{"id":13950,"date":"2014-05-21T13:00:55","date_gmt":"2014-05-21T03:00:55","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=13950"},"modified":"2014-05-23T05:27:41","modified_gmt":"2014-05-22T19:27:41","slug":"enough-is-enough-united-states-v-chinese-hackers","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/","title":{"rendered":"\u2018Enough is enough\u2019: United States v Chinese hackers"},"content":{"rendered":"

\"FBI<\/a><\/p>\n

Earlier this week, the US Department of Justice indicted<\/a> five People\u2019s Liberation Army officials for hacking into the computers of US companies to steal trade secrets. The indictment alleges that the PLA Five<\/a> stole information that would be useful to the companies\u2019 competitors in China, including state-owned enterprises (SOEs). This is a significant development, as the US is directly accusing China of stealing information and using it to undermine the competitiveness of US companies. The charges signal that the US sees the theft of intellectual property as a national security threat and is resolved to hold those responsible to account. It also reaffirms a distinction the US makes between spying for profit, which is wrong, and spying for political purposes, which is acceptable. \u00a0Ultimately, the indictment is aimed at influencing China\u2019s behaviour in cyberspace. It\u2019s unlikely to prove effective.<\/p>\n

The fifty-six page indictment<\/a> (PDF) is backed by substantial evidence and describes the methods and motives behind the hacks. In the case of nuclear power plant manufacturer Westinghouse, the company was negotiating in 2010 to build four power plants in China when conspirator Sun Kailiang stole design specifications for pipes, pipe supports, and pipe routing. That information would enable a Chinese competitor looking to build a similar plant to save on research and development costs. In a global market that injures Westinghouse\u2019s competitiveness and, consequentially, weakens the US economy.<\/p>\n

The economic cost of cyber attacks to the US has been estimated<\/a> to range up to a hundred billion dollars, and the US needs to find ways to stem the steady theft of information. \u2018Our economic security and our ability to compete fairly in the global marketplace are directly linked to our national security\u2019 said<\/a> US Attorney General Eric Holder. His call for an \u2018aggressive response\u2019 has been echoed by other testimonies. \u2018Cyber theft impacts real people, in real and painful ways. The lifeblood of any organization is the people who work, and sweat for it’,\u00a0said<\/a> the chief prosecutor in Western Pennsylvania, David Hickton. In short, the US is saying \u2018enough is enough\u2019.<\/p>\n

China is also calling enough\u2014enough of US hypocrisy. The US action has already prompted retribution from Beijing. \u2018The Chinese military have never engaged in cyber theft of trade secrets\u2019, and the indictment is \u2018ungrounded and absurd\u2019 <\/span>said<\/a> Foreign Ministry spokesman Qin Gang. In response to the charges, China has <\/span>summoned<\/a> the US ambassador for \u2018solemn representation\u2019, and <\/span>suspended<\/a> activities of the China-US cyber working group. China has also been quick to censure the US about its own cyber-espionage activities, with one <\/span>article<\/a> on <\/span>Xinhua<\/i> yesterday accusing the US of hosting a range of cyber attacks.<\/span><\/p>\n

In announcing the indictment, the US has further complicated tense US-China cyber relations and risked the reputations of major US companies like Alcoa and US Steel by exposing attacks publicly. But there are advantages for the US in doing so, as it shows resolve in an attempt to influence China\u2019s behaviour in cyberspace. The underlying message from the US is twofold.<\/p>\n

The first message is that the US has elevated state-sponsored economic espionage from a diplomatic talking point to an actual crime. True, the prospect of the accused being brought to trial is next to nil. But the US hopes to signal to China that by conducting systemic illegal attacks, it takes an increased risk\u2014that is no longer deniable\u2014and that the US can, and will, hold China responsible.<\/p>\n

