Extensive Network of Secret Chinese Military Units Attack US on Daily Basis


China's silent war costs America trillions of dollars and millions of jobs


An army is attacking the United States. Its war is being waged without bullets or fanfare. Denied by its government, these soldiers operate in shadows and in silence. Yet, glimpses of their operations are seen on a daily basis—hackers and spies attacking and stealing from U.S. businesses and the U.S. government.
Until now, a complete view of their operations and of the military department that gives them their orders remained hidden. Yet, China’s spy and cyberoperations all share one thing in common: they’re all orchestrated under the People’s Liberation Army General Staff Department (GSD), the Chinese military’s top-level department dedicated to warfighting.

Article Quote: China's Silent War on the US
One military unit of China’s hacker army, Unit 61398, was revealed by a security company in February 2013. It is just one of around 20 similar units operating under the GSD’s Third Department, and alongside the Third Department are the Chinese regime’s other spy departments fighting against the West.
Under the GSD, three departments work on its spy campaigns for unconventional warfare. Its Second Department focuses on human spies and intelligence (HUMINT). The Third Department focuses on cyberespionage and signals intelligence (SIGINT). The Fourth Department focuses on electronic warfare, intercepting satellite data, and electronics intelligence (ELINT).
The GSD also oversees China’s military regions, the army, navy, and air force, and the Second Artillery, the home for China’s nuclear weapons.
CLICK HERE to see infographic detailing China’s ‘Unconventional War Machine’

‘Biggest Threat’

Casey Fleming, CEO of BlackOps Partners Corporation, which does counterintelligence and protection of trade secrets for Fortune 500 companies, spoke about the dangers posed by the army of spies at work against the United States under the direction of the GSD.
“It is clearly America’s biggest threat,” he said.
“It’s a war of the technology age, an economic war, a war where bombs are not dropped and guns are not fired, but it’s a war we’re squarely in,” he said.
Article Quote: China's Silent War on the US
One way to estimate the damage done in this war is through the cost of intellectual property theft, most of which is done by the Chinese regime.
The Commission on the Theft of Intellectual Property estimated such theft costs the United States $300 billion and 1.2 million jobs a year.
Fleming said, based on research from his company’s intelligence unit and client situations, the cost is closer to $500 billion worth of raw innovation that is stolen from U.S. companies.
That $500 billion would otherwise generate revenue, profits, and jobs. In a previous interview, Fleming estimated the total loss to the economy from the theft of innovation is $5 trillion each year when considering the expected 10-year life of the research and development.

An Unseen Battle

The question then is why China’s warfighting apparatus is hacking American companies. According to a Sept. 26 report from U.S. Special Operations Forces Command, the Chinese regime is waging hybrid warfare on the United States.
The Chinese regime’s theft of intellectual property for economic gain is just one piece of a larger strategy to fight a war while avoiding troop-to-troop combat. The report states, “Hybrid warfare involves a state or state-like actor’s use of all available diplomatic, informational, military, and economic means to destabilize an adversary.”
“Recent Chinese doctrine articulates the use of a wide spectrum of warfare against its adversaries, including the United States,” states the report, which quotes China’s Maj. Gen. Qiao Liang saying “The first rule of unrestricted warfare is that there are no rules, with nothing forbidden.”
The report outlines China’s uses of hybrid warfare, which include, “trade warfare, financial warfare, ecological warfare, psychological warfare, smuggling warfare, media warfare, drug warfare, network warfare, technological warfare, fabrication warfare, resources warfare, economic aid warfare, cultural warfare, and international law warfare.”
FBI material showing five Chinese military officers wanted on charges of economic espionage and trade secret theft are shown at the Justice Department in Washington, on May 19. The indictment of these five represents a first step for U.S. efforts to hold accountable the Chinese military for the theft of U.S. intellectual property and classified information. (AP Photo/Charles Dharapak)
FBI material showing five Chinese military officers wanted on charges of economic espionage and trade secret theft are shown at the Justice Department in Washington, on May 19. The indictment of these five represents a first step for U.S. efforts to hold accountable the Chinese military for the theft of U.S. intellectual property and classified information. (AP Photo/Charles Dharapak)
Estimates on the number of soldiers in each GSD varies, and most only focus on cyberspies in the Third Department. The Project 2049 Institute estimated in November 2011 there were 130,000 personnel under the Third Department. The Wall Street Journal estimated in July that the Third Department has 100,000 hackers, linguists, and analysts.
Both, however, estimate the Third Department has only 12 operational bureaus.
Fleming, whose company runs counterintelligence operations and researches the Chinese regime’s systems for espionage and unconventional warfare, said that under the Third Department there are 20 operational bureaus and between 250,000 and 300,000 soldiers dedicated to cyberespionage. The New York Times has also reported 20 bureaus.
Under the Second Department, between 30,000 and 50,000 human spies are working on insider operations targeting U.S. and foreign companies.
No source has been able to give an estimate on the number of operatives under the Fourth Department, which works on electronic intelligence.
A former soldier who worked under the Fourth Department, and whose job was to monitor Chinese weather satellites, told Epoch Times the soldiers who worked on its intelligence operations were highly secretive, and their operations were unknown even to others in the Fourth Department.
The source said, however, soldiers in the Fourth Department’s spy operations run rolling shifts. “For example, if Russia is launching a satellite, they’ll monitor that,” he said, noting it would be outside their schedule for monitoring the United States. “They’re working on this 24 hours.”

The Party’s Interest

The People’s Liberation Army (PLA) “is not a national army belonging to the state,” states a Nov. 12 report from the Congressional Research Service. “Rather, it serves as the Party’s armed wing.”
The PLA is not fighting its war on behalf of the Chinese people, and the soldiers under the GSD’s spy departments are being used to further the financial and political ambitions of the Chinese Communist Party.
According to Richard Fisher, senior fellow at the International Assessment and Strategy Center, “The PLA is kind of a state within a state that is completely devoted to the survival of the Party, and the Party returns that by showering the PLA with resources.”
“The PLA and its subordinate offices exist to carry out the leadership of the Communist Party,” he said, noting that if the Party’s leadership wanted them to feed the homeless, that’s what they’d be doing.
Article Quote: China's Silent War on the US
Regarding the cyberattacks and spy operations, “all of this is happening at the order and behest of the General Staff Department, because it is acting at the behest and order of the Chinese Communist Party,” Fisher said.
The state-run cyberattacks and China’s use of more conventional spies are part of a larger, coordinated effort under the GSD. The office operates under the Central Military Commission, which answers to the Chinese regime’s top leaders in the Central Committee of the Chinese Communist Party.
Unlike the other warfighting branches under the GSD, the Chinese regime’s spy departments have more flexibility in how they operate. Their orders come through the Chinese Communist Party’s Five-Year Plans, which often include targeted industries and economic goals of the Party.
One of the clearest links between the Five-Year Plans and the campaigns of economic theft by the Chinese military is Project 863, which was set in motion by former Chinese Communist Party leader Deng Xiaoping in March 1986. The program identified targeted industries for the Chinese regime to develop, and is widely regarded as a program that mandates theft.
Project 863 is “an emblematic program,” in the Chinese regime’s drive for “catching up fast and surpassing” the West, according to a 2011 report from the U.S. Office of the National Counterintelligence Executive. It states Project 863, “provides funding and guidance for efforts to clandestinely acquire US technology and sensitive economic information.”

