词条 | Chinese espionage in the United States |
释义 |
In addition to traditional espionage, China partners civilian Chinese companies with American businesses to acquire technology and economic data[6] and uses cyber spying to penetrate the computer networks of U.S. businesses and government agencies; an example is the December 2009 Operation Aurora.[7] U.S. law enforcement officials have identified China as the most active foreign power involved in the illegal acquisition of American technology that China wants.[8] On May 19, 2014, the United States Department of Justice announced that a Federal grand jury had indicted five People's Liberation Army officers for stealing confidential business information and intellectual property from U.S. commercial firms and planting malware on their computers.[1][2] MethodsThe People's Republic of China has used a number of methods to covertly gather intelligence in the United States.[9][10][11][12][13][14] Individuals attempt to obtain targeted information from open sources such as libraries, research institutions and unclassified databases.[9] Chinese travelers are recruited to carry out specific intelligence activities, and the Chinese government debriefs returnees from exchange programs, trade missions and scientific-cooperation programs.[15] Chinese citizens may be coerced to cooperate in acting classes.[16] Partnerships between Chinese and foreign companies have been accused of existing solely to give Chinese defense industries access to advanced technology.[17] The regulatory and commercial environment in China pressures American and other foreign companies to transfer technology to their Chinese partner companies as part of doing business in their country.[17] Foreign companies provide technology, capital and manufacturing expertise to obtain access to Chinese markets,[17] and high-tech equipment is purchased by Chinese agents operating front organizations in Hong Kong.[15][17] Some items (computers, semiconductors, software, telecommunications devices, and integrated circuits)[17] may be used for military or civilian purposes.[18] China also uses state-run firms to purchase American companies with access to the targeted technology.[15] China also accesses foreign technology through industrial espionage,[17] with U.S. Immigration and Customs Enforcement officials rating China's industrial-espionage and theft operations as the leading threat to U.S. technological security.[19] Between October 2002 and January 2003 five Chinese businessmen were accused of illegally shipping equipment and trade secrets from California to China,[9] and U.S. officials prevented a Chinese man from shipping a new, high-speed computer used in classified projects (including nuclear-weapons development) from Sandia National Laboratories.[9] Nuclear espionageA 1999 United States House of Representatives Select Committee on U.S. National Security and Military and Commercial Concerns with the People's Republic of China report, known as the Cox Report, warned that China has stolen classified information on every thermonuclear warhead in the country's intercontinental ballistic missile arsenal.[20] Information is collected through espionage, reviews of U.S. technical and academic publications and interaction with U.S. scientists.[21] China tasks a large number of individuals to collect small pieces of information (which are collated and analyzed),[21] and individual agents can more easily escape suspicion. U.S. government personnel suspect that China's intelligence-gathering efforts directed towards the development of modern nuclear weapons are focused on the Los Alamos, Lawrence Livermore, Sandia and Oak Ridge National Laboratories.[21] China is known to have stolen classified information on the W-56 Minuteman II ICBM, the W-62 Minuteman III ICBM, the W-70 Lance short-range ballistic missile (SRBM), the W-76 Trident C-4 submarine-launched ballistic missile (SLBM), the W-78 Minuteman III Mark 12A ICBM, the W-87 Peacekeeper ICBM and the W-88 Trident D-5 SLBM and weapon-design concepts and features.[22] {{anchor|Cyber warfare}}CyberwarfareChina conducts political and corporate espionage to access the networks of financial, defense and technology companies and research institutions in the United States.