recommended reading

China Hits Back Over Hacking Charges

lapas77/Shutterstock.com

The Obama administration's decision to bring criminal charges against members of the Chinese military is already showing signs of straining the U.S. relationship with China.

Shortly after the Justice Department accused five Chinese officers of hacking U.S. companies, China announced that it is withdrawing from a joint cybersecurity working group. The U.S. and China launched the working group last year to try to reach agreements over the use of cyber espionage.

Qin Gang, a spokesman for the Chinese government, said China will announce more retaliations "as the situation evolves."

According to the indictments, the five men were members of a hacking group that stole trade secrets from major U.S. companies including Westinghouse, United States Steel, and Alcoa.

But the Chinese spokesman claimed the charges were "based on deliberately fabricated facts." He also pointed to the Edward Snowden leaks as evidence that the U.S. is hypocritical when it condemns others for spying.

"China is a victim of severe U.S. cybertheft, wiretapping, and surveillance activities," he claimed.

When Attorney General Eric Holder announced the indictments Monday, he emphasized that China's behavior is fundamentally different than spying by the National Security Agency. The U.S. may spy on other countries, but it does not steal secrets to give its own companies an economic edge, he argued.

Adam Segal, a senior fellow with the Council on Foreign Relations, said it's not likely that China will try to bring criminal charges against NSA officials or other members of the U.S. government. But he said he expects China to take other steps against the U.S. in the coming days.

Segal explained that China doesn't see an important distinction between spying to protect national security and spying to help domestic companies.

"There's not such a clear line between the public and private sector in China," he said. "Their conception of economic power and national power doesn't really see this distinction."

(Image via lapas77/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.