Sorry!! The article you are trying to read is not available now.
Thank you very much;
you're only a step away from
downloading your reports.

Report: Chinese Espionage 'Growing and Persistent Threat' to US Economy

By

And China's "increasingly creative and resourceful" cyber spying could also affect the US military's "readiness and ability to operate."

PrintPRINT
MINYANVILLE ORIGINAL

Chinese companies are gaining an unfair advantage with the state's backing, according to [PDF] the US-China Economic and Security Review Commission's 2012 Report to Congress.

Released yesterday, the federally-mandated annual assessment of Sino-American relations and the associated national security implications maintains that "Chinese actors are the world's most active and persistent perpetrators of economic espionage," which has created "a growing and persistent threat to US economic security."

While the Commission's report covers a range of issues, there appears to be particular concern over China's "increasingly creative and resourceful" cyber spying -- which could also affect the US military's "readiness and ability to operate."

"Although most China-based activity observed over the past year relied on basic and straightforward techniques, a series of new developments suggest Chinese exploitation capabilities are improving significantly," the report says. "Irrespective of sophistication, the volume of exploitation attempts yielded enough successful breaches to make China the most threatening actor in cyberspace."

Following Orders?

Though the Commission says "it is unclear whether the Chinese state directs all of this activity," the "theft of industrial secrets through cyber espionage is apparently Chinese state policy."

As the state controls "up to" 50% of the Chinese economy -- and designates seven so-called "strategic" industries, including armaments, power generation and distribution, oil and petrochemicals, telecom, coal, civil aviation, and shipping -- the Commission believes cyber attacks from China targeting these industries have "a particularly high likelihood of state sponsorship."

Some incursions have been particularly effective. "Deliberate targeting" by Chinese hackers in 2009 "totally compromised" six to eight subcontractors working on the F-35 Joint Strike Fighter program, according to Lockheed Martin (NYSE:LMT) officials. The program's three prime contractors -- Lockheed Martin, Northrop Grumman (NYSE:NOC), and BAE Systems (LON:BA) -- were "repeatedly" targeted by hackers identified by reports as Chinese. And just last month, Cisco (NASDAQ:CSCO) released excerpts from a confidential report regarding patent infringement by Huawei, a Chinese competitor. One reads, "The exactness of the comments and spacing [in an evaluated Huawei product] not only indicate that Huawei has access to the Cisco code but that the Cisco code was electronically copied and inserted."

"Most companies -- and countries -- are too willing to turn a blind eye to this and just not acknowledge it; it's too politically fraught," Jarrett Kolthoff, a former US counterintelligence agent and the current president and CEO of cyber counterintelligence firm SpearTip, told me recently. "But civilian entities are finally waking up to the fact that businesses don't play nice. Whether that's an insider that didn't receive the promotion or bonus they wanted, or a competitor overseas, there are no rules of engagement."

Hard Answers Difficult to Get

A 2012 study from Akamai Technologies (NASDAQ:AKAM) cited by the Commission claims that 16% of Internet "attack traffic" originates in China, "more than any other country in the world."

And, as former Vice Chairman of the US Joint Chiefs of Staff James Cartwright testified earlier this year, "[T]he clear paths back into servers and other mechanical devices inside of the Chinese sovereign domain remain a constant problem for us."

Dr. Craig Labovitz, co-founder and CEO of DeepField Networks (and a former Microsoft research scientist) says, "[T]his is not hype."

"There are real issues here," he tells me. "Large sections of the North American Internet are scanned multiple times a day from boxes overseas. Usually, the scanning is a handful of packets (i.e., negligible traffic) looking for commonly exploitable services."
< Previous
No positions in stocks mentioned.
The information on this website solely reflects the analysis of or opinion about the performance of securities and financial markets by the writers whose articles appear on the site. The views expressed by the writers are not necessarily the views of Minyanville Media, Inc. or members of its management. Nothing contained on the website is intended to constitute a recommendation or advice addressed to an individual investor or category of investors to purchase, sell or hold any security, or to take any action with respect to the prospective movement of the securities markets or to solicit the purchase or sale of any security. Any investment decisions must be made by the reader either individually or in consultation with his or her investment professional. Minyanville writers and staff may trade or hold positions in securities that are discussed in articles appearing on the website. Writers of articles are required to disclose whether they have a position in any stock or fund discussed in an article, but are not permitted to disclose the size or direction of the position. Nothing on this website is intended to solicit business of any kind for a writer's business or fund. Minyanville management and staff as well as contributing writers will not respond to emails or other communications requesting investment advice.

Copyright 2011 Minyanville Media, Inc. All Rights Reserved.
PrintPRINT

Busy? Subscribe to our free newsletter!

Submit
 

WHAT'S POPULAR IN THE VILLE