Discussing Biden's Potential China Policy

  • Thread starter Deleted member 15887
  • Start date

localizer

Colonel
Registered Member
Market Value and Reach of Key Chinese Tech Companies

VALUES ARE APPROXIMATE AS OF DEC. 18.​

RESEARCH BY CHLOE HADAVAS/FOREIGN POLICY; SOURCES: MORNING STAR, FORTUNE, BLOOMBERG, INVESTOPEDIA, TECHNODE
By co-opting Chinese companies’ data-processing capabilities, U.S. officials say, Beijing’s spy agencies can rapidly sift through massive amounts of information to find key nuggets of intelligence value—for example, to help identify an undercover CIA operative by cross-checking real-time travel intelligence with other sources gathered by China’s Ministry of State Security (MSS). And by outsourcing these expensive data-processing functions to private companies, Chinese intelligence agencies can also exploit these commercial capabilities at a scale they don’t possess themselves or don’t want to build in-house, officials say. Alibaba and Baidu did not respond to multiple requests for comment.

The cooperation hasn’t always been frictionless. “The private companies are hostages to it,” a former counterintelligence executive said. “Arguments ensue.” Sometimes, U.S. intelligence officials would learn about “pissed-off employees” at Chinese companies upset about “doing extra work” on behalf of Chinese intelligence, the former executive said. But they were obligated to comply. “All the major Chinese firms have benefited from knowing, at various points, how to not be too big to fail the party,” the former senior CIA official said. The companies’ at-times begrudging cooperation with Beijing’s intelligence agencies is still, in the end, a subordination to them.

Many Chinese tech firms “probably want to be normal tech companies, and don’t want to deal with these ideological expectations, or the national security expectations,” said Elsa Kania, a China expert and adjunct senior fellow at the Center for a New American Security. “Most Chinese tech companies are not that dissimilar to their counterparts in Silicon Valley. The difference is they are trying to operate within a system where there are incentives and expectations to cultivate closer relations with the government, or the potential for retribution should they step out of line on some front.”

Chinese companies walk a tricky line when talking about such ties. Publicly, and especially in English, they deny any links to Beijing’s intelligence or military apparatus. Huawei, which has faced a
Please, Log in or Register to view URLs content!
about these links,
Please, Log in or Register to view URLs content!
to be owned by its employees. At home, though, the same companies repeatedly
Please, Log in or Register to view URLs content!
loyalty to the party and willingness to assist the security services.

Some connections are more deep-seated. For instance, the former senior CIA official said that, based on “high-confidence reporting,” the CIA concluded that the Chinese tech giant Tencent, which operates the ultrapopular WeChat messaging service, received funding from the Ministry of State Security early on in its foundation. The organization, China’s chief civilian intelligence agency, provided a “seed investment,” this former official said, “when they were trying to build out the Great Firewall and the monitoring technology.”

“This is entirely false,” Tencent said. “Our history as an entrepreneurial start-up is well known, funded first by our founders and then IDG and PCCW, and we’ve been a public company with transparent ownership for over 16 years.”

Cooperation picked up “when WeChat became a thing; the MSS came to them regarding monitoring things and shutting them down when necessary,” said the former senior CIA official. “It’s not that Tencent or [its founder] Pony Ma are dancing to the tune of what the MSS says, but if at any point China’s security services need assistance, they are providing it.”

“Tencent, like any other company operating in China, complies with [Chinese] law in a transparent way,” Tencent said. “The allegations beyond this are completely false.”

China’s President Xi Jinping and U.S. President Donald Trump review the Chinese honor guards during a welcome ceremony at the Great Hall of the People in Beijing on Nov. 9, 2017. FRED DUFOUR/AFP VIA GETTY IMAGES
Economic espionage by China’s spy agencies has benefited mainland companies for many years, with data hacked or otherwise stolen by China’s intelligence services flowing toward the private sector to give Chinese firms a leg up against the competition. While intellectual property theft is
Please, Log in or Register to view URLs content!
—and often driven by the private sector—in China, the state has long played a key role in industrial espionage. America’s firms, with their hefty government and military contracts, became juicy targets in the online era. “It’s well understood that you’ve had some flow of information from Chinese intelligence agencies to private sector entities,” said Sean Kanuck, who served as the U.S. national intelligence officer for cyber issues from 2011 to 2016.

