Open figure viewer
Significance
This discovery underscores the sophistication of China’s cyber espionage operations, particularly demonstrating how skilled state-sponsored hackers have become at exploiting US government systems for intelligence gathering.
Impacts
Telecom providers and other critical infrastructure firms will face a growing set of cybersecurity regulations and reporting requirements.
The portals that are used for lawful interception of communications by governments will receive heightened scrutiny.
Other adversaries will also enhance their cyber espionage tactics to exploit government tools for intercepting electronic communications.
Keywords:
China,
United States,
AP,
INT,
NA,
industry,
international relations,
politics,
social,
cyber espionage,
cybercrime,
cybersecurity,
regulation,
technology,
telecommunications
© Oxford Analytica 2024. All rights reserved. This content contains general information about geopolitical, macroeconomic and social developments or (where stated) other matters. It does not contain advice or recommendations that may be relied on. Where links to external websites are provided, this does not indicate that Oxford Analytica or Emerald agree with, endorse or have checked for accuracy the contents of said sites.
2024
You do not currently have access to this content.
