HomeUSHomeland SecurityChinese Cyber Attacks: Robust Response Needed

Chinese Cyber Attacks: Robust Response Needed

After a multi-year investigation, the computer security firm Mandiant announced this week that it had tracked a cyber group back to its Chinese Chinese Espionageroots.[1] Even more explosive, it had concluded that the group is, in fact, a Chinese military unit, the Second Bureau of the Third Department of the General Staff Department of the Chinese People’s Liberation Army (PLA), with the Military Unit Cover Designator 61398.

Mandiant’s report confirms what has long been suspected around the world: Not only are there Chinese engaging in various cyber espionage and hacking activities, but many are acting at the direction and with the approval of the Chinese government.

Chinese Military Organized Differently

The PLA is organized along different lines than other militaries. Although the PLA has different services (including the PLA Navy, PLA Air Force, and the Second Artillery), it is mainly organized under four “General Departments,” which have responsibility across service lines:

  1. The General Staff Department (GSD) is responsible for military planning, intelligence, and operational implementation;

  2. The General Political Department is responsible for political oversight, morale, propaganda, and military law enforcement (e.g., judge advocate general activities);

  3. The General Logistics Department ensures the smooth flow of spare parts, food, ammunitions, etc.; and

  4. The General Armaments Department is responsible for weapons development, mans the various Chinese space facilities, and oversees the nuclear test sites.

Because of this different organizational approach, the PLA has likely concentrated its cyber assets into a handful of units and organizations, rather than the more dispersed, service-centric approach of the United States, which runs the risk of greater duplication of effort.

At the same time, certain functions that are managed by civilians in the U.S. are also part of the Chinese military. The GSD Third Department, for example, is the counterpart of the U.S. National Security Agency, monitoring communications, managing cryptography, and the like. But the American agency is a civilian one, whereas the Chinese entity is part of the military. Overall Chinese cyber efforts are therefore potentially more centrally directed; key targets and objectives may be attacked in a coordinated fashion from a variety of sources.

These targets, however, may not all be military, or even national security oriented. Mandiant indicates that this organization has apparently engaged in corporate espionage. Unit 61398 reportedly collected information on such companies as Coca-Cola when the latter was attempting to purchase a Chinese beverage maker.[2] In this regard, there is no parallel with the U.S., since American government agencies are not authorized to engage in industrial or financial espionage in order to support commercial entities.

Cyber Attacks and PLA Military Thinking

Not surprisingly, the Chinese authorities have denied the charges, but the weight of evidence thus far provided by Mandiant appears to be overwhelming. As one American analyst observed, “Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”[3]

As important, such activities would seem to be consistent with PLA writings and statements regarding the nature of “information war” (xinxi zhan, 信息战) and “informationized warfare” (xinxihua zhanzheng, 信息化战争).

“Informationization” is the permeation of information technology into various aspects of a nation’s infrastructure and activities, including both the military and the broader society, to the point where it fundamentally alters that society’s nature.[4] Informationized warfare is the military aspect of “information war,” marked by the broader struggle for “information dominance” (zhi xinxi quan, 制信息权, also translated as information superiority). This entails the ability to control information at times and places of one’s own choosing, both to enhance and support one’s own operations and to degrade an opponent’s. This, in turn, requires developing the capacity to affect the collection, management, direction, and assessment of information.[5] It involves not only information systems but also influencing those who would use information—i.e., decision makers.

In the Chinese view, informationization means that information is no longer easily divisible into military and civilian. Similarly, information collection, and even potentially exploitation, is not necessarily restricted by “wartime” versus “peacetime.” As one Chinese volume observes, information war is ongoing, whether in wartime or peacetime, unceasingly. Because of the complex, intertwined nature of modern international politics and economics,

it is necessary in peacetime to undertake information warfare in the political, economic, technical, and military realms, as only then can one scientifically establish operational plans, appropriately calculate gains and losses in a conflict, appropriately control the level of attack, precisely strike predetermined targets, and seek the best strategic interest and long-term benefit.[6]

This is echoed in other PLA writings, which emphasize that modern information technology blurs the lines between peacetime and wartime, between military and civilian, and among strategy, operations, and tactics.[7] Rather than trying to delineate among these categories, the implication is that information is an integrated whole. In this light, it is not surprising that there should be a fairly unified Chinese organization tasked with information operations; that these would target a range of military, civilian, and commercial sites; or that such operations would be undertaken in peacetime.