The second message is about doing business with Chinese SOEs such as Chinalco and Baosteel. Clear links between Chinese military intelligence and state-owned enterprise are established in the indictment. Companies that are in negotiations with SOEs may find cause for a pause in their relationships. Chinese companies are likely to find themselves under greater pressure to limit government ties that undermine their international credibility. In turn, business pressure may cause China to limit the scope of its cyberespionage activities if those are seen as threatening commercial opportunities.<\/p>\n

Whether, and to what degree, the indictment is able to influence China\u2019s behaviour remains to be seen. But the move signals a determination on the part of the US to step out of the bilateral cybersecurity stasis. Evidence in the report shows straight-faced deniability is no longer the smoke screen it once was. The indictment will give China pause for reflection. It may, ultimately, limit its attacks. Alternatively, China may become more advanced in its methods, or more selective in its targets. Or it might simply ignore the US clamour altogether. China has much to gain from continuing its attacks\u2014indictment or not, spying for profit in China has its own national security rationale.<\/p>\n

Simon Hansen is an intern in ASPI’s International Cyber Policy Centre. Image courtesy of the FBI<\/a>.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Earlier this week, the US Department of Justice indicted five People\u2019s Liberation Army officials for hacking into the computers of US companies to steal trade secrets. The indictment alleges that the PLA Five stole information …<\/p>\n","protected":false},"author":214,"featured_media":13951,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[52,169,749,713,728,31],"class_list":["post-13950","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-china","tag-cyber-crime","tag-cyber-espionage","tag-cyberattack","tag-hacking","tag-united-states"],"acf":[],"yoast_head":"\n\u2018Enough is enough\u2019: United States v Chinese hackers | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018Enough is enough\u2019: United States v Chinese hackers | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Earlier this week, the US Department of Justice indicted five People\u2019s Liberation Army officials for hacking into the computers of US companies to steal trade secrets. The indictment alleges that the PLA Five stole information ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-21T03:00:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-05-22T19:27:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/05\/FBI-wanted-enlarged.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1050\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Hansen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Hansen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/05\/FBI-wanted-enlarged.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/05\/FBI-wanted-enlarged.jpg\",\"width\":1050,\"height\":369},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/\",\"name\":\"\u2018Enough is enough\u2019: United States v Chinese hackers | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/#primaryimage\"},\"datePublished\":\"2014-05-21T03:00:55+00:00\",\"dateModified\":\"2014-05-22T19:27:41+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u2018Enough is enough\u2019: United States v Chinese hackers\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\",\"name\":\"Simon Hansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"caption\":\"Simon Hansen\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u2018Enough is enough\u2019: United States v Chinese hackers | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/","og_locale":"en_US","og_type":"article","og_title":"\u2018Enough is enough\u2019: United States v Chinese hackers | The Strategist","og_description":"Earlier this week, the US Department of Justice indicted five People\u2019s Liberation Army officials for hacking into the computers of US companies to steal trade secrets. The indictment alleges that the PLA Five stole information ...","og_url":"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-05-21T03:00:55+00:00","article_modified_time":"2014-05-22T19:27:41+00:00","og_image":[{"width":1050,"height":369,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/05\/FBI-wanted-enlarged.jpg","type":"image\/jpeg"}],"author":"Simon Hansen","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Simon Hansen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/05\/FBI-wanted-enlarged.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/05\/FBI-wanted-enlarged.jpg","width":1050,"height":369},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/","url":"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/","name":"\u2018Enough is enough\u2019: United States v Chinese hackers | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/#primaryimage"},"datePublished":"2014-05-21T03:00:55+00:00","dateModified":"2014-05-22T19:27:41+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/enough-is-enough-united-states-v-chinese-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"\u2018Enough is enough\u2019: United States v Chinese hackers"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a","name":"Simon Hansen","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","caption":"Simon Hansen"},"url":"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13950"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=13950"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13950\/revisions"}],"predecessor-version":[{"id":14002,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13950\/revisions\/14002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/13951"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=13950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=13950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=13950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}