\n1<\/sup>cbsnews.com\/news\/china-us-philippines-military-bases-taiwan-tension-south-china-sea\/<\/a>; cfr.org\/global-conflict-tracker\/conflict\/territorial-disputes-south-china-sea<\/a>; www.state.gov\/briefings-foreign-press-centers\/chinas-maritime-claims-in-the-south-china-sea<\/a>
\n2<\/sup>New bases in the Philippines increase US military presence in the region, bbc.com\/news\/world-asia-64479712<\/a>
\n3<\/sup>At present there is insufficient evidence to tie the groups together.
\n4<\/sup>wsj.com\/articles\/new-u-s-base-on-guam-is-aimed-at-deterring-china-11674731857<\/a>
\n5<\/sup>microsoft.com\/en-us\/security\/blog\/2023\/05\/24\/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques\/<\/a>
\n6<\/sup>CVE-2022-27518; support.citrix.com\/article\/CTX474995\/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227518<\/a>; nvd.nist.gov\/vuln\/detail\/CVE-2022-27518<\/a>
\n7<\/sup>microsoft.com\/en-us\/security\/blog\/2023\/05\/24\/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques\/<\/a>
\n8<\/sup>microsoft.com\/en-us\/security\/blog\/2023\/07\/14\/analysis-of-storm-0558-techniques-for-unauthorized-email-access\/<\/a>
\n9<\/sup>query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE5bUvv?culture=en-us&country=us<\/a>
\n10<\/sup>microsoft.com\/en-us\/security\/blog\/2021\/12\/06\/nickel-targeting-government-organizations-across-latin-america-and-europe\/<\/a>
\n11<\/sup>about.fb.com\/news\/2022\/09\/removing-coordinated-inauthentic-behavior-from-china-and-russia\/<\/a>; foreignpolicy.com\/2022\/11\/04\/china-us-midterm-electioninterference-meddling-social-media-cybersecurity-disinformation\/<\/a>; apnews.com\/article\/russia-ukraine-business-north-korea-e6a068d91bc9828ecadfb67c929a4162<\/a>
\n12<\/sup>miburo.substack.com\/i\/45539420\/seeds-and-sprout<\/a>
\n13<\/sup>public-assets.graphika.com\/reports\/graphika_report_spamouflage_goes_to_america.pdf<\/a>
\n14<\/sup>washingtonpost.com\/technology\/2023\/03\/26\/ai-generated-hands-midjourney\/<\/a>
\n15<\/sup>https:\/\/archive.ph\/QXvtw<\/a>
\n16<\/sup>miburo.substack.com\/p\/csm-influencer-ops-1<\/a>; miburo.substack.com\/p\/chinese-state-medias-global-influencer<\/a>; These statistics reflect data as of April 2023.
\n17<\/sup>miburo.substack.com\/p\/spamouflage-survives<\/a>; iri.org\/wp-content\/uploads\/legacy\/iri.org\/detecting_digital_fingerprints__tracing_chinese_disinformation_in_taiwan_0. pdf<\/a>; Such influence actors are sometimes known as \u201cSpamouflage Dragon\u201d or \u201cDRAGONBRIDGE\u201d.
\n18<\/sup>safeguarddefenders.com\/en\/blog\/230000-policing-expands<\/a>; safeguarddefenders.com\/en\/blog\/patrol-and-persuade-follow-110-overseas-investigation<\/a>
\n19<\/sup>web.archive.org\/web\/20200527103611\/media.people.com.cn\/GB\/40606\/6198886.html<\/a>
\n20<\/sup>See: The Microsoft Threat Analysis Center\u2019s framework for determining influence attributions. blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2023\/02\/ DTAC-Attribution-Framework.pdf<\/a>; The Chinese diaspora is commonly referred to as \u201coverseas Chinese\u201d or \u534e\u4fa8 (huaqiao) by the Chinese government, referring to those with Chinese citizenship or heritage who reside outside of the PRC. For more detail on Beijing\u2019s interpretation of the Chinese diaspora, see: www.jstor.org\/<\/a> stable\/26492596.
\n21<\/sup>Archive.ph\/GWW0D<\/a>
\n22<\/sup>archive.is\/oAn4j<\/a>
\n23<\/sup>The Chinese government seeded this narrative at the beginning of the COVID-19 pandemic, see: apnews.com\/article\/pandemics-beijing-only-on-ap-epidemicsmedia-122b73e134b780919cc1808f3f6f16e8<\/a>. Websites within this network that promote this claim include: archive.ph\/ueq4R<\/a>; archive.ph\/5DLGc<\/a>; archive.ph\/xmp6W<\/a>.
\n24<\/sup>economist.com\/china\/2018\/06\/14\/china-is-spending-billions-on-its-foreign-language-media<\/a>
\n25<\/sup>foreignpolicy.com\/2023\/03\/16\/china-propaganda-africa-soft-power\/<\/a>
\n26<\/sup>freedomhouse.org\/report\/beijing-global-media-influence\/2022\/authoritarian-expansion-power-democratic-resilience<\/a>
\n27<\/sup>digichina.stanford.edu\/work\/lexicon-discourse-power-or-the-right-to-speak-huayu-quan\/<\/a>
\n28<\/sup>Defending Ukraine: Early Lessons from the Cyber War, query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE50KOK<\/a>
\n29<\/sup>web.archive.org\/web\/20210525192516\/www.scmp.com\/business\/companies\/article\/3130027\/phoenix-media-founder-sells-almost-all-his-shares-beijing-backed<\/a>
\n30<\/sup>Another interpretation of xuexi qiangguo is \u201cStudy Xi, Strengthen the Country.\u201d The name is a pun on Xi Jinping\u2019s family name. Governments, universities, and businesses in China strongly promote the use of the app, at times shaming or punishing subordinates for infrequent use, see: nytimes.com\/2019\/04\/07\/world\/asia\/ china-xi-jinping-study-the-great-nation-app.html<\/a>
\n31<\/sup>The Paper is owned by Shanghai United Media Group, which is in turn owned by the Shanghai Communist Party Committee: nytimes.com\/2016\/04\/06\/business\/international\/china-media-the-paper-english.html<\/a>
\n32<\/sup>apnews.com\/article\/russia-ukraine-business-north-korea-e6a068d91bc9828ecadfb67c929a4162<\/a>
\n33<\/sup>fbi.gov\/news\/press-releases\/fbi-confirms-lazarus-group-cyber-actors-responsible-for-harmonys-horizon-bridge-currency-theft<\/a>
\n34<\/sup>edition.cnn.com\/2023\/02\/04\/asia\/north-korea-youtuber-yumi-intl-hnk-dst<\/a>; tiktok.com\/@viceworldnews\/video\/7190073973739179269<\/a>
\n35<\/sup>The CCP has previously invested in private sector companies that aid IO campaigns via SEO manipulation techniques, fake likes and followers, and other services. Procurement documents reveal such bids, see: www.nytimes.com\/interactive\/2021\/12\/20\/technology\/china-facebook-twitter-influence-manipulation.html<\/a>
\n<\/sup><\/p>\n
Dive in and explore emerging trends in East Asia\u2019s evolving threat landscape, where China conducts both widespread cyber and influence operations (IO), while North Korean cyber threat actors demonstrate growing sophistication. <\/p>\n","protected":false},"author":31,"featured_media":4011,"comment_status":"open","ping_status":"open","sticky":false,"template":"single-post.php","format":"standard","meta":{"footnotes":""},"categories":[188,158],"tags":[151,197,189,173,143],"industries":[],"threat_actor_groups":[],"countries":[],"industries_targeted":[],"acf":[],"yoast_head":"\n