{"id":1385,"date":"2017-01-01T18:28:43","date_gmt":"2017-01-02T02:28:43","guid":{"rendered":"https:\/\/www.cloudinsidr.com\/content\/?p=1385"},"modified":"2017-11-08T04:06:06","modified_gmt":"2017-11-08T12:06:06","slug":"ibms-china-connection-and-the-betrayal-of-america-how-chinese-government-hackers-manage-to-remain-undetectable","status":"publish","type":"post","link":"https:\/\/www.cloudinsidr.com\/content\/ibms-china-connection-and-the-betrayal-of-america-how-chinese-government-hackers-manage-to-remain-undetectable\/","title":{"rendered":"IBM\u2019s China connection and the betrayal of America: how Chinese government hackers manage to remain undetectable"},"content":{"rendered":"<p>\u201c<em>You know, if you have something really important, write it out and have it delivered by courier, the old-fashioned way. Because I\u2019ll tell you what: No computer is safe (\u2026) I don\u2019t care what they say.<\/em>\u201d<\/p>\n<p style=\"text-align: right;\">President-Elect Donald Trump<\/p>\n<p>&nbsp;<\/p>\n<p>In the waning days of the fading Obama presidency, plenty of questions surfaced about Russia\u2019s involvement with the hacks of the DNC and election systems. Electronic evidence can be easily manipulated.<\/p>\n<p>There is more to it than just electronic evidence.<\/p>\n<p><!--more--><\/p>\n<p><strong>IBM has systematically betrayed America by selling US technology vital to the national security of its home nation to China:<\/strong><\/p>\n<p><strong><u>STEP 1:<\/u><\/strong>\u00a0The Chinese manufacturer Lenovo was able to acquire\u00a0<strong>IBM\u2019s PC division<\/strong> in a fire sale, for pennies on the Dollar, in <strong>2004<\/strong>,<\/p>\n<p><strong><u>STEP 2:<\/u><\/strong> Lenovo then acquired <strong>IBM\u2019s Server division, <\/strong>also in a fire sale,\u00a0for pennies on the Dollar, in <strong>2014<\/strong>.<\/p>\n<p>Through these two acquisitions, China obtained valuable know-how related to Intel&#8217;s x86 architecture including Intel&#8217;s Active Management Technology (AMT), <strong>an undetectable backdoor which presents a national security risk for the United States<\/strong>. This knowledge allows the Chinese government to <strong>hack<\/strong> into <strong>any computer using the Intel x86 architecture and **remain undetected**. <\/strong>The technology was designed as Intel\u2019s own backdoor for maintenance, but it can be misused for malicious activities.<strong> It gives China on-demand access to any U.S. cloud or U.S. data center running on Intel x86.<\/strong><\/p>\n<p>IBM has also betrayed America on at least one other occasion:<\/p>\n<p><strong><u>STEP 3:<\/u><\/strong> IBM <strong>gave away the POWER<\/strong> technology to China through <strong>an illicit backdoor deal <\/strong>(please see [1] below). To cover its tracks, IBM used an open source initiative, OpenPOWER Foundation, <strong>as a smoke screen<\/strong> for what could be otherwise seen as <strong>treason<\/strong>.<\/p>\n<p>The results of these actions are far-reaching. They also pose a long-term danger to the United States on several fronts.<\/p>\n<h2>THE RESULTS AND THE DANGER THEY POSE TO THE UNITED STATES<\/h2>\n<p><span style=\"color: #ff0000;\"><strong>In a nutshell: The Chinese government can hack into any US clouds, any U.S. data centers and most mainframes while remaining totally **undetectable**. <\/strong><\/span><\/p>\n<p><span style=\"color: #ff0000;\"><strong>The Russians are being used as scapegoats.<\/strong><\/span><\/p>\n<h3><strong>Undetectable hacking capabilities on Intel x86 systems<\/strong><\/h3>\n<p>Through its front Lenovo, the Chinese government has the capability to <strong>hack <\/strong>into <strong>all systems<\/strong> running Intel\u2019s market-leading x86 architecture \u2014 including AWS GovCloud, the private cloud of the Central Intelligence Agency \u2014 and <strong>remain undetected<\/strong>.<\/p>\n<h3><strong>Intrusion capabilities within the U.S. financial system\u00a0<\/strong><\/h3>\n<p>With Lenovo\u2019s technology acquired from IBM, China can hack into <strong>all POWER-based Mainframes.