{"id":11131,"date":"2005-08-25T00:00:00","date_gmt":"2005-08-25T00:00:00","guid":{"rendered":"http:\/\/localhost\/cyber-operations\/titan-rain\/"},"modified":"2005-08-25T00:00:00","modified_gmt":"2005-08-25T00:00:00","slug":"titan-rain","status":"publish","type":"post","link":"https:\/\/www.cfr.org\/cyber-operations\/titan-rain","title":{"rendered":"Titan Rain"},"content":{"rendered":"<p>Titan Rain was a string of cyber operations that compromised a number of agencies within the U.S. and UK government. Chinese state-sponsored actors <a href=\"https:\/\/web.archive.org\/web\/20080905070427\/http:\/news.zdnet.com\/2100-1009_22-5969516.html\">are suspected<\/a> of breaching the unclassified networks of the <a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2005\/08\/24\/AR2005082402318.html\">U.S. Departments<\/a> of State, Homeland Security, and Energy, and <a href=\"https:\/\/www.theguardian.com\/technology\/2007\/sep\/04\/news.internet\">UK defense and foreign ministries<\/a>. Although the attacks were first publicly revealed in 2005, the United States reported that they had been ongoing since at least 2003. The United Kingdom reported that the campaign continued as late as 2007.<\/p>\n<p>Titan Rain was the first instance of state-sponsored espionage from China that was made public, triggering a decades-long effort by the U.S. government to reduce the breadth and scope of Chinese cyber operations against U.S. targets.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Titan Rain was a string of cyber operations that compromised a number of agencies within the U.S. and UK government. Chinese state-sponsored actors are suspected of breaching the unclassified networks of the U.S. Departments of State, Homeland Security, and Energy, and UK defense and foreign ministries. Although the attacks were first publicly revealed in 2005, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_cloudinary_featured_overwrite":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[],"cyber_operation":[49],"state_sponsor":[30],"victim_category":[63,110],"victim_government_response":[186],"victim":[180,182],"class_list":["post-11131","post","type-post","status-publish","format-standard","hentry","category-incident","cyber_operation-espionage","state_sponsor-china","victim_category-government","victim_category-military","victim_government_response-unknown","victim-united-kingdom","victim-united-states"],"acf":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts\/11131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/comments?post=11131"}],"version-history":[{"count":0,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts\/11131\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/media?parent=11131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/categories?post=11131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/tags?post=11131"},{"taxonomy":"cyber_operation","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/cyber_operation?post=11131"},{"taxonomy":"state_sponsor","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/state_sponsor?post=11131"},{"taxonomy":"victim_category","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim_category?post=11131"},{"taxonomy":"victim_government_response","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim_government_response?post=11131"},{"taxonomy":"victim","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim?post=11131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}