Modern field guide to security and privacy

Exploring cybersecurity from China’s perspective

Excerpts from a talk with Adam Segal, Sharon Hom, Michael Sulmeyer, and Lobsang Gyatso Sither.

|
Ann Hermes/The Christian Science Monitor

Hardly a week passes without some headline accusing unnamed Chinese hackers of digital misdeeds. They’ve breached a bank, broken into a retailer, stolen data from a health insurer, or infiltrated American government networks. Most famously, Obama administration officials called out China as the No. 1 suspect in the massive Office of Personnel Management breach last year.

But even though US officials point the finger at China for aggressively hacking of American computer networks – either for commercial gain or in service of national spying – there’s often little discussion about what’s driving their actions. Of course, all countries spy and all countries use the Internet to do it. But many experts say China is in a league of its own when it comes to digital espionage for commercial gain or hacking into the networks of critics, activists, or civil society organizations working toward reform.

“Why they are constantly hacking into companies, institutions, the military, quite honestly, is because they can. There has been almost no cost to them,” said Adam Segal, director of the digital and cyberspace policy program at the Council on Foreign Relations and author of “The Hacked World Order.”

Passcode convened a Feb. 4 panel discussion that explored China’s motivations in cyberspace –and how its actions are affecting governments, companies, and civil society –  that included Segal, Sharon Hom, executive director of Human Rights in China, Michael Sulmeyer, director of the cybersecurity project at the Harvard Kennedy School’s Belfer Center, and Lobsang Gyatso Sither, digital security programs manager at the Tibet Action Institute. Excerpts follow.

All photos are by Ann Hermes, staff photographer of The Christian Science Monitor.

Ann Hermes/The Christian Science Monitor
From left, Passcode editor Michael Farrell, Adam Segal, Sharon Hom, Michael Sulmeyer, and Lobsang Gyatso Sither, who joined via Skype from Dharamsala, India.

Why is China hacking the world?

Beyond the fact that it can, and there have been few ramifications, economics drives much of China’s digital espionage. While many people may think of China as a “massive economic success story” that has “raised hundreds of millions of people out of poverty,” said Segal, Beijing worries about being left in the next stage of global development as the world moves away from manufacturing and toward the knowledge economy.

China is also impatient, says Mr. Segal. It wants to accelerate its own engine of technological development and it’s doing that by hacking corporations and stealing intellectual property, he says. “The Chinese don’t want to be the factory to the world any longer,” said Segal, who recently wrote a cover story for The Christian Science Monitor explaining why China hacks the world. “The Chinese are really worried that in the next stage of development, they are going to get caught in a technology trap....  They want to move up the chain much more quickly, so we see them hacking to steal intellectual property.”

Ann Hermes/The Christian Science Monitor
Adam Segal (r.) is the author of the forthcoming book, "The Hacked World Order."

Everyone spies

It’s the nature of geopolitics in the Digital Age. As National Security Agency leaker Edward Snowden has shown, the NSA is certainly willing to hack phones, networks, and anything else to eavesdrop on friends and enemies alike.

“The difference that the US has been trying to establish for the past five years was that there’s good hacking, and there’s bad hacking,” said Segal. “Of course, the good hacking is the hacking the United States does. The good hacking is hacking focused on political and military espionage. Bad hacking is breaking into a company, stealing their intellectual property to help a Chinese company. The US doesn’t do that.”

Control the narrative

Both Segal and Sharon Hom said China is also exerting power in cyberspace to control freedom of expression, tamp down on criticism, and attempt to intimidate anyone – activists, artists, students, and journalists – who criticize the Communist Party. “China wants to control the narrative about itself but also the narrative about the world,” said Ms. Hom. “The party wants to manage expression online.”

While China’s hacking has become a national security issue in the US as a result of political and industrial espionage – the recent deal between Washington and Beijing is meant to curtail cyber-enabled commercial spying – Hom says the rights community has long felt the full force of China’s relentless digital assaults.

Ann Hermes/The Christian Science Monitor
Sharon Hom is the executive director of Human Rights in China, a Chinese nongovernmental organization.