[23] Email attachments attempting to enter the networks of U.S. companies and organizations exploit security weaknesses in software.[23] A recipient opens an email attachment, apparently from a familiar source, containing a program which embeds in the recipient's computer. The remotely controlled program allows an attacker to access the recipient's email, send sensitive documents to specific addresses and turns on such instruments as web cameras or microphones.[23] In January 2010, Google reported "a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google".[24] According to investigators, the Google cyber-attack targeted the Gmail accounts of Chinese human-rights activists.[24] At least 34 other companies have been attacked, including Yahoo, Symantec, Adobe, Northrop Grumman and Dow Chemical.[23] In January 2013, The New York Times reported that it was the victim of hacking attempts originating from China during the previous four months after it published an article on Prime Minister Wen Jiabao. According to the newspaper, the "attacks appear to be part of a broader computer espionage campaign against American news media companies that have reported on Chinese leaders and corporations."[25] Chinese cyber-attacks seem to target strategic industries in which China lags;[23] attacks on defense companies target weapons-systems information, and attacks on technology companies seek source code critical to software applications.[23] Operation Aurora emphasized what senior U.S. government officials have called an increasingly serious cyber threat to critical industries.[23] Amitai Etzioni of the Institute for Communitarian Policy Studies has suggested that cyberspace could be a fruitful realm for the United States and China to implement a policy of mutually assured restraint allowing both states to take measures they deem necessary for self-defense while agreeing to refrain from offensive steps. Such a policy would require oversight.[26]2010–2012 compromise of CIA networkBetween 2010 and 2012, the Chinese government was able to arrest or kill between 18 and 20 CIA assets within China.[27] A joint CIA/FBI counterintelligence operation, codenamed "Honey Bear", was unable to definitely determine the source of the compromises, though theories include the existence of a mole, cyber-espionage, or poor tradecraft.[27] Mark Kelton, then the Deputy Director of the National Clandestine Service for Counterintelligence, was initially skeptical that a mole was to blame.[27] In January 2018, a former CIA officer named Jerry Chun Shing Lee{{refn|group=nb|Alternatively known as Zhen Cheng Li[28][29]}} was arrested at John F. Kennedy International Airport, on suspicion of helping dismantle the CIA's network of informants in China.[30][31] {{anchor|Various case histories}}Cyber casesIn 2007 the computer security company McAfee alleged that China was actively involved in cyberwarfare, accusing the country of cyber-attacks on India, Germany and the United States; China denied knowledge of these attacks.{{Citation needed|date=March 2013}} In September 2007 former senior U.S. information security official Paul Strassmann said that 735,598 computers in the U.S. were "infested with Chinese zombies"; computers infected in this manner can theoretically form a botnet capable of carrying out unsophisticated yet potentially dangerous denial-of-service attacks.[32] A cyber spying network known as GhostNet, using servers primarily based in China, was reported as tapping into the classified documents of government and private organizations in 103 countries (including Tibetan exiles);[33][34] China denied the claim.[35][36] In December 2009 and January 2010 a cyberattack, known as Operation Aurora, was launched from China on Google and over 20 other companies.[37] Google said that the attacks originated from China, and it would "review the feasibility" of its business operations in China as a result of the incident. According to Google, at least 20 other companies in a variety of sectors were also targeted by the attacks. According to McAfee, "this is the highest profile attack of its kind that we have seen in recent memory."[38] In May 2014, a U.S. Federal grand jury indicted five Chinese military officers for cybercrimes and stealing trade secrets.