MICHAEL MARTINA, ERIC M. JOHNSON AND JOSEPH MENN
Seeking to warm bilateral ties and project a sunny climate for U.S. business, Xi Jinping vowed to cut restrictions on foreign investment.
Charlie Smith, Rogier Creemers, Li Shengjiao
Chinese President Xi Jinping arrives in the United States today on his first state visit. Xi will address a group of American business leadersin Seattle. High on their list of concerns about trade with China is cyber hacking, cyber espionage and...
The Democratic presidential candidate accused Chinese hackers of stealing “huge amounts of government information.”
Retired Gen. Michael Hayden calls records a ‘legitimate foreign intelligence target’.
The attackers compromised websites frequented by Chinese journalists as well as China’s Muslim Uighur ethnic minority.
Matt Spetalnick and David Brunnstrom
Hacks possibly compromised the personal data of 4 million current and former federal employees.
“There’s no smoking gun...,but all signs point to China” Bryce Boland told TechCrunch.
Scott D. Livingston
It has been a difficult few weeks for global technology companies operating in China.Chinese officials strengthened the Internet firewall by blocking the use of virtual private networks (VPNs), reasserted demands that web users register their real...
Mr. Obama’s punt is not a big surprise as there simply are no good options for responding to North Korea. How do you calibrate a “proportional response” when not countering a military attack but one that targets freedom of expression?
Keith Zhai and Ting Shi
The dispute between the U.S. and North Korea is escalating after hackers forced Sony to pull a comedy movie about the assassination of North Korean leader Kim Jong Un, exposed Hollywood secrets, and destroyed company data.
Aruna Viswanatha and Steve Holland
It was the first time the United States had directly accused another country of a cyber attack of such magnitude on American soil and sets up a possible new confrontation between longtime foes Washington and Pyongyang.
Center for a New American Security
Research Associate Amy Chang explores the political, economic, and military objectives of China’s cybersecurity apparatus; reveals drivers and intentions of Chinese activity in cyberspace; and analyzes the development of Beijing’s cybersecurity...