<\/strong> \u00a0These systems run America\u2019s financial institutions (including American Express, Citi Group and others), insurance companies, stock markets, etc. They are all vulnerable.<\/p>\n<h3>Cryptographic superiority<\/h3>\n<p>China has an enviable ability to decode any data, even very strongly encrypted, for example prerecorded communications. America\u2019s secrets are no longer secret. The Chinese have declared open season on both the U.S. federal government and the public sector, including defense.<\/p>\n<p>It\u2019s that bleak!<\/p>\n<p>In theory, Intel\u2019s ME firmware is cryptographically protected with RSA 2048, but unfortunately this is just a walk in the park for China\u2019s top-of-the-list supercomputers:<\/p>\n<ul>\n<li>#1 supercomputer in the world (China): 93,01 TFlops\/s (National Supercomputing Center in Wuxi, China)<\/li>\n<li>#2 supercomputer in the world (China): 33,86 TFlops\/s (National Super Computer Center in Guangzhou, China).<\/li>\n<li>#3 and #4 supercomputers in the world (U.S. Dep. Of Energy): it pale by comparison: 17,59 TFlops\/s and 17,13 TFlop\/s, respectively<\/li>\n<\/ul>\n<p>ADDITIONAL INFORMATION<\/p>\n<p>[1] \u201cIBM Venture With China Stirs Concerns\u201d, NY Times:<\/p>\n<p><a href=\"http:\/\/www.nytimes.com\/2015\/04\/20\/business\/ibm-project-in-china-raises-us-concerns.html?_r=0\">http:\/\/www.nytimes.com\/2015\/04\/20\/business\/ibm-project-in-china-raises-us-concerns.html?_r=0<\/a>)<\/p>\n<p>and through the shady OpenPOWER Foundation.<\/p>\n<h3><strong>Clandestine cyber warfare<\/strong><\/h3>\n<p>In the waning days of the fading Obama presidency, plenty of questions surfaced about the identity of the DNC hackers. Given that former President Obama has been less than supportive of a smooth transition it is certainly worth investigating whether Russia is really the culprit. There is another global player a lot more invested in it: China.<\/p>\n<p>With the Strategic Support Force, China has not only the motive but also the means for clandestine cyberwarfare. The creation of the Strategic Support Force (\u6230\u7565\u652f\u63f4\u90e8\u968a; SSF) by the People&#8217;s Liberation Army (PLA) (https:\/\/international.thenewslens.com\/article\/58081) certainly points to an aggressive attitude towards the U.S.<\/p>\n<p>While China is the most dangerous rival of the United States, IBM is the most dangerous company right on American soil, the enemy on the inside. <strong>IBM was instrumental in establishing China as the No. 1 nation in supercomputing.<\/strong><\/p>\n<h2>The Timeline of Treason<\/h2>\n<p>From the initial rise of the Third Reich in Nazi Germany back in the early 1930s through the dark days of WWII (1939-1945), German Nazis had a devilish accomplice: IBM Corporation.<\/p>\n<p>IBM delivered the technology that was used to annihilate <strong>6 million Jews<\/strong> and nearly handed the Nazis a victory over the Allied Forces. It was close, way too close!<\/p>\n<h3><strong>1. [WWII]: IBM &amp; &#8220;The Death&#8217;s Calculator&#8221; <\/strong><\/h3>\n<p>In \u201c<a href=\"http:\/\/www.jewishvirtuallibrary.org\/jsource\/Holocaust\/IBM.html\" target=\"_blank\" rel=\"noopener\"><em>IBM and the Holocaust: The Strategic Alliance between Nazi Germany and America&#8217;s Most Powerful Corporation<\/em><\/a>\u201d,<strong>\u00a0Edwin Black<\/strong> details IBM&#8217;s involvement with Nazi Germany.<\/p>\n<p>Some may argue that this was the \u201cold IBM\u201d. The \u201cnew IBM\u201d has supposedly remorsefully parted with its evil ways. Fast forward from WWII to December 8th, 2004 for a reality check.<\/p>\n<h3>2. [<strong>2004]:\u00a0<\/strong><strong>The beginning of IBM\u2019s technology sellout to China<\/strong><\/h3>\n<p>http:\/\/www.nbcnews.com\/id\/6666170\/ns\/technology_and_science-tech_and_gadgets\/t\/ibm-sells-pc-business-chinas-lenovo\/<\/p>\n<p>IBM&#8217;s CEO Samuel J. Palmisano sold <strong>technology that was vital to the national security of the United States<\/strong> to China-owned Lenovo in a landmark deal valued at $1.75 billion (in other words: for\u00a0<strong>pennies on the Dollar<\/strong>). This has nothing to do with a \u201cfree market\u201d. It\u2019s treason.