Comments by "MilesBellas" (@MilesBellas) on "Daily Mail World"
channel.
-
ken ho
"Huawei has a long track record in intellectual property theft. In 2004 Cisco Systems, the market leader in routers, took Huawei to court for stealing its core router software code and using it in Huawei routers. The case was settled confidentially. More recently, when Huawei public statements claimed that the 2004 case did not involve stolen Cisco code, Cisco in 2012 replied by describing the essence of their original complaint this way: “this litigation involved allegations by Cisco of direct, verbatim copying of our source code, to say nothing of our command line interface, our help screens, our copyrighted manuals and other elements of our products.” Routers are the core hardware technology at the heart of the Internet. Huawei routers, widely used in China and Europe, have played a key role in Huawei’s growth into a $95 billion global telecom equipment giant."
1
-
1
-
1
-
1
-
1
-
@bradley7240
"China has become one of the world’s most advanced economies overnight in no small part through the rampant, state-sponsored theft of intellectual property from other countries. This extended campaign of commercial espionage has raided almost every highly developed economy. (British inventor James Dyson has complained publicly about Chinese theft of designs for his eponymous high-end vacuums.) But far and away its biggest targets have been the trade and military secrets of the United States. From US companies, Chinese hackers and spies have purloined everything from details of wind turbines and solar panels to computer chips and even DuPont’s patented formula for the color white. When American companies have sued Chinese firms for copyright infringement, Chinese hackers have turned around and broken into their law firms’ computer systems to steal details about the plaintiffs’ legal strategy.
3Articles Left
Subscribe
Sign In
close

JULES JULIEN
AUTHOR: GARRETT M. GRAFFGARRETT M. GRAFF
SECURITY
10.11.18
06:00 AM
HOW THE US FORCED CHINA TO QUIT STEALING—USING A CHINESE SPY
SHARE
5055
KEVIN AND JULIA Garratt had spent nearly all of their adult lives in China. A devout Christian couple in their fifties with an entrepreneurial streak, they operated a café called Peter’s Coffee House, a popular destination in the city of Dandong, according to TripAdvisor.
DANDONG IS A sprawling border town that sits just across the Yalu River from North Korea. For tourists and expats, the Garratts’ coffee shop—just a short walk from the Sino-Korean Friendship Bridge—was a hub of Western conversation and comfort food. “After time in North Korea a decent cup of coffee was one of those things I was really looking forward to,” one Australian tourist wrote in early 2014. “Peter’s was a perfect place.”
The Garratts had come to China from Canada in the 1980s as English teachers. They lived in six different Chinese cities over the years, raising four children along the way, before settling in Dandong. From their perch near the border, they helped provide aid and food to North Korea, supporting an orphanage there and doing volunteer work around Dandong itself. The Garratts had a strong social network in the city, so it didn’t seem odd to either of them when they were invited out to dinner by Chinese acquaintances of a friend who wanted advice on how their daughter could apply to college in Canada.
SIGN UP TODAY

SIGN UP FOR THE BACKCHANNEL NEWSLETTER AND NEVER MISS THE BEST OF WIRED.
The meal itself, on August 4, 2014, was formal but not unusual. After dinner, the Garratts got into an elevator that took them from the restaurant down to a lobby. The doors opened onto a swarm of bright lights and people with video cameras. The Garratts initially thought they’d stumbled into a party of some kind, maybe a wedding. But then some men grabbed the couple, separated them, and hustled them toward waiting cars. Everything happened fast, and very little made sense. As the vehicles pulled away, neither Kevin nor Julia had any idea that it was the last they’d see of one another for three months.
It wasn’t until the two arrived at a police facility that they each realized they were in real trouble. And it wasn’t until much later still that the couple would understand why they had been taken into custody. After all, before their detainment, they’d never even heard of a Chinese expat living in Canada named Su Bin.
WHEN THE GARRATTS first arrived in China, in 1984, the country was still transitioning away from collective farms. Shanghai had only just opened up to foreign investment; the future megacity Shenzhen still had just a few hundred thousand inhabitants. Over the ensuing three decades, the couple would watch as China hurtled from eighth-largest economy in the world to second-largest, powered, famously, by mass migrations of people into new industrial cities and the erection of a vast manufacturing and export sector. But especially in the later years of the Garratts’ career as expats, the country’s growth was also propelled by a more invisible force: a truly epic amount of cheating.
China has become one of the world’s most advanced economies overnight in no small part through the rampant, state-sponsored theft of intellectual property from other countries. This extended campaign of commercial espionage has raided almost every highly developed economy. (British inventor James Dyson has complained publicly about Chinese theft of designs for his eponymous high-end vacuums.) But far and away its biggest targets have been the trade and military secrets of the United States. From US companies, Chinese hackers and spies have purloined everything from details of wind turbines and solar panels to computer chips and even DuPont’s patented formula for the color white. When American companies have sued Chinese firms for copyright infringement, Chinese hackers have turned around and broken into their law firms’ computer systems to steal details about the plaintiffs’ legal strategy.
RELATED STORIES

