Cyber-security Firm
Says Chinese Hackers Keep Attacking US Companies
This
article states that Chinese hackers have continued to attack US companies
despite signing an agreement with the US stating that China and the US would
not solicit cyber missions whose aims were to steal private company
intellectual property or trade secrets that presented evident commercial
advantages. However, the Chinese
breached this agreement the very next day.
A
hacking group, with connections to the Chinese government, hacked US private
companies in an attempt to look for trade secrets and was tracked by security
service provider CrowdStrike. Companies
the Chinese were particularly targeting were pharmaceutical and technological
companies. The attacks were thwarted but
still raised a concern for US cyber security, since these attacks happened after
the US and China had signed the agreement.
The news is hopefully going to stagnate future attacks on private
companies despite doubts from the US audience.
If the attacks continue, Obama has stated that the US will not rule out
economic sanctions against Chinese companies.
Upon investigation, it is evident that the intent of these hackings is
to steal intellectual property and trade secrets from private pharmaceutical
and technology sectors. Tempers are
continuing to rise on the side of the US considering that many China-affiliated
hackers are said to have persistently tried to re-enter US networks even after
multiple failed attempt. It would seem
that despite the negotiation and signed agreement, that China has not ceased
its cyber warfare. The group of the
utmost concern is called Deep Panda, whose main goal is to reveal national
security targets, but who also dabbles in invading agriculture, finance,
chemical, and technology industries. The
deal is not entirely for not however, as the Obama administration is expecting
lag time between agreement and the execution of that agreement. The real test will come when an adequate
amount of time has passed and the agreement is in full execution, to see if the
Chinese hacking attempts will really stop.
China is given some credit though, in that they have taken markers to
see that this agreement is upheld, namely arresting a number of hackers who were
said to have stolen secrets of US companies prior to the agreement. As of now, the US is viewing future attacks
as a setback but not a deal breaker. The
US administration has faith that China will be able to control groups like Deep
Panda and uphold their end of the agreement for now.
This controversy
displayed in this article relates to the issues of cyberwarfare discussed in
the course. Agreement breaching aside, the article defines what the Chinese
hackers are doing as an attack.
According to the US Army definition of cyber-attack, it must be “a
premeditated use of disruptive activities, or the threat, against computers
and/or networks with the intention to cause harm…” In contrast, cyber exploitation and espionage
is defined as using cyber tools in order to extract confidential information
from the adversary’s computer. The main
difference between attack and espionage is whether or not the intent was to
harm or father information. According to
the article, the Chinese objective was to glean intellectual property and steal
information from private companies. Additional
information that groups attempted to glean was regarding national security
targets. By definition, this is
espionage because the Chinese were trying to gather information. As a side note, the companies being targeted were
private US companies that are part of specific areas of industry. They were not hacking military computers or
other typical essentials of fighting a war.
Therefore, to label the Chinese hacking as an “attack” is slightly
inaccurate. Due to the breaching of the
agreement, and the objective to steal intellectual property that rightfully
belongs to US private companies, it is surely illegal and in no way
self-defense or anything like that.
However, the hackings should be more accurately described as espionage
rather than an attack according to the themes discussed in the course. However, despite the slightly inaccurate
label, the US reaction and threats of economic sanctions imply that the Obama
administration is not willing to counter the situation the way one would if it
was a conventional or “more obvious” cyber-attack. For example, the threat of economic sanctions
should the Chinese not comply with the agreement are not force because the
conditions of the sanctions are not to cause harm. Rather, they would be used, as sanctions
often are, to get China “in line” with the terms of the signed agreement that
they just breached. Sanctions are open
and direct, despite cyber-attacks not being as pin-pointed. These sanctions are the threat of choice
because of the nature of the victims in these hackings. In other words, the Obama administration is
choosing sanctions over other means in part because the victims in the article have
been specified as private companies.
If the
attack is from a company controlled by the state, and acting for the state,
then the state is liable to be attacked.
The perpetrators in the article are said to have connections to the Chinese
government. This is why the entire state
of China is being held responsible. If it
was simply a private company located in
but not working for the state doing
the attack, then the victim country, in this case the US, would make a demand
for it to stop and demand that the host country take care of the situation,
because the attacking company is located in that country. In this case, if China does not handle the
hacking situation, the US is legally able to act and take care of it themselves,
hence the threat of sanctions. Because
it would be on record that the US made demands to China for it to be handled
without US involvement, the US would then have more legal grounds for means
that it takes to handle the situation itself if that arises.
Overall,
I think that the US is handling the situation appropriately, as far as legality
goes. To attack or sanction China right
away, without giving China a chance to fix the situation and reprimand the
people responsible, would set an unfair precedent in China-US relations. Also, because of the government connections
that the hacking groups have, I think it is adequate that the US is demanding
that China as a state handle the situation before the US decides to take
matters into its own hands. It will be
interesting to see how this situation develops now that an official agreement
has been signed and China is now expected to halt all future attacks. It will be interesting to see how this
situation affects future Chinese-American foreign relations.
http://www.nytimes.com/2015/10/20/technology/cybersecurity-firm-says-chinese-hackers-keep-attacking-us-companies.html?_r=0
No comments:
Post a Comment