A historic federal espionage trial against a Chinese intelligence agent started in Cincinnati, Ohio on Oct. 18. The agent, named Yanjun Xu, has been charged with recruiting spies to steal tech from U.S. aviation and aerospace firms. According to the prosecutors, the Chinese regime was attempting to steal know-how from American aircraft companies, particularly from…
Chinese Agent Accused of Recruiting Spies to Steal US Aircraft Tech Stands Trial
Japanese Messaging App Admits It Processed User Data in China
LINE, a Japanese messaging app, admitted it sent user data to China, exposing people’s personal information to the communist regime, reported The Register. The Chinese Communist Party (CCP) has been collecting big data—the new key asset for global power—as part of its intelligence strategy, in its bid to control worldwide information and transactions. LINE’s parent…
Japanese Messaging App Admits to Sending User Data to China
Japanese messaging app Line admitted it sent user data to China, exposing people’s personal information to the communist regime. The Chinese Communist Party (CCP) has been collecting big data—the new key asset for global power—as part of its intelligence strategy, in its bid to control worldwide information and transactions. LINE’s parent company, Z-Holdings, released a…
US Intelligence Agency Warns Companies on China’s ‘Comprehensive’ Efforts to Acquire Critical Technologies
The National Counterintelligence and Security Center (NCSC) launched an outreach campaign on Oct. 22 to warn and instruct U.S. organizations engaged in critical and emerging technologies about the dangers posed by foreign states’ counterintelligence operations. “In recent months, NCSC has begun engagements with various entities in these sectors to provide information on nation-state threats to…
Billions Worth of American Tech Licenses Approved for Blacklisted Chinese Companies
Suppliers to two blacklisted Chinese companies—telecom giant Huawei and China’s top chipmaker SMIC—were approved to receive billions of dollars worth of licenses for U.S. technologies shipments between November and April, documents released by the House Committee on Foreign Affairs on Oct. 21 detail. Some 301 licenses worth a total of $103 billion were approved for…
News of Jack Ma, Founder of Alibaba, Resurfacing Overseas, Props up Investor Confidence
The reported reappearance of Jack Ma overseas, for the first time in over a year, has resulted in shares of the tech giant Alibaba Group surging in Hong Kong. Ma is the founder and former chairman of Alibaba Group Holding, which owns the South China Morning Post (SCMP) which reported on Oct. 19 that he…
US-China Battle for Semiconductors
News Analysis Semiconductors are at the heart of the U.S.-China competition for tech supremacy. They are expensive and critical, and the Chinese regime has vowed to outspend the United States by almost 50 to 1 in developing semiconductors. Semiconductors, or “chips,” are an integral component of the technological products, which drive a country’s economic development. They…
Explainer: What Are Hypersonic Weapons and Why Do They Matter?
News Analysis Talk of a new arms race between the United States and China has rapidly increased since a recent report by the Financial Times asserted that China had tested a nuclear-capable hypersonic weapon. But what are hypersonic weapons? How do they work? Who has them? And why does it matter? What are Hypersonic Weapons?…
Unauthorized Footage of South Koreans Trend on Chinese TikTok, Raising Serious Privacy Concerns
Do you have to worry that images of you in public are appearing on Chinese multimedia platforms? Many South Koreans are concerned about exactly this problem after learning that Chinese TikTokers have been recording unauthorized footage of people in public places in South Korea. A recent post titled, “Do you know that Chinese people take…
China Could be Exploiting Internet Security Process to Steal Data, Cyber Experts Warn
To access data from unsuspecting users, the Chinese Communist Party (CCP) could be exploiting a universal authentication process that is thought to be secure, but in reality may not be, cybersecurity experts warned. While encryption remains the preferred method to secure digital data and protect computers, in some cases, the very digital certificates used for…
US News
RSS Error: A feed could not be found at `https://www.theepochtimes.com/c-us/feed`; the status code is `200` and content-type is `text/html; charset=utf-8`