China Back to Cyberlooting "Helpless" U.S. After Failure of Obama Shaming Strategy
May 20, 2013 11:12 AM
comment(s) - last by
Cyberattacks by Unit 61398 resume
In a strategy dubbed "naming and shaming" by the media, the Obama administration bet that confronting China over cyberattacks traced to the Asian superpowers military --- the People's Liberation Army (PLA) -- would cause the nation to stop its brazen cyberlooting. Now evidence is mounting that the strategy is failing, and that China has returned to its old ways, with the U.S. left as the helpless victim.
I. China Bullies "Weak" American Cybersecurity
Chinese cyberattacks may have been ongoing for a decade or more, but began to intensify in 2008 when
President Barack Obama took office
. Those attacks led military officials to
begin to target China with accusations
, accusations that
China, of course, denied
. China admits to having
a large "cyber army"
, but claims it only uses the highly skilled unit for "self defense".
Meanwhile attacks on the private sector from Chinese IPs began to rise. Many of the attacks appeared politically motivated, while others appeared aimed at stealing intellectual property, financial secrets, and military information.
repelling a major attack
from Chinese IPs in the wake of a story about Tibet. In 2009, Lockheed Martin Corp. (
grappled with sophisticated intrusions
. Lockheed claimed that the spies did not successfully steal secrets, but soon after in 2011
China shocked U.S. officials
fielding a fully function stealth fighter; prior to the hacks U.S. officials believed China lacked this technology.
Chinese attacks intensified around 2008. [Image Source: ScreenRant]
2011 marked a marked intensification of attacks from China on both the U.S. private and government sectors. Chinese hackers
struck at online petition site Change.org
after a petition was launched to free an imprisoned Chinese artist. That same year
Chinese hackers struck Google
) Gmail service, looking to scoop the accounts of Tibetan dissidents. China's state-run newspaper mouthpiece then
proceeded to threaten Google
for stating the obvious -- that the attacks originated from Chinese IPs.
U.S. Chamber of Commerce
was hacked with Chinese IPs communicating with infected thermostats and internet printers. The
U.S. National Aeronautics and Space Administration
was been hacked
. U.S. Embassies
U.S. Department of Defense
by persistent attacks
again traced to China
. The White House's
were even attacked.
In a pair of
Intel Corp. (
) subsidiary McAfee, a security industry giant, accused China either directly or indirectly of a massive "cyberwar" campaign.
II. Obama Administration's Noisy Rhetoric Yields Short-Lived Truce
President Obama responded in early 2009
ordering a security review
. Then in June 2009 he
created a new "cyber command" department
in the DoD to handle cyber defense. But as the
Chinese threat grew
, DoD and intelligence agencies in the U.S. continued to struggle.
U.S. Cyber Command
with only around 500 "cyber-soldiers". And an April 2011 study suggested a third of cybersecurity "experts" at the
U.S. Federal Bureau of Investigations
Unable to defend itself with cyber-might, the Obama administration turned its focus to defense via rhetoric. In May 2011 the DoD warned cyberattacks
could be construed as acts of war
. In March 2012
U.S. National Security Agency
Gen. Keith Alexander
testified to the
Senate Armed Services Committee
, that the Chinese were destroying the U.S. economy with hacks.
The Obama adminstrations vowed this year to no longer be week and submissive towards China after confirming the PLA was behind cyberattacks. [Image Source: Reuters]
But the President himself
was mostly silent
until this year, when a series of attacks on
The New York Times
, and the
U.S. Federal Reserve
. Around that same time security officials with the research firm Mandiat
finally pinned the attacks on an elite group of PLA hackers
-- dubbed Unit 61398 -- which were based out of a government-guarded 12-story white high-rise in Shanghai. That report was confirmed by government officials earlier this month, which led to China responding that the U.S. was "the real ‘hacking empire.'"
Amid the confirmations that the PLA was behind the victimization of the U.S., President Obama
responded to these developments
with his toughest rhetoric yet
led to counter-accusations from China
. The tough rhetoric from the Commander-in-chief seemed to work, though; Unit 61398 fell silent for nearly three months from February into May.
Top PLA hackers with handles like “DOTA,” “SuperHard” and “UglyGorilla" disappeared as their online footprints were purged. Chinese hackers even began to remotely unplug the intrusion toolkits they had installed on 3,000 identified systems in the U.S.
III. Chinese are Back at It
But according to
The New York Times
, that quiet armistice is over, and China has returned to its old ways, marking the failure of the administration's "naming and shaming" strategy. With the U.S. unable to offer up any real consequences, the report suggests that the PLA sees no compelling reason to bow to its foe's hollow rhetoric, instead gleefully returning to battering the "helpless" U.S.