What the U.S. Should Do

  • Create a broad, multinational response. The response to China’s behavior should be forged among the major OECD countries, all of whom are targeted by Chinese computer network operations. Restrictions in one state can be circumvented by exploiting loopholes and security gaps elsewhere. The U.S. should be the motive force behind the creation of both a multinational clearinghouse of cyber activity information and support greater discussion among such major players as Great Britain, Germany, Israel, Australia, South Korea, and Japan.

  • Implement new government-private cooperation. It was a private company that conducted the research that established Chinese culpability, and Chinese efforts are aimed as much at the private sector as the public. The Obama Administration should expand upon its proposed sharing of classified threat data, and establish the equivalent of the Combined Space Operations Center, where commercial and governmental computer security experts can share information on a regular, sustained basis.

  • Go beyond the usual diplomatic responses. Given the commercial activities being affected by the Chinese actions, commercially related responses should rank as high as diplomatic ones. For example, if Chinese companies are benefiting from information extracted by this unit, are they essentially trafficking in stolen goods (in this case, intellectual property)? Would that make their directors subject to criminal charges, their foreign assets susceptible to seizure? How should this affect their ability to be listed on not just American but Asian or European stock exchanges? China’s actions fundamentally jeopardize the international rule of law in a variety of business contexts; it should not be able to benefit from its brazen flouting of those rules.

  • Actually take a tougher line on China. The Obama Administration has actively sought out the Chinese military to cooperate on cyber issues and even engaged in joint “war games” together.[8] One can only imagine how Chinese officers viewed the gullibility of their American counterparts in such “cooperative” sessions, even as they were targeting them from Shanghai. Similarly, Secretary of State John Kerry’s comments questioning the need for a U.S. “pivot” to Asia, in the belief that it somehow antagonizes China, raises doubts about his understanding of how extensive China’s efforts have been.

An Integrated Response

The Chinese response to the controversy thus far has been one of “woxing, wosu” (我行我素): ignoring the American reaction. If American decision makers were expecting the Chinese to be ashamed of their actions, they are sadly mistaken (especially since the Chinese apparently view such actions as legitimate).

In order to make clear to Beijing that their actions are in fact illegitimate, there needs to be an extensive, integrated response. Just as Chinese cyber activities are not limited to the U.S. or solely targeted against military and national security systems, the response needs to be multilateral and comprehensive, involving not just all the elements of government but the private sector as well.

Source: Heritage Foundation

 Dean Cheng is Research Fellow in Chinese Political and Security Affairs in the Asian Studies Center at The Heritage Foundation.

 

[1]Mandiant Corporation, “APT-1, Exposing One of China’s Cyber Espionage Units,” http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf (accessed February 22, 2013).

[2]Charles Riley, “Report: Chinese Military Engaged in ‘Extensive Cyber Espionage Campaign,’” CNN, February 19, 2013, http://money.cnn.com/2013/02/19/technology/china-military-cybercrime/index.html (accessed February 22, 2013).

[3]David Sanger, David Barboza, and Nicole Perlroth, “Chinese Army Unit Is Seen as Tied to Hacking Against US,” The New York Times, February 18, 2013, http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?pagewanted=all&_r=0 (accessed February 23, 2013).

[4]Academy of Military Science Operations Theory and Regulations Research Bureau and Informationized Operations Theory Research Office, Informationized Operations Theory Study Guide (Beijing, China: Academy of Military Science Press, 2005), p. 27.

[5]Ibid., p. 69.

[6]Li Naiguo, New Theories of Information Warfare (Beijing, China: Academy of Military Sciences Press, 2004), p. 154.

[7]Yuan Wenxian, The Science of Military Information (Beijing, China: National Defense University Press, 2008), pp. 77–79.

[8]Nick Hopkins, “US and China Engage in Cyber Wargames,” The Guardian (U.K.), April 16, 2012, http://www.guardian.co.uk/technology/2012/apr/16/us-china-cyber-war-games (accessed February 22, 2013); and BBC, “China and US to Cooperate to Avoid Cyber Cold War,” May 8, 2012, http://www.bbc.co.uk/news/technology-17989560 (accessed February 22, 2013).

