Abstract
‘[T]he reason the enlightened prince and the wise general conquer the enemy whenever they move and their achievements surpass those of ordinary men is foreknowledge.’ - Sun Tzu1
1. Tzu, The Art of War, 144.
View all notes
‘China has expansive efforts in place to acquire U.S. technology to include sensitive trade secrets and proprietary information. It continues to use cyber espionage to support its strategic development goals - science and technology advancement, military modernization, and economic policy objectives. China’s cyberspace operations are part of a complex, multipronged technology development strategy that uses licit and illicit methods to achieve its goals. Chinese companies and individuals often acquire U.S. technology for commercial and scientific purposes. At the same time, the Chinese government seeks to enhance its collection of U.S. technology by enlisting the support of a broad range of actors spread throughout its government and industrial base.’ - US National Counterintelligence and Security Center, 2018.
1. Tzu, The Art of War, 144.
View all notes
‘China has expansive efforts in place to acquire U.S. technology to include sensitive trade secrets and proprietary information. It continues to use cyber espionage to support its strategic development goals - science and technology advancement, military modernization, and economic policy objectives. China’s cyberspace operations are part of a complex, multipronged technology development strategy that uses licit and illicit methods to achieve its goals. Chinese companies and individuals often acquire U.S. technology for commercial and scientific purposes. At the same time, the Chinese government seeks to enhance its collection of U.S. technology by enlisting the support of a broad range of actors spread throughout its government and industrial base.’ - US National Counterintelligence and Security Center, 2018.
Original language | English |
---|---|
Pages (from-to) | 1085-1091 |
Number of pages | 7 |
Journal | Intelligence and National Security |
Volume | 34 |
Issue number | 7 |
Early online date | 23 Oct 2018 |
DOIs | |
Publication status | Published - 10 Nov 2019 |
Keywords
- Intelligence
- China
- Espionage
- Security