China Back to Cyberlooting "Helpless" U.S. After Failure of Obama Shaming Strategy
May 20, 2013 11:12 AM
comment(s) - last by
Cyberattacks by Unit 61398 resume
In a strategy dubbed "naming and shaming" by the media, the Obama administration bet that confronting China over cyberattacks traced to the Asian superpowers military --- the People's Liberation Army (PLA) -- would cause the nation to stop its brazen cyberlooting. Now evidence is mounting that the strategy is failing, and that China has returned to its old ways, with the U.S. left as the helpless victim.
I. China Bullies "Weak" American Cybersecurity
Chinese cyberattacks may have been ongoing for a decade or more, but began to intensify in 2008 when
President Barack Obama took office
. Those attacks led military officials to
begin to target China with accusations
, accusations that
China, of course, denied
. China admits to having
a large "cyber army"
, but claims it only uses the highly skilled unit for "self defense".
Meanwhile attacks on the private sector from Chinese IPs began to rise. Many of the attacks appeared politically motivated, while others appeared aimed at stealing intellectual property, financial secrets, and military information.
repelling a major attack
from Chinese IPs in the wake of a story about Tibet. In 2009, Lockheed Martin Corp. (
grappled with sophisticated intrusions
. Lockheed claimed that the spies did not successfully steal secrets, but soon after in 2011
China shocked U.S. officials
fielding a fully function stealth fighter; prior to the hacks U.S. officials believed China lacked this technology.
Chinese attacks intensified around 2008. [Image Source: ScreenRant]
2011 marked a marked intensification of attacks from China on both the U.S. private and government sectors. Chinese hackers
struck at online petition site Change.org
after a petition was launched to free an imprisoned Chinese artist. That same year
Chinese hackers struck Google
) Gmail service, looking to scoop the accounts of Tibetan dissidents. China's state-run newspaper mouthpiece then
proceeded to threaten Google
for stating the obvious -- that the attacks originated from Chinese IPs.
U.S. Chamber of Commerce
was hacked with Chinese IPs communicating with infected thermostats and internet printers. The
U.S. National Aeronautics and Space Administration
was been hacked
. U.S. Embassies
U.S. Department of Defense
by persistent attacks
again traced to China
. The White House's
were even attacked.
In a pair of
Intel Corp. (
) subsidiary McAfee, a security industry giant, accused China either directly or indirectly of a massive "cyberwar" campaign.
II. Obama Administration's Noisy Rhetoric Yields Short-Lived Truce
President Obama responded in early 2009
ordering a security review
. Then in June 2009 he
created a new "cyber command" department
in the DoD to handle cyber defense. But as the
Chinese threat grew
, DoD and intelligence agencies in the U.S. continued to struggle.
U.S. Cyber Command
with only around 500 "cyber-soldiers". And an April 2011 study suggested a third of cybersecurity "experts" at the
U.S. Federal Bureau of Investigations
Unable to defend itself with cyber-might, the Obama administration turned its focus to defense via rhetoric. In May 2011 the DoD warned cyberattacks
could be construed as acts of war
. In March 2012
U.S. National Security Agency
Gen. Keith Alexander
testified to the
Senate Armed Services Committee
, that the Chinese were destroying the U.S. economy with hacks.
The Obama adminstrations vowed this year to no longer be week and submissive towards China after confirming the PLA was behind cyberattacks. [Image Source: Reuters]
But the President himself
was mostly silent
until this year, when a series of attacks on
The New York Times
, and the
U.S. Federal Reserve
. Around that same time security officials with the research firm Mandiat
finally pinned the attacks on an elite group of PLA hackers
-- dubbed Unit 61398 -- which were based out of a government-guarded 12-story white high-rise in Shanghai. That report was confirmed by government officials earlier this month, which led to China responding that the U.S. was "the real ‘hacking empire.'"
Amid the confirmations that the PLA was behind the victimization of the U.S., President Obama
responded to these developments
with his toughest rhetoric yet
led to counter-accusations from China
. The tough rhetoric from the Commander-in-chief seemed to work, though; Unit 61398 fell silent for nearly three months from February into May.
Top PLA hackers with handles like “DOTA,” “SuperHard” and “UglyGorilla" disappeared as their online footprints were purged. Chinese hackers even began to remotely unplug the intrusion toolkits they had installed on 3,000 identified systems in the U.S.
III. Chinese are Back at It
But according to
The New York Times
, that quiet armistice is over, and China has returned to its old ways, marking the failure of the administration's "naming and shaming" strategy. With the U.S. unable to offer up any real consequences, the report suggests that the PLA sees no compelling reason to bow to its foe's hollow rhetoric, instead gleefully returning to battering the "helpless" U.S.
PLA hackers resumed their attacks on the U.S. this month after a three month armistice.
[Image Source: Unknown]
Kevin Mandia, the chief executive of Mandiant, warns, "They dialed it back for a little while, though other groups that also wear uniforms didn’t even bother to do that. I think you have to view this as the new normal."
A source in the Obama administration is quoted in the report as expressing grim resignation that a resumption would occur, commenting, "This is something we are going to have to come back at time and again with the Chinese leadership have to be convinced there is a real cost to this kind of activity."