“When we think about cybersecurity, it is a transnational issue. It’s an issue that has always been obvious to the human rights community, that it affected all of us. But it’s become more obvious to the private sector when governments are attacked, when companies are attacked, they realize that they’re actually in the same boat with human rights groups and Tibetan activists. We’ve always been targeted by attacks.”

In fact, the Tibetan activist community endures so many digital assaults that it’s often characterized as being at the frontlines in a cyberwar with China. “If you’re an activist or someone who works for Tibet you will receive a social-engineered e-mail every week. And if you don’t receive an e-mail like that, you probably think you aren’t doing enough,” said Lobsang Gyatso Sither, digital security programs manager at the Tibet Action Institute.

“Everyone is targeted, and it’s not just the people in the movement,” he said. State-backed hackers target the friends, relatives, and colleagues of people who are working on rights’ campaigns, he said. “That creates a sense of fear, and that’s how they want to make people afraid of the repercussions.”

These kinds of hacks have life and death consequences, said Mr. Sither. And because of that, the international community, governments, and businesses should do more to stand up against China’s persistent digital assaults on human rights groups. “We need to make that at the forefront because human lives are at stake, it’s not just about money.”

Ann Hermes/The Christian Science Monitor
Lobsang Gyatso Sither (r.) is the digital security programs manager for Tibetan Action Institute and a Tibetan living in exile in India.

Toward normalcy in cyberspace

One mechanism that many experts argue could convince China, and many other nations for that matter, to rein in hackers is the establishment of international norms of behavior – diplospeak for rules meant to guide how nations should act in cyberspace.

“We aren’t going to stop them from trying to break into the Pentagon. That’s just not going to happen,” said Segal. But, he said, norms could help to prevent cyber from moving to the kinetic, meaning digital assaults that trigger some physical damage or attack. “Right now there are no rules about what behavior is acceptable in cyberspace.”

But Hom pointed out that there's significant momentum at the United Nations and other international organizations to forge norms of behavior, that would also apply to how countries should treat civil society and online speech.

Ann Hermes/The Christian Science Monitor

‘We’ve always been targeted by attacks.’ - Sharon Hom

“The debates primarily on norms in the cyberspace realm have been about economic espionage and about military espionage and about national security interests,” said Hom. But rights groups and civil society need to be a major part of the discussion, too, she said. “At least there’s a discussion and a trend and development that brings human rights into the discussion where it belongs.”

But until then, Hom asked what kind of digital response could the West exact on China that would send a clear message that its actions in cyberspace won’t be tolerated. What would a serious, proportionate look like, she asked. Could the US or hacktivists poke holes in the Great Firewall, for instance, disrupting China’s system for massive Internet censorship. That would send a clear message, said Hom. “What if there was some serious proportionate appropriate response.”
Segal pointed out that, according to a July 2015 New York Times article, someone in the government is already thinking about about breaching China’s digital cloak. “If we want to go after something that the Chinese leadership would understand – and be afraid of – then one of the things we might do is target the great firewall.”

Ann Hermes/The Christian Science Monitor

Improving defences

Figuring out how to improve security in the digital world, and dissuading nation-state or criminal groups from attacking either for political or financial gain, is incredibly frustrating, said Michael Sulmeyer of Harvard’s Belfer Center. “The reason why this is frustrating – thinking about what to do about Chinese activity in cyberspace – is because it’s frustrating to figure out what to do about about China’s activity across the board. It is not just a cyber problem that the US has with China.”

But until there’s any kind of truce or calming to the hostilities that all nations, companies, and organizations face online, the key is to bolster cyberdefences, said Mr. Sulmeyer, formerly the director for plans and operations for cyber policy in the Office of the Secretary of Defense.

“The state of defences is really bad,” he said. “I fear we are still largely in a situation where the state of defenses is so bad that it’s just too easy for adversaries.” While international talks and agreements are worthwhile pursuits, said Sulmeyer, shoring up defense goes a long way to deterring attackers. “If the statistics are true that over 70 percent of hacks are perpetrated over known vulnerabilities,” he said, “I don’t know how you have a conversation about what to do about it without talking about defense.”

Watch the entire event

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Exploring cybersecurity from China’s perspective
Read this article in
https://www.csmonitor.com/World/Passcode/2016/0211/Exploring-cybersecurity-from-China-s-perspective
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe