Intelligence Adviser Warns China's Hacking is Hurting Relations, China Offers Talks
March 12, 2013 2:27 PM
comment(s) - last by
Accusations and counter-accusations hurl regarding hacking
The U.S. claims China
is actively stealing U.S. companies' intellectual property
and hacking the federal government. China
accuses American hackers
of attacking government sites and trying to stir insurrection. The strong accusations are
casting an awkward shadow
on America's relationship with its second largest trade partner, a nation that it heavily relies on for its manufacturing needs.
I. White House: China Hacking Must Stop
Following statements by the White House that there would be consequences for Chinese hacking,
National Security Adviser Thomas Donilo
at the Asian superpower this week. He said President Barack Obama wants a friendlier relationship with China, but that the hacking issues are stifling his hopes.
In a speech before the
in New York he accused China of creating "a growing challenge" to economic relations, via the hacking. He says that U.S. intellectual property is being stolen through "cyber intrusions emanating from China at a very large scale."
He says that the President is trying, noting that he "engaged with China at an unprecedented pace, including twelve face-to-face meetings with [departing Chinese Prime Minister] Hu Jintao."
He concludes, "We have worked hard to build a constructive bilateral relationship that allows us to engage forthrightly on priority issues. The United States and China, the world’s two largest economies, both dependent on the Internet, must lead the way in addressing this problem."
President Obama and Security Adviser Thomas Donilo [Image Source: White House/Flickr]
China gives a counter case-study in which if found 140,000 attacks a month to be directed against a pair of its government sites, with roughly two-thirds of those attacks being traced to the U.S.
U.S. research firm Mandiat labels the U.S. and China as the world's top two sources of attack traffic on the internet. China accounts for about a third of global attack traffic, while the U.S. is in second place, account for about a tenth of attack traffic.
II. China Sympathetic, But Military Officials Blast U.S.
At times China has responded to accusations with an aggressive counterattack, but this time it took a sympathetic tone. In a speech over the weekend Chinese Foreign Minister Yang Jiechi remarked, "[Cyberspace is] a community of common destiny. What cyberspace needs is not war, but rules and cooperation. We oppose turning cyberspace into another battlefield, or using the Internet as a new tool to interfere in other countries' internal affairs."
Foreign Ministry spokeswoman Hua Chunying told reporters in Beijing that her government was working to "protect peace, safety, openness and cooperation in cyberspace", including looking to protect the U.S.
She adds, "China is willing, on the basis of the principles of mutual respect and mutual trust, to have constructive dialogue and cooperation on this issue with the international community including the United States to maintain the security, openness and peace of the Internet."
One big question though is whether a February report by Mandiat is accurate. That report shows evidence that a number of the attacks on U.S. corporations and government networks were carried out by what is believed to be
a secret unit in China's military
Chinese Foreign Minister Yang Jiechi on Mar. 9 said the American media was exploiting the report for political gains and
said the report itself was on "shaky ground"
in terms of facts.
Maj. Gen. Liu Lianhua
, "This talk from the U.S. has no foundation whatsoever. And what evidence is there? There isn't any!"
China claims the U.S. is the real cyberaggressor. [Image Source: Asia Society]
Wang Hongguang, deputy commander of the PLA's Nanjing Military District, claims his nation's military lacks cyber offensive capabilities, but when asked whether they would develop them to counter foreign threats, he replied, "Personally, I think we will. If the enemy has it we'll want to have it too. We must have the means at least to defend ourselves."
He calls the U.S. "a thief calling others a thief."
III. The North Korea Factor
Ultimately both sides claim to want to talk, but at the same time both seem determined to attack the other. But there is additional pressure to resolve the differences on cybersecurity amid the crisis in North Korea. With North Korea
moving to possibly go to war
, the U.S. has cause to try to work out its difference with China, a long time ally of the North.
In his speech Mr. Donilo alluded to this threat, praising China for backing new UN sanctions against North Korea.
He comments, "North Korea’s claims may be hyperbolic -- but as to the policy of the United States, there should be no doubt: We will draw upon the full range of our capabilities to protect against, and to respond to, the threat posed to us and to our allies by North Korea."
