News / USA

Hacking: Not Just China

Part of the building of 'Unit 61398', a secretive Chinese military unit believed to be behind a series of hacking attacks, is seen in the outskirts of Shanghai, February 19, 2013. Part of the building of 'Unit 61398', a secretive Chinese military unit believed to be behind a series of hacking attacks, is seen in the outskirts of Shanghai, February 19, 2013.
Part of the building of 'Unit 61398', a secretive Chinese military unit believed to be behind a series of hacking attacks, is seen in the outskirts of Shanghai, February 19, 2013.
Part of the building of 'Unit 61398', a secretive Chinese military unit believed to be behind a series of hacking attacks, is seen in the outskirts of Shanghai, February 19, 2013.
Computer hacking by the Chinese has been causing a stir in recent weeks, but experts warn that focusing too much on Beijing could open the door to cyber spies from other countries the U.S. government is monitoring.

For example, the most recent National Intelligence Estimate, a classified document said to represent a consensus view of the U.S. intelligence community, named Russia, Israel and France, in addition to China, as leading countries engaged in hacking against U.S. targets for economic gain.

“In my opinion, while China is getting, and may even deserve, the lion’s share of the attention, they are not the only ones dabbling in cyber mischief,” said Christopher Burgess, author of Secrets Stolen, Fortunes Lost, Preventing Economic Espionage and Intellectual Property Theft in the 21st Century.

Narrowly focusing on China can have negative consequences, says Jeffrey Carr, founder and CEO of Taia Group, a cybersecurity firm, who wrote a blog post critical of a recent, and oft-cited study by the computer security firm, Mandiant, that focused on China’s hacking capabilities.

Carr said always blaming China, could cause “unnecessary ramping up of tensions” between the two rivals. He also said a narrow focus on China gives an “inaccurate picture of the global threat landscape, which leads to poor defense planning.” Finally, he said, too much emphasis on China could give “companies a false sense of security when they operate in countries besides China.”

Russia, for example, reportedly pulled off two very high-profile cyber attacks in recent years. In 2007, after a row with Estonia, cyber attacks said to be from Russia shut down Estonian government, media and financial computers. In 2008, during the South Ossetia War, Georgian computers faced similar attacks. The two incidents were enough for the U.S. Army to commission a paper analyzing the Russian cyber threat.

Late last year, Iran was seen as the likely culprit in a cyber attack on the Saudi oil industry, which brought down computers and even affected some U.S. financial institutions. In the wake of the attack, U.S Defense Secretary Leon Panetta warned of a “cyber Pearl Harbor.”

Iran also has been the victim of cyber attack. It is widely believed the U.S. and Israel were behind the so-called Stuxnet worm that damaged key components of Iran’s nuclear facilities.

The U.S. also was accused of hacking into the Elysée Palace computers in May of last year just before François Hollande succeeded Nicolas Sarkozy as president of France. The U.S. denied the charges.

Massive, Noisy, Familiar

The cost of cybercrime is a hotly debated topic, but there’s no doubt it costs the U.S. economy billions. And while other countries may be more discreet in their hacking activities, China appears to be comfortable conducting at least some of their cyber espionage in what experts call a “noisy” manner, meaning they’re not careful to cover their footprints.

Matthew Aid, an intelligence historian, said the Chinese have operated over the past decade “as if they don't care who knows what they are doing,” which he says probably represents the mindset of the generals who run the cyber espionage programs.

“This may, in part, be a reflection of the enormous pressure the Chinese intelligence 'mandarins' have been under from their political masters in Beijing to produce all of the commercial data needed to push forward the Chinese economy and spot opportunities for growth outside of China,” he said. “The Chinese perhaps calculated that the U.S. and other western nations would not do anything about their spying activities because of China's enormous new economic power on the world stage and Washington's need for Chinese cooperation on global issues like North Korea and Iran.”

