World

Explained: Why FBI Director Thinks TikTok Is A National Security Concern And The History Of Chinese Espionage In US

Swarajya StaffDec 04, 2022, 08:17 PM | Updated 08:17 PM IST
Tiktok

Tiktok


FBI Director Christopher Wray raised national security concerns about TikTok on Friday, warning that the app is controlled by a government with "values different from our own". The Associated Press reported that Wray said the FBI is concerned that China has the ability to control TikTok's recommendation algorithm, "which would allow it to manipulate content and, if it so chose, exercise influence". He also claimed that China could use the app to collect user data for use in traditional espionage efforts.

"It's all being manipulated by a government with values different from our own, and whose interests are not necessarily aligned with ours, and that's something we should be concerned about," Wray said during a speech at the Gerald R. Ford School of Public Policy at the University of Michigan.

TikTok spokesperson Brooke Oberwetter reportedly said in an email statement that, "As the Director previously stated, the FBI's perspective has been incorporated and is part of our ongoing discussions with the US government. While we cannot divulge the details of confidential discussions, I can assure you that we are working to fully address the US government's concerns and have made substantial progress toward a resolution."

The history of China's intelligence operations against the United States dates back to the Cold War, when the two countries were bitter rivals and engaged in a global struggle for power and influence. At the time, China's intelligence efforts were focused on gathering information about US military capabilities and diplomatic strategies, as well as on stealing American technological and scientific secrets.

During the early years of the Cold War, China relied heavily on human intelligence (HUMINT) operations, using agents and operatives to gather information through personal contacts and covert means. This included recruiting agents within the US government and military, as well as infiltrating American academic and scientific institutions. In addition to HUMINT operations, China also used covert action and disinformation campaigns to influence public opinion and decision-making in the United States.

As the Cold War continued, China's intelligence operations against the US evolved and became more sophisticated. In the 1960s and 1970s, China began to focus more on the use of technology for intelligence gathering, utilizing advanced eavesdropping and surveillance equipment to collect information. This included the development of satellite technology and the establishment of listening posts near US embassies and military bases.

In the 1980s and 1990s, China's intelligence operations against the US continued to expand and evolve. The country developed a robust cyber espionage program, using advanced computer hacking techniques to steal sensitive information from American government and corporate networks. China also increased its use of front companies and other covert means to acquire sensitive technology and intellectual property from the United States.


Another example is the case of Larry Wu-Tai Chin, a Chinese-American who worked as a translator for the CIA and was also a long-time spy for the Chinese government. Chin, who had access to sensitive information about US intelligence operations, provided the Chinese government with valuable information about US intelligence capabilities and strategies. He was eventually caught and convicted of espionage in 1986.

These cases illustrate the ways in which China has used HUMINT operations to infiltrate the US government and military, and to gather valuable information about American intelligence activities.

In addition to using HUMINT operations and covert action, China has also relied heavily on technology to conduct espionage against the United States. In the 1960s and 1970s, China began to focus more on the use of technology for intelligence gathering, utilizing advanced eavesdropping and surveillance equipment to collect information. This included the development of satellite technology and the establishment of listening posts near US embassies and military bases.

The development of these capabilities allowed China to collect a wide range of information about US military and diplomatic activities, as well as to intercept communications and gather other sensitive information. For example, in the late 1970s, China was able to intercept communications between the US embassy in Moscow and Washington, DC, providing valuable intelligence about US-Soviet relations and diplomatic strategies.

In the 1980s and 1990s, China's use of technology for espionage against the US continued to expand and evolve. The country developed a robust cyber espionage program, using advanced computer hacking techniques to steal sensitive information from American government and corporate networks. This included the theft of sensitive military technology, such as the designs for the F-35 Joint Strike Fighter and the Patriot missile system, as well as the theft of intellectual property from American companies.

One high-profile example of China's use of cyber espionage against the US is the case of the "Comment Crew," a group of hackers working for the Chinese military who were responsible for a number of significant cyber attacks against American targets. The Comment Crew, which was also known as APT1, was responsible for a number of major breaches, including the theft of sensitive information from the US Office of Personnel Management, which contained the records of millions of federal employees.

With TikTok, China now has access to data of millions of users, and although the app may claim to not use your personal information, anyone with a basic understanding of computer science knows that the app can be easily used to mine data which belongs to other apps on your phone, through a backdoor entry. Tiktok also presents a more wider social problem, as it incentivises narcissistic behaviour, and in fact amplifies it and scales it, instead of regulating it.

Join our WhatsApp channel - no spam, only sharp analysis