Yemen's Houthi rebels have claimed responsibility for the attacks, which created a huge fire at a processor essential to global energy supplies.Politicsread more
Oil prices are expected to jump as much as $10 per barrel after a coordinated drone strike hit Saudi Arabia's largest oil field, forcing the kingdom to cut its oil output in...Marketsread more
Trusii's hydrogen water machines were supposed to help users with their health problems, but customers claim the company is involved in a giant scam.Technologyread more
The decoupling of the world's two weightiest economies seems as inescapable as its extent and global impact remains incalculable.Politicsread more
The trucking industry is worth hundreds of billions of dollars per year. Uber is going after this market with Uber Freight, an online platform that matches truckers with...Technologyread more
BlackBerry has reinvented itself to become a leader in securing mobile communications and in embedded communications. Next year it plans to roll out new products. CEO John...Evolveread more
Trailers have become a cult phenomenon. Even short teasers that reveal little about the plot of the upcoming film are headline-worthy. Blogs and forums have become devoted...Entertainmentread more
Thanks to the performance of Beyond Meat, investors who focus on venture-backed tech IPOs have done well this year despite some notable disappointments.Technologyread more
Software company Intuit, maker of tax helper TurboTax, is in its eleventh year of stock gains and up 36% this year.Investingread more
CNBC did a deep dive through the most recent Wall Street research to find stocks with upside potential.Marketsread more
The benchmark 10-year Treasury note yield tested 1.5% in late August and early September, bouncing off that level and most recently trading around 1.8%. However, another...Marketsread more
Despite a cyber-warfare truce, one defense analyst said China is probably still engaged in the theft of sensitive U.S. military technology. Hacking over the years is one of the reasons China has been able to narrow the gap with the U.S. in advanced missiles, drone technology and even stealth aircraft.
Also, a report predicts that by 2030 the Chinese could dominate artificial intelligence and exploit it for military purposes.
For example, when China wanted to build the J-20, a new stealth fighter jet, they were reportedly helped by industrial espionage. The J-20 became operational in September.
There were said to be several prototypes of the plane, but the final sleek design resembles the F-22, a stealth fighter made by Lockheed Martin. China's smaller stealth fighter, called the FC-31 Gyrfalcon, in development is seen as a knockoff of Lockheed's F-35.
"What Beijing has been very good at is targeting U.S. defense contractors, getting into their computer systems through various types of essentially cyber warfare and stealing the designs of some of America's best military assets," said Harry Kazianis, director of defense studies at the Center for the National Interest, a think tank founded by former President Richard Nixon.
Although a U.S.-Chinese cyber-hacking truce was announced in 2015, Kazianis and others remain skeptical it will matter over the long term. He says China could have agents in other countries still doing hacking or "camouflage" such activity through various methods.
"So we don't even have a good idea if they stopped," he said. "It's obviously a huge, huge problem."
According to Kazianis, the Chinese have been able to hack into computer networks to steal designs and other information on U.S. carriers, advanced defense systems as well as the F-22 and F-35 jets.
Indeed, a federal grand jury in 2014 indicted a Chinese national for a computer hacking scheme that involved the theft of trade secrets from Boeing's C-17 military transport aircraft. The individual, who last year entered a guilty plea, also was accused of working with two co-conspirators based in China to steal military data about the F-22 and F-35 jets.
The concern is China's supersonic J-20 could one day become a threat to the F-22 and the smaller F-35 fighters.
The Center for Strategic and International Studies, a think tank based in Washington, said Beijing's "J-20 has the potential to considerably enhance China's regional military strength."
For one, the J-20's could give China an advantage should it want to use the warplane in a dogfight with the U.S. or allies. Also, depending on its stealth capabilities, the J-20 could be used for strikes on Taiwan or U.S. airbases.
Then again, the J-20's design may make it susceptible to detection. It features angles that allow it to deflect radar emissions from the front but reports suggest its signature reduction falls short elsewhere. Portions of the J-20's engines also "may work against its stealth capabilities," according to CSIS.
"Almost every fighter in the world has some kind of emissions that come out with radar or communications devices just like radios that we can detect," said John "JV" Venable, a senior research fellow for defense policy at the Heritage Foundation, a Washington conservative think tank. "When we can pick those [emissions] up, then we can actually find, fix and kill that fighter."
Venable, a retired Air Force colonel, said the U.S. military's ability to "mask emissions is very good, and our ability to detect is very good. We just don't know what theirs is [with the J-20]."