Synergy

Understanding the overall structure of the GSD and the roles of its departments are crucial to understanding China’s seemingly wanton and random acts of cyberespionage and spying operations.
There isn’t just one military unit working on attacks. It is three large branches, under the GSD, which work in conjunction with one another.
For example, hackers under the Third Department may breach satellite systems and provide useful data to the Fourth Department, which is responsible for electronics intelligence.
Physical spies under the Second Department may internally infect the networks of a U.S. company with malware, which will then grant access to hackers with the Third Department.
The building housing Unit 61398 of the People's Liberation Army on the outskirts of Shanghai on Feb. 19, 2013. This unit was identified in a report issued by the security company Mandiant as involved in cyberhacking. Experts said 61398 is the least advanced of 20 such units. (AP Photo)
The building housing Unit 61398 of the People’s Liberation Army on the outskirts of Shanghai on Feb. 19, 2013. This unit was identified in a report issued by the security company Mandiant as involved in cyberhacking. Experts said 61398 is the least advanced of 20 such units. (AP Photo)
If a spy with the Second Department steals information from a network, hackers with the Third Department may also launch attacks against the network to help hide the spy’s tracks—making it appear the data was stolen from a cyberattack.
The system extends much further. There are state-run companies operating directly beneath each of the three departments, as well as by other military branches of the Chinese military that can benefit directly from trade secrets stolen from foreign companies.
And the Chinese military also overlaps with domestic security departments, and directly participates in some of the Chinese regime’s human rights violations against the Chinese people.
William Triplett, former chief counsel of the Senate Foreign Relations Committee and an expert on national security, has been following the GSD for some time. He wrote a two-part series on state-run companies working beneath the department, and its ties to the Chinese regime’s nuclear weapons research.
“It’s not just cyberattacks,” Triplett said, noting that while cyberattacks are in the news at the moment, the whole picture of the Chinese regime’s system is much more concerning.
“They’re out for everything,” he said. “To cast the net widely, they use actual live agents, and maybe once every couple of months somebody gets arrested by the FBI for doing this dreadful thing or that dreadful thing.”
He added that in the defense community, when Chinese spies are caught, “We say that’s just the one we caught. How many others are there we haven’t caught?”

Invading Armies

“The General Staff is specifically responsible for war affairs,” said a source formerly from China with direct knowledge of the department.
“They have specific schools that train operatives,” he said. “I know people who went to such schools and were sent to mountain bases where they collect satellite signals, and try to translate foreign-language communications into Chinese.”
He noted that the electronic intelligence operatives under the Fourth Department intercept phone and satellite communications, and also work on interfering with signals.
Operatives in the Second Department, he added, are often assigned to embassies for intelligence gathering—which is common practice for intelligence bureaus of most countries—or work under front businesses in targeted countries.
Article Quote: China's Silent War on the US
As for the Second Department, which oversees China’s conventional human spy operations, also known as HUMINT, Fleming said its agents typically work as insiders in U.S. foreign companies, think tanks, universities, and government agencies. Others under the Second Department work as China’s sleeper agents.
The sleeper agents will often take up regular jobs and live in foreign countries, and will typically stay inactive unless they receive orders to carry out operations.
According to Lu Dong, a former agent of the Chinese regime who defected in 2001, many of the Chinese regime’s systems for foreign espionage work by exploiting the open system of the United States.
Lu worked as one of the “low-ranking spies,” under China’s offices for overt espionage—the type that takes place in plain view—the United Front Work Department and the Overseas Chinese Affairs Office. These departments work on expanding the Chinese regime’s influence into foreign countries and maintaining oversight of Chinese expats.
He notes that the overt departments “are just the second guys,” and its agents are typically less trained and professional than agents under the GSD. The GSD, he said, “only sends the high-ranking spies.”