Because Chinese cyber espionage can be noisy and easily discovered, experts say at least some of China’s activities in cyberspace are easy to understand because they’re familiar and persistent.

“I think in terms of sheer volume [China’s threat] is not an exaggeration, but it’s too simplistic,” said Aid. “It’s easy to make the Chinese the bogeyman. We know a great deal more about them, but we know so much less about Russia, Israel, France and Iran.”

It’s possible, Aid added, that Russia in particular may be even more successful than the Chinese because “they’ve been able to remain secret and covert.”

And while China is certainly on everyone’s mind now, Burgess said governments and corporations need to realize that a cyber threat can come from anywhere.
“The prudent strategy is prepare for all who may attack your infrastructure and be pleasantly surprised when they don't, and prepared if they do,” he said.

He also added that China’s noise is likely masking more sophisticated, quiet efforts.

Badge of Honor

It used to be a stigma for a U.S. company to be hacked by China, but as China’s stature has risen, more and more companies are coming forward claiming they’ve been hacked by the Chinese as some kind of badge of honor.

Recently, many U.S. media outlets, including the New York Times, Wall Street Journal, Bloomberg and the Washington Post, have all claimed to have been hacked by the Chinese.

Carr relates the story of a client whose company was hacked by the Chinese.

The company computers were infiltrated, he said, after an executive visited China and returned to the U.S. The hack was cleaned up, but the executive went back to China, this time with a clean laptop.

“That was breached when he was asleep in his hotel room,” Carr said. “One of the executives for the company later said ‘our work has never been in the limelight. We’ve gotten some kind of status. All of a sudden, we matter.’”

Carr said that kind of thinking struck him as “weird.”

“If you had your choice of being hacked by Slovakia or China, the latter is much more interesting,” he said.

Nothing new

China’s aims are nothing new, says Burgess, citing the 863 Program, created by China in March of 1986 with the goal of identifying needed technologies -- and either developing them domestically or, as a 2011 report by the National Counterintelligence Executive said, “to clandestinely acquire U.S. technology and sensitive economic information.”

Aid said China has become “reasonably good at producing on a Detroit-style mass production basis vast amounts of foreign economic intelligence information by exploiting weaknesses in computer software and security systems.”

”You cannot measure the success or failure of Chinese espionage by our standards,” he said. “You have to try to put yourself in the shoes of the Chinese political leadership in Beijing, who perhaps feel that they have a narrow window of opportunity to work with, and who still fear the U.S. is still a substantial military power in East Asia, and the recent trends of pivoting U.S. national security strategy away from South Asia towards East Asia.”

Cover, for Now

Not only does China engage in massive cyber espionage, but the scale of it could very well allow other states to conduct their own spying behind the Chinese flag. In the short term, China may very well be doing Israel, France, Russia and, to a lesser extent, Iran, a favor.

“China is the best cover there is in the world for acts of cyber espionage,” said Carr. “Every foreign intelligence service should set up a front business in Shanghai or Beijing for that very reason.”

According to Burgess, a would-be cyber thief would not even have to physically be in China.

“I can make that connection bounce all over the world and you’re not going to be able to pinpoint where I’m coming from,” he said. “I can be sitting in Munich and make it look like like I’m in Beijing.”

Carr wondered why other states active in cyber espionage are never caught.

“It's not because they do it less, or because China is incompetent at it,” he said. “It could be because they are using China for cover. It could be because the Chinese government isn't involved at all; that it is the work of professional hacker crews who are Chinese, Eastern European, Brazilian, etc. and who then sell the information to China and/or other nation states. How is it that they’ve never one time discovered Russia, France or Israel doing these things? How can that happen, statistically speaking. I don’t understand.”

Over the long term, there could, however, be a silver lining to the Chinese cyber espionage story.

