This article is from the source 'nytimes' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at http://www.nytimes.com/2014/05/20/us/us-treads-fine-line-in-fighting-chinese-espionage.html

The article has changed 5 times. There is an RSS feed of changes available.

Version 0 Version 1
U.S. Treads Fine Line in Fighting Chinese Espionage U.S. Treads Fine Line in Fighting Chinese Espionage
(about 2 hours later)
WASHINGTON — By indicting suspected members of the People’s Liberation Army’s most famous cyberwarfare operation, Unit 61398, the Obama administration is now using the legal system to make a case it has, until now, made only in classified briefings: that the Chinese military leadership is stealing American intellectual property and designs for its own profit. WASHINGTON — By indicting members of the People’s Liberation Army’s most famous cyberwarfare operation, called Unit 61398 but known among hackers by the moniker “Comment Crew,” the Obama administration is now using the legal system to make a case it has previously confined to classified briefings: that the Chinese military leadership is behind an enormous organized campaign to steal American intellectual property and designs for its own profit.
For two years now, President Obama and his aides have declared that while the United States spies for its national security, China, in using instruments of the state for commercial competitive advantage, does something far more pernicious. The indictment unsealed Monday morning cited examples including the theft of trade secrets for nuclear power plants that would save months or years of design work, and of information from inside a solar energy company that was pursuing a trade complaint that its Chinese competitors were receiving illegal subsidies from the government. For two years now, President Obama and his aides have declared that when the United States spies on China, its goals are sharply different from those of the Chinese who engage in espionage. In public speeches and private conversations with Xi Jinping, the Chinese president, Mr. Obama has argued that it is far more pernicious to use the intelligence instruments of the state for commercial competitive advantage. The United States may do all it can to learn about China’s nuclear arsenal, or about Beijing’s intentions in its territorial disputes with Japan, but it does not, the administration says, steal from China Telecom to help AT&T.
But the Chinese will most likely argue in response that the United States also spies, and that the distinction between spying for commerce and spying for national security is a tiny one and distinctly American. Attorney General Eric H. Holder Jr. repeated that argument Monday morning as he unsealed an indictment that included allegations that Unit 61398 had stolen trade secrets for nuclear power plants that would save months or years of design work, as well as information from inside an American solar energy company that was pursuing a trade complaint against its Chinese competitors.
Documents revealed by Edward J. Snowden, the National Security Administration contractor now in Russia, have revealed that the American government pried deep into the servers of Huawei, one of China’s most successful Internet and communications companies. The documents made clear that the N.S.A. was seeking to learn whether the company was a front for the People’s Liberation Army and whether it was interested in spying on American firms. But there was a second purpose: to get inside Huawei’s systems, and to use them to spy on its clients. That was only the tip of the iceberg: A Federal report last year, classified but widely circulated, indicated that more than 3,000 American companies had been notified by the F.B.I. that they had been hacked, mostly by Chinese competitors. Statistics like those have been at the heart of the argument that the Chinese activity is increasingly intolerable.
Huawei officials said they failed to understand how that differed in any meaningful way from what the United States has accused the Chinese of doing. Even some former American officials, speaking on condition of anonymity, said they agreed. But the Chinese have already rejected both the facts and the argument, and they used the revelations last year by the former National Security Agency contractor Edward J. Snowden to press their response that the distinction between spying for commerce and spying for national security is a tiny one, and distinctly American.
“To the Chinese, this isn’t first and foremost a military weapon, it’s an economic weapon,” Laura Galante, a former Defense Intelligence Agency cyberspecialist now at the Mandiant division of FireEye, said last month. “The Chinese response was that building China’s economy and strengthening its technological base were national security issues,” James A. Lewis, a cybersecurity expert at the Center for Strategic and International Studies in Washington, wrote shortly after the indictment was announced. “One People’s Liberation Army officer put it this way: ‘In the U.S., military espionage is heroic and economic espionage is a crime, but in China, the line is not as clear.' ”
One senior American official noted several weeks ago that “we’re on a bit of thin ice” in making the distinction between economic and security surveillance and data gathering. “To the Chinese, their economic security is their national security,” he said. “They just don’t think about this world the way we do.” In fact, even in the United States the line has occasionally blurred.
The big question now is what the diplomatic impact of the indictment may be. The United States spies regularly for economic advantage when the goal is to support trade negotiations; when the United States was trying in the 1990s to reach an accord with Japan, it tapped the Japanese negotiator’s car. It is also widely believed to be using intelligence in support of major trade negotiations now underway with European and Asian trading partners. But in the view of a succession of Democratic and Republican administrations, that is considered fair game.
Last month, Defense Secretary Chuck Hagel went to Beijing to argue for a new channel of communication between the United States and China on cyberstrategy. American officials had already given the Chinese an overview of American cybersecurity, emphasizing that the N.S.A. did not take what it collects and hand it to Apple or Microsoft or Google. Companies can also be targets. Documents released by Mr. Snowden have revealed that the American government pried deep into the servers of Huawei, one of China’s most successful Internet and communications companies. The documents made clear that the N.S.A. was seeking to learn whether the company was a front for the People’s Liberation Army and whether it was interested in spying on American firms. But there was a second purpose: to get inside Huawei’s systems, and to use them as a conduit to spy on countries that buy its equipment around the world.
Huawei officials said they failed to understand how that differed in any meaningful way from what the United States has accused the Chinese of doing.
But such reasoning is rejected by former American officials. “I welcome this indictment because it has our government falsely rejecting the false equivalence between us and the Chinese,” said Michael V. Hayden, a former director of both the N.S.A. and the Central Intelligence Agency. “It’s a risky course of action,” he added, “but prior to this we were in stasis.”
It is risky because the Chinese have already reacted by declaring that they are shutting down, at least for now, the modest conversations underway between the two countries on norms of behavior on the Internet.
But those conversations were already fraught. Last month, Defense Secretary Chuck Hagel went to Beijing to argue for a new channel of communication between the United States and China on cyberstrategy. American officials had already given the Chinese an overview of American cybersecurity, emphasizing that the N.S.A. did not take what it collects and hand it to Apple or Microsoft or Google.
The hope was that it would prompt the Chinese to give Washington a similar briefing about the People’s Liberation Army units that are believed to be behind the escalating attacks on American corporations and government networks. So far, the Chinese have not reciprocated.The hope was that it would prompt the Chinese to give Washington a similar briefing about the People’s Liberation Army units that are believed to be behind the escalating attacks on American corporations and government networks. So far, the Chinese have not reciprocated.
Instead, they have denied that the P.L.A. conducts cyberoperations. When The New York Times published an article early last year about Unit 61398, in which it detailed some of its operations, there were furious denials from Beijing. For a few weeks, the unit went quiet. Instead, they have denied that the P.L.A. conducts cyberoperations. When The New York Times published an article early last year about Unit 61398, in which it detailed some of the group’s operations, there were furious denials from Beijing. For a few weeks, the unit went quiet.
Then it came back — operating from different servers, but often against the same American industrial targets.Then it came back — operating from different servers, but often against the same American industrial targets.