 
 

Most Popular

Recent Comments

Toddy Littman on Coronavirus & Dr. Rife
jimjfox on The Islamic Scam
USAPATRIOT✓ on Coronavirus & Dr. Rife
Dumb Bass Fisherman on The Disgrace of Benghazi
Dumb Bass Fisherman on Prosecute Biden the Crook!
Dumb Bass Fisherman on The Disgrace of Benghazi
Christan on Who is Nasim Aghdam?
FarvingStartist on
Swampmom on Stubborn Syria
OhSoGood on SHOCKING Media LIES
Pbranham on
Pbranham on
Fay Butler on Lawfare, living in fear
John Cunningham on The Media and Trump at 100 Days
steve smith on
Worried on
Insanity Personified on
no mo uro on
no mo uro on
Patriotjeff on
OhSoGood on
Steve on
lovelydestruction on
Val Cocora on
Jerry Kenney on
Merlinever on
Phill Crapidy on
Clifford Ishii on
Americanmommy on
Doctor Fine on
reggiec on
DeltamanH20 on
Ms. warrior4Christ on
Comrade Molotov on
reggiec on
JEANNIEMAC2 on
Average Punter on
shamm86 on
Rich on
ort on
Lee Sargeant on
Lee Sargeant on
jcarroll4415 on
Erroldean Andrews on
charles becker on
David Miller on
charles becker on
Sophia Emma on March4Trump
UR.carrion on The Islamic Scam
pbr90 on
John Cornel Kovach on Should Islam Be Banned from America?
Lane Wingham on Rituals of Islam
Lane Wingham on Rituals of Islam
Taylor Crystaloski on Rituals of Islam
lamarlamar on California Dreaming
usaok59 on Smearing Sessions
b.a. freeman on True Islam vs Pseudo Islam
b.a. freeman on True Islam vs Pseudo Islam
Randy McDaniels on True Islam vs Pseudo Islam
Mohammad Izzaterd on True Islam vs Pseudo Islam
Bikinis not Burkas on True Islam vs Pseudo Islam
John Cornel Kovach on Should Islam Be Banned from America?
paramore309 on
Anthony Duhe on
Anthony Duhe on
Dianna9490 on
Guest✓ᵛᵉʳᶦᶠᶦᵉᵈ on Dana Rohrabacher for Secretary of State
Guest✓ᵛᵉʳᶦᶠᶦᵉᵈ on Dana Rohrabacher for Secretary of State
Abu Mohamed on
wellilltellya on The Obama Era is Over
Dianna9490 on The Obama Era is Over
reggiec on Democratic Panic
Tony Donaldson on Why Trump Will Prevail
Charlotte W on Why Trump Will Prevail
Bubba Gump on Why Trump Will Prevail
bas h on
Dianna9490 on Weaponized Immigration
Dianna9490 on Charlotte Burning
Tony Donaldson on Hillary Clinton: Basket Case
SuperDave2 on The Islamic Scam
Truthorlie on Hillary’s Race War
Proud Amelekite on We are in the End of Days
EarthCitizenNumberOne on George Soros’s Open Border Foundations
EarthCitizenNumberOne on George Soros’s Open Border Foundations
Sgt Saunders on We are in the End of Days
Proud Amelekite on We are in the End of Days
Proud Amelekite on We are in the End of Days
Saputra 007 on We are in the End of Days
Kevan Massey on We are in the End of Days
Bonnie Wolf on We are in the End of Days
Bruce Peters on We are in the End of Days
David Collins on We are in the End of Days
Monte Noffsinger on We are in the End of Days
Proud Amelekite on We are in the End of Days
Eddie Clever on The Flying Clintons
jackcandobutwont on
TSM on
Tee Quake on Born in America
shamm86 on Born in America
seersuckerandapanama on The Coming US/Mexico War
Sgt Saunders on Would Jesus Bomb Hiroshima?
michaelhayes on Would Jesus Bomb Hiroshima?
Roberta Dzubow on MUST READ: The Twisting Noose
danstewart on Why Trump Chickened Out
Uzoozy on Paul Ryan's Hijra
JEANNIEMAC2 on Importing Terror
JEANNIEMAC2 on Insane Muslim Terrorists
"The Eastern Diamondback" on King Barack the Lawless Endangers Girls
Jeff Tangen on The Cults of Islam
Joe on
amyinnh on
David Gearhart on Sex Slavery by the Numbers
David Gearhart on Sex Slavery by the Numbers
