Welcome,
Good Monday morning, everybody. Craig Peterson here. I was on with Jack Heath this morning. We talked about an article that Jack posted on Facebook about a Chinese National working for an American Military Contractor who gave our Military Secrets to China. Here we go with Jack.
These and more tech tips, news, and updates visit - CraigPeterson.com
---
Automated Machine Transcript:
Craig Taking a laptop, even if you are not a Chinese spy, to China is has a high probability that information on that laptop disappears while you're over there.
Craig Hey, good morning, everybody. Craig Peterson here. This morning Jack wrote about an article on Facebook about what's been happening here in New England with Chinese infiltration and spying on military companies and contractors. We got into it this morning. Here we go.
Jack Heath On top of the lack of social technology, getting US pictures out of places like you know where the host city you have China, basically muscling technology and stealing it allegedly from us. You look at this 10-year engineer, Chinese born American who was just picked up over the weekend by the FBI for allegedly taking his secure Raytheon laptop to China on a trip last year. It is a federal offense for someone with high-security clearance to take technology capable of accessing things like our weapon system technology out of the country. Then the Harvard story. Last week, which you haven't heard much more about the professor, one or two professors charged with getting $50,000 a month from a bogus Chinese University, from the Chinese government to recruit and steal intellectual capital from Harvard. Those are big stories, and it shows the dichotomy between the people having access and the government using it to get more technology for the government and stealing our intellectual capital. Some interest there, and maybe a comment on that Craig Peterson joins us live in the author listener lines, our Tech Talk guy, Good morning, Craig.
Craig Hey, good morning, jack. Yeah, and the last few months we've got this Chinese Harvard affiliated cancer researcher caught in December with 21 vials Cells stolen from a lab at a Boston hospital. We've got a Chinese Professor conducting surveillance Research at the University of Kansas indicted in August on charges for his ties to Chinese University. We've got a Chinese PLA Lieutenant posing as a student here at Boston University. The fact that she was a lieutenant in the Chinese military. She was a spy and a Chinese scholar. Another at the University of California. The list goes on and on. You talked a little bit, and you posted on Facebook about the Raytheon employee taking a laptop to China. The company told him not only was it against company policy to travel with a company computer that might have some proprietary information on it but was against federal law. And we see this a lot. There's a lot of ignorance out there amongst people who do take laptops with them to China. I've been warning about that for the last ten years because taking a portable computer, even if you are not a Chinese spy, to China presents a high probability of exfiltration of that data from that laptop while you're over there. Now the infiltration of soft targets in the last few years, our universities where Chinese students are coming over. As I mentioned earlier, Chinese military Lieutenants are coming over to universities posing as students and being assigned to research projects and stealing stuff. The federal ITAR requirements are ones we are dealing with all the time with some of our clients. We have military sub-subcontractors that are making things as simple as screws, Jack, and their products ultimately get used in some military system. Many of these companies are not being careful with our data, and it gets stolen. They have no clue that they're exposing all of us to these dangers.
Jack Craig, I think you may know,