decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
US scare tactics to keep Chinese business out | 401 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
U.S. weapons system designs compromised by Chinese cyberspies
Authored by: Anonymous on Tuesday, May 28 2013 @ 09:16 AM EDT
Why are they building the security in such a way that it's compromised by the
plans being stolen?

They did much better when they were designing tor.

[ Reply to This | Parent | # ]

US scare tactics to keep Chinese business out
Authored by: Anonymous on Tuesday, May 28 2013 @ 11:52 AM EDT
`Whether it takes five years or 50 years, China is on the brink of eclipsing the US as the largest economy in the world and, as far as she is concerned, Washington is playing dirty as a measure of last resort.'

"It is using these spying allegations to justify why people should not buy Chinese goods,"

"America used to argue that it was the home of innovation, and that Chinese goods were poor quality, but it can't do that any more."

Read more:

[ Reply to This | Parent | # ]

U.S. weapons system designs compromised by Chinese cyberspies
Authored by: Anonymous on Tuesday, May 28 2013 @ 01:33 PM EDT
>The magnitude of the stupidity involved here on the part of the
US government, the military, and defence contractors is
staggering

About fifteen years ago I found a book written in the 1940's that
described how the People's Republic of China will overtake the
United States in economic, military, and technology strength.
(The author was a member of the so-called China Lobby.)

A different book about Chinese Intelligence gathering
capabilities written during the 1980's emphasised that the Chinese
prefer to have people educated in the United States, and then
work for the Chinese government. These "defectors" are kept up
to date in their field, by being given subscriptions to the leading
scientific journals in their field.

Both books also stated that the Chinese were not going to pass
up any information that was "freely" offered to them. However,
unlike the Soviets, they were not going to make big plans to
obtain that which was locked down.

If you look at what the "Chinese Cyber-Espionage Networks" are
doing, it is blatantly obvious that they are merely retrieving that
which is not locked down. IOW, any organisation that falls victim
to their tactics, is a company that has a blatant disregard for
security measures.

[ Reply to This | Parent | # ]

People Power
Authored by: Anonymous on Tuesday, May 28 2013 @ 04:14 PM EDT
> There are long-standing suspicions that China’s theft of designs
> for the F-35 fighter allowed Beijing to develop its version much faster.

A subtle difference between the western competitive commercial model
that requires companies to keep their own secrets, and not exchange
employees with rivals, and the chinese state controlled model where
problems are solved by throwing more people at them. Yup, that defies
the "Mythical Man Month", but the environment is different,
and people are cheaper.

The Chinese used similar tactics with the Russians for ICBMs,
the Germans for high speed rail, there are many more examples.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )