{"id":814,"date":"2018-12-20T20:37:53","date_gmt":"2018-12-20T20:37:53","guid":{"rendered":"http:\/\/ielrblog.com\/?p=814"},"modified":"2018-12-21T14:20:38","modified_gmt":"2018-12-21T14:20:38","slug":"u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information","status":"publish","type":"post","link":"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/","title":{"rendered":"U.S. Indicts 2 Chinese Hackers Associated with the Chinese Government for Global Campaigns to Steal Intellectual Property and Confidential Business Information"},"content":{"rendered":"<p>Today Deputy Attorney General Rod J. Rosenstein and other high-level U.S. officials announced the unsealing of an <a href=\"https:\/\/www.justice.gov\/opa\/press-release\/file\/1121706\/download\">indictment<\/a> charging Zhu Hua (\u6731\u534e), aka Afwar, aka CVNX, aka Alayos, aka Godkiller; and Zhang Shilong (\u5f20\u58eb\u9f99), aka Baobeilong, aka Zhang Jianguo, aka Atreexp, both nationals of the People\u2019s Republic of China (China), with conspiracy to commit computer intrusions, conspiracy to commit wire fraud, and aggravated identity theft.<\/p>\n<p>Zhu and Zhang \u00a0allegedly belong to a hacking group operating in China known within the cyber security community as Advanced Persistent Threat 10 (the APT10 Group).\u00a0 The defendants worked for a company in China called Huaying Haitai Science and Technology Development Company (Huaying Haitai) and acted in association with the Chinese Ministry of State Security\u2019s Tianjin State Security Bureau.<\/p>\n<p>From at least in or about 2006 up to and including in or about 2018, members of the APT10 Group, including Zhu and Zhang, conducted extensive campaigns of intrusions into computer systems around the world.\u00a0 The APT10 Group used some of the same online facilities to initiate, facilitate and execute its campaigns during the conspiracy.<\/p>\n<p>Starting \u00a0at least in or about 2014, members of the APT10 Group, including Zhu and Zhang, obtained unauthorized access to the computers and computer networks of Managed Service Providers (MSPs0 for businesses and governments around the world (the MSP Theft Campaign).\u00a0 MSPs are firms that other companies trust to store, process, and protect commercial data, including intellectual property and other confidential business information.\u00a0 When hackers gain access to MSPs, they can steal sensitive business information that gives competitors\u00a0 an unfair advantage.<\/p>\n<p>The APT10 Group targeted MSPs in order to leverage the MSPs\u2019 networks to gain unauthorized access to the computers and computer networks of the MSPs\u2019 clients and to steal, among other data, intellectual property and confidential business data on a global scale.\u00a0 For example, through the MSP Theft Campaign, the APT10 Group obtained unauthorized access to the computers of an MSP that had offices in the Southern District of New York and compromised the data of that MSP and certain of its clients involved in banking and finance, telecommunications and consumer electronics, medical equipment, packaging, manufacturing, consulting, healthcare, biotechnology, automotive, oil and gas exploration, and mining.<\/p>\n<p>Earlier, starting in or about 2006, members of the APT10 Group, including Zhu and Zhang, engaged in an intrusion campaign to obtain unauthorized access to the computers and computer networks of more than 45 technology companies and U.S. government agencies, in order to steal information and data concerning a number of technologies (the Technology Theft Campaign).\u00a0 Through the Technology Theft Campaign, the APT10 Group stole hundreds of gigabytes of sensitive data and targeted the computers of victim companies involved in aviation, space and satellite technology, manufacturing technology, pharmaceutical technology, oil and gas exploration and production technology, communications technology, computer processor technology, and maritime technology.<\/p>\n<p>In furtherance of the APT10 Group\u2019s intrusion campaigns, Zhu and Zhang, among other things, registered malicious domains and infrastructure.\u00a0 In addition, Zhu, a penetration tester, engaged in hacking operations on behalf of the APT10 Group and recruited other individuals to the APT10 Group, and Zhang developed and tested malware for the APT10 Group.<\/p>\n<p><em>The MSP Theft Campaign<\/em><\/p>\n<p>Zhu, Zhang, and their co-conspirators in the APT10 Group engaged in the following criminal conduct:<\/p>\n<p>First, after the APT10 Group gained unauthorized access into the computers of an MSP, the APT10 Group installed multiple variants of malware on MSP computers around the world. To avoid antivirus detection, the malware was installed using malicious files that masqueraded as legitimate files associated with the victim computer\u2019s operating system.\u00a0 Such malware enabled members of the APT10 Group to monitor victims\u2019 computers remotely and steal user credentials.<\/p>\n<p>Second, after stealing administrative credentials from computers of an MSP, the APT10 Group employed \u00a0those stolen credentials to connect to other systems within an MSP and its clients\u2019 networks. The APT10 Group then moved laterally through an MSP\u2019s network and its clients\u2019 networks and to compromise victim computers that were not yet infected with malware.<\/p>\n<p>Third, after identifying data of interest on a compromised computer and packaging it for exfiltration using encrypted archives, the APT10 Group employed stolen credentials to move the data of an MSP client to one or more other compromised computers of the MSP or its other clients\u2019 networks before exfiltrating the data to other computers controlled by the APT10 Group.<\/p>\n<p>During \u00a0the \u00a0MSP Theft Campaign, Zhu, Zhang, and their co-conspirators in the APT10 Group successfully obtained unauthorized access to computers providing services to or belonging to victim companies located in at least 12 countries, including Brazil, Canada, Finland, France, Germany, India, Japan, Sweden, Switzerland, the UAE, the UK, and the US.\u00a0 The victim companies included at least the following:\u00a0 a global financial institution, three telecommunications and\/or consumer electronics companies; three companies involved in commercial or industrial manufacturing; two consulting companies; a healthcare company; a biotechnology company; a mining company; an automotive supplier company; and a drilling company.<\/p>\n<p><em>The Technology Theft Campaign<\/em><\/p>\n<p>During the course of the Technology Theft Campaign, which started in or about 2006, Zhu, Zhang, and their coconspirators in the APT10 Group successfully obtained unauthorized access to the computers of more than 45 technology companies and U.S. Government agencies based in at least 12 states, including Arizona, California, Connecticut, Florida, Maryland, New York, Ohio, Pennsylvania, Texas, Utah, Virginia and Wisconsin.\u00a0 The APT10 Group stole hundreds of gigabytes of sensitive data and information from the victims\u2019 computer systems, including from at least the following victims: seven companies involved in aviation, space and\/or satellite technology; three companies involved in communications technology; three companies involved in manufacturing advanced electronic systems and\/or laboratory analytical instruments; a company involved in maritime technology; a company involved in oil and gas drilling, production, and processing; and the NASA Goddard Space Center and Jet Propulsion Laboratory.\u00a0 In addition to those victims who had information stolen, Zhu, Zhang, and their co-conspirators successfully obtained unauthorized access to computers belonging to more than 25 other technology-related companies involved in, among other things, industrial factory automation, radar technology, oil exploration, information technology services, pharmaceutical manufacturing, and computer processor technology, as well as the U.S. Department of Energy\u2019s Lawrence Berkeley National Laboratory.<\/p>\n<p>Zhu and Zhang are each charged with one count of conspiracy to commit computer intrusions, which carries a maximum sentence of five years in prison; one count of conspiracy to commit wire fraud, which carries a maximum sentence of 20 years in prison; and one count of aggravated identity theft, which carries a mandatory sentence of two years in prison.<\/p>\n<p>Finally, the APT10 Group compromised more than 40 computers in order to steal sensitive data belonging to the Navy, including the names, Social Security numbers, and dates of birth, salary information, personal phone numbers, and email addresses of more than 100,000 Navy personnel.<\/p>\n<p><a href=\"https:\/\/www.justice.gov\/opa\/speech\/deputy-attorney-general-rod-j-rosenstein-announces-charges-against-chinese-hackers\">According to Deputy A.G. Rosenstein<\/a>, \u201c(t)oday\u2019s charges mark an important step in revealing to the world China\u2019s continued practice of stealing commercial data.\u00a0 Responding to that conduct requires a strategic approach to the threats that China poses.\u00a0 That is why the Department of Justice recently announced an initiative to address the full range of threats. One tactic is to increase our enforcement efforts. Another is to conduct foreign investment reviews to protect against China improperly acquiring sensitive information. A third is to find ways to better protect our telecommunications networks.