{"id":130566,"date":"2021-11-13T22:22:51","date_gmt":"2021-11-14T06:22:51","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/11\/chinas-next-generation-of-hackers-wont-be-criminals-thats-a-problem"},"modified":"2021-11-13T22:22:51","modified_gmt":"2021-11-14T06:22:51","slug":"chinas-next-generation-of-hackers-wont-be-criminals-thats-a-problem","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/11\/chinas-next-generation-of-hackers-wont-be-criminals-thats-a-problem","title":{"rendered":"China\u2019s next generation of hackers won\u2019t be criminals. That\u2019s a problem"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/chinas-next-generation-of-hackers-wont-be-criminals-thats-a-problem.jpg\"><\/a><\/p>\n<p><em>The <a href=\"https:\/\/techcrunch.com\/2021\/10\/23\/introducing-the-techcrunch-global-affairs-project\/\">TechCrunch Global Affairs Project<\/a> examines the increasingly intertwined relationship between the tech sector and global politics.<\/em><\/p>\n<p>Criminals have a long history of conducting cyber espionage on China\u2019s behalf. Protected from prosecution by their affiliation with China\u2019s Ministry of State Security (MSS), criminals turned government hackers conduct many of China\u2019s espionage operations. Alarming as it may sound, this is not a <a href=\"https:\/\/www.nytimes.com\/2021\/08\/26\/technology\/china-hackers.html?partner=slack&smid=sl-share\">new phenomenon<\/a>. An <a href=\"https:\/\/www.justice.gov\/opa\/press-release\/file\/1295981\/download\">indictment<\/a> issued by the U.S. Department of Justice last year, for example, indicated that the simultaneous criminal-espionage activity of two Chinese hackers went back as far as 2009. In another case, FireEye, a cybersecurity company, <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2019\/08\/apt41-dual-espionage-and-cyber-crime-operation.html\">alleges<\/a> that APT41, a separate cohort of MSS hackers, began as a criminal outfit in 2012 and transitioned to concurrently conducting state espionage from 2014 onward. But there\u2019s reason to believe that since then, China has been laying the groundwork for change.<\/p>\n<p style=\"padding-right: 20px\"><a href=\"https:\/\/techcrunch.com\/tag\/techcrunch-global-affairs-project\/\"><img decoding=\"async\" class=\"aligncenter\" loading=\"lazy\" class=\"alignright\" src=\"https:\/\/lifeboat.com\/blog.images\/chinas-next-generation-of-hackers-wont-be-criminals-thats-a-problem2.jpg\" alt=\"Read more from the TechCrunch Global Affairs Project\" width=\"300\" height=\"300\" \/><\/a>\n<\/p>\n<p>A spate of policies beginning in 2015 put China in a position to replace contracted criminals with new blood from universities. The CCP\u2019s first effort in 2015 was to standardize university cybersecurity degrees by taking inspiration from the United States\u2019 National Initiative for Cybersecurity Education \u2014 a NIST framework for improving the U.S. talent pipeline. One year later, China announced the construction of a new <a href=\"https:\/\/cset.georgetown.edu\/publication\/chinas-national-cybersecurity-center\/\">National Cybersecurity Talent and Innovation Base<\/a> in Wuhan. Including all of the <a href=\"https:\/\/ncc-map.cset.tech\/\">Base\u2019s components<\/a>, it is capable of training and certifying 70,000 people a year in cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The TechCrunch Global Affairs Project examines the increasingly intertwined relationship between the tech sector and global politics. Criminals have a long history of conducting cyber espionage on China\u2019s behalf. Protected from prosecution by their affiliation with China\u2019s Ministry of State Security (MSS), criminals turned government hackers conduct many of China\u2019s espionage operations. Alarming as it [\u2026]<\/p>\n","protected":false},"author":556,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,34,32,1490],"tags":[],"class_list":["post-130566","post","type-post","status-publish","format-standard","hentry","category-biotech-medical","category-cybercrime-malcode","category-education","category-government"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/130566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/556"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=130566"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/130566\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=130566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=130566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=130566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}