US Charges Chinese Military Hackers With Cyber Espionage

The U.S. Department of Justice charged five Chinese military officers with hacking six U.S. companies and unions

3 min read
US Charges Chinese Military Hackers With Cyber Espionage
Illustration: Getty Images

Five Chinese military hackers became the first "state actors" ever charged by the U.S. Department of Justice with using "cyber means" to steal U.S. trade secrets. The unprecedented step seems to signal the Obama administration's determination to turn up the pressure on China for what the U.S. sees as rampant Chinese corporate espionage targeting U.S. businesses.

The announcement by the U.S. Department of Justice named five officers of China's People's Liberation Army indicted by a grand jury in the Western District of Pennsylvania on charges of computer hacking, economic espionage and other offenses, according to The Diplomat. U.S. Attorney General Eric Holder made the announcement on Monday while laying out the traditional U.S. stance on distinguishing cyber espionage from cyber attacks aimed at collecting national intelligence. More details were made available in a press release by the U.S. Department of Justice.

"This is a case alleging economic espionage by members of the Chinese military and represents the first ever charges against a state actor for this type of hacking. The range of trade secrets and other sensitive business information stolen in this case is significant and demands an aggressive response. Success in the global market place should be based solely on a company's ability to innovate and compete, not on a sponsor government's ability to spy and steal business secrets. This Administration will not tolerate actions by any nation that seeks to illegally sabotage American companies and undermine the integrity of fair competition in the operation of the free market."

The named victims of the five Chinese military hackers include six U.S. companies and unions: Westinghouse Electric, Alcoa, Allegheny Technologies Incorporated, U.S. Steel, the United Steelworkers Union and SolarWorld. The U.S. commercial interests supposedly harmed in this case include nuclear power and solar power companies, as well as the iron and steel industries.

China's Foreign Ministry reacted by condemning the U.S. indictment. It denied any cybertheft of trade secrets by the Chinese government or military, and described itself as the frequent victim of U.S. cybertheft, wiretapping, and surveillance. It also suspended the activities of the China-U.S. Cyber Working Group—a group set up last year to improve dialogue on cybersecurity issues—as an additional act of protest.

"This U.S. move, which is based on fabricated facts, grossly violates the basic norms governing international relations and jeopardizes China-US cooperation and mutual trust," said Qin Gang, a spokesperson for China's Foreign Ministry, in a press release.

There is little doubt that both the U.S. and Chinese governments regularly attempt to hack one another's government agencies, military networks and companies for "national security" purposes. For instance, U.S. National Security Agency documents leaked by former contractor Edward Snowden show how the NSA allegedly infiltrated the internal networks of Chinese telecom giant Huawei—part of a broader U.S. intelligence effort to find any suspicious links between Huawei and the Chinese military.

But the U.S. government has drawn a strong distinction between hacking in the name of national security and hacking in the name of stealing trade secrets and committing economic espionage. The latter has been a longstanding sore point for many U.S. companies that feel victimized by Chinese hackers, but the fact that the U.S. Department of Justice has laid out charges against specific individuals within the Chinese military suggests it's gathering concrete evidence on such efforts.

Such a U.S. move is more symbolic than anything because China would undoubtedly refuse to extradite the named military hackers for prosecution, according to The Diplomat. It may also do little to improve U.S.-China relations or achieve a cyber detente, given how China could just as easily retaliate by bringing charges against the NSA for its hacking activities.

The Conversation (0)

How the FCC Settles Radio-Spectrum Turf Wars

Remember the 5G-airport controversy? Here’s how such disputes play out

11 min read
This photo shows a man in the basket of a cherry picker working on an antenna as an airliner passes overhead.

The airline and cellular-phone industries have been at loggerheads over the possibility that 5G transmissions from antennas such as this one, located at Los Angeles International Airport, could interfere with the radar altimeters used in aircraft.

Patrick T. Fallon/AFP/Getty Images

You’ve no doubt seen the scary headlines: Will 5G Cause Planes to Crash? They appeared late last year, after the U.S. Federal Aviation Administration warned that new 5G services from AT&T and Verizon might interfere with the radar altimeters that airplane pilots rely on to land safely. Not true, said AT&T and Verizon, with the backing of the U.S. Federal Communications Commission, which had authorized 5G. The altimeters are safe, they maintained. Air travelers didn’t know what to believe.

Another recent FCC decision had also created a controversy about public safety: okaying Wi-Fi devices in a 6-gigahertz frequency band long used by point-to-point microwave systems to carry safety-critical data. The microwave operators predicted that the Wi-Fi devices would disrupt their systems; the Wi-Fi interests insisted they would not. (As an attorney, I represented a microwave-industry group in the ensuing legal dispute.)

Keep Reading ↓Show less