As far back as 2000, according to Steve Ryan, the former deputy director of the National Security Agency’s Threat Operations Center, U.S. officials observed Chinese cyberoperations aimed at piercing U.S. defense contractors—something that was occurring “on a regular basis” by around 2006 onward, Ryan said. The Chinese were “just robbing the defense industrial base blind, in certain areas, in certain technologies,” he recalled. “And then we would just watch them form a company that would then put that U.S.-side interest out of business. We saw that time and again.” These cyber-incursions became ubiquitous, with Chinese state hackers successfully compromising the networks of contractors to the Pentagon’s U.S. Transportation Command 20 times in a single year,
Please, Log in or Register to view URLs content!
a 2014 Senate Armed Service Committee report. In 2018, Chinese operatives successfully
Please, Log in or Register to view URLs content!
, pilfering highly sensitive information related to the development of submarine missiles.
 

localizer

Colonel
Registered Member
U.S. INTELLIGENCE OFFICIALS ALSO OBSERVED HACKED INFORMATION BEING TRANSFERRED FROM DATA CENTERS CONTROLLED BY CHINESE INTELLIGENCE AGENCIES TO QUASI-PRIVATE, QUASI-PUBLIC CHINESE DEFENSE BUSINESSES.

American officials stewed as
Please, Log in or Register to view URLs content!
new fighter jets and other weapons systems
Please, Log in or Register to view URLs content!
stolen U.S. designs. Using their own technical spying capabilities, U.S. intelligence officials also observed hacked information being transferred from data centers controlled by Chinese intelligence agencies to quasi-private, quasi-public Chinese defense businesses. Years ago, though, this purloined data would remain with Chinese companies for “competitive uses,” said a former senior NSA official. It was like “a gift to be used effectively” from Chinese intelligence to its defense sector partners, this person recalled. This earlier model of cooperation, however, was unidirectional, with data passed from China’s spies to its own industrial base, as part of Beijing’s race for technological parity with Washington.

But the use of private Chinese conglomerates to provide the know-how and data-processing firepower for China’s intelligence apparatus represents a new stage in this evolution, U.S. officials say. “The companies they are using are portraying themselves as large, legitimate, multinationals that have footprints across jurisdictions,” said the former Trump-era national security official. “These are not simply tiny little . . . defense contractors working inside China. They are major multinationals with footprints all over the world.” China’s “use of their private sector entities furthers not only their intelligence gathering, but processing,” said Ryan, the former top NSA official.

Key legal restrictions and cultural norms mean American spy agencies cannot induce U.S. firms to sift through the fruits of its own cyberspying; they have had to build these data analysis capabilities for themselves, U.S. officials say. And they cannot, for example, commandeer private U.S. companies’ data-processing power to help them create a composite picture of what the Chinese know about, say, U.S. government employees based on Beijing’s prior hacks. But synthesizing these parallel databases has been a priority for U.S. officials, who have worked to mirror image at least some of what they believe the Chinese possess, according to three current and former senior officials. This can be a laborious process. “It took us forever to condition” the data from the OPM breach, the current senior intelligence official said.

But when U.S. officials eventually analyzed all this data, the picture that emerged about what, in fact, the Chinese knew was not a pretty one. U.S. intelligence reporting on the subject is “sickening to your stomach,” the senior intelligence official said.

Please, Log in or Register to view URLs content!
we examine the emerging laws, regulations, and technologies that are both enabling greater data collection and impacting cross-border data flows. This series catalogs the data localization laws, comprehensive national data regulations, government data collection, and monitoring and surveillance technologies that are shaping the global data governance landscape and carrying wide-ranging impacts for individuals, companies, governments, multilaterals, and non-profits.
Please, Log in or Register to view URLs content!

“Look at Equifax. Add Anthem, the financial stuff, Marriott, there’s nothing they don’t know about us,” said the current official, referring to a series of breaches of U.S. firms perpetrated by Chinese hackers. “We are constantly trying to mimic what they do know” about Americans who might be targets for Chinese spies, they said. “And then we marry that up with intelligence that we get about what their interests are. Then we go back and give defensive briefs” to these potential targets, the current senior official said. “That’s kind of the new business model we have right now.”

China might be testing out a “new business model” as well, Trump-era officials fear. During the first few years of the Trump administration, conversations “bounced around” at the National Security Council and within U.S. intelligence agencies on how China’s hunt for security through data—through, for instance, synthesizing data from Marriot, Equifax, OPM, and other hacked organizations to identify U.S. spies—may have converged with its larger economic objectives, according to the former Trump-era national security official. The thinking “is still relatively immature” in that area, this source said. But U.S. officials believe China may be leveraging stolen personal information to attempt to undermine the American economy, through putting companies
Please, Log in or Register to view URLs content!
in strategically important business sectors, even if these companies don’t perform classified work.

These datasets might also be used to benefit Chinese businesses in other ways, officials say. “If I’m looking to expand a hotel chain or expand into the international travel market, having United Airlines, Marriot, or American Airlines customer records” could provide Chinese firms clear potential advantages “for due diligence and market research purposes,” said Kanuck, the former top U.S. cyber-focused intelligence official. Likewise, Kanuck said, the hack of Anthem could give Chinese firms obvious insights into the U.S. health care market. The massive data tranches could also be used as inputs to build better algorithms for artificial intelligence programs, officials say.

While some of this weaponized data could be derived from hacks, Trump-era officials also worried that attempted investments in U.S. firms by some Chinese businesses was aimed at gaining control over personal data in U.S. companies’ possession—which could then be passed back to the Chinese intelligence services. The Trump administration’s increased use of the Committee on Foreign Investment in the United States process—in which an interagency group reviews foreign purchases for national security threats—to block takeovers of some U.S. companies by Chinese firms was
Please, Log in or Register to view URLs content!
, officials say.

Then-Chinese Vice President Xi invites then-U.S. Vice President Joe Biden to view an honor guard during a welcome ceremony inside the Great Hall of the People in Beijing on Aug. 18, 2011. Lintao Zhang/Getty Images
Navigating the U.S.-China relationship will be the most momentous foreign-policy challenge for the incoming Biden administration. But in the vanishingly small world of bipartisan officialdom, the integrated threat posed by Beijing may represent the last great unifying issue in the national security sphere. The Biden administration’s China strategy seems likely to be a difference in degree from its predecessor, not in kind.

For American national security officials, deep worries about the Chinese government’s relationships with its world-spanning private sector companies—including telecom giants like Huawei, massive e-commerce platforms like Alibaba, and social media behemoths like ByteDance, which operates the TikTok platform—will increasingly influence the U.S.-Beijing relationship. China has already succeeded in isolating one out of every five humans on the planet from the global data ecosystem; now, in a defensive mirror image, U.S. policymakers are instituting more stringent controls aimed at segregating Americans’ data from Chinese companies—and, by extension, Beijing’s formidable intelligence apparatus.

DRIVEN BY FEARS OVER INTERNAL INSTABILITY AND EXTERNAL THREATS TO ITS RULE, THE CHINESE COMMUNIST PARTY HAS DETERMINED THAT DATA SECURITY IS TANTAMOUNT TO REGIME SECURITY.

Driven by fears over internal instability and external threats to its rule, the Chinese Communist Party has determined that data security is tantamount to regime security. But this strategy creates some internal tensions for Beijing. “The Chinese cybersecurity system today requires backdoors into every single company and individual in China,” said a former senior intelligence analyst. “And they are willing to admit that these [backdoors] could enable attackers and may decrease the cybersecurity of the companies.”

