Chinese Cyber Espionage: Undermining German Economic Security

Chinese cyber espionage attempts targeting German companies have increasingly utilised hacking. This has come accompanied by warnings from German intelligence agencies and also industrial representatives that Germany is ill-prepared to deal with mass cyber-attacks which could paralyse the German economy. These aforementioned cyber attacks from China-based hackers have increasingly used hacks in order to either steal industrial secrets or cause disruption. This situation has the potential to expose flaws in the German intelligence system which is seemingly unable to deal with the threat posed by external malicious cyber attackers.

Key Judgment 1. It is highly likely that Chinese cyber espionage attempts targeting Germany will increasingly utilise hacking attempts

Key Judgment 2. It is highly likely that Chinese cyber espionage will increasingly target German companies in order to steal business secrets and funds

Key Judgment 3. It is highly likely that rising Chinese cyber espionage attempts will prompt Germany to increase warnings against a lack of prepared cybersecurity measures

Rest of this post is for paying members only

Already have an account?  Log in

Free Plan
Free
Secret Plan
$14.99
/ month
Recommended
Top Secret Plan
$39.99
/ month
Free Plan
Free
Secret Plan
$14.99
/ month
Recommended
Top Secret Plan
$39.99
/ month
Table of Contents

Related Content

Post-Quantum Cryptography: Are We There Yet?

Sinaloa and the CJNG Cartels: Criminal Warfare in Mexico

Location:_ Latin America

US Counternarcotics Operations: Mission Success?

Location:_ North America

GPS Jammers: Trends in War and Crime

The Reality of Haiti’s Security: Gang Control and Security Aid

Location:_ Latin America

Cyber Attacks on Cultural Institutions: Heritage Under Siege

Location:_ North America, Europe

Stay in the loop

Get a free weekly email that makes reading intel articles and reports actually enjoyable.

Log in

Stay in the loop

Get a free weekly email that makes reading Intelligence Reports and Articles actually enjoyable.

Table of Contents

Contact

Contact

"*" indicates required fields

This field is for validation purposes and should be left unchanged.