China, Russia and Iran Conduct Economic Spying on US: Report - NBC Southern California
National & International News
The day’s top national and international news

China, Russia and Iran Conduct Economic Spying on US: Report

"If this threat is not addressed, it could erode America's long-term competitive economic advantage"

    processing...

    NEWSLETTERS

    How a Business Education Can Help You Advance Your Career 
    Andy Wong/AP (File)
    In this Nov. 9, 2017, file photo, an American flag is flown next to the Chinese national emblem during a welcome ceremony for visiting U.S. President Donald Trump outside the Great Hall of the People in Beijing.

    A Chinese cyberespionage group called APT10 relentlessly attacks U.S. engineering, telecom and aerospace industries. Russian hackers last year compromised dozens of U.S. energy companies. Iranian hackers known as "Rocket Kitten" repeatedly target American defense companies in hopes of stealing information to boost Tehran's missile and space programs.

    While Moscow's efforts to meddle in the 2016 U.S. presidential election are widely known, spy services from China, Russia and Iran, along with their proxy hackers, also are hard at work trying to steal trade secrets and proprietary information from the United States, according to a government report released Thursday. A classified version of the report was sent to Congress.

    "Foreign economic and industrial espionage against the United States continues to represent a significant threat to America's prosperity, security and competitive advantage," the National Counterintelligence and Security Center said. "China, Russia and Iran stand out as three of the most capable and active cyber actors tied to economic espionage and the potential theft of U.S. trade secrets and proprietary information."

    Cyberespionage is a relatively low-cost, high-yield way to access and acquire information from U.S. research institutions, universities and corporations, the report said. More vulnerabilities will emerge with the increase in cloud computing, artificial intelligence and the proliferation of vehicles, home appliances, medical devices and other items connected to the internet.

    Watch: Ta-Nehisi Coates’ Full Opening Statement at House Hearing on Reparations

    [NATL] Watch: Ta-Nehisi Coates’ Full Opening Statement at House Hearing on Reparations

    Ta-Nehisi Coates, author of “The Case for Reparations,” testified before a House Judiciary subcommittee during a hearing on whether the United States should consider compensation for the descendants of slaves. 

    He delivered a rebuttal to Senate Majority Leader Mitch McConnell's comments that "no one currently alive was responsible for that," which Coates called a "strange theory of governance." 

    "Well into this century the United States was still paying out pensions to the heirs of civil war soldiers," he said. "We honor treaties that date back some 200 years despite no one being alive who signed those treaties. Many of us would love to be taxed for the things we are solely and individually responsible for. But we are American citizens and this bound to a collective enterprise that extends beyond our individual and personal reach."

    (Published Wednesday, June 19, 2019)

    Cyberoperations are the preferred method for conducting economic espionage, the report said, but U.S. adversaries also acquire sensitive information by hiring sophisticated hackers, recruiting spies or gleaning material from foreign students studying at American universities.

    Adversaries also are infiltrating computer networks of suppliers that serve large companies and then using that connection to worm their way up the chain into large corporate computer systems. Bill Evanina, the nation's top counterintelligence official and director of the center, told reporters at a briefing that business leaders need to investigate the security of computer systems used by companies that supply their air conditioning and heating, printers and copiers and the like.

    "Our economic security is our national security," Evanina said "We cannot just get numb to our adversaries stealing our intellectual property."

    The report listed two dozen technologies that have piqued the interest of foreign intelligence collectors. They include oil, gas and coal-bed methane gas energies; smart grids; solar and wind technologies; biopharmaceuticals and new vaccines and drugs; defensive marine systems and radar; hybrid and electric cars; pollution control; high-end computer numerically controlled machines, which are used to control factory tools and machines in manufacturing; space infrastructure and exploration technology; synthetic rubber; rare earth materials; quantum computing; and next generation broadband wireless communications networks.

    Michael Moss, deputy director of the government's Cyber Threat Intelligence Integration Center, said incidents of economic espionage are growing rapidly. "The thing that continues to surprise me is how fast it continues to accelerate. It's getting faster and faster," he said.

    China uses joint ventures to try to acquire technical know-how, the report said. It said Beijing seeks partnerships with U.S. government labs to learn about specific technology and information about running such facilities and uses front companies to hide the hand of the Chinese government and acquire technology under U.S. export controls.

    Hearing on Reparations Brings Testimony from Actor, Senator, Ex-NFL Player

    [NATL] Hearing on Reparations Brings Testimony from Actor, Senator, Ex-NFL Player

    Watch actor Donald Glover, Sen. Cory Booker, D-N.J., and former NFL player Owens Burgess testify before a House Judiciary subcommittee hearing on whether the United States should consider compensation for the descendants of slaves.

     

    (Published 6 hours ago)

    The Trump administration has railed against China, imposed new tariffs and called for Beijing to end the theft of intellectual property from U.S. companies. The administration also wants China to curb policies that require American and other foreign businesses to hand over technology in exchange for access to the Chinese market.

    "If this threat is not addressed, it could erode America's long-term competitive economic advantage," the report said.

    Economic espionage conducted by hackers linked to Russia is mostly aimed at finding ways to inflict damage on the United States, disrupt services or benefit its economic interests, according to the report.

    "In support of that goal, Russian intelligence services have conducted sophisticated and large-scale hacking operations to collect sensitive U.S. business and technology information," the report said. It also said that Russian "military modernization efforts also likely will be a motivating factor for Russia to steal U.S intellectual property."

    Iranian's operations have typically targeted adversaries in the Middle East, such as Israel and Saudi Arabia. But it also tries to infiltrate U.S. networks to acquire technologies to bolster economic growth, modernize its military and increase exports.

    "The loss of sensitive information and technologies not only presents a significant threat to U.S. national security," the report said. "It also enables Tehran to develop advanced technologies to boost domestic economic growth, modernize its military forces and increase its foreign sales."

    20 Candidates. 2 Nights. Breaking Down 1st 2020 Dem. Debates

    [MI-NATL COPY] 20 Candidates. 2 Nights. Breaking Down 1st 2020 Dem. Debates

    The first Democratic primary debates will be held June 26th and 27th - and with 20 candidates expected to debate policy, healthcare, immigration and other issues over the course of two nights, it's anything but conventional. NBC's Darryl Forges breaks it down.

    (Published 4 hours ago)