Why the United States should go after the Chinese hackers

 

Slate

At first glance, the Justice Department’s 31-count indictment of five Chinese military officers for hacking into the computers of six American corporations, in order to steal billions of dollars’ worth of industrial secrets, seems a bit odd. No way are Beijing’s leaders going to extradite members of their elite cyberwarfare unit to stand trial in a U.S. criminal court.

At second glance, the move still seems strange and possibly counterproductive. The United States engages in cyber-offensive operations, too. Doesn’t President Obama —who must have approved the indictment and its high-profile rollout — worry that China will strike back by revealing some of our own secret plots? Besides, won’t this whole business endanger U.S.-Chinese relations, and at a time when Russian President Vladimir Putin is doing his own “pivot” toward Beijing? (Fostering a U.S.-Chinese alliance against Russia makes more sense than provoking a Russian-Chinese alliance against us.)

But at third glance, there is logic to what the Obama administration is doing, and though it’s loaded with risk, it’s on balance a good move, maybe even a necessary one.

For years the Chinese — especially, but not exclusively, a Shanghai-based department of the People’s Liberation Army called Unit 61398 (where all of the indicted officers work) — have been hacking into the computer networks of U.S. corporations, defense firms and financial institutions. President Obama and a few Cabinet secretaries have raised the issue in several diplomatic forums. Each time, Chinese officials have denied the charges and challenged the Americans to produce some evidence. The indictment is, in this sense, the reply: Here is the evidence — and in staggering detail.

When Obama tried to spark a dialogue on the issue last June, at the summit in Palm Springs, California, Chinese President Xi Jinping called him out on the hypocrisy. The first leaks from Edward Snowden had just appeared, revealing that the United States was hacking into Chinese networks. How, Xi asked, could Obama complain about Chinese hacking when he was hacking, too? (Of course, Xi still denied that his government was responsible for any of it.)

U.S. officials, then and now, have drawn a distinction: China hacks into our computer networks to steal secrets and enrich its state-run corporations; the United States hacks into Chinese networks only to protect national security. The Chinese and others, including many American critics, have scoffed at the fine line. First, to China, economic enrichment is national security. Second, to some, hacking is hacking is hacking.

In fact, though, there are real distinctions here. The Chinese cyberwarfare units don’t just hack into corporate networks for trade secrets. They also – just like their counterparts in the United States, Russia, Britain, France, Israel, Iran, North Korea and other countries — hack into military and intelligence networks for national security secrets. The Obama administration is saying: The latter, the realm of traditional spying, is fair game; the former, the cyber-age equivalent of industrial espionage, is not.

For some time Obama has said he wants to negotiate “rules of the road” for this new, anarchic domain of cybertools and cyberweapons, laying out which kinds of networks are legitimate military targets and which kinds are vital to the workings of a civil, lawful society — and should, therefore, be protected (whether by treaty, international law, mutual asset, or whatever) from nation-state hackers.

Obama has made repeated overtures to the Chinese because they are the world’s most indiscriminate hackers and because the two nations have other diplomatic ties and interests; in other words, diplomacy on this issue with China is a plausible notion. The indictment is Obama’s way of turning up the pressure — and of showing just how much we know about what they’re doing. (The Chinese may think they’ve deeply penetrated the world of U.S. secrets; but they may not have known, till now, just how deeply we’ve penetrated their own — so much so that, when they hack into American networks, we see what their hackers are seeing.)

The indictment is interesting not only for the crimes it’s seeking to punish, but also for the crimes it’s letting brush by. The statutes that the Justice Department cites fall mainly under 18 U.S. Code 1030, “Fraud and related activity in connection with computers.” The Chinese hackers are charged under those sections of the statute that deal with gaining access to files of financial value — but not other sections that deal with damage to national security, although there’s plenty of evidence that they engage in that sort of hacking as well. An explicit decision was made to ignore that sort of hacking, to draw a distinction between military and industrial espionage.

It’s not that Obama is giving military hackers a free ride. The Pentagon spends billions of dollars a year trying to make its own networks more secure. But he recognizes this is what militaries do.