IV. How Can the Administration Respond?
The question is what kind of consequences the administration can really muster.
The U.S. economy remains deeply dependent on China, to the extent that any sort of serious trade sanctions could plunge the nation's fragile economy into recession. At the same time, the military and intelligence community,
having alienated most of the nation's skilled hackers
(versus China who actively recruits black hats), appears
helpless to mount any substantial offense or defense
And to boot, the
administration is struggling
over a deluge of domestic scandals
ranging from drones
U.S. Internal Revenue Service
seizures of Associated Press phone records
Still the administration's security advisor, Thomas Donilon, is expected to work what little leverage he has in a visit to China this month.
President Obama and Attorney General Eric Holder
Jon M. Huntsman Jr., a former ambassador to China, and President Obama's former director of national intelligence, Dennis C. Blair are reportedly drawing up a series of executive orders the President could use to attempt to "punish" China for continued hacking. Mr. Blair is quoted as saying, "Jawboning alone won’t work. Something has to change China’s calculus."
About the only positive development, thus far, has been independent efforts on apparently putting a face to the handle of some of the PLA hackers. A blog was traced to UglyGorilla -- real name Wang Dong -- who between 2006 and 2009 wrote about his experiences with the PLA, bemoaning low pay, long hours and instant ramen meals.
Such positive identifications could allow the U.S. to step up international pressure on China, even as its own efforts continue to struggle.
The New York Times
This article is over a month old, voting and posting comments is disabled
RE: Privatize the datacenters.
5/20/2013 5:03:43 PM
So, you've been in the IT field since 1977 but you're still just a systems admin? And the best you can do is advise a CIO at a relatively small company? Your skills must be out of this world.
Linux isn't as secure as everyone makes it out to be. Sure, you can harden it if you invest the time and effort and want to cause yourself serious inconvenience every time you go to use it. But the majority of distros aren't like that out of the box. There are also more critical vulnerabilities per year in your average distro than in Windows.
Linux has plenty of uses. But the statement "Linux is better than Windows" is incredibly stupid and short-sighted. Of course, "Windows is better than Linux" is equally stupid. They both have their uses. As does OS X, BSD, Unix and every other OS out there. The difference between people like you, who have managed to progress to an "admin" in 35 years, and people like me who is a Sr. Systems Engineer in 14 years is knowing what is the right answer and when. And not being so narrow-minded. The world isn't black and white. But it sounds like it's too late for you to learn that.
Let me know if you need me to take you to school some more. I'm always happy to help.
"If they're going to pirate somebody, we want it to be us rather than somebody else." -- Microsoft Business Group President Jeff Raikes
Obama Admin Looks to Revive Bill for Greater Media Protection in Wake of AP Controversy
May 16, 2013, 1:47 PM
Obama's DOJ Caught Spying on Associated Press in Hunt for Leakers
May 14, 2013, 8:44 AM
Goatse Security iPad Hacker Gets 41 Months for "Doing Arithmetic"
March 18, 2013, 11:06 PM
Intelligence Adviser Warns China's Hacking is Hurting Relations, China Offers Talks
March 12, 2013, 2:27 PM
Obama's AG Won't Rule Out Drone Death Strikes on U.S. Soil
March 6, 2013, 12:34 PM
Quick Note: Former Googler Becomes Director of U.S. Patent and Trademark Office
December 12, 2013, 10:42 AM
AT&T Launches U-verse with GigaPower Network in Austin, Texas
December 11, 2013, 5:14 PM
Harlem to Receive U.S.' Largest Free Wi-Fi Network
December 11, 2013, 11:48 AM
Google's First Asian Data Centers Now Operational
December 11, 2013, 8:50 AM
Seattle's High-Speed Internet Rollout Delayed Due to Financial Issues
December 10, 2013, 12:14 PM
Report: Spotify Working on Free, Ad-Supported Mobile Service
December 6, 2013, 9:52 AM
Most Popular Articles
Experts: Masturbation Prevents Cancer, Diabetes, Insomnia, and Depression
December 6, 2013, 2:01 PM
Hackers Nab 2 Million Login Credentials from Facebook, Gmail, Twitter
December 5, 2013, 1:00 PM
Thieves Steal Truck with Cobalt-60 Onboard in Mexico, Will Die "Without a Doubt" from Exposure
December 5, 2013, 12:04 PM
Report: Windows 8.2 Revives Start Menu, Runs Metro Apps in Desktop Mode
December 10, 2013, 2:56 PM
U.S. Navy Fires "XFC" Drone from Underwater Submarine
December 6, 2013, 2:35 PM
Latest Blog Posts
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
Is The Period Becoming an Expression of Anger?
Nov 26, 2013, 2:02 PM
NSA and Congress -- You Will Never Kill the Constitution, It's an Idea
Nov 10, 2013, 2:00 PM
AT&T Explores $100B+ USD Deal to Acquire Vodafone's European Operations
Nov 4, 2013, 7:34 AM
More Blog Posts
Copyright 2013 DailyTech LLC. -
Terms, Conditions & Privacy Information