Obama threatens sanctions on China

Having openly accused China of hacking, President Obama, just before the visit of the Chinese president is warning that if it continues he will impose sanctions on Chinese companies.

It opens “Barack Obama has a blunt message for Beijing’s hacker army: You’re good, but we’re better. “If we wanted to go on offense,” he boasted to a group of business leaders last week, “a whole bunch of countries would have some significant problems.”  The tough talk reflects Obama’s insistence that the United States has ways of retaliating for what he has described as the rampant theft of American intellectual property by Chinese state-sponsored hackers, an issue likely to dominate the president’s meeting with his Chinese counterpart, Xi Jinping, later this week. But Obama’s bluster underlines what has become a depressing reality for the president as he approaches the end of his tenure in office: Despite years of threats, cajoling, and indictments aimed at deterring China from stealing American commercial secrets, Washington has made little progress in developing a set of tools that would deter Beijing’s cyberspies from breaching the networks of major companies like Westinghouse and then passing on their trade secrets to Chinese state-owned enterprises. As a result, the administration is considering rolling out a limited set of sanctions against Chinese firms suspected of benefiting from economic espionage — and perhaps the hackers who carried out the operations as well”.

The report makes the point that “Lacking the tools to force China to give up its commercial espionage, Obama and his top spy, Director of National Intelligence James Clapper, have spoken in recent weeks of the need for a “basic international framework” to establish “rules of the road” for cyberspace. With Xi in town, Beijing and Washington are negotiating what the New York Times reported on Saturday as an arms control agreement for cyberspace that would bar either country from waging a hacking campaign against the other nation’s critical infrastructure”.

Of course, just because there are rules does not mean that they will be obeyed. This is especially the case with China who have continually bullied and harassed its neighbours in the seas around China.

The piece adds that “The White House refused to comment on the news, which would reportedly involve both countries endorsing a U.N. experts group report that Chinese and U.S. officials were involved in drafting and that lays out a set of basic principles for states’ use of cyberweapons. That report recommends that states “should not conduct or knowingly support” any “activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public.” By endorsing that message, the United States and China would appear to rule out peacetime attacks on things such as power grids and financial systems. Moreover, the U.N. report, dated June 26, 2015, urges states not to support proxies who carry out malicious activity online and to ensure that such activity does not take place within its borders. According to U.S. claims, China has in the past used hackers working as proxies for the state to shield its responsibility for online attacks”.

It has become so open that the piece notes, “In a speech Monday at George Washington University, National Security Advisor Susan Rice called on China to halt what she called “state-sponsored, cyber-enabled economic espionage.” “This isn’t a mild irritation,” she said. “It puts enormous strain on our bilateral relationship, and it is a critical factor in determining the future trajectory of U.S.-China ties. Cyber-enabled espionage that targets personal and corporate information for the economic gain of businesses undermines our long-term economic cooperation, and it needs to stop.” But the report that is the basis of this alleged diplomatic accord between China and the United States says nothing about outlawing the theft of intellectual property”.

The writer argues that “At the heart of that conflict lies a very basic disagreement between Chinese and American spies as to what constitutes legitimate intelligence activity. Both Washington and Beijing are willing to accept that their opponent will carry out a certain amount of digital espionage — penetrating military computers, for instance, or eavesdropping on official communications — but the United States argues that China violates the unwritten rules of international espionage when it takes the information it steals and passes it on to Chinese state-owned companies”.

Interestingly the piece adds “When Obama talks about establishing some “rules of the road” for cyberspace and the competition there between China and the United States, he seems to imply that there are currently no limits whatsoever on cyber-related behaviour. And that isn’t quite true. Although commentary and punditry on the nature of warfare in cyberspace often approaches the hyperbolic — then-Defense Secretary Leon Panetta’s 2012 warning that the United States was facing an imminent “cyber-Pearl Harbor” is a classic example of a dire prediction that hasn’t come to pass — there are in fact several categories of attacks that state-hackers on both sides of the Pacific have so far forsworn”.

The piece ends “Confronted with a limited set of options to influence Chinese behaviour, the U.S. government has in recent weeks been locked in an intense debate over whether to hit China with one of the few tools on hand: financial sanctions. Last week, Obama himself hinted that sanctions directed at China are in the pipeline. “We are preparing a number of measures that will indicate to the Chinese that this is not just a matter of us being mildly upset but is something that will put significant strains on the bilateral relationship if not resolved,” he said during an appearance at the Business Roundtable. “We are prepared to [use] some countervailing actions in order to get their attention.” According to three former senior administration officials familiar with the contents of the internal debate, U.S. intelligence and military officials generally pushed hard in the run-up to Xi’s visit for sanctions that would likely target companies that have benefited from economic espionage and perhaps the hackers who carried out the operations. Diplomatic and economic officials resisted that move and cautioned against a measure they believed would blow up a summit with China’s top leader that will also feature discussion on a range of key issues besides cybersecurity, among them climate change and the global economy”.

He ends “In order to have a chance at successfully deterring Chinese intellectual property theft, such an effort would likely need to be sustained over some time. “The way you really get impact on sanctions is having meaningful actions on a serial basis,” said a former National Security Council official who worked on sanctions policy during his time in government. “You do one entity and then another. It’s a trunk and branch approach.” Moreover, using sanctions as a deterrent tool in cyberspace presents some unique challenges. Sophisticated actors obscure their physical location by technical means and commandeer third party networks to carry out their attacks. “Finding the ‘parent,’ so to speak, is harder and harder. It’s possible, but it’s a heavier lift,” the official said”.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: