The high-profile espionage case of Presidential Office employee Wang Jen-bin (王仁炳) in 2009, who was later convicted of espionage, was one of the incidents of Chinese infiltration of the civilian government, the official said. As they have no mechanisms for reporting suspected espionage attempts, the risk of vulnerable civil servants being turned or compromised is substantial,” the official said.Ĭhinese espionage is not limited to attempts to infiltrate the central government, the official said, adding that Beijing’s agents have exploited cross-strait exchange channels to approach and cultivate specific individuals of Aboriginal descent for recruitment as assets or agents. “The main issue for governmental administrative offices is that civil servants have low awareness and the offices lack their own information security systems to protect them from communist spies, beyond the ‘ethics units’ putting in double shifts. Zhou allegedly attempted to “recruit Taiwanese officials working in ministry or department-level organizations in the central government on a long-term basis,” and confidential information entrusted to multiple governmental agencies and employees of educational institutions has been compromised, the official said, citing knowledge of the investigation. The official cited the detention last week of Chinese former student Zhou Hongxu (周泓旭) on suspicion of espionage as evidence that Chinese agents have compromised government offices. Such offices are primary targets, as they are capable of providing sensitive information regarding technological research and development, diplomatic policies and cross-strait affairs, the official said. Named GhostEmperor, Kaspersky said the group uses hi. In addition to military and national security apparatuses, Chinese intelligence operatives have infiltrated the administrative offices of the civilian government, the official said. At the SAS 2021 security conference today, analysts from security firm Kaspersky Lab have published details about a new Chinese cyber-espionage group that has been targeting high-profile entities across South East Asia since at least July 2020. Eighteen were discovered before August 2009, when mail, commerce and travel channels were opened between Taiwan and China, while 42 have been recorded since then, according to reports.ĭetected Chinese espionage operations represent only the tip of the iceberg, the official said. Taiwanese authorities have uncovered 60 espionage plots since 2002. Taiwan’s national security authorities estimate that about 5,000 individuals are collecting state secrets in Taiwan on behalf of the Chinese government, and the nation’s civilian administration is no less vulnerable or compromised than its military, said the official, who spoke on condition of anonymity.Īlthough 80 percent of all detected incidents of Chinese espionage targeted the military, leaving just 20 percent aimed at the civilian government, the disparity was likely due to the military’s higher detection rate, as it has counterintelligence capabilities that are absent from the government’s administrative offices, the official said. In late spring of 2015, Elemental’s staff boxed up several servers and sent them to Ontario, Canada, for the third-party security company to test, the person says.Government offices lack credible information security and are vulnerable to Chinese espionage, an official in the national security establishment said. These servers were assembled for Elemental by Super Micro Computer Inc., a San Jose-based company (commonly known as Supermicro) that’s also one of the world’s biggest suppliers of server motherboards, the fiberglass-mounted clusters of chips and capacitors that act as the neurons of data centers large and small. The first pass uncovered troubling issues, prompting AWS to take a closer look at Elemental’s main product: the expensive servers that customers installed in their networks to handle the video compression. To help with due diligence, AWS, which was overseeing the prospective acquisition, hired a third-party company to scrutinize Elemental’s security, according to one person familiar with the process. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |