Chinese Cyber Attacks:
A 12-month Outlook

Background

Recent data leaks from iSoon, a Chinese security contractor have leaked information about Chinese hacking capabilities and surveillance technology which has been used against its own citizens aswell as foreigners. Chinese cyber attacks targeting the Dutch and Japanese governments have revealed cyber vulnerabilities in defence networks and government systems. Hackers who have often been accused of being directly supported by the Chinese state have targeted business, state infrastructure and government personnel. Chinese hackers have recently targeted both the Japanese and Dutch governments. Consequently, both governments have responded with stern diplomatic warnings. China, however, has rejected these as baseless. Instead they have responded by alleging that they have been the victims of US-based hacker groups. With Chinese cyber capabilities being increasingly developed they have the potential to disrupt and damage countries without firing a shot.

Key Judgement 1. China will highly likely launch more cyber attacks against foreign governments to gain access to defence and diplomatic information in the next 12 months.

Key Judgement 2. Chinese authorities are highly likely to invest in new and better cyber warfare capabilities in the next 12 months.

Key Judgement 3. US and European governments will highly likely strengthen critical infrastructure security in response to Chinese cyber attacks in the next 12 months

Rest of this post is for paying members only

Already have an account?  Log in

Free Plan
Free
Secret Plan
$14.99
/ month
Recommended
Top Secret Plan
$39.99
/ month
Free Plan
Free
Secret Plan
$14.99
/ month
Recommended
Top Secret Plan
$39.99
/ month
Table of Contents

Related Content

The Safari Club

TYPE:_ Article

German Security Paradox: The U.S. Army’s Role in Europe

TYPE:_ Article
Location:_ Europe

China’s Global Reach: Overseas Police Stations

TYPE:_ Article

Operation Momentum: The Secret Laos Guerrilla Force

TYPE:_ Article

Chinese Hypersonic Vehicle Programmes

TYPE:_ Article
Location:_ Far East

Operation Rubicon: How the CIA and BND Spied on the World

TYPE:_ Article

Stay in the loop

Get a free weekly email that makes reading intel articles and reports actually enjoyable.

Log in

Stay in the loop

Get a free weekly email that makes reading Intelligence Reports and Articles actually enjoyable.

Table of Contents

Contact

Contact

"*" indicates required fields

This field is for validation purposes and should be left unchanged.