[2] It was alleged that the Chinese officers hacked into the computers of six U.S. companies to steal information that would provide an economic advantage to Chinese competitors, including Chinese state-owned enterprises. China said that the charges were "made-up", and the indictment would damage trust between the two nations.[39] Although the indictments have been called relatively meaningless, they could limit travel by the officers due to U.S. extradition treaties.[40] In November 2017, the Department of Justice charged three Chinese employees of Guangzhou Bo Yu Information Technology Company Limited with hacking into corporate entities in the United States, including Siemens AG, Moody's Analytics, and Trimble Inc.[41] Since at least 2013, a Chinese espionage group called TEMP.Periscope by FireEye is reported to have been engaged in espionage against maritime-related subjects.[42] FireEye reported that the information targeted was likely of commercial and economic importance.[42] The People's Liberation Army (PLA) was tied to economic espionage involving stolen business plans, intellectual property, and infringed on private conversations from Westinghouse Electric and United States Steel Corporation.[43] Chinese hackers have stolen information on the Patriot missile system, the F-35 Joint Strike Fighter, and the U.S. Navy's new Littoral combat ship. These blueprints of U.S. weapon and control systems were stolen to advance the development of Chinese weaponry.[44] The protection of the South China Sea is highly important to the U.S. because a Chinese Cyber Unit has already succeeded an invasion in the Philippine's government and military networks. Military documents, internal communications, and other sensitive materials related to dispute were lost due to the invasion. [45] In January and February 2018, Chinese government hackers reportedly stole 614 gigabytes of data from a Naval Undersea Warfare Center-affiliated contractor.[46] The compromised material reportedly included information on a project dubbed "Sea Dragon", as well as United States Navy submarine cryptographic systems and electronic warfare.[46] The New York Times reported that China and Russia are routinely eavesdropping on calls from an iPhone used by President Donald Trump, which China reportedly attempting to influence the President by identifying and influencing the people Trump is regularly in contact with.[47][48]According to the cybersecurity firm Area 1, hackers working for the People's Liberation Army Strategic Support Force compromised the networks of the AFL–CIO in order to gain information on negotiations for the Trans-Pacific Partnership.[49] As part of a campaign called Cloudhopper, hackers working for the Ministry of State Security compromised the networks of IBM and Hewlett Packard Enterprise, and used that access to compromise those companies' clients.[50] The Cloudhopper attacks began no later than 2014, and included targets in Brazil, Germany, India, Japan, the United Arab Emirates, the United Kingdom, and the United States.[50] In 2019, iDefense reported that Chinese hackers had launched cyberattacks on dozens of academic institutions in an attempt to gain information on technology being developed for the United States Navy.[51] Some of the targets included the University of Hawaii, the University of Washington, the Massachusetts Institute of Technology, and Woods Hole Oceanographic Institution.[51] The attacks have been underway since at least April 2017.[51] Alleged Supermicro compromiseIn 2018, Bloomberg News reported that, as early as 2015, a specialized unit of the People's Liberation Army began inserting chips into Supermicro servers that allowed for backdoor access to them.[52] Approximately 30 companies reportedly had their servers compromised via the chips, including Amazon (via AWS Elemental) and Apple Inc.[52] The claim was strongly denied by both Amazon and Apple Inc.[53][54][55] See also{{div col|colwidth=22em}}
