- Hamid Karzai’s cousin killed by suicide bomber at Eid al-Fitr party
- Obama thanks Muslims for ‘building the very fabric of our nation’
- Israel flattens home of top Hamas leader, takes out power plant
- Texas man arrested for powder-letter hoax
- Islamic State opens ‘marriage bureau’ for single jihadists
- Drone almost blocks California firefighting planes
- Tornado rips off roofs, downs trees near Boston
- GOP: Environmental rules keeping agents from accessing border
- John Kerry: Millions displaced by religious fighting in 2013
- Federal appeals court rules against Virginia’s gay marriage ban
Inside the Ring: Russia tests new intercontinental ballistic missile warhead
Question of the Day
“If Treasury’s intelligence coordination shop hasn’t tasked NSA to track Chinese financial trades, they’re not doing their jobs,” he said.
The NSA, Treasury Department and Federal Reserve Bank could begin by calculating illicit funds gained by so-called “princelings” — the wealthy sons and daughters of party and PLA elites.
Scores to hundreds of Chinese leaders and their relatives have parked billions of dollars in U.S. banks and other institutions.
For example, foreign press reports about imprisoned Communist Party Politburo member Bo Xilai, charged with financial corruption, revealed that his wife had transferred $1.7 billion overseas.
Mr. Tkacik said China uses its economic power to influence global financial and commodities markets, and manipulates those markets on “a galactic scale.”
“If Chinese steel and aluminum companies have this kind of access to foreign data networks, there can be no doubt that they use it to reap extra billions in profits off of global commodities markets with insider information,” Mr. Tkacik said.
CYBER SPYING CONCERNS
Navy Rear Adm. John Kirby said he is not aware of the specific impact of Monday’s indictment of five members of a Chinese military hacking unit.
“I can tell you just in general, we share the U.S. government’s concern about intellectual theft and property theft from cyber,” the spokesman said.
“The president’s been clear, the secretary’s been clear that we remain deeply concerned about these government-sponsored cyber-enabled thefts of trade secrets and other sensitive business information. It’s got to stop. We have the same concerns,” Adm. Kirby said.
Several U.S. and allied defense contractors have been victims of Chinese cyberattacks. The most damaging case was the loss of secrets related to the Lockheed Martin F-35, the military’s newest jet.
U.S. defense officials told Inside the Ring in March that F-35 secrets obtained by cyber espionage seven years ago have begun appearing in China’s new J-20 stealth fighter, which appears very similar in design to the F-35.
• Contact Bill Gertz at @BillGertz.
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
Bill Gertz is a national security columnist for The Washington Times and senior editor at The Washington Free Beacon (www.freebeacon.com). He has been with The Times since 1985.
He is the author of six books, four of them national best-sellers. His latest book, “The Failure Factory,” on government bureaucracy and national security, was published in September 2008.
TWT Video Picks
- Hillary Clinton: Forget Obama, George W. Bush made her 'proud to be an American'
- D.C. seeks to stay judge's order allowing gun owners to carry in public
- White House says Russia 'losing' war in Ukraine
- Illegal immigrants demand representation in White House meetings
- Iraqi Christians rally at White House: 'Obama, Obama, where are you?'
- Justice at last: 'Evil woman' outed for grabbing girl's game ball
- EPSTEIN: All IRS roads lead to the archivist
- Border surge puts Obama legacy on immigration at stake
- Obama's brother wears Hamas scarf bearing anti-Israel slogans in photo
- PRUDEN: When the hangman botches the job
Obama's biggest White House 'fails'
Celebrities turned politicians
Athletes turned actors
20 gadgets that changed the world
Fighting in Iraq