World Library  
Flag as Inappropriate
Email this Article

Cyberwarfare in China

Article Id: WHEBN0029351291
Reproduction Date:

Title: Cyberwarfare in China  
Author: World Heritage Encyclopedia
Language: English
Subject: Cyberwarfare in China, Advanced persistent threat, Foreign relations of China, China–United States relations, Academic publishing in China
Publisher: World Heritage Encyclopedia

Cyberwarfare in China

The nature of cyberwarfare in the People's Republic of China is difficult to assess. Government officials in India and the United States have traced various attacks on corporate and infrastructure computer systems in their countries to computers in the People's Republic of China. However, "It is nearly impossible to know whether or not an attack is government-sponsored because of the difficulty in tracking true identities in cyberspace."[1][2] China has denied accusations of cyberwarfare,[3] and has accused the United States of engaging in cyberwarfare against it, which the US government denies.[4][5][6][7][8][9][10] A number of private computer security firms have stated that they have growing evidence of cyber-espionage efforts originating from China, including the "Comment Group".[11] In May 2014 a Federal Grand Jury in the United States indicted five PLA Unit 61398 officers on charges of theft of confidential business information from U.S. commercial firms and planting malware on their computers.[12][13]

According to former Chinese University of Hong Kong, and were among the 61,000 of hacker attacks carried out by the United States globally.[14][15][16]


[17] Nationalist groups, he says, such as "patriotic hacker associations", are often used as "foot soldiers" or "proxies".[17]

While China has long been suspected of cyber spying, on May 24, 2011 the People's Liberation Army announced the existence of their cyber security squad.[18]

By nation


In May 2013, [19] The cyber security concerns also excluded Huawei from Australian broadband project.[20]


Officials in the Canadian government claim that Chinese hackers have compromised several departments within the federal government in early 2011, though the Chinese government has refused involvement.[21]

Canada's Chief Information Officer claims that Chinese hackers compromised computer systems within the National Research Council in 2014.[22]


Officials in the Indian government have alleged that attacks on Indian government networks, such as that of the Indian National Security Council, have originated in China. According to the government, Chinese hackers are experts in operating up botnets.[23]

Fears of Chinese cyberespionage have resulted in the blocking of deals with Chinese telecoms, like Huawei and ZTE,[24] due to their ties with the Chinese military.[23] Huawei was also accused of breaching national security of India by hacking base station controller in Andhra Pradesh (AP).[25] As a result foreign telecom companies may face opposition and lesser market share in India.[26]

United States

The United States has accused the People's Republic of China of implementing cyberwarfare and cyberespionage against American interests, accessing the networks of important military, commercial, research, and industrial organisations. A Congress advisory group has declared China "the single greatest risk to the security of American technologies"[27] and that "there has been a marked increase in cyber intrusions originating in China and targeting U.S. government and defense-related computer systems".[27] According to the Washington Post, China allegedly manipulates security exploits existing in websites, sending out hijacked email attachments with malicious software. Intrusion is especially worrying since the intruder can control the hijacked computer from a remote location, with the ability to steal important files, monitor the user's activity, and read the user's email.[28] Users are typically unaware that they are being spied; the infected attachment is disguised as a mundane topic from a familiar contact, fooling the user into unwittingly setting off a program that silently infects the person's computer.[29] Traces of the malware are hidden by rootkits, which prevent the person from being aware that data is being stolen.[29]

In January 2010, Google reported on targeted attacks on its corporate infrastructure originating from China "that resulted in the theft of intellectual property from Google". Apparently, the Gmail accounts of two human rights activists were compromised in the raid on Google's password system.[30] American security experts connected the Google attack to various other political and corporate espionage efforts originating from China, including espionage against military, commercial, research, and industrial corporations. Obama administration officials have called the cyberattacks "an increasingly serious cyber threat to US critical industries".[28]

In addition to Google, at least 34 companies have been attacked. Reported cases include Northrop Grumman, Symantec, Yahoo, Dow Chemical, and Adobe Systems.[31] Cyberespionage has been aimed at both commercial and military interests, especially areas in which China lags. Technology companies have claimed that China has sought out source code,[32] along with general information on weapon systems, to develop the software that China needs in both its economic and military pursuits. The source code was stolen using vulnerabilities found in Adobe Reader, which the hackers used to spread malicious software.[32] Chinese cyberattacks have emphasized what senior US Government officials have said is an increasingly serious cyber threat to US critical industries.

China has denied accusations of cyberwarfare,[3] and has accused the United States of engaging in cyberwarfare against it, accusations which the United States denies.[4] Wang Baodong of the Chinese Embassy in the United States responded that the accusations are a result of sinophobic paranoia.[3] He states that, "China would never do anything to harm sovereignty or security of other countries. In conformity with such national policies, the Chinese government has never employed, nor will it employ so-called civilian hackers in collecting information or intelligence of other countries. Allegations against China in this respect are totally unwarranted, which only reflect the dark mentality of certain people who always regard China as a threat."[3] Amitai Etzioni of the Institute for Communitarian Policy Studies has suggested that cyberspace could be a fruitful realm for the United States and China to implement a policy of mutually assured restraint. This would involve allowing both states to take the measures they deem necessary for their self-defense while simultaneously agreeing to refrain from taking offensive steps; it would also entail vetting these commitments.[33]

Diplomatic cables highlight US concerns that China is using access to Microsoft source code and 'harvesting the talents of its private sector' to boost its offensive and defensive capabilities.[34]

As of March 2013, high level discussions continued.[35]

In September 2014, Senate Armed Services Committee's probe found : Hackers associated with the Chinese government have repeatedly infiltrated the computer systems of U.S. airlines, technology companies and other contractors involved in the movement of U.S. troops and military equipment.[36] In October 2014, The U.S. Federal Bureau of Investigation said that hackers it believes to be backed by the Chinese government have recently launched attacks on U.S. companies.[37]


Although the vast majority of experts have concluded that the Stuxnet virus targeting Iran originated from Israel,[38][39][40] which is known to engage in cyberwarfare, American cyberwarfare expert Jeffrey Carr has implicated China as one of the possible states where Stuxnet could have originated. His rationale is that the countries Stuxnet targeted happened to be rich in resources such as copper, gold, and iron ore, that are especially important for China in a period of high economic growth.[41] However, China has also been a victim of the Stuxnet virus. The virus has reportedly infected millions of computers in the nation, wreaking much havoc, because the virus can control industrial machinery.[42]

IP hijacking

In late November 2010, a U.S. Defense Department spokesman said the department was aware that Internet traffic was rerouted briefly through China earlier in the year. The United States-China Economic and Security Review Commission charged in its annual report that state-owned China Telecom advertised erroneous network routes that instructed "massive volumes" of U.S. and other foreign Internet traffic to go through Chinese servers during an 18-minute stretch on April 8. China's Foreign Ministry condemned the commission's report, while China Telecom separately denied the charge that it "hijacked" U.S. Internet traffic.[43]

