Is the Chinese army hacking American computers?


Uncovering a Motive for Chinese Cyberattacks
The attack on the New York Times is believed to be a result of the paper's planned reporting on Chinese premier Wen Jiabao.
The attack on the New York Times is believed to be a result of the paper's planned reporting on Chinese premier Wen Jiabao.
© Liu Jiansheng/Xinhua Press/Corbis

When it comes to cyberattacks by Chinese hackers on U.S. companies and government entities, the reigning question is "why?"

Could hacking be a new and faceless version of war waged remotely? Is the endgame designed to plunge the U.S. into a pre-technology state? These are questions President Obama alluded to in his 2013 State of the Union address, saying, "We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, our air traffic control systems" [source: The White House].

Some suspect the computer attacks are actually a new version of corporate espionage designed to bolster the Chinese economy by providing access to proprietary information. It's worth noting, however, that a Chinese government-issued attack on America's financial markets, transportation systems or power grid would also affect China. China is now one of the largest investors in oil and gas in the U.S.; an attack would devalue China's U.S. investments and interrupt its flow of exports [sources: Corsi, Perlroth].

Sometimes, the information-gathering efforts of Chinese hackers take on a more political and personal angle. Take the four-month infiltration of the New York Times, for example. Just as the newspaper was set to publish a potentially embarrassing article about a wealthy Chinese leader (it would reveal how premier Wen Jiabao amassed more than $2 billion, breaking basic Communist tenets), hackers using Chinese university computers uncovered Times reporters' passwords and then used that information to access 53 of the employees' personal computers. They also snuck into the e-mail accounts of the newspaper's bureau chiefs in Shanghai and India. The computers the hackers used were the same computers previously used by the Chinese military to breach U.S. military contractors [sources: Associated Press, Perlroth].

In the midst of the controversy surrounding its cyber actions, China is deflecting blame. According to China's state news agency, the country is actually a victim in the cyber espionage game rather than an aggressor. In fact, China's state news agency reveals there are 1.29 million hacked host computers in China that are controlled by U.S. servers [source: Estes]. And China's defense ministry reports two-thirds of its military hacking attempts came from the U.S. in 2012 [source: Wee].

Wherever the blame lies, many countries are taking a hard look at how they protect government and corporate information. The U.S. and China are among those calling for the world's most technologically advanced nations to forge new rules of engagement. In addition to the obvious -- like not breaking into other countries' computers -- the guidelines would require nations to ferret out hackers operating within their borders, and set up global norms for cyberspace behavior [source: Landler].

Author's Note: Is the Chinese army hacking American computers?

Perhaps the greatest threat is not the one getting the most ink. An intense campaign of cyberassaults against U.S. computers has originated in Iran, too. Among other targets, these attacks are believed to have infiltrated American banks. And, says House Intelligence Committee Chairman Mike Rogers, this places critical information at risk, especially when it comes to federal, military and infrastructure operations. While Rogers and other lawmakers are calling for new cyber regulations -- including some that would require companies to share information on hacker threats or breaches -- it's like naming a baby at his first birthday. Great idea, just a little late.

Related Articles

Sources

  • Associated Press. "NY Times Says Chinese Hacked its Computers over Story on Top Communist Leader's Wealth." Fox News. Jan. 31, 2013. (March 10, 2013) http://www.foxnews.com/world/2013/01/31/new-york-times-say-its-computer-networks-were-repeatedly-hacked-by-chinese/
  • Estes, Adam Clark. "Framing Itself as a Victim, China Calls for a Global Crackdown on Hackers." The Atlantic Wire. March 10, 2013. http://www.theatlanticwire.com/global/2013/03/framing-itself-victim-china-calls-global-crackdown-hackers/62940/
  • Goldman, David. "Hacker Hits on U.S. Power and Nuclear Targets Spiked in 2012." CNN. Jan. 9, 2013. (March 10, 2013) http://money.cnn.com/2013/01/09/technology/security/infrastructure-cyberattacks/index.html
  • Landler, Mark. "U.S. Demands That China End Hacking and Set Cyber Rules." The New York Times. March 11, 2013. http://www.nytimes.com/2013/03/12/world/asia/us-demands-that-china-end-hacking-and-set-cyber-rules.html
  • Lawrence, Dune. "A Chinese Hacker's Identity Unmasked." Business Week. Feb. 14, 2013. (March 10, 2013) http://www.businessweek.com/articles/2013-02-14/a-chinese-hackers-identity-unmasked#p1
  • Mandiant. "APT1: Exposing One of China's Cyber Espionage Units." (March 10, 2013) http://intelreport.mandiant.com
  • Perlroth, Nicole. "As Hacking Against U.S. Rises, Experts Try to Pin Down Motive." The New York Times. March 3, 2013. (March 10, 2013) http://www.nytimes.com/2013/03/04/us/us-weighs-risks-and-motives-of-hacking-by-china-or-iran.html?pagewanted=all&_r=1&
  • Perlroth, Nicole. "Attacks on Six Banks Frustrate Customers." The New York Times. Sept. 30, 2012. (March 10, 2013) http://www.nytimes.com/2012/10/01/business/cyberattacks-on-6-american-banks-frustrate-customers.html
  • Perlroth, Nicole. "Hackers in China Attacked The Times for Last Four Months." The New York Times. Jan. 30, 2013. (March 10, 2013) http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all
  • Perlroth, Nicole. "Internet Sleuths Add Evidence to Chinese Military Hacking Accusations." The New York Times. Feb. 27, 2013. (March 10, 2013) http://bits.blogs.nytimes.com/2013/02/27/internet-sleuths-add-evidence-to-chinese-military-hacking-accusations/
  • Reuters. "China Says U.S. is Top Source of Hacking Attacks on Country." March 10, 2013. http://www.reuters.com/article/2013/03/10/us-china-hacking-idUSBRE92902F20130310
  • Rodriguez, Salvador. "Cyber Attacks on the Rise and More Costly, Study Says." Los Angeles Times. Aug. 2, 2011. (March 10, 2013) http://latimesblogs.latimes.com/technology/2011/08/rising-costs-suggest-cyber-crimes-getting-worse-study-shows-.html
  • Saarinen, Juha. "Chinese Hackers Infiltrated Reserve Bank." IT News. March 11, 2013. http://www.itnews.com.au/News/336011,chinese-hackers-infiltrated-reserve-bank.aspx
  • Sanger, David. "Chinese Army Unit is seen as Tied to Hacking against U.S." The New York Times. Feb. 18, 2013. (March 10, 2013) http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?pagewanted=all&_r=0
  • Taipei Times. "Taiwan, U.S. to Cooperate on Cybersecurity." Feb. 23, 2013. (March 10, 2013) http://www.taipeitimes.com/News/taiwan/archives/2013/02/23/2003555507
  • Taylor, Paul. "Anatomy of a Cyberattack." Financial Times. Aug. 10, 2011. (March 10, 2013) http://www.ft.com/intl/cms/s/0ec77afc-c2cc-11e0-8cc7-00144feabdc0,Authorised=false.html?_i_location=http%3A%2F%2Fwww.ft.com%2Fcms%2Fs%2F0%2F0ec77afc-c2cc-11e0-8cc7-00144feabdc0.html&_i_referer=
  • The White House. "Remarks by the President in the State of the Union Address." Feb. 12, 2013. (March 10, 2013) http://www.whitehouse.gov/the-press-office/2013/02/12/remarks-president-state-union-address

More to Explore