<\/p>\n<p>The acquisition by Lenovo (with the backing of the communist state China) should have raised alarm bells immediately. The US is a global superpower whose national security rides on its ability to maintain an edge in technology. Since the IBM selling frenzy, this is no longer the case.<\/p>\n<p>Some observers argued that it was &#8220;just&#8221; the PC division. This argument soon became obsolete with Lenovo\u2019s acquisition of IBM\u2019s server division in 2014 at a fire sale in which no other company was invited to bid.<\/p>\n<h3><strong>3. [2013]: IBM\u2019s Betrayal in Plain Sight: The OpenPOWER Foundation gives its technology away<\/strong><\/h3>\n<p>Adding insult to injury, IBM made a deal to open its POWER architecture to China.<\/p>\n<p>In its frantic attempts to transfer its technology to China, IBM decided to \u201copen source\u201d its POWER architecture in the <a href=\"https:\/\/openpowerfoundation.org\/\" target=\"_blank\" rel=\"noopener\">OpenPOWER Foundation<\/a>. The result was a one-way technology transfer to China with zero scrutiny. The POWER architecture is used in the United States mainly in the financial services sector, insurance and defense.<\/p>\n<p>Even the biased left-wingers like the New York Times grasped that there is something afoul in a report titled &#8220;<strong><a href=\"http:\/\/www.nytimes.com\/2015\/04\/20\/business\/ibm-project-in-china-raises-us-concerns.html?_r=0\" target=\"_blank\" rel=\"noopener\">IBM Venture With China Stirs Concerns<\/a>&#8220;.<\/strong><\/p>\n<p><strong>&#8212;QUOTE&#8212;<\/strong><\/p>\n<blockquote><p><em>&#8220;In the past 16 months, IBM has agreed \u2014 and received permission under United States export laws \u2014 to provide the Beijing company, Teamsun, with a partial blueprint of its higher-end servers and the software that runs on them, according to IBM announcements and filings from Teamsun.&#8221;<\/em><\/p>\n<p><em>(&#8230;) &#8220;The goal is to create [<strong>in China!!!- remark added<\/strong>] a domestic tech industry that in the long run will no longer need to buy American products, thus avoiding security concerns.&#8221;<\/em><\/p><\/blockquote>\n<p><strong>&#8212;END of quote&#8212;<\/strong><\/p>\n<p><strong>4. [2014]: Lenovo Set to \u00a0Close Acquisition of IBM\u2019s x86 Server Division<\/strong><\/p>\n<p><a href=\"http:\/\/news.lenovo.com\/news-releases\/lenovo-set-to-close-acquisition-ibms-x86-server-business.htm\" target=\"_blank\" rel=\"noopener\">Here&#8217;s <\/a>the news from the horse&#8217;s mouth.<\/p>\n<p>The most crucial element of this acquisition is Intel&#8217;s closely guarded secret that IBM was privy to (and so is now China): <strong>Intel&#8217;s Active Management Technology (AMT).<\/strong><\/p>\n<p><strong>Intel x86s hides another CPU that can take over your machine (you can&#8217;t audit it)<\/strong><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"9lPpKirzR9\"><p><a href=\"https:\/\/boingboing.net\/2016\/06\/15\/intel-x86-processors-ship-with.html\">Intel x86s hide another CPU that can take over your machine (you can&#8217;t audit it)<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Intel x86s hide another CPU that can take over your machine (you can&#039;t audit it)&#8221; &#8212; Boing Boing\" src=\"https:\/\/boingboing.net\/2016\/06\/15\/intel-x86-processors-ship-with.html\/embed#?secret=Hxki8iU3fe#?secret=9lPpKirzR9\" data-secret=\"9lPpKirzR9\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Lenovo&#8217;s acquisition of IBM&#8217;s X86 server division has <strong>nothing to do with free markets<\/strong>. Instead, it&#8217;s all about mis-using technology to bully other nations. Just look at how arrogant China behaves in the South China Sea and you immediately know what&#8217;s all about. The acquisition has also nothing to do with strengthening Lenovo&#8217;s position as a global, diversified tech leader&#8230; that&#8217;s just a smoke screen.