China is reportedly concerned that North Korea could turn on it. [Image Source: CNN]
indicate China is concerned that North Korea could turn on it, using the threat of its
emerging nuclear capabilities
to blackmail it into increasing financial support. In a sign that China and the U.S. may be approaching a collective "solution" to the North Korean crisis, a senior Japanese diplomat arrived in China late last month.
Japan -- a top ally to the U.S. in the region -- has long been at odds with China over the
, a group of islands south of Japan, which both China and Japan claim to own. But much like America and China's hacking dispute, Japan and China may be forced to compromise as their common neighbor North Korea flexs its military muscle.
The White House
This article is over a month old, voting and posting comments is disabled
RE: Stealing? lolwhut?
3/14/2013 4:21:46 AM
There is no incentive to develop medicine if the drugs cannot be patented & sold at a premium to recoup the huge cost of investment. Don't give me crap about how grants could cover R&D. Money has to come from somewhere.
This concept applies to ALL developments. Eliminating intellectual property rights is a de-facto state of eliminating just compensation for the inventions/development a person or persons create. Once you do that, the only "progress" you'll see is only from people who desire to work pro-bono. Many, many other will simply NOT work to develop new things because there is no financial benefit in doing so (and indeed, potentially great financial cost). I myself am certainly not motivated to design a new form of internal combustion engine that triples gas-mileage using conventional fuels...if there is no way I can be compensated for the time/work invested in it.
As far as locks...no security measure is a 100% certainty. The idea is DETERRANCE and making your stuff less opportune than someone else's.
RE: Stealing? lolwhut?
3/19/2013 7:19:37 AM
Funny you speak of medicine cause companies are making huge profits in this field and this thanks to... patents, where did I say drugs would be given for free? also if you develop a new medicine you will be first to market and potentially be a couple years if not more without any competition since you don't have to give away your formula either and anyone else that wants to copy it will have to figure it out (and it's not that easy) and even if they get it they still have to run trials and of course get an approval from the state to sell it, so even with out any kind of patent you would still be without any competition for at least 2 years. Coca-Cola never patented its formula yet I've never tasted any cola like theirs...
I myself would develop for sure that engine, I would then flood the market with my engines and be without any competitor for at least 2 years, in mere 2 years I would have shaken the market and racked a huge profit out of it, after 2 years some competitor may show up but by then I'm already selling a better version of my engine, so yeah they may copy but they WILL ALWAYS be one step behind.
I don't think you have any idea how hard it's to reverse engineer complex formulas or devices, the easy to copy stuff is usually the stuff even a 10 years would come up with and this represents maybe 90% of the patents.
"Folks that want porn can buy an Android phone." -- Steve Jobs
China Losing Patience as North Korea Threatens Nuclear Strike on U.S.
March 7, 2013, 4:37 PM
China Accuses U.S. of Hacking, "Victimizing" Its Military
February 28, 2013, 5:36 PM
White House Threatens Action Against China Over Corporate Espionage
February 21, 2013, 1:33 PM
China Says the U.S. Has No Evidence That Its Military is Behind Hacks
February 20, 2013, 9:50 AM
"Secret" Chinese Military Unit May Be Behind Series of Hacks on U.S. Since 2006
February 19, 2013, 11:41 AM
Creationists are Mad About Google Doodle Depicting Evolution
November 24, 2015, 8:48 PM
DHS and TSA: Whoops, We Missed That 73 Airport Employees May be Terrorists
November 19, 2015, 2:16 PM
Star Wars Spinoff Film "Rogue One", Theme Park Attractions Announced
August 17, 2015, 12:20 PM
SpaceX Falcon 9's Seventh Supply Mission to ISS Ends w/ Fiery Stage 1 Explosion
June 28, 2015, 1:10 PM
Cool Science Video: Glowing Millipede Prowls the Nevada Desert
May 18, 2015, 12:00 PM
Newly Discovered Costa Rican Glass Frog is Kermit's Doppelgänger
April 22, 2015, 11:26 AM
Most Popular Articles
Free Windows 10 offer ends July 29th, 2016: 10 Reasons to Upgrade Immediately
July 22, 2016, 9:19 PM
Smart Security Cameras: 5 Good Choices For Any Budget
July 25, 2016, 7:13 PM
Top 5 Smart Watches
July 21, 2016, 11:48 PM
2017 Porsche Panamera: I’ll Take Three of These.
July 24, 2016, 6:44 PM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information