This is a trade-off China’s leaders seem willing to make, at least for now—even though these policies may catalyze an economic decoupling with China’s most important trading partner, and even though this decoupling might itself drive domestic instability. Meanwhile, the bear hug between Chinese intelligence and Chinese industry continues to squeeze together ever more tightly. After all, said the former senior intelligence analyst, “this is a country with omnipresence in its companies.”

Editor’s Note: This is the third in a three-part series. The
Please, Log in or Register to view URLs content!
covers how the data wars began between the two nations after CIA networks were uncovered in China. The
Please, Log in or Register to view URLs content!
covers how U.S. sources in China went dark at a critical moment during Xi’s rise, while Beijing’s hacking continued.
 

daifo

Major
Registered Member
Please, Log in or Register to view URLs content!
is a good site to "archive" sites with paywalls. Might be a better alternative especially from a legal standpoint than posting the whole article onto this forum.
 

localizer

Colonel
Registered Member
Please, Log in or Register to view URLs content!
is a good site to "archive" sites with paywalls. Might be a better alternative especially from a legal standpoint than posting the whole article onto this forum.
Please, Log in or Register to view URLs content!


Basically it's saying that Chinese private enterprises cooperate with state intelligence apparatuses to process intelligence data, willingly or unwillingly. This taps into the industrial prowess of the high tech sector.
 

AssassinsMace

Lieutenant General
Please, Log in or Register to view URLs content!


Since some people are fighting to exclude legal votes that include from ethnic minorities, it just tells you being able to vote is all right just as long as it doesn't affect which candidate they want. So just because they're okay with minorities voting just as long it doesn't take away from what they want still means they're for democracy and can bomb other countries in the name of democracy. That's why your seeing the pro Trump crowd wanting to change a legal election. For the longest time they can claim they're for democracy because they allowed minorities to vote but once those minorities have influence on who wins by their votes, they see something wrong and act like the election is being stolen from them because they still think their votes are the only ones that count. And the Democrats are guilty of this too when Matt Fong ran against Barbara Boxer for the California Senate seat an influential democratic pundit who also had a radio talk show was worried that Asian-Americans in California would vote for an Asian just because they were Asian where he even agreed with a caller that said Asian Americans should have their citizenship taken away if they dare vote for any Asian in an election.
 

daifo

Major
Registered Member
Please, Log in or Register to view URLs content!


Basically it's saying that Chinese private enterprises cooperate with state intelligence apparatuses to process intelligence data, willingly or unwillingly. This taps into the industrial prowess of the high tech sector.

The Snowden/wikileaks proves US private companies are doing the same thing :rolleyes:
 

Nobonita Barua

Senior Member
Registered Member
But the involved have plausible deniability due to being able to control the media as well.

Chinese are always guilty in their eyes.
Actually it gives a possible route to make sure their entire population is held responsible for the activities of their government which is by,of,for them.

China is so bad at PR
 

localizer

Colonel
Registered Member
Actually it gives a possible route to make sure their entire population is held responsible for the activities of their government which is by,of,for them.

China is so bad at PR
US had a head start in the propaganda game.

CCP is at fault for hermiting for so long

Even USSR failed against the Western propaganda machine.
 
Last edited:

Nobonita Barua

Senior Member
Registered Member
US had a head start in the propaganda game.

CCP is at fault for hermiting for so long

Even USSR failed against the Western propaganda machine.
No.
US had head start, yet it barely can controls the outcome.

First forward in 2020, almost everything US does is source of entertainment, because they are biggest source of adult entertainment.

Chinese PR shouldn't target US & EU. It should target rest of the world to agitate people of the globe against them,especially those in MENA region will come in handy. West is going to use it's population to shield it's government's activity in name of democracy. China need to do exactly same. USSR example bears nothing today. It was a country with lots of nukes & nothing else.
 
Top