“The Chinese have done us a great service by making plain the nature and extent of the cyber threat that the U.S. and its allies face from countries such as, but not limited to, China,” said Aid. “With recognition of the threat comes the inevitable move to strengthen our cyber defenses, which not only will inevitably strangle off many of the most productive cyber targets that the Chinese have been exploiting, but also in the process kill off many of the targets in the U.S., Europe and Japan that Russia, France, and Israel have been more secretly monitoring for their own intelligence purposes.

“In effect,” Carr concluded, “the Chinese have queered the pitch for all the other nations that were quietly using cyber espionage to gather needed economic and political intelligence on the U.S. and its allies.”

You May Like

Video Americans, Tourists, Reflect on Meaning of Thanksgiving

VOA garnered opinions from several people soon after November 13 Paris attacks, which colored many of their thoughts

Video Thais Send Security Concerns Down the River

In northern Thailand, the annual tradition of constructing floating baskets to carry away the year’s bad spirits highlights the Loy Krathong festival

Video Tree Houses - A Branch of American Dream

Workshops aimed at teaching people how to build tree houses have become widely popular in America in recent years

This forum has been closed.
Comment Sorting
by: WoW from: USA
February 22, 2013 11:30 AM
Wow! One of very few intelligent views on the subject! China's information security and IT aren't as mature as more developed countries. The systems there can be hacked relatively simply. If you talk to the people there, you'd know how much they hate hacking and most of them have bad experiences with it. China has lots of college students with a lot of free time. It will definitely be a fertile ground for hacking.

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Belgium-Germany Border Remains Porous, Even As Manhunt For Paris Attacker Continuesi
Ayesha Tanzeem
November 25, 2015 10:46 PM
One of the suspected gunmen in the Nov. 13 Paris attacks, Salah Abdeslam, evaded law enforcement, made his way to Belgium, and is now believed to have fled to Germany. VOA correspondent Ayesha Tanzeem makes the journey across the border from Belgium into Germany to see how porous the borders really are.

Video Belgium-Germany Border Remains Porous, Even As Manhunt For Paris Attacker Continues

One of the suspected gunmen in the Nov. 13 Paris attacks, Salah Abdeslam, evaded law enforcement, made his way to Belgium, and is now believed to have fled to Germany. VOA correspondent Ayesha Tanzeem makes the journey across the border from Belgium into Germany to see how porous the borders really are.

Video Islamic State Unfazed by Losses in Iraq, Syria

Progress in the U.S.-led effort to beat Islamic State on its home turf in Iraq and Syria has led some to speculate the terror group may be growing desperate. But counterterror officials say that is not the case, and warn the recent spate of terror attacks is merely part of the group’s evolution. VOA National Security correspondent Jeff Seldin has more.

Video Taiwan Looks for Role in South China Sea Dispute

The Taiwanese government is one of several that claims territory in the hotly contested South China Sea, but Taipei has long been sidelined in the dispute, overshadowed by China. Now, as the Philippines challenges Beijing’s claims in an international court at The Hague, Taipei is looking to publicly assert its claims. VOA’s Bill Ide has more from Beijing.

Video Syrian Refugees in US Express Concern for Those Left Behind

Syrian immigrants in the United States are concerned about the negative tide of public opinion and the politicians who want to block a U.S. plan to accept 10,000 Syrian refugees. Zlatica Hoke reports many Americans are fighting to dispel suspicions linking refugees to terrorists.

Video After Paris Attacks, France Steps Up Fight Against IS

The November 13 Paris attacks have drawn increased attention to Syria, where many of the suspected perpetrators are said to have received training. French President Francois Hollande is working to build a broad international coalition to defeat Islamic State in Syria and in Iraq. Zlatica Hoke reports.

Video US, Cambodian Navies Pair Up in Gulf of Thailand

The U.S. Navy has deployed one of its newest and most advanced ships to Cambodia to conduct joint training drills in the Gulf of Thailand. Riding hull-to-hull with Cambodian ships, the seamen of the USS Fort Worth are executing joint-training drills that will help build relations in Southeast Asia. David Boyle reports for VOA from Preah Sihanouk province.

