News / Asia

Chinese Army Rejects US Report on Cyber Hacking

x
TEXT SIZE - +
William GalloVictor Beattie
China is adamantly denying a report by a U.S.-based Internet security group that accuses Beijing's army of carrying out a "long-running and extensive cyber espionage campaign" against American government and business targets.

Beijing's Defense Ministry on Wednesday released a statement saying the Chinese army has never supported cyber attacks. It said the Tuesday report by Mandiant "is not based on facts" and "lacks technical proof."

Mandiant says its investigation revealed that a secretive division of the People's Liberation Army, Unit 61398, was behind a group that carried out nearly 150 attacks on a wide range of mostly U.S. targets since 2006.

The White House would not directly comment on the report, but promised that it is taking all necessary steps to protect U.S. networks from cyber crimes and said it has raised the issue with Chinese leaders.

The Chinese government had already denied it was behind the attacks. On Tuesday, the foreign ministry said Beijing was the victim, not perpetrator, of computer hacking, saying such activity is against Chinese law.

Map of the APT1 hacking headquarters in Shanghai, China.Map of the APT1 hacking headquarters in Shanghai, China.
x
Map of the APT1 hacking headquarters in Shanghai, China.
Map of the APT1 hacking headquarters in Shanghai, China.
The Defense Ministry repeated that insistence on Wednesday, saying its own data suggested that a "considerable" number of hacking attempts against it originate from the United States.

It also questions Mandiant's methodology of using IP addresses, or computer identification codes, to trace dozens of the China-based attacks to a neighborhood surrounding a PLA building in Shanghai. It argues the codes could be re-routed to appear as if they came from a different location.

China has long been considered the source of many of the world's cyber attacks, and many suspect the involvement of China's government and military. But most computer scientists and foreign governments have refrained from making direct accusations against Beijing, since specific attacks are difficult to pinpoint.

  • People walk past Unit 61398 in Shanghai February 19, 2013, the unit believed to be behind a series of hacking attacks.
  • A Chinese People's Liberation Army soldier stands guard in front of Unit 61398 in Shanghai. The Mandiant report says Chinese hackers have focused on stealing information like technology blueprints, manufacturing processes and other information from foreign companies.
  • Richard Bejtlich, Mandiant's Chief Security Officer: "The name of the game for this group is theft. From what we have seen they are there to take it and bring it back to China," he said of the group behind the cyber attacks.
  • Map of the APT1 hacking headquarters in Shanghai, China.
  • Part of the building of Unit 61398 in Shanghai.

Mounting evidence suggests Beijing's involvement

Internet security groups like Mandiant rely on several techniques that can trace the origin of malicious software back to China with with reasonable certainty, according to Brad Glosserman with the Hawaii-based Pacific Forum.

"They have particular signatures on them that we can identify and tell who has written similar software. That's number one. Number two, we look at the type of information being taken. Certain people want certain types of information ... and number three, we look at where it's going. And, while we can't be sure that this is ultimately the final end destination, when IP addresses are used consistently, we get a pretty strong conclusion that's where the attacks are coming from," Glosserman says.

Faced with mounting public evidence that it is involved in or does not take steps to halt cyber attacks, the Chinese government has responded by insisting it cannot control everything that occurs within its borders. But Beijing has a lot of incentive to claim it cannot do anything about the hacking, says Gabe Collins of the analysis group China SignPost.

"It makes a lot of economic sense for them," says Collins. "(Even) if there's not state support, there's literally probably billions of dollars in savings that accrue to the different Chinese laboratories and state-owned enterprises that can reap the fruits of this industrial espionage."

Collins points out that Beijing's state-controlled companies stand to profit from recent attacks that have stolen information on U.S. oil and gas companies, the Department of Defense and even information on one of America's most advanced aircraft, the F-35 Joint Strike Fighter.

Problem intensifying; could threaten ties?

Even though the U.S. and China consistently raise the issue and pledge cooperation on cyber security at regular dialogue sessions, the problem still seems to be getting worse, and some say it could threaten U.S.-China relations.

The prospect of being hacked by the Chinese government is something that U.S. companies will take under consideration when contemplating operations in China, says Patrick Chovanec, a professor at Beijing's Tsinghua University.

"On the one hand they're being regulated by the Chinese government, and on the other hand they may find themselves on the receiving end of attacks coming from other parts of the Chinese government," says Chovanec.

Obama considering tougher stance?

The Obama administration is considering taking a more aggressive stance on Chinese hackers, according to recent U.S. media reports, which have quoted government officials as saying trade sanctions or fines are possible against those found guilty of cyber crimes.

In his recent State of the Union address, President Barack Obama did not mention China by name, but said America must face the "rapidly growing threat from cyber attacks" from foreign countries.

"We know hackers steal people's identities and infiltrate private e-mail. We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems. We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy," the president said.

You May Like

Thailand's Political Power Struggle Continues

Court gave Prime Minister Yingluck Shinawatra until May 2 to prepare her defense over abuse of power charges but uncertainty remains over election timing More

Malaysia Plane Search Tests Limits of Ocean Mapping Technology

Expert tells VOA existing equipment’s maximum operating depth is around 6 kilometers as operation continues on ocean bed for any trace of MH370 More

Open Source Seeds Hit the Market, Raise Awareness

First open source seeds include 29 new varieties of broccoli, celery, kale, quinoa and other vegetables and grains More

This forum has been closed.
Comment Sorting
Comments
     
by: Professor_H from: USA
February 22, 2013 12:51 PM
As a retired federal prosecutor, I think the solution is simple: With the IP addresses fully disclosed by the claimant Mandiant, the burden shifts to the Chinese government to present full disclosure of how the IP addresses were spoofed or otherwise misaddressed. This is not rocket science! It is simple investigatory protocol.


by: Igor from: Russia
February 20, 2013 10:49 PM
If you believe in Chinese People's Liberation Army, you are a stupid fool, no more, no less. China is the main copyrights infringer in the world. They buy Russian weapons, imitate them and then sell them to other nations. They also do countless dirty things without concerning any moral regulation.

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Pet Kangaroo Helps Spread Environmental Messagei
X
Penelope Poulou
April 22, 2014 5:53 PM
Children’s author Julia Heckathorn travels the world to learn about different ecosystems and endangered animals. She pours her knowledge into children’s books, hoping the next generation will right the environmental wrongs of our times. As in many children's books, the main character in Heckathorn's stories is an animal. Unlike those other characters, though, this one is real - a kangaroo, that lives in the author’s backyard. VOA’s Penelope Poulou has more.
Video

Video Pet Kangaroo Helps Spread Environmental Message

Children’s author Julia Heckathorn travels the world to learn about different ecosystems and endangered animals. She pours her knowledge into children’s books, hoping the next generation will right the environmental wrongs of our times. As in many children's books, the main character in Heckathorn's stories is an animal. Unlike those other characters, though, this one is real - a kangaroo, that lives in the author’s backyard. VOA’s Penelope Poulou has more.
Video

Video Pro-Russian Separatists Plan 'Federalization Referendum' in Eastern Ukraine

Pro-Russian separatists in eastern Ukraine say they plan to move forward next month with a referendum vote for greater autonomy, despite the Geneva agreement reached with Russia, the U.S. and Ukraine to end the political conflict. VOA's Brian Padden reports from the city of Donetsk in Eastern Ukraine.
Video

Video Pope Francis Hopes Dual Canonizations Will Reconcile Church

On April 27, two popes - John the XXIII and John Paul II - will be made saints in a ceremony at St. Peter’s Square. VOA religion correspondent Jerome Socolovsky says the dual canonization is part of the current pope’s program to reconcile liberals and conservatives in the Roman Catholic Church.
Video

Video In Capturing Nature's Majesty, Film Makes Case for Its Survival

French filmmaker Luc Jacquet won worldwide acclaim for his 2005 Academy Award-winning documentary "March of the Penguins". Now Jacquet is back with a new film that takes movie-goers deep into the heart of a tropical rainforest - not only to celebrate its grandeur, but to make the case for its survival. VOA's Rosanne Skirble reports.
Video

Video Boston Marathon Bittersweet for Many Runners

Monday's running of the Boston Marathon was bittersweet for many of the 36,000 participants as they finished the run that was interrupted by a double bombing last year. Many gathered along the route paid respect to the four people killed as a result of two bombings near the finish line. VOA's Carolyn Presutti returned to Boston this year to follow two runners, forever changed because of the crimes.
Video

Video International Students Learn Film Production in World's Movie Capital

Hollywood - which is part of Los Angeles - is the movie capital of the world, and many aspiring filmmakers go there in hopes of breaking into the movie business. Mike O'Sullivan reports that regional universities are also a magnet for students who hope to become producers or directors.
Video

Video Pacific Rim Trade Deal Proves Elusive

With the U.S.-led war in Iraq ended and American military involvement in Afghanistan winding down, President Barack Obama has sought to pivot the country's foreign policy focus towards Asia. One aspect of that pivot is the negotiation of a free-trade agreement among 12 Pacific Rim nations. But as Obama leaves this week on a trip to four Asian countries he has found it very difficult to complete the trade pact. VOA's Ken Bredemeier has more from Washington.
Video

Video Autistic Adults Face Housing, Job Challenges

Many parents of children with disabilities fear for the future of their adult child. It can be difficult to find services to help adults with disabilities - physical, mental or emotional - find work or live on their own. The mother of an autistic boy set up a foundation to advocate for the estimated 1.2 million American adults with autism, a developmental disorder that causes communication difficulties and often social difficulties. VOA's Faiza Elmasry reports.
AppleAndroid