China Back to Cyberlooting "Helpless" U.S. After Failure of Obama Shaming Strategy
May 20, 2013 11:12 AM
comment(s) - last by
Cyberattacks by Unit 61398 resume
In a strategy dubbed "naming and shaming" by the media, the Obama administration bet that confronting China over cyberattacks traced to the Asian superpowers military --- the People's Liberation Army (PLA) -- would cause the nation to stop its brazen cyberlooting. Now evidence is mounting that the strategy is failing, and that China has returned to its old ways, with the U.S. left as the helpless victim.
I. China Bullies "Weak" American Cybersecurity
Chinese cyberattacks may have been ongoing for a decade or more, but began to intensify in 2008 when
President Barack Obama took office
. Those attacks led military officials to
begin to target China with accusations
, accusations that
China, of course, denied
. China admits to having
a large "cyber army"
, but claims it only uses the highly skilled unit for "self defense".
Meanwhile attacks on the private sector from Chinese IPs began to rise. Many of the attacks appeared politically motivated, while others appeared aimed at stealing intellectual property, financial secrets, and military information.
repelling a major attack
from Chinese IPs in the wake of a story about Tibet. In 2009, Lockheed Martin Corp. (
grappled with sophisticated intrusions
. Lockheed claimed that the spies did not successfully steal secrets, but soon after in 2011
China shocked U.S. officials
fielding a fully function stealth fighter; prior to the hacks U.S. officials believed China lacked this technology.
Chinese attacks intensified around 2008. [Image Source: ScreenRant]
2011 marked a marked intensification of attacks from China on both the U.S. private and government sectors. Chinese hackers
struck at online petition site Change.org
after a petition was launched to free an imprisoned Chinese artist. That same year
Chinese hackers struck Google
) Gmail service, looking to scoop the accounts of Tibetan dissidents. China's state-run newspaper mouthpiece then
proceeded to threaten Google
for stating the obvious -- that the attacks originated from Chinese IPs.
U.S. Chamber of Commerce
was hacked with Chinese IPs communicating with infected thermostats and internet printers. The
U.S. National Aeronautics and Space Administration
was been hacked
. U.S. Embassies
U.S. Department of Defense
by persistent attacks
again traced to China
. The White House's
were even attacked.
In a pair of
Intel Corp. (
) subsidiary McAfee, a security industry giant, accused China either directly or indirectly of a massive "cyberwar" campaign.
II. Obama Administration's Noisy Rhetoric Yields Short-Lived Truce
President Obama responded in early 2009
ordering a security review
. Then in June 2009 he
created a new "cyber command" department
in the DoD to handle cyber defense. But as the
Chinese threat grew
, DoD and intelligence agencies in the U.S. continued to struggle.
U.S. Cyber Command
with only around 500 "cyber-soldiers". And an April 2011 study suggested a third of cybersecurity "experts" at the
U.S. Federal Bureau of Investigations
Unable to defend itself with cyber-might, the Obama administration turned its focus to defense via rhetoric. In May 2011 the DoD warned cyberattacks
could be construed as acts of war
. In March 2012
U.S. National Security Agency
Gen. Keith Alexander
testified to the
Senate Armed Services Committee
, that the Chinese were destroying the U.S. economy with hacks.
The Obama adminstrations vowed this year to no longer be week and submissive towards China after confirming the PLA was behind cyberattacks. [Image Source: Reuters]
But the President himself
was mostly silent
until this year, when a series of attacks on
The New York Times
, and the
U.S. Federal Reserve
. Around that same time security officials with the research firm Mandiat
finally pinned the attacks on an elite group of PLA hackers
-- dubbed Unit 61398 -- which were based out of a government-guarded 12-story white high-rise in Shanghai. That report was confirmed by government officials earlier this month, which led to China responding that the U.S. was "the real ‘hacking empire.'"
Amid the confirmations that the PLA was behind the victimization of the U.S., President Obama
responded to these developments
with his toughest rhetoric yet
led to counter-accusations from China
. The tough rhetoric from the Commander-in-chief seemed to work, though; Unit 61398 fell silent for nearly three months from February into May.
Top PLA hackers with handles like “DOTA,” “SuperHard” and “UglyGorilla" disappeared as their online footprints were purged. Chinese hackers even began to remotely unplug the intrusion toolkits they had installed on 3,000 identified systems in the U.S.