Unit 61398 made headlines just over a year ago, in February 2013, when The New York Times reported, based on a study by the Mandiant, a leading cybersecurity contractor, that the super-secret Chinese military unit had hacked into the newspaper’s computer networks. This was the first time many people had heard of not just Unit 61398 but of nation-state hacking as a serious problem generally. In fact, though, it’s been going on for two decades.

In the fall of 1997, the Joint Chiefs of Staff conducted a top-secret exercise known as Eligible Receiver, in which a 25-man Red Team from the National Security Agency — using off-the-shelf commercial equipment — hacked into the major computer networks of the Defense Department, the military services, and several U.S. combatant commands worldwide. The exercise spurred the first official steps to beef up the security of the military’s computers. The threat wasn’t hypothetical. When the Red Team players were hacking into the Pentagon networks, they saw traces of Russian and French hackers who were already there. (The NSA had been hacking into foreign networks, too.) Soon after the exercise, the Pentagon ordered “intrusion detection systems” to be installed on all Defense Department computers. Instantly, they detected hundreds of intrusions a week. The pattern continues to this day — with many nations hacking, and getting hacked, nonstop.

In this sense, hacking isn’t much different from other forms of espionage through the ages. But in two ways, it’s very different. First, in the cyber-age, a nation doesn’t need to send spies abroad. Instead, with some computers and a few dozen trained specialists, it can spy remotely – and therefore cheaply. (North Korea, for instance, is said to have an excellent cyberwarfare unit.)

Second, because the Internet opens into a single worldwide network, hacking into even a piece of that network opens up the possibilities of vast penetration — and destruction. Almost everything is plugged into this network — personal email, industrial secrets, household appliances, and even the workings of electrical power grids, water supplies, dams: increasingly, everything. One of the worries in new-age strategic thinking is that, in an attempt to gain leverage in an armed conflict, one side might launch — or threaten to launch — a cyber-attack that turned out the lights in a major city. It’s known that foreign cyberwarfare units are already poking around in these infrastructure networks — their digital traces have been spotted — just as our cyber-units poke around in similar networks abroad. It would be very hard to launch an effective cyberstrike that shut down, say, a power grid or some waterworks. But fundamentally, it would not be so different from a cyberstrike that disabled a newspaper’s network or hacked into a bank’s credit card records or stole a manufacturer’s trade secrets.

These worries — about the financial costs inflicted today and the possible war scenarios spun out tomorrow – are why many people involved in this field are calling for the world’s leaders to draft “rules of the road.” The Chinese, who are the most suitable collaborators on such a project, have resisted all such calls for negotiation. Maybe the indictment will shock them into a dialogue. Maybe not.

It’s worth a shot.

Fred Kaplan is the author of “The Insurgents” and the Edward R. Murrow press fellow at the Council on Foreign Relations.

© 2014, Slate

Read more From Our Inbox stories from the Miami Herald

  • A GOP ultimatum to Vlad

    With the party united, the odds are now at least even that the GOP will not only hold the House but also capture the Senate in November.

  • College cost not big problem for poor students

    To judge by this summer’s banner policy proposals, the most important question for higher-education reform right now is giving students easier access to loans. But evidence from Canada suggests those changes won’t address the greater need: Getting more kids from poor families into college, the key to moving up in an increasingly unequal society.

  • Torture is not a public relations problem

    The CIA is on a “charm offensive.”

Miami Herald

Join the
Discussion

The Miami Herald is pleased to provide this opportunity to share information, experiences and observations about what's in the news. Some of the comments may be reprinted elsewhere on the site or in the newspaper. We encourage lively, open debate on the issues of the day, and ask that you refrain from profanity, hate speech, personal comments and remarks that are off point. Thank you for taking the time to offer your thoughts.

The Miami Herald uses Facebook's commenting system. You need to log in with a Facebook account in order to comment. If you have questions about commenting with your Facebook account, click here.

Have a news tip? You can send it anonymously. Click here to send us your tip - or - consider joining the Public Insight Network and become a source for The Miami Herald and el Nuevo Herald.

Hide Comments

This affects comments on all stories.

Cancel OK

  • Marketplace

Today's Circulars

  • Quick Job Search

Enter Keyword(s) Enter City Select a State Select a Category