GARRETT M. GRAFF
The Quantum SpyAuthor David Ignatius on the Future of High-Tech Espionage

ERIC NIILER
Some Scientists Work With China, but NASA Won't

GARRETT M. GRAFF
The New Arms Race Threatening to Explode in Space
Each theft has allowed Chinese companies to bypass untold years of precious time and R&D, effectively dropping them into the marathon of global competition at the 20th mile. China’s military has gotten a leg up too. Coordinated campaigns by China’s Ministry of State Security and the People’s Liberation Army have helped steal the design details of countless pieces of American military hardware, from fighter jets to ground vehicles to robots. In 2012, National Security Agency director Keith Alexander called it the “greatest transfer of wealth in history,” a phrase he has regularly repeated since.
John Carlin, who served as assistant attorney general for national security during the Obama administration, recalls one meeting with executives from a West Coast company whose intellectual property was being stolen by Chinese hackers. The executives even projected that, in seven or eight years, the stolen IP would kill their business model; by that point, a Chinese competitor would be able to undercut them completely with a copycat product. But the company’s general counsel still didn’t want the government to step in and take action. “We are going to be coming back to you and complaining,” the general counsel said. “But we’re not there yet.”
Finally, between 2011 and 2013, the US began to reach a breaking point. Private cybersecurityfirms released a string of damning investigative reports on China’s patterns of economic espionage; the US government started to talk more publicly about bringing charges against the country’s hackers. But it was far from clear how any government or company might successfully turn back the tide of Chinese incursions. President Obama pressed the issue of cyberthefts in his first meeting with President Xi in 2013, only to be met with more denials.""
1
-
1
-
@bradley7240
Winning by any means has been a Huawei trademark for some time. For example, two Huawei engineers used a 2014 visit to T-Mobile’s labs in Seattle to steal information and even a piece of confidential T-Mobile equipment., a robot that simulated finger-taps to test cell phone performance. Not only did Huawei take unauthorized photos of the robot, they stole one of its fingers. In 2017 a Seattle jury decided that Huawei had misappropriated T-Mobile trade secrets and awarded the wireless operator $4.8 million in damages.
Huawei also has a long track record in intellectual property theft. In 2004, for instance, Cisco Systems took Huawei to court for stealing its core router software code and using it in Huawei routers. Routers are the core hardware technology at the heart of the Internet; Huawei routers are widely used across China and Europe. The case was settled confidentially, but in 2012 Cisco used the occasion of Huawei’s effort to deny it had stolen Cisco code to review for the public the original litigation, which had accused Huawei of “direct, verbatim copying of our source code, to say nothing of our command line interface, our help screens, our copyrighted manuals and other elements of our products.”
1
-
1
-
@bradley7240
a Huawei engineer leading smartwatch development tracked down a supplier involved with the Apple Watch heart rate sensor and arranged a meeting in November 2018 under the pretence of requesting a large order. The Huawei engineer arrived accompanied with four researchers and probed details about the Apple Watch for an hour and a half, including component prices, an anonymous source at the supplier said.
“They were trying their luck, but we wouldn’t tell them anything”, the source said. “After that, Huawei went silent.”
The meeting reflects a “pattern of dubious tactics” used by the world’s largest telecommunications manufacturer to harvest trade secrets from other companies, the report claims. In another instance, a Huawei engineer reportedly approached an Apple supplier and asked them to “suggest a design you already have experience with.”
In another incident, Huawei is accused of copying a connector design from 2016 used to make the sleek MacBook Pro’s hinge thinner while still linking the display to the logic board; a similar component was used in Huawei’s 2018 MateBook Pro. Many manufacturers recognised the similarity and refused to work with Huawei on the high-end laptop.
The report alleges that Huawei also offered interviews with recently-departed Apple employees, repeatedly questioning them about upcoming products and features: “It was clear they were more interested in trying to learn about Apple than they were in hiring me,” a source told The Information.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1