References1. ^1 Finkle, J. Menn, J., Viswanatha, J. [https://www.reuters.com/article/2014/05/19/us-cybercrime-usa-china-idUSBREA4I09420140519 U.S. accuses China of cyber spying on American companies.] Reuters, Mon 19 May 2014 6:04pm EDT. 2. ^1 2 Clayton, M. US indicts five in China's secret 'Unit 61398' for cyber-spying. Christian Science Monitor, May 19, 2014 3. ^deGraffenreid, p. 30. 4. ^Global Security. "Ministry of State Security Operations." (accessed March 11, 2010). 5. ^Wortzel, p. 6. 6. ^Wortzel, p. 9. 7. ^Helft, Miguel and John Markoff, "In Rebuke of China, Focus Falls on Cybersecuirty," The New York Times, January 13, 2010. 8. ^Wortzel, p. 8. 9. ^1 2 3 Polmar, Norman and Thomas B. Allen, Spy Book: The Encyclopedia of Espionage, Second Edition, (New York, NY: Random House Reference, 2004), p. 125. 10. ^{{cite web|url=https://www.nytimes.com/2013/06/06/world/asia/wide-china-push-is-seen-to-obtain-industry-secrets.html|title=China Seen in Push to Gain Technology Insights|date=June 6, 2013|website=The New York Times|accessdate=June 18, 2017}} 11. ^{{cite web|url=https://www.nytimes.com/2017/02/03/technology/artificial-intelligence-china-united-states.html|title=China’s Intelligent Weaponry Gets Smarter|first1=John|last1=Markoff|first2=Matthew|last2=Rosenberg|date=February 3, 2017|publisher=|accessdate=June 18, 2017|via=NYTimes.com}} 12. ^{{cite web|url=http://observer.com/2016/04/the-unpleasant-truth-about-chinese-espionage/|title=The Unpleasant Truth About Chinese Espionage|date=April 22, 2016|publisher=|accessdate=June 18, 2017}} 13. ^{{cite web|url=http://thefederalist.com/2016/08/02/why-access-to-china-can-be-suicide-for-u-s-companies/|title=Why Access To China Can Be Suicide For U.S. Companies|first=|last=Trade|date=August 2, 2016|website=The Federalist|accessdate=June 18, 2017}} 14. ^{{cite web|url=https://www.washingtonpost.com/news/checkpoint/wp/2016/04/10/navy-officer-faces-charges-of-espionage-and-prostitution-in-highly-secretive-case/|title=Navy officer accused of passing secrets faces espionage and prostitution charges|first=|last=https://www.facebook.com/dlamothe|website=Washington Post|accessdate=June 18, 2017}} 15. ^1 2 Eftimiades, p. 28. 16. ^Wortzel, p. 5. 17. ^1 2 3 4 5 Wortzel, p. 4. 18. ^Wortzel, p. 3. 19. ^U.S. Department of Defense, Annual Report to Congress on the Military Power of the People's Republic of China, (Washington, DC: July 2007), p. 29. 20. ^deGraffenreid, p. 99. 21. ^1 2 deGraffenreid, p. 98. 22. ^deGraffenreid, p. 100. 23. ^1 2 3 4 5 6 Cha, Ariana Eunjung and Ellen Nakashima, "Google China cyberattack part of vast espionage campaign, experts say," The Washington Post, January 14, 2010. 24. ^1 "Google cyberattack hit password system – NY Times," Reuters, April 19, 2010. 25. ^{{cite news | url=https://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?smid=pl-share | title=Hackers in China Attacked The Times for Last 4 Months | work=The New York Times | date=January 30, 2013 | accessdate=January 31, 2013 | author=Perlroth, Nicole}} 26. ^{{cite web|author=Amitai Etzioni, The Diplomat |url=http://thediplomat.com/2013/09/mar-a-model-for-us-china-relations/ |title=MAR: A Model for US-China Relations |publisher=The Diplomat |date= |accessdate=August 25, 2014}} 27. ^1 2 {{cite news |publisher=The New York Times |archive-url=https://web.archive.org/web/20170520215353/https://www.nytimes.com/2017/05/20/world/asia/china-cia-spies-espionage.html?smid=fb-nytimes&smtyp=cur |archive-date=May 20, 2017 |url=https://www.nytimes.com/2017/05/20/world/asia/china-cia-spies-espionage.html?smid=fb-nytimes&smtyp=cur |title=Killing C.I.A. Informants, China Crippled U.S. Spying Operations |first1=Mark |last1=Mazzetti |first2=Adam |last2=Goldman |first3=Michael S. |last3=Schmidt |first4=Matthew |last4=Apuzzo |date=May 20, 2017 |access-date=May 20, 2017}} 28. ^{{cite news |quote=He did not maintain any internet presence under his name in English or Chinese, or under an alternative spelling Zhen Cheng Li. He may have used an alias or avoided using public internet accounts altogether. |publisher=The Guardian |date=January 18, 2018 |access-date=January 19, 2018 |title='Very discreet': arrested CIA spy kept a low profile in Hong Kong |url=https://www.theguardian.com/us-news/2018/jan/18/very-discreet-arrested-cia-spy-kept-a-low-profile-in-hong-kong |first=Benjamin |last=Haas}} 29. ^{{cite news |url=https://www.bbc.com/news/world-us-canada-42713108 |publisher=BBC News |date=January 16, 2018 |access-date=January 16, 2018 |title=Ex-CIA officer Jerry Chun Shing Lee held over secret records}} 30. ^{{cite news |url=https://www.nytimes.com/2018/01/16/us/politics/cia-china-mole-arrest-jerry-chun-shing-lee.html?smid=fb-nytimes&smtyp=cur |title=Ex-C.I.A. Officer Suspected of Compromising Chinese Informants Is Arrested |date=January 16, 2018 |access-date=January 16, 2018 |first=Adam |last=Goldman |publisher=The New York Times}} 31. ^{{cite news |url=https://assets.documentcloud.org/documents/4351679/Read-the-Case-Against-Jerry-Chun-Shing-Lee.pdf |first=Kellie R. |last=O'Brien |title=Case 1:18-mj-00018-JFA |access-date=January 17, 2018 |date=January 13, 2018}} 32. ^{{cite news | first=Shaun | last=Waterman | coauthors= | title=China 'has .75M zombie computers' in U.S. | date=September 17, 2007 | publisher= United Press International | url =http://www.upi.com/Emerging_Threats/2007/09/17/China-has-75M-zombie-computers-in-US/UPI-73941190055386/ | work = | pages = | accessdate = November 30, 2007 | language = }} 33. ^{{cite web|url=https://news.yahoo.com/s/ap/20090329/ap_on_re_ca/canada_cyber_spy_network_1 |accessdate=July 29, 2011 |deadurl=yes |archiveurl=https://web.archive.org/web/20090403065223/http://news.yahoo.com/s/ap/20090329/ap_on_re_ca/canada_cyber_spy_network_1 |archivedate=April 3, 2009 |title=Researchers: Cyber spies break into govt computers }} 34. ^{{cite web|url=http://watch.ctv.ca/news/latest/online-spy-operation/#clip155241 |title=CTV News: Video clip |publisher=Watch.ctv.ca |date= |accessdate=August 25, 2014}} 35. ^{{cite web|url=http://www.fmprc.gov.cn/eng/xwfw/s2510/2535/t555337.htm |title=Foreign Ministry Spokesperson Qin Gang's Remarks on the So-called Chinese Cyber-Spy Ring Invading Computers in Countries |publisher=Fmprc.gov.cn |date= |accessdate=August 25, 2014}} 36. ^{{cite news |url=http://www.theaustralian.news.com.au/story/0,25197,25301006-5013871,00.html |title=Chinese embassy scoffs at reports of cyber spying |publisher=Theaustralian.news.com.au}} 37. ^{{cite web|url=http://googleblog.blogspot.com/2010/01/new-approach-to-china.html|title=A new approach to China|date=January 12, 2010|publisher=Google Inc.|accessdate=January 17, 2010}} 38. ^"Google Attack Is Tip Of Iceberg", McAfee Security Insights, January 13, 2010 39. ^{{cite news|title=Beijing denies corporate cyber spying charge against five Chinese military officials|url=http://www.chinanews.net/index.php/sid/222128735/scat/9366300fc9319e9b/ht/Beijing-denies-corporate-cyber-spying-charge-against-five-Chinese-military-officials|accessdate=May 20, 2014|publisher=China News.Net}} 40. ^{{cite web|url=http://www.huffingtonpost.com/andrew-edwards/the-cyber-cold-war_b_5440791.html|title=The Cyber Cold War|publisher=The Huffington Post}} 41. ^{{cite news |url=https://www.justice.gov/opa/pr/us-charges-three-chinese-hackers-who-work-internet-security-firm-hacking-three-corporations |title=U.S. Charges Three Chinese Hackers Who Work at Internet Security Firm for Hacking Three Corporations for Commercial Advantage |publisher=United States Department of Justice |author=Department of Justice, Office of Public Affairs |date=November 27, 2017 |quote=An indictment was unsealed today against Wu Yingzhuo, Dong Hao and Xia Lei, all of whom are Chinese nationals and residents of China, for computer hacking, theft of trade secrets, conspiracy and identity theft directed at U.S. and foreign employees and computers of three corporate victims in the financial, engineering and technology industries between 2011 and May 2017. The three Chinese hackers work for the purported China-based Internet security firm Guangzhou Bo Yu Information Technology Company Limited (a/k/a "Boyusec").}} 42. ^1 {{cite news |url=https://www.fireeye.com/blog/threat-research/2018/03/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.html |publisher=FireEye |title=Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries |date=March 16, 2018 |archive-url=https://web.archive.org/web/20180316172606/https://www.fireeye.com/blog/threat-research/2018/03/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.html |archive-date=March 16, 2018}} 43. ^Segal, A. (2018). How China is preparing for cyberwar. The Christian Science Monitor 44. ^Abad-Santos, A. (2018). China Is Winning the Cyber War Because They Hacked U.S. Plans for Real War. The Atlantic. 