News Analysis The Chinese military is unveiling a range of sophisticated military technologies, from underwater stealth attacks against foreign ports, to drone fighters and military artificial intelligence (AI). China’s military is testing stealthy underwater explosions for purposes of the destruction of foreign ports, according to the Global Times, an ultra-nationalist news outlet controlled by the…
China Uses ‘Whole-of-Society’ Effort to Steal From the US: Former CIA Officer
China is using a whole-of-society approach to steal its way to become a military power, and the U.S. government needs to better defend against such an espionage campaign, said a retired CIA officer. “U.S. security officials estimate that the Chinese steal between $300 billion and $600 billion a year in U.S. intellectual property, research and…
China Uses ‘Whole-of-Society’ Effort to Steal From US: Former CIA Officer
China is using a whole-of-society approach to steal its way to becoming a military power, and the U.S. government needs to better defend against such an espionage campaign, according to a retired CIA officer. “U.S. security officials estimate that the Chinese steal between $300 billion and $600 billion a year in U.S. intellectual property, research…
China’s 5G Activity Remains Active and Dangerous, Experts Warn
Wireless networks around the world that control critical functions in factory production and military communications could be jeopardized by the Chinese Communist Party (CCP), according to Jon Pelson. Pelson is the author of “Wireless Wars: China’s Dangerous Domination of 5G and How We’re Fighting Back,” who warned of the security risks posed by telecom companies with…
Chinese Agent Accused of Recruiting Spies to Steal US Aircraft Tech Stands Trial
A historic federal espionage trial against a Chinese intelligence agent started in Cincinnati, Ohio on Oct. 18. The agent, named Yanjun Xu, has been charged with recruiting spies to steal tech from U.S. aviation and aerospace firms. According to the prosecutors, the Chinese regime was attempting to steal know-how from American aircraft companies, particularly from…
Blacklisted Huawei Pays Half a Million to Lobbyist to Influence White House
Chinese tech giant Huawei paid longtime Democrat lobbyist Tony Podesta $500,000 from July to September to lobby the White House, according to a recent government lobbying disclosure report. It’s not clear what policies Podesta lobbied on or whom he might have contacted at the White House. According to the disclosure form, it stated that lobbying…
Blacklisted Huawei Pays Half a Million to Tony Podesta to Lobby White House
Chinese tech giant Huawei paid longtime Democrat lobbyist Tony Podesta $500,000 from July to September to lobby the White House, according to a recent government lobbying disclosure report. It’s not clear what policies Podesta lobbied on or whom he might have contacted at the White House. According to the disclosure form, it stated that lobbying…
China Is Upping the Game in Hypersonic Weapons
News Analysis The hypersonic missile is the holy grail of the kinetic-kill weapons system. The appeal of such a powerful, supposedly unstoppable weapon is obvious and not lost on the West’s adversaries. It is China, however, that is driving most of the recent concerns over a hypersonics arms race. Traveling at a speed of anywhere…
US-China Battle for Semiconductors
News Analysis Semiconductors are at the heart of the U.S.-China competition for tech supremacy. They are expensive and critical, and the Chinese regime has vowed to outspend the United States by almost 50 to 1 in developing semiconductors. Semiconductors, or “chips,” are an integral component of the technological products, which drive a country’s economic development. They…
China Could be Exploiting Internet Security Process to Steal Data, Cyber Experts Warn
To access data from unsuspecting users, the Chinese Communist Party (CCP) could be exploiting a universal authentication process that is thought to be secure, but in reality may not be, cybersecurity experts warned. While encryption remains the preferred method to secure digital data and protect computers, in some cases, the very digital certificates used for…
-
Recent Posts
-
Archives
- May 2025
- April 2025
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- September 2013
- July 2013
- March 2013
- January 2013
- December 2012
- November 2012
- December 1
-
Meta