Video Americans Sharpen Focus on Terrorism

Washington will be quieter than usual this week due to the Thanksgiving holiday, even as Americans across the nation register heightened concerns over possible terrorist threats. VOA’s Michael Bowman reports new polling data from ABC News and the Washington Post newspaper show an electorate increasingly focused on security issues after the deadly Islamic State attacks in Paris.

Video World Leaders Head to Paris for Climate Deal

Heads of state from nearly 80 countries are heading to Paris (November 30-December 11) to craft a global climate change agreement. The new accord will replace the Kyoto Protocol on Climate Change that expired in 2012.

Video Uncertain Future for Syrian Refugee Resettlement in Illinois

For the trickle of Syrian refugees finding new homes in the Midwest city of Chicago, the call to end resettlement in many U.S. states is adding another dimension to their long journey fleeing war. Organizations working to help them integrate say the backlash since the Paris attacks is both harming and helping their efforts to provide refugees sanctuary. VOA's Kane Farabaugh reports.

Video Creating Physical Virtual Reality With Tiny Drones

As many computer gamers know, virtual reality is a three-dimensional picture, projected inside special googles. It can fool your brain into thinking the computer world is the real world. But If you try to touch it, it’s not there. Now Canadian researchers say it may be possible to create a physical virtual reality using tiny drones. VOA’s George Putic reports.

Video New American Indian Village Takes Visitors Back in Time

There is precious little opportunity to experience what life was like in the United States before its colonization by European settlers. Now, an American Indian village built in a park outside Washington is taking visitors back in time to experience the way of life of America's indigenous people. Carol Pearson narrates this report from VOA's June Soh.

Video Even With Hometown Liberated, Yazidi Refugees Fear Return

While the northern Iraqi town of Sinjar has been liberated from Islamic State forces, it's not clear whether Yazidi residents who fled the militants will now return home. VOA’s Mahmut Bozarslan talked with Yazidis, a religious and ethnic minority, at a Turkish refugee camp in Diyarbakır. Robert Raffaele narrates his report.

Video Nairobi Tailors Make Pope Francis’ Vestments

To ensure the pope is properly attired during his visit, the Kenya Conference of Catholic Bishops asked the Dolly Craft Sewing Project in the Nairobi slum of Kangemi to make the pope's vestments, the garments he will wear during the various ceremonies. Jill Craig reports.

Video Cross-Border Terrorism Puts Europe’s Passport-Free Travel in Doubt

The fallout from the Islamic State terror attacks in Paris has put the future of Europe’s passport-free travel area, known as the "Schengen Zone," in doubt. Several of the perpetrators were known to intelligence agencies, but were not intercepted. Henry Ridgwell reports from London European ministers are to hold an emergency meeting Friday in Brussels to look at ways of improving security.

Video El Niño Brings Unexpected Fish From Mexico to California

Fish in an unexpected spectrum of sizes, shapes and colors are moving north, through El Niño's warm currents from Mexican waters to the Pacific Ocean off California’s coast. El Nino is the periodic warming of the eastern and central Pacific Ocean. As Faiza Elmasry tells us, this phenomenon thrills scientists and gives anglers the chance of a once-in-a-lifetime big catch. Faith Lapidus narrates.

Video Terrorism in Many Forms Continues to Plague Africa

While the world's attention is on Paris in the wake of Friday night's deadly attacks, terrorism from various sides remains a looming threat in many African countries. Nigerian cities have been targeted this week by attacks many believe were staged by the violent Islamist group Boko Haram. In addition, residents in many regions are forced to flee their homes as they are terrorized by armed militias. Zlatica Hoke reports.

Video Study: Underage Marriage Rate Higher for Females in Pakistan

While attitudes about the societal role of females in Pakistan are evolving, research by child advocacy group Plan International suggests that underage marriage of girls remains a particularly big issue in the country. VOA’s Ayesha Tanzeem reports how such marriages leads to further social problems.

VOA Blogs