Paul Mozur,

Paul Mozur is a global technology correspondent based in Taipei who has written about technology and politics in Asia from Hong Kong, Shanghai, and Seoul. He was part of the team that won the 2021 Pulitzer Prize for public service for coverage of the coronavirus pandemic. Since joining The New York Times in 2014, he has covered China's tech boom, the geopolitics of semiconductors, online disinformation in Myanmar aiding a genocide, Russian censorship, and the global spread and abuse of AI-powered surveillance technologies in western China, South America, and the Middle East. Before The Times, he worked at The Wall Street Journal and The Standard. He grew up in Pennsylvania, graduated from Dartmouth College with a double major in English literature and East Asian studies, and has lived or studied in Taiwan, Hong Kong, Shanghai, Seoul, Myanmar (Burma), Malaysia, Singapore, Since joining The New York Times in 2014 as a global technology correspondent based in Taipei, Paul Mozur has covered China's tech boom and the geopolitics of semiconductors. He was part of the team that won the 2021 Pulitzer Prize for public service for coverage of the coronavirus pandemic. Mozur has also written about online disinformation in Myanmar aiding a genocide, Russian censorship, and the global spread and abuse of AI-powered surveillance technologies in western China, South America, and the Middle East. Before joining The Times, he worked at The Wall Street Journal and The Standard. Mozur grew up in Pennsylvania, Before joining The New York Times in 2014 as a global technology correspondent based in Taipei, Paul Mozur covered technology and politics in Asia from Hong Kong, Shanghai, and Seoul. He was part of the team that won the 2021 Pulitzer Prize for public service for coverage of the coronavirus pandemic. Since joining The Times, he has written about China's tech boom, the geopolitics of semiconductors, online disinformation in Myanmar aiding a genocide, russian censorship, and the global spread and abuse of AI-powered surveillance technologies in western China, South America, and the Middle East. Before The Times, he worked at The Wall Street Journal and The Standard. He grew up in Pennsylvania and graduated from Dartmouth College with a double major in English literature and East Asian studies.

78%

The Daily's Verdict

This author has a mixed reputation for journalistic standards. It is advisable to fact-check, scrutinize for bias, and check for conflicts of interest before relying on the author's reporting.

Bias

86%

Examples:

  • The author implies that these hackers are only targeting foreign governments and telecommunications firms when in fact they may be targeting other countries' domestic populations.
  • The author implies that these hackers are only working on behalf of Chinese law enforcement and its premier spy agency when in fact they may be working for private companies.
  • The author uses language that dehumanizes and demonizes China's hackers for hire by referring to them as 'secretive world.'
  • The author uses language that portrays these hackers as being unethical and immoral by referring to their work as 'cyberespionage operations.',

Conflicts of Interest

75%

Examples:

  • The author implies that these hackers are only targeting foreign governments and telecommunications firms when in fact they may be targeting other countries' domestic populations.
  • The author implies that these hackers are only working on behalf of Chinese law enforcement and its premier spy agency when in fact they may be working for private companies.

Contradictions

86%

Examples:

  • Employees complained about low pay and hoped to get jobs at other companies such as Qi An Xin.
  • I-Soon is a company that contracts for many PRC agencies, including the Ministry of Public Security, Ministry of State Security, and People's Liberation Army.
  • One soldier named Ajax reported that Starlink shut down just before Russian attacks.
  • Starlink became extremely slow for Ukrainian soldiers earlier this month.
  • Victim data and targeting lists show a company that competes for low-value hacking contracts from many government agencies.

Deceptions

75%

Examples:

  • The article states that China has increasingly turned to private companies in campaigns to hack foreign governments and control its domestic population. However, it does not provide any evidence or context for this claim.

Recent Articles

Russian Forces' Illicit Acquisition of Starlink Terminals: An Ongoing Threat to Ukraine's Military Communications

Russian Forces' Illicit Acquisition of Starlink Terminals: An Ongoing Threat to Ukraine's Military Communications

Broke On: Wednesday, 01 May 2024 Russian forces illegally acquire Starlink terminals in Ukraine, disrupting the Ukrainian military's use of the satellite-based broadband system. The Pentagon and SpaceX collaborate to identify and turn off these terminals, but Russia continues purchasing more. Starlink is a critical resource for Ukraine's military communication, intelligence gathering, and drone strikes. Disruptions pose a significant threat to Ukraine's frontline connectivity and outmaneuvering capabilities.
Microsoft's $1.5 Billion Investment in Emirati AI Company G42: A Strategic Move Against China's Influence

Microsoft's $1.5 Billion Investment in Emirati AI Company G42: A Strategic Move Against China's Influence

Broke On: Tuesday, 16 April 2024 Microsoft invests $1.5 billion in Emirati AI company G42, marking a strategic move to counter China's influence and protect US intellectual property. With Microsoft President Brad Smith joining G42's board and the company leveraging Azure cloud platform for AI endeavors, this deal could set a precedent for US firms in the Gulf region and boost UAE as a tech hub.
Exclusive Look into China's Massive International Hacking Efforts Revealed by Data Leak from State-Backed Hacker Firm iSoon

Exclusive Look into China's Massive International Hacking Efforts Revealed by Data Leak from State-Backed Hacker Firm iSoon

Broke On: Friday, 16 February 2024 A massive data leak from a Chinese state-backed hacking group has revealed that China's intelligence and military groups have been exploiting vulnerabilities in software systems from companies including Microsoft, Apple, and Google to carry out large-scale cyber intrusions against foreign governments, companies, and infrastructure. The leaked documents detail contracts to extract data over eight years targeting at least 20 foreign governments and territories such as India, Hong Kong, Thailand etc. iSoon or Auxun offered a menu of services ranging from $15k for access to private police website in Vietnam to $278k for software that ran disinformation campaigns and hacked accounts on X platform.