{"id":57945,"date":"2020-07-31T06:00:05","date_gmt":"2020-07-30T20:00:05","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=57945"},"modified":"2020-08-01T06:59:40","modified_gmt":"2020-07-31T20:59:40","slug":"chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/","title":{"rendered":"China\u2019s cyber espionage surge in Australia: opportunism not punishment"},"content":{"rendered":"
<\/figure>\n

One of the theories floated about China\u2019s recent cyber espionage campaign<\/a>\u00a0against Australia is that it\u2019s being used to punish us for banning Huawei from our future 5G networks and for introducing laws to combat foreign interference. Some in the UK expressed similar fears<\/a> after the government\u2019s decision<\/a> to remove Huawei from the country\u2019s telecommunications networks. But this cyber-operations-as-punishment theory is probably not correct. Although there has been a sustained increase in cyber activity targeting Australia<\/a>, the Chinese state is not trying to punish us, or, if it is, it\u2019s a misguided application of state power. If punishing Australia is a key foreign policy goal for Beijing, there are far cheaper and more effective ways to do that.<\/p>\n

Historically, China\u2019s cyber espionage targets have been closely aligned with its strategic technology goals. In addition to spying on governments and militaries\u2014which many, if not all, countries do\u2014the Chinese state has used cyber espionage to steal commercial intellectual property to further its technology goals. Recent Western victims of Chinese commercial intellectual property theft have often been in the technology sectors that feature in Beijing\u2019s \u2018Made in China 2025<\/a>\u2019 strategy, including next-generation information technology, biotechnology, advanced manufacturing and environmental technologies.<\/p>\n

One well-documented example<\/a> shows<\/a> that the Jiangsu bureau of the China\u2019s Ministry of State Security<\/a> carried out a multi-year combined cyber espionage and intelligence-gathering campaign to steal technology used in making components for the domestic airliner<\/a> being built by the Chinese state\u2013owned aerospace company Comac. This reportedly included successful compromises of companies such as Ametek, Honeywell, Safran, Capstone Turbine and General Electric, each of which makes jetliner parts.<\/p>\n

Technology acquisition is not merely a secondary priority for the Chinese state. Technology directly addresses a key Chinese Communist Party concern<\/a>\u2014the possibility of domestic unrest. By providing economic growth, and hence jobs and prosperity, technology acquisition reduces unemployment and discontent and therefore the risk of political instability.<\/p>\n

Although China\u2019s cyber espionage operations occur on a massive scale, they are still specialist capabilities and, crucially, they have large opportunity costs. Every hacker, unit, operation or campaign devoted to punishing Australia is effort diverted from addressing other key intelligence priorities, whether they be internal security matters (such as surveilling the Uyghur community<\/a> or keeping tabs on domestic dissidents and the Hong Kong protest movement), external matters (such as monitoring international progress on Covid-19 treatments and vaccines), or normal military and government intelligence matters (such as those stemming from escalating tensions with the US).<\/p>\n

In the midst of the Covid-19 pandemic that has cruelled the global economy, China is suffering its first economic contraction in 40 years<\/a>. Given that Beijing is also responding to a combative and unpredictable US leadership while dealing with multiple challenges, including domestic perceptions of its own handling of the Covid-19 crisis, the current moment seems an unlikely time for \u2018punishing Australia\u2019 to be a key intelligence priority.<\/p>\n

These circumstances also point to other, more plausible reasons for the increased activity that the Australian government has observed. It could be that the Chinese government, facing tremendous economic pressure during the Covid-19 pandemic, has altered its intelligence priorities and its collection agencies are scrambling to refocus their efforts. This could, for example, include a new focus on Covid-19 vaccine and treatment research<\/a>. Another possibility is that the intelligence agencies are scrambling to take advantage of the heightened emotions surrounding the pandemic that provide fertile opportunities to use Covid-related themes<\/a> for phishing attacks as fear and urgency override caution.<\/p>\n

Using cyber espionage as punishment is also not a very clear or direct form of signalling. For the Australian government to understand the message, it would have to combine and correlate hundreds or thousands of potentially unrelated hacking incidents into what could be described as a \u2018campaign\u2019, track this campaign and assemble clues to determine the responsible party, and then apply professional judgement on the assembled data to ascribe a motive.<\/p>\n

The Australian government has done the analytic work to convert incidents into a coherent campaign, but how exactly are officials meant to interpret a broad-based and widespread hacking campaign as punishment?<\/p>\n

The process from our being hacked to the government understanding that we are being punished is simply too long and indirect\u2014effective signalling should be clear, specific and timely, and using cyber operations as punishment is none of those.<\/p>\n

In contrast, economic coercion\u2014whether the leverage is import restrictions on commodities such barley<\/a>, beef<\/a> and coal<\/a>, the threat to reduce Chinese student numbers<\/a> in Australia, or even a potential Chinese consumer boycott<\/a> of Australian products\u2014sends a very clear message that the Australian polity receives loud and clear. Because these forms of economic coercion are overt, they have the additional benefit of mobilising interest<\/a> groups<\/a> to lobby government to \u2018fix\u2019 the China relationship. This approach has a huge advantage over covert cyber operations.<\/p>\n

Public forms of economic coercion can, from a CCP point of view, be cheap or even costless. Threats to reduce student numbers, for example, cost nothing when international travel is extremely limited due to the pandemic. Similarly, the threat of a consumer boycott costs nothing to the Chinese government, and costs Chinese consumers only if it actually takes place.<\/p>\n

Cyber operations have large opportunity costs and their typically covert nature means that they\u2019re not well suited for punishment or deterrence. It is possible that Beijing is trying to punish us with cyber operations; not all actors in cyberspace are rational. But without firm evidence we shouldn\u2019t uncritically accept this theory as it could blind us to the real motives of Chinese intelligence agencies.<\/p>\n","protected":false},"excerpt":{"rendered":"

One of the theories floated about China\u2019s recent cyber espionage campaign\u00a0against Australia is that it\u2019s being used to punish us for banning Huawei from our future 5G networks and for introducing laws to combat foreign …<\/p>\n","protected":false},"author":618,"featured_media":57952,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[2212,1383,749],"class_list":["post-57945","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australia-china-relations","tag-ccp","tag-cyber-espionage"],"acf":[],"yoast_head":"\nChina\u2019s cyber espionage surge in Australia: opportunism not punishment | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"China\u2019s cyber espionage surge in Australia: opportunism not punishment | The Strategist\" \/>\n<meta property=\"og:description\" content=\"One of the theories floated about China\u2019s recent cyber espionage campaign\u00a0against Australia is that it\u2019s being used to punish us for banning Huawei from our future 5G networks and for introducing laws to combat foreign ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-30T20:00:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-31T20:59:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-1072225652-e1596097305557.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"599\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Uren\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Uren\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-1072225652-e1596097305557.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-1072225652-e1596097305557.jpg\",\"width\":900,\"height\":599,\"caption\":\"Binary code symbols are seen on a laptop screen in this photo illustration on October 15, 2018 in Warsaw, Poland. (Photo by Jaap Arriens\/NurPhoto via Getty Images)\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/\",\"name\":\"China\u2019s cyber espionage surge in Australia: opportunism not punishment | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/#primaryimage\"},\"datePublished\":\"2020-07-30T20:00:05+00:00\",\"dateModified\":\"2020-07-31T20:59:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b143103fc9b3a4ae0d5e4b22c5eba93a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"China\u2019s cyber espionage surge in Australia: opportunism not punishment\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b143103fc9b3a4ae0d5e4b22c5eba93a\",\"name\":\"Tom Uren\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/216436cb30ac616a4eacffdffe5ff739?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/216436cb30ac616a4eacffdffe5ff739?s=96&d=mm&r=g\",\"caption\":\"Tom Uren\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/thomas-uren\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"China\u2019s cyber espionage surge in Australia: opportunism not punishment | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/","og_locale":"en_US","og_type":"article","og_title":"China\u2019s cyber espionage surge in Australia: opportunism not punishment | The Strategist","og_description":"One of the theories floated about China\u2019s recent cyber espionage campaign\u00a0against Australia is that it\u2019s being used to punish us for banning Huawei from our future 5G networks and for introducing laws to combat foreign ...","og_url":"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2020-07-30T20:00:05+00:00","article_modified_time":"2020-07-31T20:59:40+00:00","og_image":[{"width":900,"height":599,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-1072225652-e1596097305557.jpg","type":"image\/jpeg"}],"author":"Tom Uren","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Tom Uren","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-1072225652-e1596097305557.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-1072225652-e1596097305557.jpg","width":900,"height":599,"caption":"Binary code symbols are seen on a laptop screen in this photo illustration on October 15, 2018 in Warsaw, Poland. (Photo by Jaap Arriens\/NurPhoto via Getty Images)"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/","url":"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/","name":"China\u2019s cyber espionage surge in Australia: opportunism not punishment | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/#primaryimage"},"datePublished":"2020-07-30T20:00:05+00:00","dateModified":"2020-07-31T20:59:40+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b143103fc9b3a4ae0d5e4b22c5eba93a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"China\u2019s cyber espionage surge in Australia: opportunism not punishment"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b143103fc9b3a4ae0d5e4b22c5eba93a","name":"Tom Uren","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/216436cb30ac616a4eacffdffe5ff739?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/216436cb30ac616a4eacffdffe5ff739?s=96&d=mm&r=g","caption":"Tom Uren"},"url":"https:\/\/www.aspistrategist.ru\/author\/thomas-uren\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/57945"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/618"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=57945"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/57945\/revisions"}],"predecessor-version":[{"id":57968,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/57945\/revisions\/57968"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/57952"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=57945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=57945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=57945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}