which went to the F.B.I. and organized a sting.
Xu flew from China to Belgium in April on the hope he would be able to copy the employee’s computer hard drive.
He was arrested on April 1 when he arrived in Brussels and was extradited to the United States on Oct. 9, the day before the Justice Department made the case public.
China’s Foreign Ministry denounced the criminal case as “pure fabrication,” but it has neither confirmed nor denied that Xu was an intelligence officer.
China’s relatively muted reaction could be an effort to minimize attention on an embarrassing intelligence failure and leave room for quiet negotiations for an exchange.
Xu’s was the most high profile of several recent cases, including two others that had links to the Ministry of State Security’s branch in Jiangsu Province, which extends north from Shanghai.
In September, the Justice Department announced the arrest of Ji Chaoqun, a 27-year-old graduate student who had joined the Army Reserves under a special waiver for foreigners.
The F.B.I. affidavit in the case said that Ji’s handler — presumably Xu — had been arrested, allowing the bureau to send an undercover officer to meet the student in April.
Ji, the affidavit said, had been recruited to gather background information about eight potential recruits for the Jiangsu branch.
Xu, who went by at least two aliases, often claimed to represent the Jiangsu Association for International Science and Technology Cooperation and Nanjing University of Aeronautics and Astronautics, both based in the provincial capital, Nanjing.
The reasons Jiangsu has become a hotbed of China’s cyberespionage are not entirely clear, though it is an important manufacturing center, with many foreign investments, and is thus one of China’s richest provinces.
In 2016, the director of the Jiangsu intelligence branch, Liu Yang, declared that “the national security departments should actively cooperate and promote enterprises” in their efforts to expand and compete globally, according to a report from the Suzhou General Chamber of Commerce.
In January, Liu was promoted and is now the vice governor of the province.
Another American criminal case of espionage in the same region of China was announced Oct. 30. The Justice Department accused two other intelligence officers from that branch, as well as five hackers and two employees of a French aerospace company in Suzhou.
The target was Safran, which operates a joint venture, CFM International, that builds jet engines with General Electric.
The hackers were accused of using a variety of sophisticated techniques and tools against the Suzhou plant, and against other companies.
But the suspects are believed to still be in China and thus beyond the reach of American law enforcement.

vendredi 19 mai 2017

Xi Liening: "The Capitalists will sell us the rope with which we will hang them."

Chinese aviation finally takes off with help from the west 
Comac C919 designed to reduce reliance on foreign manufacturers Boeing and Airbus 
By Ben Bland

The first time China attempted to build a large passenger jet, it tried — and failed — to reverse-engineer a Boeing 707 that crash-landed in Xinjiang in 1971.
The latest vehicle for China’s aviation dream, the Comac C919, has just completed its first test flight after Beijing decided to take a different path: buying parts from European and US aviation companies rather than stealing their technology. 
After many mis-steps, the maiden flight of the 158-174 seat aircraft was a big moment for China, economically and politically.
The government told state-owned Comac in a congratulatory note that the C919 “carries great weight and importance to the country’s innovation drive”.
Seeing it “flying in the blue sky makes generations of Chinese people’s dream come true”, it added. The C919 is designed to compete with the workhorses of modern short-haul aviation, the Airbus A320 and Boeing 737.
It has a ready-made customer base as China is forecast to overtake the US as the world’s biggest aviation market in 2024.
Comac has also built a smaller regional jet, called the ARJ21, and is developing a long-haul aircraft alongside Russia’s United Aircraft Corp.
China has been trying to build large passenger aircraft since the Mao Zedong era, when Communist officials bridled at the prospect of having to fly overseas on foreign-made aircraft.
Xi Jinping, who often travels abroad on a Boeing 747 operated by Air China, is unlikely to start flying on the C919 soon, as it will be at least a couple of years before it goes into mass production.
But China’s airliner project is still driven by politics as much as policy.
Throughout the sprawling Comac factory in Shanghai, Communist propaganda banners bearing slogans from Xi and others urge workers to knuckle down to achieve the Chinese aviation dream. “Remember your mission, march forward and win the ‘three battles’,” says one, referring to the markets for regional, short-haul and long-haul jets.
Xi is keen to show progress on high-profile initiatives such as the C919 ahead of the next five-yearly congress of the Communist party in the autumn, where he will be trying to strengthen his grip on power.
By successfully bringing the C919 into mass production, Comac would join the select club of companies with the technical expertise to build large passenger jets including Boeing of the US, Europe’s Airbus, Canada’s Bombardier and Russia’s Sukhoi and Tupolev.
In addition to prestige, China wants to reduce its reliance on foreign aircraft manufacturers, primarily Boeing and Airbus.
But, paradoxically, the C919 has only got this far because of the co-operation of western suppliers. The wings and the tail are made in China, but many of the most important and most technologically advanced parts are purchased from foreign companies, such as GE and Safran, which provided the engine, and Honeywell, which supplied the wheels and brakes and communication and navigation systems. 
Buying components from these industry leaders has helped to speed up the development process. 
But the C919 is still 10-15 years out of date, compared to the latest versions of the A320 and Boeing 737, meaning it will probably cost more to run.
That need not dent sales of the aircraft as most of China’s airlines are state-controlled and they can easily be encouraged to use it. 
They have already made orders for more than 500 C919s.
If China really wants to prove it can compete with Boeing and Airbus, rather than Tupolev and Sukhoi, it will have to sell its aircraft in developed markets, which will require better technology and hard-to-achieve certification from European and US regulators.
That is where Beijing may well hit the limits of Chinese aviation with western characteristics. Chinese officials have a history of covering up technical problems with domestically produced aircraft and not reporting accidents. 
Corruption, political interference and a lack of transparency make western regulators nervous, and undermine the potential for innovation in China. 
Derek Levine, who wrote a book on China’s aviation ambitions, warns that “unless China learns how to make the most sophisticated elements of a plane, they’ll always be a step behind”.