See also


  1. ^ Gorman, Siobhan (April 8, 2009). "Electricity Grid in U.S. Penetrated By Spies".  
  2. ^ Fox News: Video
  3. ^ a b c d "China's Response to BusinessWeek".  
  4. ^ a b Zetter, Kim (January 25, 2010). "China Accuses US of Cyberwarfare".  
  5. ^ Nakashima, Ellen, "Report on ‘Operation Shady RAT’ identifies widespread cyber-spying", Washington Post, August 3, 2011.
  6. ^ Anderlini, Jamil (January 15, 2010). "The Chinese dissident’s ‘unknown visitors’". Financial Times. 
  7. ^ "China Denies Role in Reported Government of Canada Hack".  
  8. ^ Macartney, Jane (December 5, 2007). "China hits back at 'slanderous and prejudiced' alert over cyber spies". The Times (London). Retrieved April 7, 2008. 
  9. ^ Barnes, Julian E. (March 4, 2008). "China's computer hacking worries Pentagon". Los Angeles Times. Archived from the original on March 10, 2008. Retrieved March 4, 2008. 
  10. ^ Brookes, Peter (March 13, 2008). "Flashpoint: The Cyber Challenge: Cyber attacks are growing in number and sophistication". Family Security Matters. Retrieved April 7, 2008. 
  11. ^ Riley, Michael, and Dune Lawrence, "Hackers Linked to China’s Army Seen From EU to D.C.", Bloomberg L.P., 27 July 2012
  12. ^ Finkle, J., Menn, J., Viswanatha, J. U.S. accuses China of cyber spying on American companies. Reuters, Mon May 19, 2014 6:04pm EDT.
  13. ^ Clayton, M. US indicts five in China's secret 'Unit 61398' for cyber-spying. Christian Science Monitor, May 19, 2014
  14. ^ Warren, Lydia (June 12, 2013). "NSA whistleblower Edward Snowden says U.S. government has been hacking Chinese universities, businesses and politicians for FOUR YEARS as he finally breaks cover". Daily Mail (London). 
  15. ^ 
  16. ^
  17. ^ a b Elegant, Simon (November 18, 2009). "Cyberwarfare: The Issue China Won't Touch". Time Magazine. Retrieved October 25, 2010. 
  18. ^ Beech, Hannah. "Meet China's Newest Soldiers: An Online Blue Army." Time Magazine, May 27, 2011.
  19. ^
  20. ^ "Cyber Security Concerns Excluded Huawei From Australian Broadband Project". Centre Of Excellence For Cyber Security Research And Development In India (CECSRDI). April 16, 2013. Retrieved August 15, 2014. 
  21. ^ "Foreign hackers attack Canadian government". CBC. February 16, 2011. Retrieved February 17, 2011. 
  22. ^ "Chinese cyberattack hits Canada's National Research Council". CBC. July 29, 2014. Retrieved July 29, 2014. 
  23. ^ a b "China mounts cyber attacks on Indian sites". Times of India (India). May 5, 2008. Retrieved October 25, 2010. 
  24. ^ "Huawei And ZTE In Telecom Security Tangle Of India". Perry4Law's Techno Legal Base (PTLB TM/SM) Blog. January 23, 2012. Retrieved August 15, 2014. 
  25. ^ "Huawei Accused Of Breaching National Security Of India By Hacking Base Station Controller In AP". Centre Of Excellence For Cyber Security Research And Development In India (CECSRDI). December 31, 2013. Retrieved August 15, 2014. 
  26. ^ "Foreign Telecom Companies May Face Opposition And Lesser Market Share In India". Cyber Law, Cyber Security, Telecom Laws And Telecom Security Legal Due Diligence And Statutory Compliance Services In India. December 31, 2013. Retrieved August 15, 2014. 
  27. ^ a b Claburn, Thomas. "China Cyber Espionage Threatens U.S., Report Says".  
  28. ^ a b Cha, Ariana Eunjung and Ellen Nakashima, "Google China cyberattack part of vast espionage campaign, experts say," The Washington Post, January 14, 2010.
  29. ^ a b McMillan, Robert. "Report Says China Ready for Cyber-war, Espionage".  
  30. ^ "Google cyberattack hit password system" NY Times, Reuters, April 19, 2010.
  31. ^ Jacobs, Andrew; Helft, Miguel (January 12, 2010). "Google, Citing Attack, Threatens to Exit China". The New York Times. Retrieved November 1, 2010. 
  32. ^ a b Zetter, Kim (January 13, 2010). "Google Hackers Targeted Source Code of More Than 30 Companies".  
  33. ^ Etzioni, Amitai, "MAR: A Model for US-China Relations," The Diplomat, September 20, 2013, [1].
  34. ^ "US embassy cables: China uses access to Microsoft source code to help plot cyber warfare, US fears". The Guardian (London). December 4, 2010. Retrieved December 31, 2010. 
  35. ^ U.S. Presses on Cyberthreats; In Beijing, Treasury Secretary Frames Issue as a Top Priority in Ties With China March 20, 2013 Wall Street Journal
  36. ^ Chinese hacked U.S. military contractors, Senate panel finds September 18, 2014
  37. ^ FBI warns U.S. businesses of cyber attacks, blames Beijing October 16, 2014
  38. ^ Halliday, Josh (September 24, 2010). "'"Stuxnet worm is the 'work of a national government agency. The Guardian (London). Retrieved September 27, 2010. 
  39. ^ Hounshell, Blake (September 27, 2010). "6 mysteries about Stuxnet". Foreign Policy. Retrieved September 28, 2010. 
  40. ^ "The Stuxnet worm: A cyber-missile aimed at Iran?". The Economist. September 24, 2010. Retrieved September 28, 2010. 
  41. ^ Miks, Jason. "Was China Behind Stuxnet?".  
  42. ^ "Stuxnet 'cyber superweapon' moves to China".  
  43. ^ Wolf, Jim (November 19, 2010). "Pentagon says "aware" of China Internet rerouting". Reuters. Retrieved November 26, 2010. 
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.