Tag: tech War

Chinese Military Plans Foreign Port Destruction

News Analysis The Chinese military is unveiling a range of sophisticated military technologies, from underwater stealth attacks against foreign ports, to drone fighters and military artificial intelligence (AI). China’s military is testing stealthy underwater explosions for purposes of the destruction of foreign ports, according to the Global Times, an ultra-nationalist news outlet controlled by the…


China Uses ‘Whole-of-Society’ Effort to Steal From the US: Former CIA Officer

China is using a whole-of-society approach to steal its way to become a military power, and the U.S. government needs to better defend against such an espionage campaign, said a retired CIA officer. “U.S. security officials estimate that the Chinese steal between $300 billion and $600 billion a year in U.S. intellectual property, research and…


China Uses ‘Whole-of-Society’ Effort to Steal From US: Former CIA Officer

China is using a whole-of-society approach to steal its way to becoming a military power, and the U.S. government needs to better defend against such an espionage campaign, according to a retired CIA officer. “U.S. security officials estimate that the Chinese steal between $300 billion and $600 billion a year in U.S. intellectual property, research…


China’s 5G Activity Remains Active and Dangerous, Experts Warn

Wireless networks around the world that control critical functions in factory production and military communications could be jeopardized by the Chinese Communist Party (CCP), according to Jon Pelson. Pelson is the author of “Wireless Wars: China’s Dangerous Domination of 5G and How We’re Fighting Back,” who warned of the security risks posed by telecom companies with…


Chinese Agent Accused of Recruiting Spies to Steal US Aircraft Tech Stands Trial

A historic federal espionage trial against a Chinese intelligence agent started in Cincinnati, Ohio on Oct. 18. The agent, named Yanjun Xu, has been charged with recruiting spies to steal tech from U.S. aviation and aerospace firms. According to the prosecutors, the Chinese regime was attempting to steal know-how from American aircraft companies, particularly from…


Blacklisted Huawei Pays Half a Million to Lobbyist to Influence White House

Chinese tech giant Huawei paid longtime Democrat lobbyist Tony Podesta $500,000 from July to September to lobby the White House, according to a recent government lobbying disclosure report. It’s not clear what policies Podesta lobbied on or whom he might have contacted at the White House. According to the disclosure form, it stated that lobbying…


Blacklisted Huawei Pays Half a Million to Tony Podesta to Lobby White House

Chinese tech giant Huawei paid longtime Democrat lobbyist Tony Podesta $500,000 from July to September to lobby the White House, according to a recent government lobbying disclosure report. It’s not clear what policies Podesta lobbied on or whom he might have contacted at the White House. According to the disclosure form, it stated that lobbying…


China Is Upping the Game in Hypersonic Weapons

News Analysis The hypersonic missile is the holy grail of the kinetic-kill weapons system. The appeal of such a powerful, supposedly unstoppable weapon is obvious and not lost on the West’s adversaries. It is China, however, that is driving most of the recent concerns over a hypersonics arms race. Traveling at a speed of anywhere…


US-China Battle for Semiconductors

News Analysis Semiconductors are at the heart of the U.S.-China competition for tech supremacy. They are expensive and critical, and the Chinese regime has vowed to outspend the United States by almost 50 to 1 in developing semiconductors. Semiconductors, or “chips,” are an integral component of the technological products, which drive a country’s economic development. They…


China Could be Exploiting Internet Security Process to Steal Data, Cyber Experts Warn

To access data from unsuspecting users, the Chinese Communist Party (CCP) could be exploiting a universal authentication process that is thought to be secure, but in reality may not be, cybersecurity experts warned. While encryption remains the preferred method to secure digital data and protect computers, in some cases, the very digital certificates used for…