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today Deputy Attorney General Rod J. Rosenstein and other high-level U.S. officials announced the unsealing of an indictment charging Zhu Hua (\u6731\u534e), aka Afwar, aka CVNX, aka Alayos, aka Godkiller; and Zhang Shilong (\u5f20\u58eb\u9f99), aka Baobeilong, aka Zhang Jianguo, aka Atreexp, both nationals of the People\u2019s Republic of China (China), with conspiracy to commit computer [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[33,14,11],"tags":[],"class_list":{"0":"post-814","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-cybercrime","7":"category-data-privacy","8":"category-transnational-organized-crime-cybercrime-narcotics","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>U.S. Indicts 2 Chinese Hackers Associated with the Chinese Government for Global Campaigns to Steal Intellectual Property and Confidential Business Information | IELR Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"U.S. Indicts 2 Chinese Hackers Associated with the Chinese Government for Global Campaigns to Steal Intellectual Property and Confidential Business Information | IELR Blog\" \/>\n<meta property=\"og:description\" content=\"Today Deputy Attorney General Rod J. Rosenstein and other high-level U.S. officials announced the unsealing of an indictment charging Zhu Hua (\u6731\u534e), aka Afwar, aka CVNX, aka Alayos, aka Godkiller; and Zhang Shilong (\u5f20\u58eb\u9f99), aka Baobeilong, aka Zhang Jianguo, aka Atreexp, both nationals of the People\u2019s Republic of China (China), with conspiracy to commit computer [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/\" \/>\n<meta property=\"og:site_name\" content=\"IELR Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/m.facebook.com\/intlenforcementlawreporter\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-20T20:37:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-21T14:20:38+00:00\" \/>\n<meta name=\"author\" content=\"Bruce Zagaris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ielr\" \/>\n<meta name=\"twitter:site\" content=\"@ielr\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruce Zagaris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2018\\\/12\\\/20\\\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2018\\\/12\\\/20\\\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\\\/\"},\"author\":{\"name\":\"Bruce Zagaris\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#\\\/schema\\\/person\\\/e491a7e89d418cb82a8c67687806ab66\"},\"headline\":\"U.S. Indicts 2 Chinese Hackers Associated with the Chinese Government for Global Campaigns to Steal Intellectual Property and Confidential Business Information\",\"datePublished\":\"2018-12-20T20:37:53+00:00\",\"dateModified\":\"2018-12-21T14:20:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2018\\\/12\\\/20\\\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\\\/\"},\"wordCount\":1240,\"commentCount\":0,\"articleSection\":[\"cybercrime\",\"Data Privacy\",\"Transnat'l Organized Crime, Cybercrime, Narcotics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2018\\\/12\\\/20\\\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2018\\\/12\\\/20\\\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\\\/\",\"url\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2018\\\/12\\\/20\\\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\\\/\",\"name\":\"U.S. Indicts 2 Chinese Hackers Associated with the Chinese Government for Global Campaigns to Steal Intellectual Property and Confidential Business Information | IELR Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#website\"},\"datePublished\":\"2018-12-20T20:37:53+00:00\",\"dateModified\":\"2018-12-21T14:20:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#\\\/schema\\\/person\\\/e491a7e89d418cb82a8c67687806ab66\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2018\\\/12\\\/20\\\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2018\\\/12\\\/20\\\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2018\\\/12\\\/20\\\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ielrblog.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"U.S. Indicts 2 Chinese Hackers Associated with the Chinese Government for Global Campaigns to Steal Intellectual Property and Confidential Business Information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#website\",\"url\":\"https:\\\/\\\/ielrblog.com\\\/\",\"name\":\"IELR Blog\",\"description\":\"Official Blog of the International Enforcement Law Reporter\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ielrblog.