<\/p>\n<p>Each of the above steps (Lenovo\u2019s acquisition of IBM&#8217;s PC division in 2004, the OpenPOWER Foundation and Lenovo\u2019s acquisition of IBM&#8217;s Server division in 2014) were orchestrated by IBM to systematically weaken the United States and strengthen the Strategic Support Force (\u6230\u7565\u652f\u63f4\u90e8\u968a; SSF) run by the People&#8217;s Liberation Army (PLA), which is controlled by the Chinese government.<\/p>\n<p>In plain words, IBM betrayed the US four times already (1933-45, 2004, 2013 and 2014). IBM allowed the Chinese state to undermine the technological leadership of the US. <strong>It\u2019s a betrayal of America.<\/strong><\/p>\n<p>Cybersecurity implications of Intel\u2019s Active Management Technology in Chinese hands<\/p>\n<p>Cybersecurity is one of the least understood fields in modern technology, because there is no golden bullet you can use to solve the problem in one step. Cybersecurity is comprised of a huge collection of individual challenges, which happen to be tightly intertwined. Dotting all i\u2019s and crossing all t&#8217;s crossed with even one single exception still leaves you vulnerable.<\/p>\n<p>&#8212;Quote [https:\/\/boingboing.net\/2016\/06\/15\/intel-x86-processors-ship-with.htm]&#8212;<\/p>\n<blockquote><p>&#8220;<em>On some chipsets, the firmware running on the ME implements a system called Intel&#8217;s Active Management Technology (AMT). This is entirely transparent to the operating system, which means that this extra computer can do its job regardless of which operating system is installed and running on the main CPU.<\/em><\/p>\n<p><em>The purpose of AMT is to provide a way to manage computers remotely (this is similar to an older system called &#8220;Intelligent Platform Management Interface&#8221; or IPMI, but more powerful). To achieve this task, the ME is capable of accessing any memory region without the main x86 CPU knowing about the existence of these accesses. It also runs a TCP\/IP server on your network interface and packets entering and leaving your machine on certain ports bypass any firewall running on your system.<\/em><\/p>\n<p><em>While AMT can be a great value-add, it has several troubling disadvantages. ME is classified by security researchers as &#8220;Ring -3&#8221;. Rings of security can be defined as layers of security that affect particular parts of a system, with a smaller ring number corresponding to an area closer to the hardware. For example, Ring 3 threats are defined as security threats that manifest in \u201cuser space\u201d mode. Ring 0 threats occur in \u201ckernel\u201d level, Ring -1 threats occur in a \u201chypervisor\u201d level, one level lower than the kernel, while Ring -2 threats occur in a special CPU mode called \u201cSMM\u201d mode. SMM stands for System-Management-Mode, a special mode that Intel CPUs can be put into that runs a separately defined chunk of code. If attackers can modify the SMM code and trigger the mode, they can get arbitrary execution of code on a CPU.<\/em>&#8220;<\/p><\/blockquote>\n<p>&#8212;END of quote&#8212;<\/p>\n<p>What it means is that by acquiring IBM&#8217;s <em>Intel PC<\/em> and IBM&#8217;s <em>Intel x86 Server<\/em> divisions, Lenovo got its hands on all Intel PC based systems: both on-premise, in the public cloud and in private data centers.<\/p>\n<p>The betrayal by IBM has many downsides for the national security and American jobs.<\/p>\n<h5><strong>1st downside: China pulls the plug on U.S. technology<\/strong><\/h5>\n<p>&#8220;<em>The goal is to create a domestic tech industry that in the long run will no longer need to buy American products, thus avoiding security concerns.<\/em>&#8221; (NY Times, April 15th 2015)<\/p>\n<p>In plain English, it means that American IT companies in China get dumped and replaced by homegrown, local Chinese IT companies. This translates into a loss of revenue, a weakening of the international competitiveness of the U.S. tech industry and in the end, into heavy job losses for the American knowledge worker.