Tuesday 20 May 2014

With Spy Charges, U.S. Draws a Line That Few Others Recognize

For example, the United States spies regularly for economic advantage when the goal is to support trade talks; when the Clinton administration was locked in a high-stakes negotiation in the 1990s to reach an accord with Japan, it bugged the Japanese negotiator’s limousine. At the time, the chief beneficiaries would have been the Big Three auto companies and a smattering of parts suppliers. It is also widely believed to be using intelligence in support of trade negotiations underway with European and Asian trading partners. But in the view of a succession of Democratic and Republican administrations, that is fair game.

2 comments:

Guanyu said...

With Spy Charges, U.S. Draws a Line That Few Others Recognize

By DAVID E. SANGERMAY, New York Times
19 May 2014

By indicting members of the People’s Liberation Army’s most famous cyberwarfare operation — called Unit 61398 but known among hackers as the “Comment Crew” — the Obama administration has turned to the criminal justice system to reinforce its argument that there is a major difference between spying for national security purposes, something the United States does daily, and the commercial, for-profit espionage carried out by China’s military.

The Chinese argue that the distinction is an American artifact, devised for commercial advantage. They believe that looking for business secrets is part of the fabric of national security, especially for a rising economic powerhouse. And while American officials are loath to admit it, Washington’s view has relatively few advocates around the world. The French, for example, were notorious for conducting state-backed corporate espionage long before the Chinese mastered the form. And if they choose, Chinese leaders has ample opportunity to retaliate by making life even harder for American companies.

Attorney General Eric H. Holder Jr. repeated the we-don’t-spy-for-corporate-America argument Monday morning as he unsealed an indictment that included allegations that Unit 61398 had stolen trade secrets for nuclear power plants that would save Chinese firms years of design work, as well as information from inside an American solar energy company that was pursuing a trade complaint against its Chinese competitors.

“The alleged hacking appears to have been conducted for no reason other than to advantage state-owned companies and other interests in China, at the expense of businesses here in the United States,” Mr. Holder said. “This is a tactic that the U.S. government categorically denounces. As President Obama has said on numerous occasions, we do not collect intelligence to provide a competitive advantage to U.S. companies, or U.S. commercial sectors.”

There is little doubt, based on the evidence published last year, that the Comment Crew’s targets include companies that compete directly with state-owned Chinese enterprises that fund the People’s Liberation Army and often line the pockets of its leaders. But they are hardly the only targets of Chinese espionage: The office of the secretary of defense, the firms building the new Joint Strike Fighter, the Council on Foreign Relations, the Aspen Institute and The New York Times have all been targets of Chinese hacking units, for different reasons.

But the United States is limited in the complaints it can make because it has targeted similar institutions in China — for equally murky reasons. So when Mr. Obama raised the issue with Xi Jinping, the Chinese president, he focused only on commercial espionage, arguing it is far more pernicious to use the intelligence instruments of the state for a business advantage. The United States may do all it can to learn about China’s nuclear arsenal, or Beijing’s intentions in its territorial disputes with Japan, but it does not, he says, steal from China Telecom to help AT&T.

Prosecutors focused on the most clear-cut commercial cases, perhaps because the United States believes the cases will bolster the president’s central argument, that there is something sacred about intellectual property.

“This is not something they pulled out of their back pocket,” said Kevin Mandia, whose company, the Mandiant division of FireEye, compiled the first public report about Unit 61398 last year. “This was a logical escalation of the pressure.”

But it was also an effort to regain the high ground the United States lost last year after the revelations made by Edward J. Snowden, the former National Security Agency contractor. The documents he revealed suggested that the clear line Mr. Obama talks about when discussing Chinese cyberpractices is often blurry.

Guanyu said...

Even before Mr. Snowden walked out of the Hawaii facilities of the N.S.A. with a trove of documents, it was clear that the United States was not above economic espionage, as long as it was not for the direct benefit of specific companies.

For example, the United States spies regularly for economic advantage when the goal is to support trade talks; when the Clinton administration was locked in a high-stakes negotiation in the 1990s to reach an accord with Japan, it bugged the Japanese negotiator’s limousine. At the time, the chief beneficiaries would have been the Big Three auto companies and a smattering of parts suppliers. It is also widely believed to be using intelligence in support of trade negotiations underway with European and Asian trading partners. But in the view of a succession of Democratic and Republican administrations, that is fair game.

Companies can also be targets. Documents released by Mr. Snowden showed that the American government pried deep into the servers of Huawei, one of China’s most successful Internet and communications companies. The documents made clear that the N.S.A. was seeking to learn whether the company was a front for the People’s Liberation Army and whether it was interested in spying on American firms. But there was a second purpose: to get inside Huawei’s systems and use them to spy on countries that buy the company’s equipment.

Huawei officials said they failed to understand how that differed meaningfully from what the United States has accused the Chinese of doing.

But such reasoning is rejected by the intelligence community. “I welcome this indictment because it has our government rejecting the false equivalence between us and the Chinese,” said Michael V. Hayden, a former director of both the N.S.A. and the Central Intelligence Agency. “It’s a risky course of action,” he added, “but prior to this we were in stasis.”

It is risky because the Chinese have already declared that they are shutting down, at least for now, the modest talks between the two countries on norms of behavior on the Internet.

Those conversations were already fraught. Last month, Defense Secretary Chuck Hagel went to Beijing to argue for a new channel of communication between the United States and China on cyberstrategy. American officials had already given the Chinese an overview of American cybersecurity, emphasizing that the N.S.A. did not take what it collects and hand it to Apple or Microsoft or Google.

The hope was that it would prompt the Chinese to give Washington a similar briefing about the People’s Liberation Army units that are believed to be behind the attacks on American corporations and government networks. So far, the Chinese have not reciprocated.

Instead, they have denied that the P.L.A. conducts cyberoperations. When The Times published a n article early last year about Unit 61398, in which it detailed some of the group’s operations, there were furious denials from Beijing. For a few weeks, the unit went quiet.

Then it came back — operating from different servers, but often against the same American industrial targets.