翻訳と辞書
Words near each other
・ Chinese Independent Churches
・ Chinese independent high school
・ Chinese Indian
・ Chinese Indonesian cuisine
・ Chinese Indonesian surname
・ Chinese Indonesians
・ Chinese Industrial Cooperatives
・ Chinese industrialization
・ Chinese influences on Islamic pottery
・ Chinese Information Operations and Information Warfare
・ Chinese input methods for computers
・ Chinese Institute of Certified Public Accountants
・ Chinese instrument classification
・ Chinese intellectualism
・ Chinese intelligence activity abroad
Chinese intelligence operations in the United States
・ Chinese International School
・ Chinese International School Manila
・ Chinese Internet Slang
・ Chinese Iranian
・ Chinese ironclad Dingyuan
・ Chinese ironclad Zhenyuan
・ Chinese Islamic cuisine
・ Chinese Islamic Cultural and Educational Foundation
・ Chinese Israeli
・ Chinese Italian
・ Chinese jade
・ Chinese Jamaicans
・ Chinese Japanese
・ Chinese Japanese Korean


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Chinese intelligence operations in the United States : ウィキペディア英語版
Chinese intelligence operations in the United States
China is alleged to have begun a widespread effort to acquire U.S. military technology and classified information and the trade secrets of U.S. companies.〔Finkle, J., Menn, J., Viswanatha, J. (''U.S. accuses China of cyber spying on American companies.'' ) Reuters, Mon 19 May 2014 6:04pm EDT.〕〔Clayton, M. (''US indicts five in China's secret 'Unit 61398' for cyber-spying.'' ) Christian Science Monitor, 19 May 2014〕 The Chinese government is accused of stealing trade secrets and technology, often from companies in the United States, to help support its long-term military and commercial development. China has been accused of using a number of methods to obtain U.S. technology (using U.S. law to avoid prosecution), including espionage, exploitation of commercial entities and a network of scientific, academic and business contacts.〔deGraffenreid, p. 30.〕 Although it uses a network of contacts to collect information used to benefit Chinese businesses, each bit of information does not invite scrutiny or prosecution by the U.S. government. Espionage cases include Larry Wu-Tai Chin, Katrina Leung, Gwo-Bao Min, Chi Mak and Peter Lee.〔〔
In addition to traditional espionage, China partners civilian Chinese companies with American businesses to acquire technology and economic data〔Wortzel, p. 9.〕 and uses cyber spying to penetrate the computer networks of U.S. businesses and government agencies; an example is the December 2009 Operation Aurora.〔Helft, Miguel and John Markoff, "In Rebuke of China, Focus Falls on Cybersecuirty," ''The New York Times'', January 13, 2010.〕 U.S. law enforcement officials have identified China as the most active foreign power involved in the illegal acquisition of American technology.〔Wortzel, p. 8.〕 On May 19, 2014, the United States Department of Justice announced that a Federal grand jury had indicted five People's Liberation Army officers for stealing confidential business information and intellectual property from U.S. commercial firms and planting malware on their computers.〔〔
High-profile Chinese spy cases in the U.S.,especially these later found falsefully accused, raise concerns by civil-rights groups about potential racial profiling of Chinese Americans, Asian Americans and immigrants of Chinese origin, particularly after the collapse of the "Chinese espionage" case against Wen Ho Lee. A prominent Chinese American and a member of the Committee of 100, Dr. George Koo wrote an article in 2015 warning that "Chinese Americans continue to be victimized by racial profiling" after seeing the latest victim Sherry Chen, who was falsefully accused of spying for China.
==Methods==
China is alleged to use a number of methods to operate in the United States.〔Polmar, Norman and Thomas B. Allen, ''Spy Book: The Encyclopedia of Espionage, ''Second Edition, (New York, NY: Random House Reference, 2004), p. 125.〕 Individuals attempt to obtain targeted information from open sources such as libraries, research institutions and unclassified databases.〔 Chinese travelers are recruited to carry out specific intelligence activities, and the Chinese government debriefs returnees from exchange programs, trade missions and scientific-cooperation programs.〔Eftimiades, p. 28.〕 Chinese citizens may be coerced to cooperate.〔
Partnerships between Chinese and foreign companies have been accused of existing solely to give Chinese defense industries access to advanced technology.〔Wortzel, p. 4.〕 The regulatory and commercial environment in China pressures American and other foreign companies to transfer technology to their Chinese partner companies as part of doing business in the country.〔 Foreign companies provide technology, capital and manufacturing expertise to obtain access to Chinese markets,〔 and high-tech equipment is purchased by Chinese agents operating front organizations in Hong Kong.〔〔 Some items (computers, semiconductors, software, telecommunications devices, and integrated circuits)〔 may be used for military or civilian purposes.〔Wortzel, p. 3.〕 China also uses state-run firms to purchase American companies with access to the targeted technology.〔
China also accesses foreign technology through industrial espionage,〔 with U.S. Immigration and Customs Enforcement officials rating China's industrial-espionage and theft operations as the leading threat to U.S. technological security.〔U.S. Department of Defense, ''Annual Report to Congress on the Military Power of the People's Republic of China,'' (Washington, DC: July 2007), p. 29.〕 Between October 2002 and January 2003 five Chinese businessmen were accused of illegally shipping equipment and trade secrets from California to China,〔 and U.S. officials prevented a Chinese man from shipping a new, high-speed computer used on classified projects (including nuclear-weapons development) from Sandia National Laboratories.〔

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Chinese intelligence operations in the United States」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.