Growing Knowledge

Researchers have just begun chipping away at the system behind the Chinese military’s seemingly constant cyberattacks against U.S. firms and government offices.
The appeal of cyber is its opaque nature. It’s difficult to trace attacks to a specific individual, particularly in China where the ruling party not only doesn’t cooperate with criminal investigations, but even denies the attacks altogether.
It wasn’t until February 2013 that solid proof emerged that the Chinese military’s GSD was behind the cyberattacks stealing from U.S. companies. The next breakthrough was in May 2014 when the FBI named and indicted five Chinese military officers for their alleged involvement in the attacks.
The military hacker unit revealed by security company Mandiant and the FBI is called Unit 61398 and operates from Shanghai. Details are only available on one other of the GSD’s 20 units, which is Unit 61486. The names of the units that use five-digit numbers, according to Mandiant, are intentionally vague since it helps them stay obscure.
Article Quote: China's Silent War on the US
The Mandiant report was widely circulated. Fortune Magazine interviewed Kevin Mandia, who released the data, in a July 2013 article. The article highlighted the weight of the information, noting that prior to its release it was difficult to pin cyberattacks directly on the Chinese regime and its military, and the report made the connections clear.
More recently, security researchers at Novetta, a public and private coalition that is countering Chinese cyberespionage, uncovered what they believe is another of the Chinese regime’s cyberunits, dubbed “Axiom,” which they state is more advanced than Unit 61398. It is still unclear whether Axiom is a unit of the GSD or a domestic spying program under China’s State Security Council focused on monitoring Chinese dissidents.
According to Fleming, researchers regard Unit 61398, the publicly known unit, as being the least advanced of the units under the Third Department. Based on analysis of cyberespionage campaigns, the other 19 units are believed to be far more capable.
“It’s much more organized, much more hierarchical than what is known publicly,” Fleming said.
“Several of the other units are extremely stealthy and extremely accurate,” he said, referring to the skill and effectiveness of many other attacks seen coming out of China.
According to Fisher, “the General Staff Department is a huge, multifaceted endeavor. It is the core of the operational and intelligence function of the PLA.” He added, however, that it is controlled by the Chinese Communist Party, and that its campaigns of theft and hybrid warfare against the United States are likewise rooted in orders from the Chinese Communist Party.
“It’s not just here [in the United States]. It’s anywhere they can. This is what evil dictatorships do. They remain closed to every other part of the world and exist to exploit and destroy any societies that would question the legitimacy of their leadership,” he said. “As long as this Communist Party exists, it is going to be working to undermine democracies everywhere.”

Infographic

China-Unconventional-Warfare-Final-V2
Click image to see full size.
epochtimes.

Popular posts from this blog

UK GENERAL ELECTIONS:Inquiry announced into memo alleging Sturgeon wants Tory election victory.