PLA hackers resumed their attacks on the U.S. this month after a three month armistice.
[Image Source: Unknown]
Kevin Mandia, the chief executive of Mandiant, warns, "They dialed it back for a little while, though other groups that also wear uniforms didn’t even bother to do that. I think you have to view this as the new normal."
A source in the Obama administration is quoted in the report as expressing grim resignation that a resumption would occur, commenting, "This is something we are going to have to come back at time and again with the Chinese leadership have to be convinced there is a real cost to this kind of activity."
IV. How Can the Administration Respond?
The question is what kind of consequences the administration can really muster.
The U.S. economy remains deeply dependent on China, to the extent that any sort of serious trade sanctions could plunge the nation's fragile economy into recession. At the same time, the military and intelligence community,
having alienated most of the nation's skilled hackers
(versus China who actively recruits black hats), appears
helpless to mount any substantial offense or defense
And to boot, the
administration is struggling
over a deluge of domestic scandals
ranging from drones
U.S. Internal Revenue Service
seizures of Associated Press phone records
Still the administration's security advisor, Thomas Donilon, is expected to work what little leverage he has in a visit to China this month.
President Obama and Attorney General Eric Holder
Jon M. Huntsman Jr., a former ambassador to China, and President Obama's former director of national intelligence, Dennis C. Blair are reportedly drawing up a series of executive orders the President could use to attempt to "punish" China for continued hacking. Mr. Blair is quoted as saying, "Jawboning alone won’t work. Something has to change China’s calculus."
About the only positive development, thus far, has been independent efforts on apparently putting a face to the handle of some of the PLA hackers. A blog was traced to UglyGorilla -- real name Wang Dong -- who between 2006 and 2009 wrote about his experiences with the PLA, bemoaning low pay, long hours and instant ramen meals.
Such positive identifications could allow the U.S. to step up international pressure on China, even as its own efforts continue to struggle.
The New York Times
This article is over a month old, voting and posting comments is disabled
5/20/2013 5:38:43 PM
Cyber security is about three things, Hardware, Software and People. Don't go blaming any particular one. I'll give you idiots one of the best home set ups to protect yourself. An Apple Mac G3 with Linux distro Smooth-wall will just about secure yourselves, now just don't click on that obvious phishing email but if you do at least you have the hardware and software to help save you. The old PowerPC infrastructure that IBM made had the best built in security measures however it was sacrificed in the Gigahertz wars. Blame Intel for building faster chips that appealed to the public who don't know shit apart from more speed.
"Death Is Very Likely The Single Best Invention Of Life" -- Steve Jobs
Obama Admin Looks to Revive Bill for Greater Media Protection in Wake of AP Controversy
May 16, 2013, 1:47 PM
Obama's DOJ Caught Spying on Associated Press in Hunt for Leakers
May 14, 2013, 8:44 AM
Goatse Security iPad Hacker Gets 41 Months for "Doing Arithmetic"
March 18, 2013, 11:06 PM
Intelligence Adviser Warns China's Hacking is Hurting Relations, China Offers Talks
March 12, 2013, 2:27 PM
Obama's AG Won't Rule Out Drone Death Strikes on U.S. Soil
March 6, 2013, 12:34 PM
Quick Note: Google Drive 100GB, 1TB Plans See Major Price Cuts
March 13, 2014, 2:45 PM
Target Missed Early Warning Signs of Holiday Data Breach
March 13, 2014, 1:45 PM
Amazon Increases Prime Subscription to $99/year Starting March 19
March 13, 2014, 8:23 AM
Bitcoin King's American Accounts Get Frozen
March 13, 2014, 3:00 AM
Time Warner Cable CEO Says Merger with Comcast is a "Dream Combination", Will Increase Innovation
March 12, 2014, 2:37 PM
North Carolina-based Company to Offer Gigabit Internet Before Google
March 12, 2014, 2:31 PM
Most Popular Articles
Bitcoin King Pt. II: Mt. Gox's Dictator Karpelès Proves Tragically Flawed
March 7, 2014, 1:12 PM
Windows 8.1 Update 1 Leaked Early
March 7, 2014, 9:30 AM
Hack Reveals Fallen Bitcoin CEO's Posh Tokyo Penthouse
March 10, 2014, 4:28 PM
Vine Users No Longer Allowed to Post Pornographic Videos
March 7, 2014, 1:47 PM
Staples Closing 225 Stores Across North America
March 7, 2014, 1:24 PM
Latest Blog Posts
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
Is The Period Becoming an Expression of Anger?
Nov 26, 2013, 2:02 PM
NSA and Congress -- You Will Never Kill the Constitution, It's an Idea
Nov 10, 2013, 2:00 PM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information