{"id":12685,"date":"2024-02-01T21:50:50","date_gmt":"2024-02-01T16:20:50","guid":{"rendered":"https:\/\/asia.businessupturn.com\/?p=12685"},"modified":"2024-02-01T21:50:50","modified_gmt":"2024-02-01T16:20:50","slug":"chinas-dominance-in-open-source-intelligence","status":"publish","type":"post","link":"https:\/\/www.businessupturn.com\/asia\/east-asia\/china\/chinas-dominance-in-open-source-intelligence\/12685\/","title":{"rendered":"China\u2019s dominance in open-source intelligence"},"content":{"rendered":"<p>The world of espionage is undergoing a quiet revolution. While cloaks and daggers still hold a certain mystique, the real game-changer lies in open-source intelligence (OSINT) and in this arena, China has emerged as a formidable player, leaving the U.S. scrambling to catch up.<\/p>\n<p>For decades, China has prioritized collecting and analyzing publicly available data. This dedication is reflected in their staggering workforce of 100,000 dedicated OSINT specialists \u2013 analysts, collectors, and field operatives. This vast network gathers information on various aspects, including foreign science and technology advancements, giving China a crucial edge in its development goals.<\/p>\n<p>Traditionally focused on classified information gathered through covert operations, the US intelligence community has been slow to embrace OSINT. This reluctance has been attributed to viewing OSINT as a \u201cpoor cousin\u201d to traditional spycraft. However, the tide is slowly turning. Recognizing the gap in capabilities, the U.S. is taking steps to improve its OSINT game.<\/p>\n<p>China\u2019s commitment to OSINT is well-documented, with a dedicated workforce of 100,000 specialists gathering and analyzing publicly available information. This focus provides valuable insights into foreign advancements, including in critical infrastructure, which China aims to exploit for its strategic advantage.<\/p>\n<p>Historically, the U.S. relied heavily on classified intelligence gathered through covert operations. However, recognizing the limitations of this approach, the U.S. government recently launched a counteroffensive against a pervasive Chinese hacking campaign known as the Volt Typhoon. This operation, authorized by the Department of Justice and FBI, involved remotely disabling key aspects of the Chinese hacking infrastructure.<\/p>\n<p>This proactive approach reflects the Biden administration\u2019s growing focus on cybersecurity, driven by concerns about election interference and ransomware attacks. Specifically, the Volt Typhoon targeted Western critical infrastructure, including naval ports and internet service providers, raising alarms about potential disruptions to U.S. military operations in the Indo-Pacific region.<\/p>\n<p>Experts explain that China\u2019s hacking strategy often involves compromising internet-connected devices near critical infrastructure, such as cameras or modems. These compromised devices then act as \u201cproxies,\u201d allowing hackers to mask their true location and launch intrusions with greater anonymity.<\/p>\n<p>The U.S. government is actively seeking collaboration with the private technology sector to address these evolving threats. Recent meetings with telecommunications and cloud computing companies highlight the need for combined efforts in tracking and mitigating such sophisticated attacks.<\/p>\n<p>While acknowledging China\u2019s lead in OSINT, the U.S. is taking crucial steps to improve its capabilities. Embracing innovative approaches, leveraging technology, and prioritizing active defence measures will be essential for the U.S. to secure its position in the ever-changing intelligence landscape.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While acknowledging China\u2019s lead in OSINT, the U.S. is taking crucial steps to improve its capabilities. Embracing innovative approaches, leveraging technology, and prioritizing active defence measures will be essential for the U.S. to secure its position in the ever-changing intelligence landscape.<\/p>\n","protected":false},"author":372,"featured_media":12698,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[146,175,4236,750,89,294],"class_list":["post-12685","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-china","tag-artificial-intelligence","tag-china","tag-cybersecurity","tag-espionage","tag-geopolitics","tag-united-states"],"reading_time":"3 min read","_links":{"self":[{"href":"https:\/\/www.businessupturn.com\/asia\/wp-json\/wp\/v2\/posts\/12685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.businessupturn.com\/asia\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.businessupturn.com\/asia\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.businessupturn.com\/asia\/wp-json\/wp\/v2\/users\/372"}],"replies":[{"embeddable":true,"href":"https:\/\/www.businessupturn.com\/asia\/wp-json\/wp\/v2\/comments?post=12685"}],"version-history":[{"count":0,"href":"https:\/\/www.businessupturn.com\/asia\/wp-json\/wp\/v2\/posts\/12685\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.businessupturn.com\/asia\/wp-json\/wp\/v2\/media\/12698"}],"wp:attachment":[{"href":"https:\/\/www.businessupturn.com\/asia\/wp-json\/wp\/v2\/media?parent=12685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.businessupturn.com\/asia\/wp-json\/wp\/v2\/categories?post=12685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.businessupturn.com\/asia\/wp-json\/wp\/v2\/tags?post=12685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}