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#\\\/schema\\\/person\\\/e491a7e89d418cb82a8c67687806ab66\",\"name\":\"Bruce Zagaris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g\",\"caption\":\"Bruce Zagaris\"},\"url\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/author\\\/ielrblogadmin1\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"U.S. Indicts 2 Chinese Hackers Associated with the Chinese Government for Global Campaigns to Steal Intellectual Property and Confidential Business Information | IELR Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/","og_locale":"en_US","og_type":"article","og_title":"U.S. Indicts 2 Chinese Hackers Associated with the Chinese Government for Global Campaigns to Steal Intellectual Property and Confidential Business Information | IELR Blog","og_description":"Today Deputy Attorney General Rod J. Rosenstein and other high-level U.S. officials announced the unsealing of an indictment charging Zhu Hua (\u6731\u534e), aka Afwar, aka CVNX, aka Alayos, aka Godkiller; and Zhang Shilong (\u5f20\u58eb\u9f99), aka Baobeilong, aka Zhang Jianguo, aka Atreexp, both nationals of the People\u2019s Republic of China (China), with conspiracy to commit computer [&hellip;]","og_url":"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/","og_site_name":"IELR Blog","article_publisher":"https:\/\/m.facebook.com\/intlenforcementlawreporter\/?ref=bookmarks","article_published_time":"2018-12-20T20:37:53+00:00","article_modified_time":"2018-12-21T14:20:38+00:00","author":"Bruce Zagaris","twitter_card":"summary_large_image","twitter_creator":"@ielr","twitter_site":"@ielr","twitter_misc":{"Written by":"Bruce Zagaris","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/#article","isPartOf":{"@id":"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/"},"author":{"name":"Bruce Zagaris","@id":"https:\/\/ielrblog.com\/#\/schema\/person\/e491a7e89d418cb82a8c67687806ab66"},"headline":"U.S. Indicts 2 Chinese Hackers Associated with the Chinese Government for Global Campaigns to Steal Intellectual Property and Confidential Business Information","datePublished":"2018-12-20T20:37:53+00:00","dateModified":"2018-12-21T14:20:38+00:00","mainEntityOfPage":{"@id":"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/"},"wordCount":1240,"commentCount":0,"articleSection":["cybercrime","Data Privacy","Transnat'l Organized Crime, Cybercrime, Narcotics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/","url":"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/","name":"U.S. Indicts 2 Chinese Hackers Associated with the Chinese Government for Global Campaigns to Steal Intellectual Property and Confidential Business Information | IELR Blog","isPartOf":{"@id":"https:\/\/ielrblog.com\/#website"},"datePublished":"2018-12-20T20:37:53+00:00","dateModified":"2018-12-21T14:20:38+00:00","author":{"@id":"https:\/\/ielrblog.com\/#\/schema\/person\/e491a7e89d418cb82a8c67687806ab66"},"breadcrumb":{"@id":"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ielrblog.com\/index.php\/2018\/12\/20\/u-s-indicts-2-chinese-hackers-associated-with-the-chinese-government-for-global-campaigns-to-steel-intellectual-property-and-confidential-business-information\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ielrblog.com\/"},{"@type":"ListItem","position":2,"name":"U.S. Indicts 2 Chinese Hackers Associated with the Chinese Government for Global Campaigns to Steal Intellectual Property and Confidential Business Information"}]},{"@type":"WebSite","@id":"https:\/\/ielrblog.com\/#website","url":"https:\/\/ielrblog.com\/","name":"IELR Blog","description":"Official Blog of the International Enforcement Law Reporter","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ielrblog.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ielrblog.com\/#\/schema\/person\/e491a7e89d418cb82a8c67687806ab66","name":"Bruce Zagaris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g","caption":"Bruce Zagaris"},"url":"https:\/\/ielrblog.com\/index.php\/author\/ielrblogadmin1\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pas6ng-d8","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts\/814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/comments?post=814"}],"version-history":[{"count":3,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts\/814\/revisions"}],"predecessor-version":[{"id":817,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts\/814\/revisions\/817"}],"wp:attachment":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/media?parent=814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/categories?post=814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/tags?post=814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}