<\/p>\n<h5><strong>2nd downside: China gets a technological edge it did not have to pay for\u00a0<\/strong><\/h5>\n<p>China builds the <em><strong>world\u2019s fastest<\/strong><\/em> supercomputer <em><strong>without U.S. chips<\/strong><\/em>:<\/p>\n<p>http:\/\/www.computerworld.com\/article\/3085483\/high-performance-computing\/china-builds-world-s-fastest-supercomputer-without-u-s-chips.html<\/p>\n<p><strong>&#8212;QUOTE&#8212;<\/strong><\/p>\n<blockquote><p><em>&#8220;China on Monday revealed its latest supercomputer, a monolithic system with 10.65 million compute cores built entirely with Chinese microprocessors. This follows a U.S. government decision last year to deny China access to Intel&#8217;s fastest microprocessors.<\/em><\/p>\n<p><em>There is no U.S.-made system that comes close to the performance of China&#8217;s new system, the Sunway TaihuLight. Its theoretical peak performance is 124.5 petaflops, according to the latest biannual release today of the world&#8217;s Top500 supercomputers. It is the first system to exceed 100 petaflops. A petaflop equals one thousand trillion (one quadrillion) sustained floating-point operations per second.<\/em><\/p>\n<p><em>The most important thing about Sunway TaihuLight may be its microprocessors. In the past, China has relied heavily on U.S. microprocessors in building its supercomputing capacity. The world&#8217;s next fastest system, China&#8217;s Tianhe-2, which has a peak performance of 54.9 petaflops, uses Intel Xeon processors.&#8221;<\/em><\/p><\/blockquote>\n<p><strong>&#8212;End of quote&#8212;<\/strong><\/p>\n<p>It&#8217;s about time someone made IBM the company, IBM&#8217;s CEOs Ginni Rometty and her predecessor Samuel J. Palmisano assume responsibility.<\/p>\n<p>Recommendations for the incoming Administration:<\/p>\n<p>1) Kick out IBM&#8217;s CEO Rometty from the next Presidential Tech summit. Twitter failed to deliver the &#8220;Crooked Hillary Emoji&#8221;, but that pales in comparison to treason and betrayal as is the case with IBM. After all, Twitter helped by-pass heavily biased left-wing LSM (lame stream media) and helped solidifying the #MAGA movement of President Elect Donald J. Trump.<\/p>\n<p>2) On Day 1, there should be a Special Prosecutor investigating IBM&#8217;s betrayal of America.<\/p>\n<p>3) Closing the OpenPOWER Foundation\u00a0for committing treason and betraying America.<\/p>\n<p>4) Excluding IBM from government contracts on Day 1.<\/p>\n<p>5) Subpoena documents at Intel and IBM pertaining to technology transfer and the ME firmware.<\/p>\n<p>&#8212;Quote: [https:\/\/boingboing.net\/2016\/06\/15\/intel-x86-processors-ship-with.html]&#8212;<\/p>\n<blockquote><p>&#8220;Although the ME firmware is cryptographically protected with RSA 2048, researchers have been able to <strong>exploit weaknesses<\/strong> in the ME firmware and take partial control of the ME on early models. This makes <strong>ME a huge security loophole<\/strong>, and it has been called <strong>a very powerful<\/strong> <strong>rootkit mechanism<\/strong>. <strong>Once a system is compromised by a rootkit, attackers can gain administration access and undetectably attack the computer.&#8221;<\/strong><\/p><\/blockquote>\n<p>&#8212;End of quote&#8212;<\/p>\n<p>In closing<\/p>\n<blockquote><p>\u201c<em>You know, if you have something really important, write it out and have it delivered by courier, the old-fashioned way. Because I\u2019ll tell you what: No computer is safe (\u2026) I don\u2019t care what they say.<\/em>\u201d<\/p><\/blockquote>\n<p style=\"text-align: right;\">President-Elect Donald Trump<\/p>\n<p>While the above sounds like a hyperbole, it isn&#8217;t\u2014at least if you consider the above facts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cYou know, if you have something really important, write it out and have it delivered by courier, the old-fashioned way. Because I\u2019ll tell you what: No computer is safe (\u2026) I don\u2019t care what they say.