Skip to content Skip to footer
|

US: Hacking Attacks Are Constant Topic of Talks With China

State Department spokeswoman Victoria Nuland said hacking came up at virtually every meeting of Chinese and US officials.

Washington – Obama administration officials acknowledged Tuesday that China’s involvement in cyber-attacks on sensitive U.S. companies is a near-constant subject of conversation between the nations’ officials but that there have been few signs that China is willing to stop the attacks.

“We have repeatedly raised our concerns at the highest levels about cyber-theft with senior Chinese officials, including in the military, and we will continue to do so,” White House spokesman Jay Carney said.

Carney’s statement came on the day that an Alexandria, Va., Internet security firm released one of the most detailed reports to date asserting that hacking is officially condoned in China. In the report, Mandiant Corp. said it had tracked online attacks on at least 141 companies and organizations since 2006 to a People’s Liberation Army organization known as Unit 61398. Of those 141 targets, 115 were in the United States, according to Mandiant’s 74-page report.

“Our research and observations indicate that the Communist Party of China . . . is tasking the Chinese People’s Liberation Army . . . to commit systematic cyber espionage and data theft against organizations around the world,” the report said.

The accusations will further strain tensions between the United States and China, a nation of growing economic and military influence.

“China is a rising power. It’s using everything at its disposal to be competitive,” said Harold Brown, a former defense secretary who led a U.S. commission to investigate China’s cyber, military and economic capabilities. “It’s weak in some ways, so it looks to gain advantages in other ways.”

In a regularly scheduled news briefing Tuesday, the Chinese government denied official involvement in online hacking and pointed out that China itself is regularly subjected to such attacks.

“Groundless criticism is irresponsible and unprofessional, and it will not help to solve the problem,” Foreign Ministry Spokesman Hong Lei said.

White House officials declined to comment on specific allegations in the report but called cyber security a “major challenge.”

“The United States has substantial and growing concerns about the threats to U.S. economic and national security posed by cyber-intrusions, including the theft of commercial information,” Carney said. “That’s why the United States government is taking an active approach in addressing the issue of cyber-theft.”

State Department spokeswoman Victoria Nuland said hacking came up at virtually every meeting of Chinese and U.S. officials.

“What we have been involved with is making clear that we consider this kind of activity a threat, not only to our national security but also to our economic interests,” Nuland said.

Administration officials say they’ve strengthened government networks, released technical information to private companies and engaged every agency and department in fighting cyber threats through diplomatic, military and economic means.

Last week, President Barack Obama signed an executive order aimed at improving the security of the computer networks that direct the nation’s crucial infrastructure systems, such as electricity, finance and transportation. The order, which doesn’t need congressional approval, directed federal agencies to share more information and companies to voluntarily comply with a government-led framework to combat online threats.

“Our enemies are . . . seeking the ability to sabotage our power grid, our financial institutions and our air traffic control systems,” Obama said in his State of the Union address last week. “We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.”

Democrats on Capitol Hill quickly praised Obama’s effort, but cyber-security experts say the executive order doesn’t go far enough, in part because the president is limited in his actions.

Melanie Teplinsky, an American University law professor who’s written and spoken extensively on cyber-law issues, said the federal government needed to take a tougher stance on hacking, imposing trade sanctions and civil penalties on those suspected of involvement.

“All of these things (the government is doing) are focused on building a stronger fortress,” she said. “But while we’re building bigger walls, they are building bigger ladders. . . . We need to change our approach.”

Congress has debated, but failed to pass, legislation to combat hacking. Last week, Rep. Mike Rogers, R-Mich., the chairman of the House of Representatives Intelligence Committee, reintroduced a bill that would help businesses protect their networks and trade secrets from cyber-attacks, mostly through information sharing.

“American businesses are under siege,” Rogers said. “We need to provide American companies the information they need to better protect their networks from these dangerous cyber-threats.”

Sen. Dianne Feinstein, D-Calif., the chairwoman of the Senate Intelligence Committee, said the Mandiant report showed a need for a binding international agreement among nations to prohibit cyber-crimes.

