China's Cyber Spies

COMMENTARY Defense

China's Cyber Spies

Nov 13, 2008 2 min read
COMMENTARY BY

Former Senior Research Fellow, Center for National Defense

Peter researched and developed Heritage’s policy on weapons of mass destruction and counter proliferation.

Got news for you: The Chinese are eating our cyber lunch.

In the last few weeks, the media have been filled with reports of Chinese cyber spies penetrating the computer networks of both presidential campaigns and even the White House, reading unclassified, but clearly privileged, e-mails.

Unfortunately, that's only the beginning of it.

No surprise that the Chinese would be interested in what's being said in the White House, even the non-secret stuff. White House staffers have access to plenty of information that would be of interest to the chaps in Zhongnanhai (the Chinese leadership compound).

For instance, Beijing would be especially keen to read the chitchat about the financial crisis and how Washington planned to act on it. In fact, such information could've led to China's decision to prime its own pump with nearly $600 billion in stimulus this week.

They'd probably also be interested in even idle White House gossip about the new president-elect, Barack Obama, who hasn't yet met with senior Chinese leaders such as President Hu Jintao, preventing them from sizing him up in person.

Snooping on the political campaigns makes perfect sense, too. Intruding into both John McCain and Obama's computer networks - essentially looking over the shoulders of campaign staff - might give Beijing a sense of where the incoming president might go on issues important to China.

Beijing would love to know the inside skinny on how the candidates really feel about trade policies, human and religious rights and, of course, support for Taiwan, especially US weapons sales.

China's hacker army is also targeting American industry for espionage, especially the defense industry, where new weapons systems and top-of-the-line defense technology are at the center of the bull's eye.

Hey, why spend billions of dollars and years to develop a sophisticated weapons system when you can steal data on it with a few keystrokes on a laptop and an Internet connection?

The same is true with the civilian side of private industry. Beijing is pilfering the technology of US and other foreign firms that set up shop on Chinese soil. In fact, some firms resist putting cutting-edge research and development there for exactly that reason.

Since traditional espionage can be tough in a foreign country (recruiting a spy to pinch information can be expensive, difficult and politically risky), the Chinese have turned to cyberspace. This makes it difficult, if not impossible, to determine who's picked your pocket, providing plausible deniability to the cyber spook. Spies cover their electronic tracks by routing their penetration through any number of surrogate servers around the world, making finger-pointing difficult.

Not surprisingly, the amount of industrial cyber espionage is grossly underreported, as firms fret over acknowledging that their intellectual property - the crown-jewels of their efforts - has been "exfiltrated."

That's probably not something they want to announce to their stockholders or Wall Street.

In the end, the Chinese aren't only stealing our industrial and defense secrets, but something more important: our ability to compete globally.

America's great strength has been its ability to innovate - to develop new ideas and concepts. Arguably, no country in history has been as ground-breaking in as many fields as Uncle Sam. It's something we've a right to be proud of.

The theft of our intellectual property - by anyone - means we'll be less able to compete in international markets as well as protect our security interests, including against the likes of a rising China, destined to be a peer competitor.

You can't blame the Chinese for reading our mail. But now it's time for some more American ingenuity: finding the means to end China's ability - or anyone else's - to steal the genius that comes from the sweat of our brows.

Peter Brookes is a senior fellow at The Heritage Foundation and a former Pentagon official.

First appeared in the New York Post

Exclusive Offers

5 Shocking Cases of Election Fraud

Read real stories of fraudulent ballots, harvesting schemes, and more in this new eBook.

The Heritage Guide to the Constitution

Receive a clause-by-clause analysis of the Constitution with input from more than 100 scholars and legal experts.

The Real Costs of America’s Border Crisis

Learn the facts and help others understand just how bad illegal immigration is for America.