Chinese Espionage Compromises Millions of Security Clearance Records. Again.
While the Chinese are noted offenders of nefarious cyber activity, these incidents further highlight the critical necessity of overall cyberspace security.
/
Loading video...
While the Chinese are noted offenders of nefarious cyber activity, these incidents further highlight the critical necessity of overall cyberspace security.
Is it really that big a deal if the Chinese stole lists of government employees? It is when the list is of Americans with top-secret security clearances.
Guerrilla warfare is nothing new. Neither is proxy war. China’s history of using indirect methods to erode and undermine their enemies without battle goes back to the earliest treatises on warfare written by the general T’ai Kung. (Sun Tzu’s admonition that supreme excellence is found in victory without fighting has nothing to do with pacifism […]
Any modern country has a wide variety of assets to protect. Some of those assets are more necessary than others for the country’s security, welfare, and economy in general. Such critical assets include power grids, water supplies, public-transit systems, and telecommunications, to name a few. Critical infrastructure has to be protected from a wide variety of […]
A little preface: To say I dislike Edward Snowden and Glen Greenwald is putting my feelings mildly. I think about the years leading up to this point and it draws out an ire that borders on fury. I was politely asked to write an article covering a facet of this, and I felt that I could […]
There has been a trend in recent years that seems to the author to be metastasizing, one in which people view current threats, particularly the asymmetric ones, in a binary, black-and-white sort of way. Either a threat is an existential one, that is going to leave the U.S. in complete wreckage, or it is nothing. Examples […]
The term “artifact” has at least two meanings: From a technical perspective, an artifact is an unintentional pattern in data, arising from processes of collection and management. From a cultural perspective, an artifact is a designed object, with a social and material history. -Yanni Loukissas As I laid out in the first part of this […]
The artifice on which every intra-state relationship with the People’s Republic of China (PRC) stands is: “In China, ‘win-win” means China wins twice.” There have been a few articles on the PRC here on SOFREP. I recently worked on a project that dealt with this, and thus my decision to write on it was appropriately […]
In this week’s Best of SOFREP, we look at Coriolanus’ post, Government Hackers and the Dark Web Part 1, which covers the deep web and its relationship to analytics, and the dark web and its relationship to nefarious activity in brief. Coriolanus is the real deal, a US government super-secret good guy patriotic hacker who […]
The first image that most often comes to people’s minds when they hear the term “hacker” is some young, video-game-loving, Mountain Dew drinking, Doritos-eating guy with glasses living in his parents’ basement. Add to that your typical presumption of a lack of social skills, pussy-pulling ability and more, and one tends to think that becoming […]
Sino-American relations have evolved drastically over the last several decades. The rise of China has created fears and concerns within certain sectors of the US defense establishment. The question that is asked time and time again is whether or not China poses a threat to American’s regional interests in East Asia. This paper seeks to summarize […]
So to recap, Part 1 of this subject covered the deep web and its relationship to analytics, and the dark web and its relationship to nefarious activity in brief. As part of this week’s fun, I thought I would introduce you to Daisake Inoue. I met him several years ago at a VisWeek conference and […]