III. Chinese are Back at It
But according to
The New York Times
, that quiet armistice is over, and China has returned to its old ways, marking the failure of the administration's "naming and shaming" strategy. With the U.S. unable to offer up any real consequences, the report suggests that the PLA sees no compelling reason to bow to its foe's hollow rhetoric, instead gleefully returning to battering the "helpless" U.S.
PLA hackers resumed their attacks on the U.S. this month after a three month armistice.
[Image Source: Unknown]
Kevin Mandia, the chief executive of Mandiant, warns, "They dialed it back for a little while, though other groups that also wear uniforms didn’t even bother to do that. I think you have to view this as the new normal."
A source in the Obama administration is quoted in the report as expressing grim resignation that a resumption would occur, commenting, "This is something we are going to have to come back at time and again with the Chinese leadership have to be convinced there is a real cost to this kind of activity."
IV. How Can the Administration Respond?
The question is what kind of consequences the administration can really muster.
The U.S. economy remains deeply dependent on China, to the extent that any sort of serious trade sanctions could plunge the nation's fragile economy into recession. At the same time, the military and intelligence community,
having alienated most of the nation's skilled hackers
(versus China who actively recruits black hats), appears
helpless to mount any substantial offense or defense
And to boot, the
administration is struggling
over a deluge of domestic scandals
ranging from drones
U.S. Internal Revenue Service
seizures of Associated Press phone records
Still the administration's security advisor, Thomas Donilon, is expected to work what little leverage he has in a visit to China this month.
President Obama and Attorney General Eric Holder
Jon M. Huntsman Jr., a former ambassador to China, and President Obama's former director of national intelligence, Dennis C. Blair are reportedly drawing up a series of executive orders the President could use to attempt to "punish" China for continued hacking. Mr. Blair is quoted as saying, "Jawboning alone won’t work. Something has to change China’s calculus."
About the only positive development, thus far, has been independent efforts on apparently putting a face to the handle of some of the PLA hackers. A blog was traced to UglyGorilla -- real name Wang Dong -- who between 2006 and 2009 wrote about his experiences with the PLA, bemoaning low pay, long hours and instant ramen meals.
Such positive identifications could allow the U.S. to step up international pressure on China, even as its own efforts continue to struggle.
The New York Times
This article is over a month old, voting and posting comments is disabled
5/20/2013 2:24:48 PM
they are playing a game in that picture
5/20/2013 6:10:23 PM
yep. looks like starcraft?
5/21/2013 12:35:50 AM
I hope you weren't expecting a real image of a lab of Chinese people hacking into US servers...
"I'm an Internet expert too. It's all right to wire the industrial zone only, but there are many problems if other regions of the North are wired." -- North Korean Supreme Commander Kim Jong-il
Obama Admin Looks to Revive Bill for Greater Media Protection in Wake of AP Controversy
May 16, 2013, 1:47 PM
Obama's DOJ Caught Spying on Associated Press in Hunt for Leakers
May 14, 2013, 8:44 AM
Goatse Security iPad Hacker Gets 41 Months for "Doing Arithmetic"
March 18, 2013, 11:06 PM
Intelligence Adviser Warns China's Hacking is Hurting Relations, China Offers Talks
March 12, 2013, 2:27 PM
Obama's AG Won't Rule Out Drone Death Strikes on U.S. Soil
March 6, 2013, 12:34 PM
Twitter Senior VP: "Diversity is Important, But We Can’t Lower the Bar"
November 9, 2015, 9:59 AM
CNN Resorts to Internet Censorship to Promote Clinton Over Senator Sanders
October 15, 2015, 2:47 PM
Breaking Bad: How to Crash Google's Chrome Browser With Just 8 Characters
September 23, 2015, 11:08 AM
Quick Note: Amazon UK Offers £10 Back on Any Order £50 or Over
August 3, 2015, 12:05 PM
Editorial: Reddit Allows Itself to be Hijacked as a Hate Platform For Racist Bigots
July 21, 2015, 6:32 PM
Mozilla and Facebook to Adobe: It's Time to Kill Flash
July 20, 2015, 6:30 PM
Most Popular Articles
Free Windows 10 offer ends July 29th, 2016: 10 Reasons to Upgrade Immediately
July 22, 2016, 9:19 PM
Smart Security Cameras: 5 Good Choices For Any Budget
July 25, 2016, 7:13 PM
2017 Porsche Panamera: I’ll Take Three of These.
July 24, 2016, 6:44 PM
Top 5 Smart Watches
July 21, 2016, 11:48 PM
5 Excellent Cable Modems: Buy Your Own and Avoid Rental Fees
July 28, 2016, 8:44 PM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information