Sandhurst's sheikhs: Why do so many Gulf royals receive military training in the UK? A parade outside the building at Sandhurst Continue reading the main story In today's Magazine The death list that names 5,000 victims Is this woman an apostate? Voices from a WW1 prison camp The Swiss selfie scandal Generations of foreign royals - particularly from the Middle East - have learned to be military leaders at the UK's Sandhurst officer training academy. But is that still a good idea, asks Matthew Teller. Since 1812, the Royal Military Academy Sandhurst, on the Surrey/Berkshire border, has been where the British Army trains its officers. It has a gruelling 44-week course testing the physical and intellectual skills of officer cadets and imbuing them with the values of the British Army. Alongside would-be British officers, Sandhurst has a tradition of drawing cadets from overseas. Many of the elite families of the Middle East have sent their sons and daughters. Perhaps the most notable was King Hussein of Jordan. Continue reading the main story Find out more Matthew Teller presents Sandhurst and the Sheikhs, a Whistledown production for BBC Radio 4, on Wednesday 27 August 2014 at 11:00 BST It will be available on iPlayer shortly after broadcast Four reigning Arab monarchs are graduates of Sandhurst and its affiliated colleges - King Abdullah of Jordan, King Hamad of Bahrain, Sheikh Tamim, Emir of Qatar, and Sultan Qaboos of Oman. Past monarchs include Sheikh Saad, Emir of Kuwait, and Sheikh Hamad, Emir of Qatar. Sandhurst's links have continued from the time when Britain was the major colonial power in the Gulf. "One thing the British were excellent at was consolidating their rule through spectacle," says Habiba Hamid, former foreign policy strategist to the rulers of Dubai and Abu Dhabi. "Pomp, ceremony, displays of military might, shock and awe - they all originate from the British military relationship." Sheikh Hamad Bin Isa Al Khalifa, King Abdullah, Sultan Qaboos Sandhurst alumni: King Hamad of Bahrain, King Abdullah of Jordan and Sultan Qaboos of Oman It's a place where future leaders get to know each other, says Michael Stephens, deputy director of the Royal United Services Institute, Qatar. And Sandhurst gives the UK influence in the Gulf. "The [UK] gets the kind of attention from Gulf policy elites that countries of our size, like France and others, don't get. It gives us the ability to punch above our weight. "You have people who've spent time in Britain, they have… connections to their mates, their teachers. Familiarity in politics is very beneficial in the Gulf context." "For British people who are drifting around the world, as I did as a soldier," says Brigadier Peter Sincock, former defence attache to Saudi Arabia, "you find people who were at Sandhurst and you have an immediate rapport. I think that's very helpful, for example, in the field of military sales." The Emir of Dubai Mohammad bin Rashid Al Maktoum with his son after his Passing Out Parade at Sandhurst in 2006 Sheikh Mohammad bin Rashid Al Maktoum, Emir of Dubai, with his son in uniform at Sandhurst in 2006 Her Majesty The Queen's Representative His Highness Sheikh Hamad bin Khalifa Al-Thani, The Emir of Qatar inspects soldiers during the 144th Sovereign's Parade held at The Royal Military Academy Sandhurst on April 8, 2004 in Camberley, England. Some 470 Officer cadets took part of which 219 were commissioned into the British Army Hamad bin Khalifa Al-Thani, the Emir of Qatar until 2013, inspects soldiers at Sandhurst in 2004 Emotion doesn't always deliver. In 2013, despite the personal intervention of David Cameron, the UAE decided against buying the UK's Typhoon fighter jets. But elsewhere fellow feeling is paying dividends. "The Gulf monarchies have become important sources of capital," says Jane Kinninmont, deputy head of the Middle East/North Africa programme at the foreign affairs think tank Chatham House. "So you see the tallest building in London being financed by the Qataris, you see UK infrastructure and oilfield development being financed by the UAE. There's a desire - it can even seem like a desperation - to keep them onside for trade reasons." British policy in the Gulf is primarily "mercantile", says Dr Kristian Coates Ulrichsen, of the Baker Institute in Houston, Texas. Concerns over human rights and reform are secondary. The Shard at dusk The Shard was funded by Qatari investors In 2012 Sandhurst accepted a £15m donation from the UAE for a new accommodation block, named the Zayed Building after that country's founding ruler. In March 2013, Sandhurst's Mons Hall - a sports centre - was reopened as the King Hamad Hall, following a £3m donation from the monarch of Bahrain, who was educated at one of Sandhurst's affiliated colleges. The renaming proved controversial, partly because of the perceived slight towards the 1,600 British casualties at the Battle of Mons in August 1914 - and partly because of how Hamad and his government have dealt with political protest in Bahrain over the last three years. A critic might note that the third term of Sandhurst's Officer Commissioning Course covers counter-insurgency