“There are already international agreements in place to govern criminal activity and war,” she said. “Cyber-attacks are both, but there is nothing currently in place to govern this emerging and increasingly dangerous national and economic security threat.”

Mandiant, which contracts with corporations to help protect their computer systems from hackers, said it had analyzed the intrusions through painstaking examination of electronic clues left behind after attacks. While not naming specific cases, Mandiant said its investigators had sifted for digital “fingerprints” such as Internet protocol addresses and information gleaned from the email addresses used to launch “spear phishing,” emails that carry attachments that, when clicked, allow access to a user’s computer. Those attachments contain dense code that may carry language identifying them as the work of a particular programmer or group.

The report identified one of the buildings from which Unit 61398 works in Shanghai and provided Google Earth images of the white, 12-floor structure.

Mandiant also distributed a copy of what it said was a China Telecom memorandum saying the state-owned company provided Unit 61398 with special fiber-optic lines, and identified Unit 61398’s place within the Chinese military’s command structure: the second bureau of the general staff’s third department, which has a focus including signals intelligence and cyber surveillance.

The study, which was first reported by The New York Times, included a video showing what Mandiant said was screen footage of a member of the group setting up anonymous email accounts used to launch the attacks. Another video recorded a member of the unit allegedly breaking into computer systems online and stealing files.

The industries targeted by Unit 61398, the report said, are consistent with those that China has marked as being strategically important to its growth. Mandiant didn’t identify the companies affected, but it said they were from a broad range of sectors including aerospace, energy, telecommunications and scientific research. All but two of the attacks took place in English-speaking countries, the report said.

Among the types of information stolen, the report said, were system designs, manufacturing procedures, contract negotiation positions and business plans.

Staff writer Hannah Allam contributed to this report.

Help us Prepare for Trump’s Day One

Trump is busy getting ready for Day One of his presidency – but so is Truthout.

Trump has made it no secret that he is planning a demolition-style attack on both specific communities and democracy as a whole, beginning on his first day in office. With over 25 executive orders and directives queued up for January 20, he’s promised to “launch the largest deportation program in American history,” roll back anti-discrimination protections for transgender students, and implement a “drill, drill, drill” approach to ramp up oil and gas extraction.

Organizations like Truthout are also being threatened by legislation like HR 9495, the “nonprofit killer bill” that would allow the Treasury Secretary to declare any nonprofit a “terrorist-supporting organization” and strip its tax-exempt status without due process. Progressive media like Truthout that has courageously focused on reporting on Israel’s genocide in Gaza are in the bill’s crosshairs.

As journalists, we have a responsibility to look at hard realities and communicate them to you. We hope that you, like us, can use this information to prepare for what’s to come.

And if you feel uncertain about what to do in the face of a second Trump administration, we invite you to be an indispensable part of Truthout’s preparations.

In addition to covering the widespread onslaught of draconian policy, we’re shoring up our resources for what might come next for progressive media: bad-faith lawsuits from far-right ghouls, legislation that seeks to strip us of our ability to receive tax-deductible donations, and further throttling of our reach on social media platforms owned by Trump’s sycophants.

We’re preparing right now for Trump’s Day One: building a brave coalition of movement media; reaching out to the activists, academics, and thinkers we trust to shine a light on the inner workings of authoritarianism; and planning to use journalism as a tool to equip movements to protect the people, lands, and principles most vulnerable to Trump’s destruction.

We urgently need your help to prepare. As you know, our December fundraiser is our most important of the year and will determine the scale of work we’ll be able to do in 2025. We’ve set two goals: to raise $150,000 in one-time donations and to add 1,500 new monthly donors by midnight on December 31.

Today, we’re asking all of our readers to start a monthly donation or make a one-time donation – as a commitment to stand with us on day one of Trump’s presidency, and every day after that, as we produce journalism that combats authoritarianism, censorship, injustice, and misinformation. You’re an essential part of our future – please join the movement by making a tax-deductible donation today.

If you have the means to make a substantial gift, please dig deep during this critical time!

With gratitude and resolve,

Maya, Negin, Saima, and Ziggy