Skip to content

Is China’s Invasive New Cybersecurity Law Another Backdoor to American Intellectual Property?

  • Asia

Close Al-Baghdadi Aide Killed in Joint Operation, Kurdish Commander Says

The spokesman for the ISIS terrorist group, Abu Hassan al-Muhajir, has been killed in a joint operation between Syrian Kurdish forces and U.S. troops in northern Syria—just hours after the group’s leader, Abu Bakr al-Baghdadi, was killed, according to a Kurdish commander. Mazloum Abdi, the commander of the Kurdish-led Syrian Democratic Forces made the comments on Oct. 28, describing how his group’s intelligence cooperated with the U.S. military to target al-Baghdadi’s aide. His comments follow a White House speech from President Donald Trump on Oct. 27, where he announced the killing of al-Baghdadi by U.S. forces. The death of al-Muhajir has left ISIS without an obvious leader—a major setback for a terror organization that in March was forced by American troops and Kurdish forces out of the last portion of its self-declared…

The U.S. flag flies at a welcoming ceremony between Chinese leader Xi Jinping and U.S. President Donald Trump in Beijing on Nov. 9, 2017. (Thomas Peter/Pool via Getty Images)

Commentary

It’s the worst-kept secret in international business. China is robbing America blind.

As the Trump administration attempts to navigate the choppy waters of negotiating with a trade partner that is less than transparent, the possible ramifications of China’s new cybersecurity law are more than enough to keep international businesses that operate in the so-called “People’s Republic” in a state of perpetual high anxiety.

China’s new cybersecurity laws under its Multi-Level Protection Scheme 2.0 (MLPS) will require that all internet service providers and mobile data providers require facial scans to sign up customers for new services. The laws will go into full effect on Dec. 1, 2019. This means that every new cell phone number assigned in China will be associated with a facial scan.

That’s in addition to the Chinese Ministry of Public Security’s mandate that all data on Chinese networks and systems be available for the Chinese regime to audit at will. Although the Chinese regime claims that the new law is not meant to suppress citizens or to be invasive, many are skeptical as to the true nature of the state’s intent with it.

Guo Qiquan, a Chinese politician who had a part in devising the new law, said, “It will cover every district, every ministry, every business and other institution, basically covering the whole society. It will also cover all targets that need cybersecurity protection, including all networks, information systems, cloud platforms, the internet of things, control systems, big data and mobile internet,” according to the South China Morning Post.

That, in essence, subjects all entities operating in China, whether public or private, to an intrusion that encompasses the totality of all data, including proprietary business secrets, that can be used in a multitude of ways by belligerents within the Chinese regime.

This should be of particular concern to customers of international businesses with operations based in China, as the new laws give the regime carte blanche over sensitive information related to foreigners and businesses with ties to China, which may not even have operations located within the country.

This is just the latest attempt by the Chinese regime to further the scope of its espionage programs. Over the past few years, these operations have included the distribution of electronic hardware that had been manufactured with a preinstalled spy chip. An investigation found that these “spy chips” had been installed into devices that were purchased by nearly 30 companies, including government contractors, Amazon, Apple, and even financial institutions.

The Chinese regime also engaged in military espionage, as Chinese state-backed hackers penetrated a U.S. Navy contractor and stole 614 gigabytes of data containing classified information related to the U.S. Naval Undersea Warfare Center.

One of the most dangerous byproducts of Chinese state-sponsored hacking is the rise of “hacking for profit” campaigns executed by unchecked criminal networks that have been trained by the Chinese regime.

These groups are noted for their so-called software supply-chain hacks. These attacks occur when the network of a software developer is hacked, and malware code is planted onto apps and software that is potentially used on millions of devices. Hacking groups such as China’s ShadowHammer have been executing these attacks for some time now.

Perhaps the simplest answer to this new expansion of governmental strong-arming for non-Chinese individuals and entities is to wholly cut ties with China. Don’t buy Chinese, don’t do business with Chinese companies or businesses with ties to the “Sleeping Dragon,” and you have a better chance of not having your information fall into unscrupulous hands.

The only other alternative, one that would be an impossibility for most individuals and businesses, would be to cut technology out of their lives. For most people in 2019, that’s not going to happen.

Julio Rivera is editorial director for Reactionary Times. A conservative columnist and commentator, he works as a business strategist.

Views expressed in this article are the opinions of the author and do not necessarily reflect the views of The Epoch Times.

This article is from the Internet:Is China’s Invasive New Cybersecurity Law Another Backdoor to American Intellectual Property?

‘Multiple Victims’ Reported in Shooting at North Hollywood Grocery Store: Reports

Officers with the Los Angeles Police Department said they have responded to a shooting at a grocery store in North Hollywood. “Multiple victims” have been confirmed so far, officials told Fox Los Angeles on Monday morning. The shooting took place at the Royal Fresh Market at 8:15 a.m. at 12811 Sherman Way, according to reports. There is an unknown number of victims, said reports. Officers with the Los Angeles Police Department said they have responded to a shooting at a grocery store in North Hollywood. (Google Maps) At least one suspect was taken into custody. Officials told ABC7 that another possible suspect might be on the loose. (Google Maps)At least one suspect was taken into custody. Officials told ABC7 that another possible suspect might be on the loose. It also is not…