recommended reading

Cyberspying Indictments Will Not Stop China From Hacking U.S. Businesses, Insiders Say

Charles Dharapak/AP

The high-profile U.S. indictments against five Chinese military officers will not encourage China to stop hacking American businesses to steal valuable trade secrets, virtually all of National Journal's National Security Insiders said.

It was the first time the U.S. brought a criminal case against a foreign government for cyberspying, but 91.5 percent of NJ's pool of security experts downplayed the move, calling the charges "simply silly" and "an empty gesture."

"China will continue to pursue its interests in acquiring access to U.S. secrets at any cost," one Insider said. China will meet last week's indictments, another Insider added, "with a big yawn (and lots of self-serving rhetoric) and continue business as usual."

The legal action might instead encourage China to try harder to avoid detection, Insiders said. "The door to the bank vault is still open."

The real solution, one Insider said, "is to stop complaining and start developing robust widespread encryption to protect everyone from China and the NSA." One Insider said China "won't stop until the U.S. finds an effective sanctions mechanism—and we don't have that yet." 

A slim 8.5 percent minority said the cyberespionage indictments might make an impact on China. "It will infuriate them, but it will also underscore to them the potential costs associated with what they have assumed, up until now, is risk-free (and potentially very profitable) behavior," one Insider said. 

Just days after the charges, Beijing accused the U.S. of launching its own large-scale cyberattacks against the Chinese government and Chinese companies. Yet 76 percent of Insiders said Attorney General Eric Holder's high-profile, public announcement of the charges—the Obama administration's most direct confrontation over China's alleged theft of intellectual property—was the right approach. 

The problem of China's cyberspying has "already been raised at the head of state level, the secretary of Defense level, and multiple political and diplomatic avenues, to little effect," another Insider said. "The Chinese minister of defense challenged the U.S. to provide evidence of the allegations; ... well, here it is. In itself, the indictments are not sufficient, but in tandem [with] other means, it is an important tool in our tool kit."

The indictments are also an important signal to the U.S. business community, an Insider said, "that the U.S. government is taking action to protect U.S. interests."

A vocal 26 percent objected to the new tack, especially after Edward Snowden revealed the National Security Agency's mass surveillance operations. "The Obama administration's approach looks like blatant hypocrisy," one Insider said. "It would seem that we would be in a much stronger position to make such strong allegations were we not engaged in so many questionable cyberpractices across the globe, not to mention against American citizens."

The Chinese, another Insider said, "will do their homework, build the case against our own electronic intrusions, and quite possibly regain the high ground here. The old rule of espionage applies here: 'Read my mail once, shame on you; read my mail twice, shame on me.' Like so many of our foreign adventures, this will not end well for us."

See the full results of the survey at National Journal.

Threatwatch Alert

Network intrusion / Software vulnerability

Hundreds of Thousands of Job Seekers' Information May Have Been Compromised by Hackers

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.