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
GregAbdul on The Cults of Islam
Sgt Saunders on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
charles becker on American Outlaws!
GregAbdul on The Cults of Islam
GregAbdul on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
GregAbdul on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
GregAbdul on The Cults of Islam
GregAbdul on The Cults of Islam
Uzoozy on The Cults of Islam
smacready on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
smacready on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
TheBucko on The Cults of Islam
TheBucko on The Cults of Islam
smacready on The Cults of Islam
smacready on The Cults of Islam
smacready on The Cults of Islam
smacready on The Cults of Islam
smacready on The Cults of Islam
smacready on The Cults of Islam
GregAbdul on The Cults of Islam
GregAbdul on The Cults of Islam
Robin Morgan on The Cults of Islam
bob250 on The Cults of Islam
SEARING JW TRUTH on The Cults of Islam
Uzoozy on The Cults of Islam
Winston Lawrence on The Satanic Bible's 'Golden Rule'
SEARING JW TRUTH on The Cults of Islam
smacready on The Cults of Islam
sherri palmer on
John Cunningham on Jihad in Brussels
Sebastian Medina on The Coming US/Mexico War
sherri palmer on
BobWhiteRevisited✓ᴺᵃᵗᶦᵒᶰᵃˡᶦˢᵗ on Why I Stump for Trump
sherri palmer on
Kevin Alfred Strom on Support for Trump Backfires on CPAC
marlene on
marlene on
DC on
DC on
Ike_Kiefer on
sherri palmer on
sherri palmer on
Christopher Strunk on Is Trump a Sleeper Agent for Moscow?
Christopher Strunk on Is Trump a Sleeper Agent for Moscow?
usaok59 on
Chris Palmer on
RobSez on
marlene on
MayPA on
spartan111 on
John Cunningham on
Weeping Man on
felix1999 on
felix1999 on
Virgil Cole on
Virgil Cole on
Virgil Cole on
Buzg on
usaok59 on
John Cunningham on
cfd_007 on
alfy on
D Guest on
marlene on
adbj102 on
JEANNIEMAC2 on
Hugh Jass on
JEANNIEMAC2 on
Uzoozy on
TexasOlTimer on
Uzoozy on
Uzoozy on
Waiting on
TexasOlTimer on
TexasOlTimer on
<-----MyFrontDoorBuddy on
<-----MyFrontDoorBuddy on
Sarfaraz A. on
Sarfaraz A. on
Alex Sheibani on
Uzoozy on
sherri palmer on
sviri finq on
No Corporate BS on
SumatraSue on
Ted Johnson on
Waiting on
Jason Woodworth on
Helmut Beintner on
Doug Sterling on
JEANNIEMAC2 on
jwmiller on
sickandtired on
sherri palmer on
VTrobert on
Fredrick Rehders on
usaok59 on
Waiting on
VTrobert on
cool-subzero90 on
michaelhayes on
danstewart on
reggiec on
John Cunningham on
Andrew on
John Cunningham on
Don P on
Britt Brooks on
John Cunningham on
Helmut Beintner on
Jim on
Spectrum on
danstewart on
Helmut Beintner on
Helmut Beintner on
Helmut Beintner on
John Cunningham on
missinger on
adbj102 on
noh1bvisas on
danstewart on
Jigsaw on
Jigsaw on
Patty Villanova on
sherri palmer on
sherri palmer on
sherri palmer on
sherri palmer on
sherri palmer on
sherri palmer on
sherri palmer on
Weeping Man on
Frosty Wooldridge on
Hugh Jass on
danstewart on
Jr1776 on
JEANNIEMAC2 on
Fredrick Rehders on
JEANNIEMAC2 on
ort on
Jared on
dndgaddy on
Thunderbolt #1 on
JEANNIEMAC2 on
reggiec on
David Gearhart on
David Gearhart on
madgrandma on
David Gearhart on
David Gearhart on
John Wesley Bletsch on
Chopko on
LaineeTheCat Wallace on 10 Tips How to Counter Islam
LaineeTheCat ✔Trump on
LaineeTheCat ✔Trump on
danstewart on
marlene on
marlene on
felix1999 on
felix1999 on
felix1999 on
ort on
ort on
felix1999 on
felix1999 on
felix1999 on
<-----MyFrontDoorBuddy on
marlene on
Helmut Beintner on
