Commentary Magazine


Topic: cyber attacks

Start Retaliating for Chinese Cyber Attacks

The Chinese government is issuing ludicrously unconvincing denials of the report issued by the Internet security firm Mandiant that a specific unit of the People’s Liberation Army—Unit 61398 based in an office-building in Shanghai–is responsible for many of the worst cyber attacks on American companies and governmental agencies. “Chinese military forces have never supported any hacking activities,” a spokesman for the Chinese defense ministry said at a press briefing. “The claim by the Mandiant company that the Chinese military engages in Internet espionage has no foundation in fact.”

Uh right. And if you believe that then no doubt the spokesman also has some nice swampland near Shanghai to sell you.

Read More

The Chinese government is issuing ludicrously unconvincing denials of the report issued by the Internet security firm Mandiant that a specific unit of the People’s Liberation Army—Unit 61398 based in an office-building in Shanghai–is responsible for many of the worst cyber attacks on American companies and governmental agencies. “Chinese military forces have never supported any hacking activities,” a spokesman for the Chinese defense ministry said at a press briefing. “The claim by the Mandiant company that the Chinese military engages in Internet espionage has no foundation in fact.”

Uh right. And if you believe that then no doubt the spokesman also has some nice swampland near Shanghai to sell you.

There is in fact little doubt of the Mandiant report’s veracity because it tallies with so many other findings from many other sources–including the U.S. intelligence community—about China’s very active computer hacking program which is at the core of its aggressive campaign of economic espionage. What really makes these activities especially chilling is this revelation in the New York Times referring to a hacking team called the Comment Crew which is believed to be PLA-sponsored: “While Comment Crew has drained terabytes of data from companies like Coca-Cola, increasingly its focus is on companies involved in the critical infrastructure of the United States — its electrical power grid, gas lines and waterworks. According to the security researchers, one target was a company with remote access to more than 60 percent of oil and gas pipelines in North America.”

This strongly suggests that the PLA is not only intent on stealing secrets for China’s economic advantage. It is also, by all indications, preparing for the possibility of war with the United States at which time it could well set off previously planted “cyber bombs” that will blow up key infrastructure nodes, potentially plunging American cities into darkness, shutting down transportation networks, and so forth.

The question is what to do about all this? Chinese activities are offensive, dangerous and intrusive, but they are not a formal act of war as previously understood. So what should be the American response?

For a start the U.S. needs to stop respecting Chinese sensibilities by not being afraid to “name and shame” the perpetrators of these attacks, however much outrage it will cause in Beijing. Bringing such activities into the public light may well lead China to calculate that the public humiliation is not worth the price paid.

Assuming, however, that such cyber-attacks continue, a stiffer response could be warranted: namely retaliation in kind. If it is not already going on, it should be—the National Security Agency should be penetrating Chinese networks as aggressively as they penetrate ours to send a clear signal that two can play at this game. Only if we achieve a degree of deterrence will the Chinese government ultimately be convinced that such activities are too costly to engage in.

Read Less




Welcome to Commentary Magazine.
We hope you enjoy your visit.
As a visitor to our site, you are allowed 8 free articles this month.
This is your first of 8 free articles.

If you are already a digital subscriber, log in here »

Print subscriber? For free access to the website and iPad, register here »

To subscribe, click here to see our subscription offers »

Please note this is an advertisement skip this ad
Clearly, you have a passion for ideas.
Subscribe today for unlimited digital access to the publication that shapes the minds of the people who shape our world.
Get for just
YOU HAVE READ OF 8 FREE ARTICLES THIS MONTH.
FOR JUST
YOU HAVE READ OF 8 FREE ARTICLES THIS MONTH.
FOR JUST
Welcome to Commentary Magazine.
We hope you enjoy your visit.
As a visitor, you are allowed 8 free articles.
This is your first article.
You have read of 8 free articles this month.
YOU HAVE READ 8 OF 8
FREE ARTICLES THIS MONTH.
for full access to
CommentaryMagazine.com
INCLUDES FULL ACCESS TO:
Digital subscriber?
Print subscriber? Get free access »
Call to subscribe: 1-800-829-6270
You can also subscribe
on your computer at
CommentaryMagazine.com.
LOG IN WITH YOUR
COMMENTARY MAGAZINE ID
Don't have a CommentaryMagazine.com log in?
CREATE A COMMENTARY
LOG IN ID
Enter you email address and password below. A confirmation email will be sent to the email address that you provide.