Cyber-espionage involves the stealing of important data from other countries by gaining access to the data bases of the countries. For the US, cyber-espionage involves other countries mainly China and Russia gaining access to the cyberspace of the United States and leaking important data from their systems, mainly economic and military data.
The video claims that these attacks on the United States government are mostly conducted by the Chinese. The United States government reported that the computers used to hack into their cyberspace were of Chinese origin. With these, they claim that the Chinese may be responsible for the cyber-espionage on their data. This however is not believable as the computers may be stolen by another country.
Adam Siegel claims that the main reason for the Chinese conducting cyber-espionage against the United States is so that they could be informed of the plans the United States have. This enables them to be in a better position both military-wise and economic-wise as they use the information they have for their own benefit.
The Nortel Management did not take the Chinese threat seriously as they did not have an idea of what had been stolen. Cyber threat at the time was not known hence the management did not take it as a serious threat to the company. The American management does not take this threat seriously as they have no prints of how this occurs.
This is true according to the video as it can be seen that more American firms are collapsing in relation to the Chines firms rising. There have been evidence of hacking in these firms, with origins from Asia but they have not been identified closely as the hackers are good at their job.
Technology transfer is posing a threat to the United States as China continues to drain the information and use it for its own gain. China economic dominance is seen to rise as compared to the falling dominance of the United States. The technology is transferred through hacking of the Google systems, hence retrieving information mainly through the emails. Technology transfer can only be detected but not stopped as the hackers are gaining new methods daily on how to steal this data.
References
CNBC - Cyber Espionage: The Chinese Threat. (n.d.). Retrieved from https://www.youtube.com/watch?v=Js52FjOsgPA