CFR Presents

Asia Unbound

CFR experts give their take on the cutting-edge issues emerging in Asia today.

Print Print Email Email Share Share Cite Cite
Style: MLA APA Chicago Close

loading...

Chinese Economic Espionage

by Adam Segal
November 3, 2011

(Courtesy Office of the National Counterintelligence Executive)

The Office of the National Counterintelligence Executive released a report on foreign economic and industrial espionage today.  The top two suspects are no surprise: Russia and China, with Chinese hackers taking the prize as the “world’s most active and persistent perpetrators of economic espionage.”  Chinese intelligence services as well as private companies are said to conduct spying operations and the list of sectors they are interested in is long: information technology; oil and other natural resources; clean energy; health care systems and pharmaceuticals; as well as military information, in particular maritime systems, unmanned aerial vehicles, and space and aviation.

The New York Times story notes that U.S. government officials “took pains” to alert journalists that the report explicitly named China and Russia.  Officials are usually more circumspect, offering something more like, “well it is always hard to say where a cyberattack originated from, but if we’re talking on background: yes, most attacks come from China and Russia.”

Can we call two events a trend, or a change in policy?  At the beginning of October, House Permanent Select Committee on Intelligence Chairman Mike Rogers called Chinese economic cyber espionage “a massive and sustained intelligence effort by a government to blatantly steal commercial data and intellectual property.”  Is this the beginning of more comprehensive efforts by the government to draw a line in the sand, to use public pronouncements to get the Chinese government to rein in the attacks?

When I was in the United Kingdom last month, I heard an interesting historical parallel.  In the 1980′s, Britain expelled 104 Soviet spies sending the signal that espionage had reached “an unacceptable level that could no longer be tolerated.”  This did not stop spying but limited it and so contained the risks.  Of course, cyber hackers sit in China and so cannot be expelled.  And they are stealing massive volumes of data in hours or minutes.  But can these public announcements act similarly as “exposure operations” and perhaps limit the attacks?  Can we expect a more direct statement, from State or the White House?

The report itself is fairly pessimistic.  Attacks will continue because of technological and economic change (more mobile devices and move to cloud), the globalization of science and technology, and the continued interest of Russia and China in U.S. secrets.  I think the report is probably right.

Post a Comment 4 Comments

  • Posted by RousseauC

    Do you mean CIA is losing the war to Russia and China? I don’t believe it. Can you talk about what’s the job of CIA, something not relating to espionage? Kidding me.

  • Posted by @Velhabomba

    I can´t really believe that US isn´t able to perfectly track such attacks.If it is,as obvious,the fact that these countries are not sanctioned must be only to avoid conflicting with them in one more field,OR…Maybe it´s not confortable to bring that to bear because we WANT to keep Cyberwars in secret.

  • Posted by TiedOfHypocrites

    I am not sure whether these people have any evidence or not. However, it is an established fact that US navy routinely operates spyplanes along the coast of China to peak into any electronic and visual signals of China’s anything. Mr. Mullen claimed on the face of the Chinese president: “the (peaking tom) activities will continue…, we will not stop them…”. You be the judge.

  • Posted by The_Observer

    The Israelis have a free rein in not only gathering intelligence in the USA but also influencing US domestic and international gathering through the various Israeli/Zionist lobbies present in the USA. In addition, the author omits to mention the longest ongoing SIGNIT vacuum cleaner known as Echelon that monitors radio, wireless and cell phone communications. It is run by the the US’s NSA and the anglophone countries. The USA also monitors the wired internet as well as money transfer systems such as SWIFT.

Post a Comment

CFR seeks to foster civil and informed discussion of foreign policy issues. Opinions expressed on CFR blogs are solely those of the author or commenter, not of CFR, which takes no institutional positions. All comments must abide by CFR's guidelines and will be moderated prior to posting.

* Required