lundi 19 novembre 2018

Chinese Theft of Trade Secrets

America’s overt payback for China’s covert espionage
By David Ignatius

Chinese dictator Xi Jinping in Beijing on Nov. 2. 

While the U.S.-China trade war has been getting the headlines, U.S. intelligence and law enforcement agencies have been waging a quieter battle to combat Chinese theft of trade secrets from American companies — a practice so widespread that even boosters of trade with China regard it as egregious.
The Trump administration’s campaign of tariffs will eventually produce some version of a truce.
But the battle against Beijing’s economic espionage is still accelerating, and it may prove more important over time in leveling the playing field between the two countries.
To combat Chinese spying and hacking, U.S. intelligence agencies are increasingly sharing with the Justice Department revelatory information about Chinese operations.
That has led to a string of recent indictments and, in one case, the arrest abroad of a Chinese spy and his extradition to the United States to face trial.
The indictments don’t just charge violations of law; they also expose details of Chinese spycraft.
And there’s a hidden threat: The Chinese must consider whether the United States has blown the covers of not just the people and organizations named in the criminal charges but also others with whom they came in contact.
This law enforcement approach to counterespionage requires public disclosure of sensitive information, something that intelligence agencies often resist.
But it seems to be an emerging U.S. strategy.
The Justice Department has pursued a similar open assault on Russian cyberespionage, with three recent indictments naming a score of Russian operatives and disclosing their hacking techniques, malware tools and planned targets.
China, like Russia, is displaying an increasingly freewheeling and entrepreneurial approach to espionage. 
Several indictments unsealed since September reveal how the Ministry of State Security, the Chinese spy service, has operated through its regional bureaus — in this case the Jiangsu provincial office of the MSS — to obtain precious U.S. technology.
The indictments allege that from 2010 to 2015, the Jiangsu branch ran a team of nine hackers who tried to steal U.S. techniques for making jet engines. 
This is a subtle and highly valuable aspect of aerospace technology, one of the few that China hasn’t yet mastered or stolen, and the Chinese evidently wanted to obtain by stealth what they couldn’t produce on their own.
“The concerted effort to steal, rather than simply purchase, commercially available products should offend every company that invests talent, energy and shareholder money into the development of products,” said Adam Braverman, the U.S. attorney in San Diego who helped prosecute the cases.
The San Diego indictment lists the hacker names used by the conspirators, handles such as “Cobain,” “sxpdlcl” and “mer4en7y.”









Yanjun Xu, who also uses the names Qu Hui and Zhang Hui, was extradited to the US with help from Belgian authorities for seeking to steal trade secrets and other sensitive information from GE Aviation, an American company that leads the way in aerospace.


A separate indictment charged an MSS officer named Yanjun Xu, a deputy division director in the Jiangsu bureau, with trying to steal jet engine secrets from GE Aviation; Xu was arrested in April in Belgium after he began trying to penetrate the company’s operations, and he was extradited to the United States last month.
















Ji Chaoqun: US army reservist accused of trying to recruit Chinese spies

The United States in September arrested a U.S. Army reservist named Ji Chaoqun and charged that he had helped the Chinese gain information about aerospace industry targets.
This month, the Justice Department also unsealed a September indictment that accused a Chinese company and its Taiwanese partner, both funded by the Chinese government, of trying to steal eight trade secrets for a memory-chip technology known as DRAM from Micron Technology Inc., based in Silicon Valley.
The indictment notes that the Chinese government had identified DRAM as “a national economic priority” that Beijing was determined to obtain.
The indictment, brought by the U.S. attorney in San Jose, uses blunt language to describe the plot: “In order to develop DRAM technology and production capabilities without investing years of research and development and the expenditure of many millions of dollars,” the defendants “conspired to circumvent Micron’s restrictions on its proprietary technology.”
What gives these indictments extra bite is that Xi Jinping had promised back in 2015 that China wouldn’t conduct economic cyberespionage anymore.
That pledge followed an indictment the previous year that revealed an elaborate plot by Chinese military hackers to steal U.S. commercial secrets.
But in the espionage world, promises not to spy are dubious at best. 


Jerry Chun Shing Lee: ex-CIA officer at the centre of one of the largest US intelligence breaches in decades.

Over the past three years, the Justice Department has charged former CIA officer Jerry Chun Shing Lee and five other Americans with stealing secrets on behalf of Beijing.
As a rising power, China is also a rising threat in the intelligence sphere.
The U.S. counterattack, in part, seems to be a public revelation of just how and why Beijing is stealing America’s secrets — overt payback for covert espionage.

Aucun commentaire:

Enregistrer un commentaire