Cyber espionage - the Chinese way

We reviewed the Chinese intelligence community structure, the way they collect data and, as a result of the first two, also tackled the monolith myth of China in order to explain why most things you hear about Chinese cyber activities do not make sense nor survive any closer analysis. Now it is time we have a look at Chinese cyber capabilities and their use. This is Part 4 of the four part series: Chinese intelligence structures The Chinese way of collecting data [China: the monolith myth]((http://playgod.