Whynot be great again222 on
JEANNIEMAC2 on
ort on
michaelhayes on
John Wesley Bletsch on
missinger on
missinger on
missinger on
Whynot be great again222 on
Whynot be great again222 on
Whynot be great again222 on
Whynot be great again222 on
Whynot be great again222 on
Whynot be great again222 on
Whynot be great again222 on
ort on
Allright Hamilton! on
ort on
Allright Hamilton! on
Allright Hamilton! on
TheBucko on
ort on
ort on
ZEPHANIAH54321 on
mzliberty2013 on
JEANNIEMAC2 on
Frosty Wooldridge on
Jim on
Frosty Wooldridge on
Whynot be great again222 on
Jawad Karim on
Tranqual on
Allright Hamilton! on
Whynot be great again222 on
Allright Hamilton! on
danstewart on
ort on
marlene on
satovey on The Islamic Scam
Tranqual on
Tranqual on
madgrandma on
durabo on
Warrior on
marlene on
reggiec on
reggiec on
marlene on
marlene on
marlene on
marlene on
marlene on
deanosslewis . on The Islamic Scam
asinnersavedbygrace on Top Bible Prophecy Stories of 2015
Jill Hasselbach Villalba on The New Terror Threat: Organized Rape
malaka_eneuresis on The Islamic Scam
TexasOlTimer on Trump Gets It: The Snake
maddog0311 on Trump Gets It: The Snake
John Cunningham on US Criminalizing Free Speech?
Michael Bluestein on Burns, Oregon, Is Not Bundy Ranch
John Cunningham on US Criminalizing Free Speech?
John Cunningham on US Criminalizing Free Speech?
John Cunningham on US Criminalizing Free Speech?
John Cunningham on US Criminalizing Free Speech?
sherri palmer on What Muslims Really Believe
David Gearhart on What Muslims Really Believe
wildmanonearth on Sharia Law for the Non-Muslim
Vladsmom on
bruce on Chelm
John Cunningham on ISIS Campaign for Europe
John Cunningham on Being Thankful for the Left
marlene on  GOP Plot Thickens
Fredrick Neal Rehders on Media Darling Conservatives
Sgt Saunders on Red-Faced Fury
Fredrick Neal Rehders on America Isn’t Dead Yet
funk u zionist bedouin on Red-Faced Fury
Fredrick Neal Rehders on Empty the Prisons Bill Now on Fast Track
NetJobsOnline~~~~Earn $97/hour on The Obama Machine Takes Over Canada
NetJobsOnline~~~~Earn $97/hour on The Death of Europe
NetJobsOnline~~~~Earn $97/hour on A Big Stash of Campaign Cash in Marijuana for Paul
kunling on The Death of Europe
Richard N on The Death of Europe
Yours Truly on Sweden Close to Collapse
John Cunningham on Sweden Close to Collapse
michaelhayes on Sweden Close to Collapse
michaelhayes on Sweden Close to Collapse
Doc Eckleberg on Sweden Close to Collapse
John Cunningham on Legitimizing Hillary’s Crimes
John Cunningham on Sweden Close to Collapse
Enos Dapenis on The Coming US/Mexico War
Fucck your lies on The Coming US/Mexico War
BornAgainSouthernPride on Obama and a Doctrine of Dishonesty
GooglePostJobs:::GET $97/h on Chinese Government Runs Circles Around Obama
GooglePostJobs:::GET $97/h on JW Exposes Hillary Clinton Lie
John Cunningham on JW Exposes Hillary Clinton Lie
Yours Truly on I Am Mourning For America
Yours Truly on I Am Mourning For America
Prophetess Anya Kelly on Are We Living In The Last Days?
disqus_NSXp0ZCum6 on Should Christians Call God Allah?
Tee Quake on Nuclear Jihad
ort on
Jim on
Joel Spealman on Is Trump the Real Deal?
RobertLaity on
DENNIS J. MALONE on Is Trump the Real Deal?
ort on
Manorbier on
Bo Wetstone on The Banking Oligarchs
Dannie Poe on
JohnDiLiberto on The Banking Oligarchs
Herman Van Keer on Answering Muslims Conference
Mean Green Law on Donald Trump: American Patriot
Jigsaw on Trumping Trump
b keaton on Trumping Trump