techniques and ways to manage public disorder. Since tension between Bahrain's majority Shia population and minority Sunni ruling elite boiled over in 2011, more than 80 civilians have died at the hands of the security forces, according to opposition estimates, though the government disputes the figures. Thirteen police officers have also lost their lives in the clashes. "The king has always felt that Sandhurst was a great place," says Sincock, chairman of the Bahrain Society, which promotes friendship between the UK and Bahrain. "Something like 20 of his immediate family have been there as cadets. He didn't really understand why there was such an outcry." David Cameron and King Hamad David Cameron meeting King Hamad in 2012... A protester is held back by police ... while protesters nearby opposed the Bahrain ruler's human rights record Crispin Black, a Sandhurst graduate and former instructor, says the academy should not have taken the money. "Everywhere you look there's a memorial to something, a building or a plaque that serves as a touchstone that takes you right to the heart of British military history. Calling this hall 'King Hamad Hall' ain't gonna do that." Sandhurst gave a written response to the criticism. "All donations to Sandhurst are in compliance with the UK's domestic and international legal obligations and our values as a nation. Over the years donations like this have saved the UK taxpayer a considerable amount of money." But what happens when Sandhurst's friends become enemies? In 2001, then-prime minister Tony Blair visited Damascus, marking a warming of relations between the UK and Syria. Shortly after, in 2003, Sandhurst was training officers from the Syrian armed forces. Now, of course, Syria is an international pariah. Journalist Michael Cockerell has written about Libyan dictator Colonel Gaddafi's time at the Army School of Education in Beaconsfield in 1966: "Three years [later], Gaddafi followed a tradition of foreign officers trained by the British Army. He made use of his newfound knowledge to seize political power in his own country." Ahmed Ali Sandhurst-trained Ahmed Ali was a key player in the Egyptian military's removal of Islamist President Mohammed Morsi That tradition persists. In the 1990s Egyptian colonel Ahmed Ali attended Sandhurst. In 2013 he was one of the key figures in the Egyptian military's removal of Islamist President Mohammed Morsi, now rewarded by a post in President Sisi's inner circle of advisers. In the late 1990s there were moves by the British government under Tony Blair to end Sandhurst's training of overseas cadets. Major-General Arthur Denaro, Middle East adviser to the defence secretary and commandant at Sandhurst in the late 1990s, describes the idea as part of the "ethical foreign policy" advocated by the late Robin Cook, then-foreign secretary. Tony Blair and Robin Cook Tony Blair and Robin Cook at one point planned to end Sandhurst's training of overseas cadets The funeral of King Hussein in 1999 appears to have scuppered the plan. "Coming to that funeral were the heads of state of almost every country in the world - and our prime minister was there, Tony Blair," says Major-General Denaro. "He happened to see me talking to heads of state - the Sultan of Brunei, the Sultan of Oman, the Bahrainis, the Saudis - and he said 'How do you know all these guys?' The answer was because they went to Sandhurst." Today, Sandhurst has reportedly trained more officer cadets from the UAE than from any other country bar the UK. The May 2014 intake included 72 overseas cadets, around 40% of whom were from the Middle East. "In the future," says Maryam al-Khawaja, acting president of the Bahrain Centre for Human Rights, "people will look back at how much Britain messed up in the [Middle East] because they wanted to sell more Typhoon jets to Bahrain, rather than stand behind the values of human rights and democracy." "It's one thing saying we're inculcating benign values, but that's not happening," says Habiba Hamid. Sandhurst is "a relic of the colonial past. They're not [teaching] the civic values we ought to find in democratically elected leaders." line Who else went to Sandhurst? Princes William and Harry, Winston Churchill, Ian Fleming, Katie Hopkins, Antony Beevor, James Blunt, Josh Lewsey, Devon Harris (From left to right) Princes William and Harry Sir Winston Churchill Ian Fleming, creator of James Bond (but did not complete training) Katie Hopkins, reality TV star Antony Beevor, historian James Blunt, singer-songwriter Josh Lewsey, World Cup-winning England rugby player Devon Harris, member of Jamaica's first bobsleigh team line Sandhurst says that "building international relations through military exchanges and education is a key pillar of the UK's international engagement strategy". Sandhurst may be marvellous for the UK, a country where the army is subservient to government, but it is also delivering militarily-trained officers to Middle Eastern monarchies where, often, armies seem to exist to defend not the nation but the ruling family.

Ebola Outbreak: Guinea Declares Emergency As Overall Deaths From Ebola Rise To 1,069