News / Asia

    Chinese Army Rejects US Report on Cyber Hacking

    x
    William GalloVictor Beattie
    China is adamantly denying a report by a U.S.-based Internet security group that accuses Beijing's army of carrying out a "long-running and extensive cyber espionage campaign" against American government and business targets.

    Beijing's Defense Ministry on Wednesday released a statement saying the Chinese army has never supported cyber attacks. It said the Tuesday report by Mandiant "is not based on facts" and "lacks technical proof."

    Mandiant says its investigation revealed that a secretive division of the People's Liberation Army, Unit 61398, was behind a group that carried out nearly 150 attacks on a wide range of mostly U.S. targets since 2006.

    The White House would not directly comment on the report, but promised that it is taking all necessary steps to protect U.S. networks from cyber crimes and said it has raised the issue with Chinese leaders.

    The Chinese government had already denied it was behind the attacks. On Tuesday, the foreign ministry said Beijing was the victim, not perpetrator, of computer hacking, saying such activity is against Chinese law.

    Map of the APT1 hacking headquarters in Shanghai, China.Map of the APT1 hacking headquarters in Shanghai, China.
    x
    Map of the APT1 hacking headquarters in Shanghai, China.
    Map of the APT1 hacking headquarters in Shanghai, China.
    The Defense Ministry repeated that insistence on Wednesday, saying its own data suggested that a "considerable" number of hacking attempts against it originate from the United States.

    It also questions Mandiant's methodology of using IP addresses, or computer identification codes, to trace dozens of the China-based attacks to a neighborhood surrounding a PLA building in Shanghai. It argues the codes could be re-routed to appear as if they came from a different location.

    China has long been considered the source of many of the world's cyber attacks, and many suspect the involvement of China's government and military. But most computer scientists and foreign governments have refrained from making direct accusations against Beijing, since specific attacks are difficult to pinpoint.

    • People walk past Unit 61398 in Shanghai February 19, 2013, the unit believed to be behind a series of hacking attacks.
    • A Chinese People's Liberation Army soldier stands guard in front of Unit 61398 in Shanghai. The Mandiant report says Chinese hackers have focused on stealing information like technology blueprints, manufacturing processes and other information from foreign companies.
    • Richard Bejtlich, Mandiant's Chief Security Officer: "The name of the game for this group is theft. From what we have seen they are there to take it and bring it back to China," he said of the group behind the cyber attacks.
    • Map of the APT1 hacking headquarters in Shanghai, China.
    • Part of the building of Unit 61398 in Shanghai.

    Mounting evidence suggests Beijing's involvement

    Internet security groups like Mandiant rely on several techniques that can trace the origin of malicious software back to China with with reasonable certainty, according to Brad Glosserman with the Hawaii-based Pacific Forum.

    "They have particular signatures on them that we can identify and tell who has written similar software. That's number one. Number two, we look at the type of information being taken. Certain people want certain types of information ... and number three, we look at where it's going. And, while we can't be sure that this is ultimately the final end destination, when IP addresses are used consistently, we get a pretty strong conclusion that's where the attacks are coming from," Glosserman says.

    Faced with mounting public evidence that it is involved in or does not take steps to halt cyber attacks, the Chinese government has responded by insisting it cannot control everything that occurs within its borders. But Beijing has a lot of incentive to claim it cannot do anything about the hacking, says Gabe Collins of the analysis group China SignPost.

    "It makes a lot of economic sense for them," says Collins. "(Even) if there's not state support, there's literally probably billions of dollars in savings that accrue to the different Chinese laboratories and state-owned enterprises that can reap the fruits of this industrial espionage."

    Collins points out that Beijing's state-controlled companies stand to profit from recent attacks that have stolen information on U.S. oil and gas companies, the Department of Defense and even information on one of America's most advanced aircraft, the F-35 Joint Strike Fighter.

    Problem intensifying; could threaten ties?

    Even though the U.S. and China consistently raise the issue and pledge cooperation on cyber security at regular dialogue sessions, the problem still seems to be getting worse, and some say it could threaten U.S.-China relations.

    The prospect of being hacked by the Chinese government is something that U.S. companies will take under consideration when contemplating operations in China, says Patrick Chovanec, a professor at Beijing's Tsinghua University.

    "On the one hand they're being regulated by the Chinese government, and on the other hand they may find themselves on the receiving end of attacks coming from other parts of the Chinese government," says Chovanec.

    Obama considering tougher stance?

    The Obama administration is considering taking a more aggressive stance on Chinese hackers, according to recent U.S. media reports, which have quoted government officials as saying trade sanctions or fines are possible against those found guilty of cyber crimes.

    In his recent State of the Union address, President Barack Obama did not mention China by name, but said America must face the "rapidly growing threat from cyber attacks" from foreign countries.

    "We know hackers steal people's identities and infiltrate private e-mail. We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems. We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy," the president said.

    You May Like

    Hope Remains for Rio Olympic Games

    Facing a host of problems, Rio prepares for holding the games but experts say some risks, like Zika, may not be as grave as initially thought

    IS Use of Social Media to Recruit, Radicalize Still a Top Threat to US

    Despite military gains against IS in Iraq and Syria, their internet propaganda still commands an audience; US officials see 'the most complex challenge that the federal government and industry face'

    ‘Time Is Now’ to Save Africa’s Animals From Poachers, Activist Says

    During Zimbabwe visit, African Wildlife Foundation President Kaddu Sebunya says poaching hurts Africa as slave trade once did

    This forum has been closed.
    Comment Sorting
    Comments
         
    by: Professor_H from: USA
    February 22, 2013 12:51 PM
    As a retired federal prosecutor, I think the solution is simple: With the IP addresses fully disclosed by the claimant Mandiant, the burden shifts to the Chinese government to present full disclosure of how the IP addresses were spoofed or otherwise misaddressed. This is not rocket science! It is simple investigatory protocol.

    by: Igor from: Russia
    February 20, 2013 10:49 PM
    If you believe in Chinese People's Liberation Army, you are a stupid fool, no more, no less. China is the main copyrights infringer in the world. They buy Russian weapons, imitate them and then sell them to other nations. They also do countless dirty things without concerning any moral regulation.