\u201d President-Elect Donald Trump &nbsp; In the waning days of the fading Obama presidency, plenty of questions surfaced about Russia\u2019s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1623,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[33,192,146,89,1],"tags":[187,35,188,85,184,185,186,189],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IBM\u2019s China connection and the betrayal of America: how Chinese government hackers manage to remain undetectable - CloudInsidr<\/title>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudinsidr.com\/content\/ibms-china-connection-and-the-betrayal-of-america-how-chinese-government-hackers-manage-to-remain-undetectable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM\u2019s China connection and the betrayal of America: how Chinese government hackers manage to remain undetectable - CloudInsidr\" \/>\n<meta property=\"og:description\" content=\"\u201cYou know, if you have something really important, write it out and have it delivered by courier, the old-fashioned way. Because I\u2019ll tell you what: No computer is safe (\u2026) I don\u2019t care what they say.\u201d President-Elect Donald Trump &nbsp; In the waning days of the fading Obama presidency, plenty of questions surfaced about Russia\u2019s [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudinsidr.com\/content\/ibms-china-connection-and-the-betrayal-of-america-how-chinese-government-hackers-manage-to-remain-undetectable\/\" \/>\n<meta property=\"og:site_name\" content=\"CloudInsidr\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-02T02:28:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-08T12:06:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2017\/01\/hacker-2300772_colorcorr.png\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"507\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#website\",\"url\":\"https:\/\/www.cloudinsidr.com\/content\/\",\"name\":\"CloudInsidr\",\"description\":\"Cyber security, infotech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.cloudinsidr.com\/content\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/ibms-china-connection-and-the-betrayal-of-america-how-chinese-government-hackers-manage-to-remain-undetectable\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2017\/01\/hacker-2300772_colorcorr.png\",\"width\":760,\"height\":507,\"caption\":\"Hacker, anonymous\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/ibms-china-connection-and-the-betrayal-of-america-how-chinese-government-hackers-manage-to-remain-undetectable\/#webpage\",\"url\":\"https:\/\/www.cloudinsidr.com\/content\/ibms-china-connection-and-the-betrayal-of-america-how-chinese-government-hackers-manage-to-remain-undetectable\/\",\"name\":\"IBM\\u2019s China connection and the betrayal of America: how Chinese government hackers manage to remain undetectable - CloudInsidr\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/ibms-china-connection-and-the-betrayal-of-america-how-chinese-government-hackers-manage-to-remain-undetectable\/#primaryimage\"},\"datePublished\":\"2017-01-02T02:28:43+00:00\",\"dateModified\":\"2017-11-08T12:06:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#\/schema\/person\/dd6ee9cb21cf05763fd7cff3d6f11b2b\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudinsidr.com\/content\/ibms-china-connection-and-the-betrayal-of-america-how-chinese-government-hackers-manage-to-remain-undetectable\/\"]}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#\/schema\/person\/dd6ee9cb21cf05763fd7cff3d6f11b2b\",\"name\":\"Cloud Insidr\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b2fa1415b3d573b97d818b8f8f83b7c?s=96&d=mm&r=g\",\"caption\":\"Cloud Insidr\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts\/1385"}],"collection":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/comments?post=1385"}],"version-history":[{"count":19,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts\/1385\/revisions"}],"predecessor-version":[{"id":1633,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts\/1385\/revisions\/1633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/media\/1623"}],"wp:attachment":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/media?parent=1385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/categories?post=1385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/tags?post=1385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}