
{"id":4536,"date":"2018-12-03T23:48:05","date_gmt":"2018-12-03T23:48:05","guid":{"rendered":"http:\/\/blogs.plymouth.ac.uk\/dcss\/?p=4536"},"modified":"2018-12-03T23:48:05","modified_gmt":"2018-12-03T23:48:05","slug":"uncovering-chinese-espionage-in-the-usa","status":"publish","type":"post","link":"https:\/\/blogs.plymouth.ac.uk\/dcss\/2018\/12\/03\/uncovering-chinese-espionage-in-the-usa\/","title":{"rendered":"UNCOVERING CHINESE ESPIONAGE IN THE USA"},"content":{"rendered":"<p><a href=\"http:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/10\/ChinaHong-20_stealth_bomber_trial_flight_expected_very_soon_001.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4289\" src=\"http:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/10\/ChinaHong-20_stealth_bomber_trial_flight_expected_very_soon_001.jpg\" alt=\"\" width=\"925\" height=\"520\" srcset=\"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/10\/ChinaHong-20_stealth_bomber_trial_flight_expected_very_soon_001.jpg 925w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/10\/ChinaHong-20_stealth_bomber_trial_flight_expected_very_soon_001-300x169.jpg 300w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/10\/ChinaHong-20_stealth_bomber_trial_flight_expected_very_soon_001-768x432.jpg 768w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/10\/ChinaHong-20_stealth_bomber_trial_flight_expected_very_soon_001-560x315.jpg 560w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/10\/ChinaHong-20_stealth_bomber_trial_flight_expected_very_soon_001-260x146.jpg 260w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/10\/ChinaHong-20_stealth_bomber_trial_flight_expected_very_soon_001-160x90.jpg 160w\" sizes=\"auto, (max-width: 925px) 100vw, 925px\" \/><\/a><\/p>\n<p>Source: The Diplomat<\/p>\n<p>By Nicholas Eftimiades<\/p>\n<p>Twenty years ago, I testified before a U.S. congressional committee on China\u2019s espionage operations in the United States. I left the Members with what I thought was an ominous warning: \u201cDo something about this now or you\u2019ll be calling me back in 20 years screaming: \u2018My God, how did this happen?\u2019 \u201d Well, they never called me back, but if recent FBI arrests are any indication, the problem has gotten worse \u2014 a lot worse.<\/p>\n<p>On October 30, 2018 the U.S. Department of Justice announced the indictment of 10 Chinese intelligence officers and cyber hackers from the Ministry of State Security (MSS), China\u2019s main civilian espionage organization. The United States charged the group with stealing airline engine technology from French and U.S. companies.<\/p>\n<p>The alleged scheme ran from 2010 to 2015 and targeted turbofan engine technology developed through a U.S.-French partnership. The objective of this espionage was to steal intellectual data and confidential business information about the engine. China\u2019s defense industry is working to develop a comparable engine.<\/p>\n<p>Read more at: https:\/\/thediplomat.com\/2018\/11\/uncovering-chinese-espionage-in-the-us\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Source: The Diplomat By Nicholas Eftimiades Twenty years ago, I testified before a U.S. congressional committee on China\u2019s espionage operations in the United States. I left the Members with what I thought was an ominous warning: \u201cDo something about this now or you\u2019ll be calling me back in 20 years screaming: \u2018My God, how did&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.plymouth.ac.uk\/dcss\/2018\/12\/03\/uncovering-chinese-espionage-in-the-usa\/\">Continue reading <span class=\"screen-reader-text\">UNCOVERING CHINESE ESPIONAGE IN THE USA<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":4289,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-4536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-and-strategy","entry"],"_links":{"self":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/4536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/comments?post=4536"}],"version-history":[{"count":1,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/4536\/revisions"}],"predecessor-version":[{"id":4537,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/4536\/revisions\/4537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/media\/4289"}],"wp:attachment":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/media?parent=4536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/categories?post=4536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/tags?post=4536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}