45. ^Piiparinen, Anni. 2015. “The Chinese Cyber Threat in the South China Sea.” The Diplomat. The Diplomat. September 18 46. ^1 {{cite news |url=https://www.reuters.com/article/us-usa-china-cyber/china-hacked-sensitive-us-navy-undersea-warfare-plans-washington-post-idUSKCN1J42MM |publisher=Reuters |title=China hacked sensitive U.S. Navy undersea warfare plans: Washington Post |date=June 8, 2018 |first=Eric |last=Walsh|editor-first=Phil |editor-last=Berlowitz |editor-first2=James |editor-last2=Dalgleish}} 47. ^{{cite news |publisher=The New York Times |url=https://www.nytimes.com/2018/10/24/us/politics/trump-phone-security.html |title=When Trump Phones Friends, the Chinese and the Russians Listen and Learn |date=October 24, 2018 |first=Matthew |last=Rosenberg |first2=Maggie |last2=Haberman}} 48. ^{{cite news |title=Trump refuses to give up iPhones, Chinese and Russian spies eavesdrop on calls |url=https://appleinsider.com/articles/18/10/24/trump-refuses-to-give-up-iphones-chinese-and-russian-spies-eavesdrop-on-calls |publisher=AppleInsider |first=Mikey |last=Campbell |date=October 24, 2018 |quote=President Donald Trump's unwillingness to ditch Apple's iPhone in favor of more secure hardware has granted Chinese and Russian spies an open door into his private phone conversations, according to a new report.}} 49. ^{{cite news |title=Hacked European Cables Reveal a World of Anxiety About Trump, Russia and Iran |first=David E. |last=Sanger |first2=Steven |last2=Erlanger |date=December 18, 2018 |url=https://www.nytimes.com/2018/12/18/us/politics/european-diplomats-cables-hacked.html |publisher=The New York Times |quote=The cyberintruders also infiltrated the networks of the United Nations, the A.F.L.-C.I.O., and ministries of foreign affairs and finance worldwide. The hack of the A.F.L.-C.I.O. focused on issues surrounding the negotiations over the Trans-Pacific Partnership, a trade deal that excluded Beijing.}} 50. ^1 {{cite news |title=Exclusive: China hacked HPE, IBM and then attacked clients - sources |first=Christopher |last=Bing |first2=Jack |last2=Stubbs |first3=Joseph |last3=Menn |editor-first=Jim |editor-last=Finkle |editor-first2=Jonathan |editor-last2=Oatis |publisher=Reuters |archive-url=https://web.archive.org/web/20181221075154/https://www.reuters.com/article/us-china-cyber-hpe-ibm-exclusive/exclusive-china-hacked-hpe-ibm-and-then-attacked-clients-sources-idUSKCN1OJ2OY |archive-date=December 21, 2018 |url=https://www.reuters.com/article/us-china-cyber-hpe-ibm-exclusive/exclusive-china-hacked-hpe-ibm-and-then-attacked-clients-sources-idUSKCN1OJ2OY}} 51. ^1 2 {{cite news |url=https://asia.nikkei.com/Politics/International-relations/Chinese-hackers-target-North-American-and-Asian-universities |publisher=Nikkei Asian Review |title=Chinese hackers target North American and Asian universities |first=Sara |last=Sekine |date=March 6, 2019}} 52. ^1 {{cite news |url=https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies |title=The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies |first=Jordan |last=Robertson |first2=Michael |last2=Riley |date=October 4, 2018 |archive-url=https://web.archive.org/web/20181004172410/https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies |archive-date=October 4, 2018}} 53. ^{{Cite news|url=https://www.apple.com/newsroom/2018/10/what-businessweek-got-wrong-about-apple/|title=What Businessweek got wrong about Apple|work=Apple Newsroom|access-date=2018-10-08|language=en-US}} 54. ^{{Cite news|url=https://aws.amazon.com/blogs/security/setting-the-record-straight-on-bloomberg-businessweeks-erroneous-article/|title=Setting the Record Straight on Bloomberg BusinessWeek’s Erroneous Article {{!}} Amazon Web Services|date=2018-10-04|work=Amazon Web Services|access-date=2018-10-08|language=en-US}} 55. ^{{cite news|url=https://www.bloomberg.com/news/articles/2018-10-04/the-big-hack-amazon-apple-supermicro-and-beijing-respond|title=The Big Hack: Statements From Amazon, Apple, Supermicro, and the Chinese Government|last=|first=|date=|work=|accessdate=8 October 2018}} Bibliography
Notes{{Reflist|group="nb"}}External links
7 : Espionage|Espionage in the United States|Cyberwarfare in China|Cyberwarfare in the United States|China–United States relations|Battles and conflicts without fatalities|History of the United States (1991–present) |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。