1. Skip to content
  2. Skip to main menu
  3. Skip to more DW sites

Virtual balance of power

Spencer KimballMay 8, 2013

For the first time, Washington has directly accused Beijing of conducting cyber espionage against the Pentagon. The attacks were allegedly aimed at gathering intelligence on US defense programs.

https://p.dw.com/p/18ThG
FILE -This undated photo provided by Northrop Grumman Corp., shows a pre-production model of the F-35 Joint Strike Fighter. The Pentagon on Friday grounded its fleet of F-35 fighter jets after discovering a cracked engine blade in one plane. The problem was discovered during what the Pentagon called a routine inspection at Edwards Air Force Base, California, of an F-35A, the Air Force version of the sleek new plane. The Navy and the Marine Corps are buying other versions of the F-35, which is intended to replace older fighters like the Air Force F-16 and the Navy F/A-18. All versions , a total of 51 planes , were grounded Friday, Feb. 22, 2013 pending a more in-depth evaluation of the problem discovered at Edwards. None of the planes have been fielded for combat operations; all are undergoing testing.AP Photo/Northrop Grumman, File) no sales
F-35 KampfflugzeugImage: picture-alliance/ap

Beijing has denied US allegations that the Chinese military was conducting cyber espionage against the Pentagon, claiming instead that Washington was trying to sensationalize China's military buildup as a national security threat.

"The Chinese government and armed forces have never sanctioned hacking activities," Senior Colonel Wang Xinjun, a researcher at the Academy of Military Sciences in Beijing, told the official Xinhau news agency. The academy is a high-level research institute affiliated with the People's Liberation Army (PLA).

In its annual report on China's ongoing military buildup, the US Defense Department had claimed on Monday that some recent breaches of American government-owned computer networks were "attributable directly to the Chinese government and military."

"These intrusions were focused on exfiltrating information," The Pentagon said in its report. "China is using its computer network exploitation (CNE) capability to support intelligence collection against the U.S. diplomatic, economic, and defense industrial base sectors that support US national defense programs."

China's Foreign Ministry, for its part, called the US allegations of cyber espionage "irresponsible," saying that China's defense buildup was "legitimate and normal."

"China is committed to a path of peaceful development and pursues a defensive defense policy," said Foreign Ministry spokeswoman Hu Chunying, adding that Beijing "resolutely oppose[s] any form of hacking attacks."

Stealing industrial secrets

While the Pentagon report may represent the first time that the US government has directly accused Beijing of cyber hacking, it is not the first time that such activity has been allegedly traced back to the Chinese military.

Last February, the American private security firm Mandiant published a report claiming to document a campaign of cyber attacks conducted by a unit of the PLA, known as Unit 61398. Mandiant said that it had tracked attacks against at least 141companies and organizations back to the military unit in Shanghai. The attacks targeted some 115 US organizations.

According to Adam Segal, an expert on Chinese security and foreign policy, cyber espionage is part of Beijing's overarching goal of becoming what it calls "a comprehensive national power." That means expanding China's military capabilities, and above all developing its economic potential. Hacking US companies for commercial secrets could help give Beijing that competitive edge.

A Chinese People's Liberation Army soldier stands guard in front of 'Unit 61398', a secretive Chinese military unit, in the outskirts of Shanghai, February 19, 2013. The unit is believed to be behind a series of hacking attacks, a U.S. computer security company said, prompting a strong denial by China and accusations that it was in fact the victim of U.S. hacking. REUTERS/Carlos Barria (CHINA - Tags: POLITICS BUSINESS CRIME LAW SCIENCE TECHNOLOGY)
Mandiant traced Unit 61398's location to this building in ShanghaiImage: Reuters

"It's part of China's efforts to move the economy from 'made in China' to 'innovated in China' - to move China up the value chain," Segal, with the Council on Foreign Relations, told DW.

Incidents of cyber infiltration allegedly committed by Chinese actors have occurred at Google, General Motors and Lockheed Martin, among other US companies. Lockheed Martin is the lead contractor on the Pentagon's F-35 stealth fighter project.

There have been reports for years that Chinese cyber spies managed to copy data related to the design of the F-35. In congressional testimony last April, Air Force Lieutenant General Charles Davis said that Beijing may have used copied data from the F-35 to develop its own J-31 stealth fighter.

Strategic deterrent against US

Beyond industrial espionage, Beijing is using cyber espionage to pursue its other core national interests, according to Michael Swaine, with the Carnegie Endowment for International Peace. Those interests include backing up China's disputed territorial claims over Taiwan as well as in the South China and East China Seas.

"It can also be used as a way of engaging in a kind of asymmetrical warfare in the event that a severe crisis or conflict emerges over Taiwan, where the Chinese would see cyber warfare as an element of an overall effort to deter the US from intervening," Swaine, an expert on China and East Asia security, told DW.

With Chinese defense spending increasing by 10 percent annually, Washington may also be engaging in cyber espionage to gain a better idea of what, exactly, China's intentions are as it builds up its military.

A "Guying" stealth fighter participates in a test flight in Shenyang, Liaoning province, October 31, 2012. China's second stealth fighter jet that was unveiled this week is part of a programme to transform China into the top regional military power, an expert on Asian security said on Friday. The fighter, the J-31, made its maiden flight on Wednesday in the northeast province of Liaoning at a facility of the Shenyang Aircraft Corp which built it, according to Chinese media. Picture taken October 31, 2012. REUTERS/Stringer (CHINA - Tags: SCIENCE TECHNOLOGY MILITARY TRANSPORT TPX IMAGES OF THE DAY) CHINA OUT. NO COMMERCIAL OR EDITORIAL SALES IN CHINA
Aspects of China's J-31 may have been copied from the US F-35 stealth fighterImage: Reuters

"The US has not been particularly forthcoming about its offensive operations," Segal said. "I don't have any reason to believe that the US does not conduct espionage against China - in fact I'm fairly certain that we do."

"The point the United States makes is that the cyber espionage we conduct is against political and military targets, and that we don't conduct cyber industrial espionage," he said. "We don't steal secrets for US companies."