    Featured Videos

    Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
    Ivorian Chocolate Makers Promote Locally-made Chocolatei
    X
    July 29, 2016 4:02 PM
    Ivory Coast is the world's top producer of cocoa but hardly any of it is processed into chocolate there. Instead, the cocoa is sent abroad to chocolate makers in Europe and elsewhere. This is a general problem throughout Africa – massive exports of raw materials but few finished goods. As Emilie Iob reports from Abidjan, several Ivorian entrepreneurs are working to change that formula - 100 percent Ivorian chocolate bar at a time.
    Video

    Video Ivorian Chocolate Makers Promote Locally-made Chocolate

    Ivory Coast is the world's top producer of cocoa but hardly any of it is processed into chocolate there. Instead, the cocoa is sent abroad to chocolate makers in Europe and elsewhere. This is a general problem throughout Africa – massive exports of raw materials but few finished goods. As Emilie Iob reports from Abidjan, several Ivorian entrepreneurs are working to change that formula - 100 percent Ivorian chocolate bar at a time.
    Video

    Video Tesla Opens Battery-Producing Gigafactory

    Two years after starting to produce electric cars, U.S. car maker Tesla Motors has opened the first part of its huge battery manufacturing plant, which will eventually cover more than a square kilometer. Situated close to Reno, Nevada, the so-called Gigafactory will eventually produce more lithium-ion batteries than were made worldwide in 2013. VOA's George Putic reports.
    Video

    Video Polio-affected Afghan Student Fulfilling Her Dreams in America

    Afghanistan is one of only two countries in the world where children still get infected by polio. The other is Pakistan. Mahbooba Akhtarzada who is from Afghanistan, was disabled by polio, but has managed to overcome the obstacles caused by this crippling disease. VOA's Zheela Nasari caught up with Akhtarzada and brings us this report narrated by Bronwyn Benito.
    Video

    Video Hillary Clinton Promises to Build a 'Better Tomorrow'

    Democratic presidential candidate Hillary Clinton urged voters Thursday not to give in to the politics of fear. She vowed to unite the country and move it forward if elected in November. Clinton formally accepted the Democratic Party's nomination at its national convention in Philadelphia. VOA national correspondent Jim Malone has more.
    Video

    Video Trump Tones Down Praise for Russia

    Republican presidential candidate Donald Trump is toning down his compliments for Russia and Vladimir Putin as such rhetoric got him in trouble recently. After calling on Russia to find 30.000 missing emails from rival Hillary Clinton, Trump told reporters he doesn't know Putin and never called him a great leader, just one who's better than President Barack Obama. Putin has welcomed Trump's overtures, but, as Zlatica Hoke reports, ordinary Russians say they are not putting much faith in Trump.
    Video

    Video Uganda Unveils its First Solar-powered Bus

    A solar-powered bus described by its Ugandan makers as the first in Africa has made its public debut. Kiira Motors' electric bus, Kayoola, displayed recently at a stadium in Uganda's capital. From Kampala, Maurice Magorane filed this report narrated by Salem Solomon.
    Video

    Video Silicon Valley: More Than A Place, It's a Culture

    Silicon Valley is a technology powerhouse and a place that companies such as Google, Facebook and Apple call home. It is a region in northern California that stretches from San Francisco to San Jose. But, more than that, it's known for its startup culture. VOA's Elizabeth Lee went inside one company to find out what it's like to work in a startup.
    Video

    Video Immigrant Delegate Marvels at Democratic Process

    It’s been a bitter and divisive election season – but first time Indian-American delegate Dr. Shashi Gupta headed to the Democratic National Convention with a sense of hope. VOA’s Katherine Gypson followed this immigrant with the love of U.S. politics all the way to Philadelphia.
    Video

    Video Dutch Entrepreneurs Turn Rainwater Into Beer

    June has been recorded as one of the wettest months in more than a century in many parts of Europe. To a group of entrepreneurs in Amsterdam the rain came as a blessing, as they used the extra water to brew beer. Serginho Roosblad has more to the story.
    Video

    Video Commerce Thrives on US-Mexico Border

    At the Democratic Convention in Philadelphia this week, the party’s presumptive presidential nominee, Hillary Clinton, is expected to attack proposals made by her opponent, Republican presidential nominee Donald Trump, to build a wall along the U.S.-Mexico border. Last Friday, President Barack Obama hosted his Mexican counterpart, President Enrique Peña Nieto, to underscore the good relations between the two countries. VOA’s Greg Flakus reports from Tucson.
    Video

    Video Film Helps Save Ethiopian Children Thought to be Cursed

    'Omo Child' looks at effort of African man to stop killings of ‘mingi’ children
    Video

    Video London’s Financial Crown at Risk as Rivals Eye Brexit Opportunities

    By most measures, London rivals New York as the only true global financial center. But Britain’s vote to leave the European Union – so-called ‘Brexit’ – means the city could lose its right to sell services tariff-free across the bloc, risking its position as Europe’s financial headquarters. Already some banks have said they may shift operations to the mainland. Henry Ridgwell reports from London.

    Special Report

    Adrift The Invisible African Diaspora