Cyberwarfare in China

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

China is the world's second-largest economy, and a nuclear weapons state with the world's second-largest defence budget.

Chinese Information Operations and Information Warfare includes the concept of “network warfare”, roughly analogous to the United States concept of cyberwarfare.[1]

Western countries have long accused China of aggressive espionage,[2][3][4] but although officials and organisations have traced various attacks on corporate and infrastructure computer systems in their countries to computers in China "It is nearly impossible to know whether or not an attack is government-sponsored because of the difficulty in tracking true identities in cyberspace"[5][6] and China has denied accusations of cyberwarfare,[7] and has accused the United States of engaging in cyberwarfare against it - which the US government in turn denies.[8][9][10][11][12][13][14]

Organization

Although details are sketchy, it is understood that China organises its resources as follows:

  • “Specialized military network warfare forces” (军队专业网络战力量) - military units for carrying out network attack and defense
  • "PLA-authorized forces” (授权力量) - network warfare specialists the Ministry of State Security (MSS), the Ministry of Public Security (MPS)
  • “Non-governmental forces” (民间力量) - civilian, and semi-civilian groups that spontaneously engage in network attack and defense.[15]

Chinese universities, businesses and politicians have been subject cyber espionage by the United States National Security Agency since 2009 according to Edward Snowden[16][17][18] and to defend their own networks, the PLA announced a cyber security squad in May 2011.[19]

Accusations of espionage

Organisations, companies and governments in a number of countries have alleged incidents of "hacking" or espionage by China.

Australia

In May 2013, ABC News claimed that China hacked plans for the headquarters of the Australian Security Intelligence Organisation.[20]

Canada

Officials in the Canadian government claim that Chinese hackers have compromised several departments within the federal government in early 2011, though the Chinese government has refused involvement.[21]

Canada's Chief Information Officer claims that Chinese hackers compromised computer systems within the National Research Council in 2014.[22]

India

Officials in the Indian government have alleged that attacks on Indian government networks, such as that of the Indian National Security Council, have originated in China. According to the government, Chinese hackers are experts in operating botnets.[23]

United States

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

The United States has accused China of cyberespionage against American interests, accessing the networks of important military, commercial, research, and industrial organisations. A Congress advisory group has declared China "the single greatest risk to the security of American technologies"[24] and that "there has been a marked increase in cyber intrusions originating in China and targeting U.S. government and defense-related computer systems".[24][25][26][26]

In January 2010, Google reported on targeted attacks on its corporate infrastructure originating from China "that resulted in the theft of intellectual property from Google". Apparently, the Gmail accounts of two human rights activists were compromised in the raid on Google's password system.[27] American security experts connected the Google attack to various other political and corporate espionage efforts originating from China, including espionage against military, commercial, research, and industrial corporations. Obama administration officials have called the cyberattacks "an increasingly serious cyber threat to US critical industries".[25]

In addition to Google, at least 34 companies have been attacked. Reported cases include Northrop Grumman, Symantec, Yahoo, Dow Chemical, and Adobe Systems.[28] Cyberespionage has been aimed at both commercial and military interests[29][29]

Diplomatic cables highlight US concerns that China is using access to Microsoft source code to boost its offensive and defensive capabilities.[30]

A number of private computer security firms have stated that they have growing evidence of cyber-espionage efforts originating from China, including the "Comment Group".[31]

China has denied accusations of cyberwarfare,[7] and has accused the United States of engaging in cyberwarfare against it, accusations which the United States denies.[8] Wang Baodong of the Chinese Embassy in the United States responded that the accusations are a result of sinophobic paranoia.[7] He states that, "China would never do anything to harm sovereignty or security of other countries. In conformity with such national policies, the Chinese government has never employed, nor will it employ so-called civilian hackers in collecting information or intelligence of other countries. Allegations against China in this respect are totally unwarranted, which only reflect the dark mentality of certain people who always regard China as a threat."[7]

As of March 2013, high level discussions continued.[32]

In May 2014 a Federal Grand Jury in the United States indicted five PLA Unit 61398 officers on charges of theft of confidential business information from U.S. commercial firms and planting malware on their computers.[33][34]

In September 2014, a Senate Armed Services Committee probe found hackers associated with the Chinese government had repeatedly infiltrated the computer systems of U.S. airlines, technology companies and other contractors involved in the movement of U.S. troops and military equipment,[35] and in October 2014, The FBI said that hackers it believes to be backed by the Chinese government have recently launched attacks on U.S. companies.[36]

IP hijacking

During an 18-minute stretch on 8 April 2010, state-owned China Telecom advertised erroneous network routes that instructed "massive volumes" of U.S. and other foreign Internet traffic to go through Chinese servers. A US Defense Department spokesman, told reporters that he did not know if "we've determined whether that particular incident ... was done with some malicious intent or not" and China Telecom denied the charge that it "hijacked" U.S. Internet traffic.[37]

See also

References

  1. "China’s Evolving Perspectives on Network Warfare: Lessons from the Science of Military Strategy", April 16, 2015, Joe McReynolds, jamestown.org
  2. Lua error in package.lua at line 80: module 'strict' not found.
  3. Lua error in package.lua at line 80: module 'strict' not found.
  4. Lua error in package.lua at line 80: module 'strict' not found.
  5. Lua error in package.lua at line 80: module 'strict' not found.
  6. Lua error in package.lua at line 80: module 'strict' not found.
  7. 7.0 7.1 7.2 7.3 Lua error in package.lua at line 80: module 'strict' not found.
  8. 8.0 8.1 Lua error in package.lua at line 80: module 'strict' not found.
  9. Nakashima, Ellen, "Report on ‘Operation Shady RAT’ identifies widespread cyber-spying", Washington Post, August 3, 2011.
  10. Lua error in package.lua at line 80: module 'strict' not found.
  11. Lua error in package.lua at line 80: module 'strict' not found.
  12. Lua error in package.lua at line 80: module 'strict' not found.
  13. Lua error in package.lua at line 80: module 'strict' not found.
  14. Lua error in package.lua at line 80: module 'strict' not found.
  15. Lua error in package.lua at line 80: module 'strict' not found.
  16. Lua error in package.lua at line 80: module 'strict' not found.
  17. http://www.washingtonpost.com/world/asia_pacific/leaker-snowdens-allegations-about-us-hacking-give-china-new-edge-in-cyber-war-of-words/2013/06/13/986c0092-d419-11e2-b3a2-3bf5eb37b9d0_story.html
  18. Lua error in package.lua at line 80: module 'strict' not found.
  19. Beech, Hannah. "Meet China's Newest Soldiers: An Online Blue Army." Time, 27 May 2011.
  20. Lua error in package.lua at line 80: module 'strict' not found.
  21. Lua error in package.lua at line 80: module 'strict' not found.
  22. Lua error in package.lua at line 80: module 'strict' not found.
  23. Lua error in package.lua at line 80: module 'strict' not found.
  24. 24.0 24.1 Lua error in package.lua at line 80: module 'strict' not found.
  25. 25.0 25.1 Cha, Ariana Eunjung and Ellen Nakashima, "Google China cyberattack part of vast espionage campaign, experts say," The Washington Post, January 14, 2010.
  26. 26.0 26.1 Lua error in package.lua at line 80: module 'strict' not found.
  27. "Google cyberattack hit password system" NY Times, Reuters, April 19, 2010.
  28. Lua error in package.lua at line 80: module 'strict' not found.
  29. 29.0 29.1 Lua error in package.lua at line 80: module 'strict' not found.
  30. Lua error in package.lua at line 80: module 'strict' not found.
  31. Riley, Michael, and Dune Lawrence, "Hackers Linked to China’s Army Seen From EU to D.C.", Bloomberg L.P., 27 July 2012
  32. U.S. Presses on Cyberthreats; In Beijing, Treasury Secretary Frames Issue as a Top Priority in Ties With China March 20, 2013 Wall Street Journal
  33. Finkle, J., Menn, J., Viswanatha, J. U.S. accuses China of cyber spying on American companies. Reuters, Mon May 19, 2014 6:04pm EDT.
  34. Clayton, M. US indicts five in China's secret 'Unit 61398' for cyber-spying. Christian Science Monitor, May 19, 2014
  35. Chinese hacked U.S. military contractors, Senate panel finds September 18, 2014 Investing.com
  36. FBI warns U.S. businesses of cyber attacks, blames Beijing October 16, 2014 Investing.com
  37. Lua error in package.lua at line 80: module 'strict' not found.