Please enable Javascript to use Top Secret Writers to it's fullest. Without it, you will find much of the modern internet doesn't work. I would add a little button hide this message, but that kind of functionality requires Javascript ;)

Was the Jill Kelley FBI Report an Intelligence Attack on Petraeus?Previous Article
ESA and NASA Successfully Test New Space Internet ProtocolNext Article

China to Escalate Cyberwar War Capabilities

Line Spacing+- AFont Size+- Print This Article

china cyberwar

“The danger is pronounced,’ warns Charles Viar, chairman of the Washington, D.C.-based Center for Intelligence Studies. ‘In my view, no one is really doing enough to deal with the Chinese threat. It is too large, and by Western standards, too unconventional[1].”

On November 9th, before leaving his post, China’s Hu Jintao announced that China is speeding up its full military Internet technology IT applications and development, including new weapons and equipment.

With China being the world’s worst perpetrator of cyber-espionage and theft, this is a worrying prospect.

All nations have the right to protect themselves in all spheres of engagement, but the Chinese have taken it too far. They are recognized as the worst perpetrators of cyber-theft, and present the biggest threat to US national security. Hu Jintao’s pronouncement should be a concern for all Western nations.

“Irrespective of sophistication, the volume of exploitation attempts yielded enough successful breaches to make China the most threatening actor in cyberspace, [2]” -US Congressional Report on China

Recent Developments

Hu’s pronouncement came before a leadership handover, which ushered in the newest generation of Chinese Princelings [3].

The timing of this proclamation is crucial, for it is through such decrees that China allows a peek into the opaque workings of its inner sanctum. Typically, communist party mandates are obtuse and lack precision. This ambiguity forestalls accountability, which in the communist system is essential.

By not being specific in their mandates, the party can manipulate ‘transgressions’ of those laws into something more benign. On the other hand, when the Chinese do come forth with a mandate like that made by Mr. Hu, it will receive full commitment and resources from the communist party, and will be enforced with an iron fist.

Beijing usually uses messages at such an pivotal time as a way to put the world on notice as to their intentions. The speech and declaration by Mr. Hu is a testament that for the next five years, China’s cyber army will ratchet up its presence, technology and presumably its theft as well.

china cyberwar

The China Cyber Command Center

In order to make good on Hu’s proclamation, China has been constructing a Cyber Command center near the Communist Party School and Beijing University.

This command center appears to be the heart of the ‘network defense, attack and exploitation systems [4]’. While China had relied on brute force techniques in terms of hacking in the past, it is trying to up its game.

Beijing operates under the fear of revolution and foreign interdiction. This fear, coupled with their knowledge that China’s military is no match for that of the US, has caused the Chinese to focus on cyber capabilities in order to nullify US strategic advantages.

Mr. Hu’s proclamation, coupled with Beijing’s increased focus on IT capabilities means that Internet hacking and theft by China will only intensify in the coming years.

One could argue that China has a right to defend itself, which is true. The problem, however, is that by developing its cyber capabilities, Beijing can not only ‘defend’ its sovereignty, but continue its widespread theft of military secrets and intellectual property. It is this combination of factors that has caused China to be labeled “The Most Significant Global Cyberthreat [5]”.

In order to better understand the China threat, consider the following example.

On any given day, cyber attacks account for nearly 15% of all global internet traffic. During the Chinese holiday, when workers presumably take leave, incidences of hacking traffic declines.

A telling example is that during China’s national holiday last year, global traffic from hackers plummeted from 15% to 6.5% [6]. If this figure is representative of China’s behavior, it shows the global scale of China’s hacking. It also reinforces the need for concern about China’s ability and intentions.

china cyberwar

So What, Doesn’t the US do the Same Thing?

The first question you may be asking is whether China’s actions are really a big deal. After all, the US does the same thing, right? This is actually a two part question, with the first being true and the second not so.

The US is certainly active in cyberspace, and with the assistance of the NSA it has a powerful online presence. The proof of this is in the role of the US in using the stuxnet virus [7].

In that instance, the US in tandem with Israel, developed a virus to be used as a weapon against Iran. Due to the secretive nature of the NSA, however, we have little to no idea what else they may be involved with.

Irrespective of their presence, however, the NSA has done little to ebb the flow of secrets being stolen from US companies each year. It is this fact that proves that by increasing its cyber warfare capabilities, China will pose an even greater threat to US security in the near term.

It has been proven that China’s cyber aggression has been paying off in spades.

Recently Beijing stole the secrets of U.S. next-generation fighters, including the F-35 and F-22[8], missile technology, missile guidance systems [9] and much more.

Couple this with the fact that China began pilfering American nuclear weapons [10][11] and technology [12] over ten years ago, and one can get an idea of the depth and scope of China’s thirst for stolen US secrets.

However, stealing US military tech is only part of Beijing’s plan. They can also plant and activate trapdoors and logic bombs [13] in military use gear that is made in China.

Even more troubling is the fact that Chinese companies provide technology that is fundamental to US infrastructure. Many of these companies are closely aligned with the red army.

It has also been shown that the Chinese have accessed trapdoors like the one mentioned above, and may have the ability to bring down the US telecommunications infrastructure even before military engagement [14].

When viewed from this perspective, it is obvious that China poses a credible and imminent threat to US security.

china technology theft

Why it Matters- Jobs and Technology

“Every major company in the United States has already been penetrated by China.[15]”- Richard Clarke

The incidence of cyber attacks increased by 44% in 2011 alone [16], and that figure has only been increasing.

As a consequence of these attacks and IPR theft, US companies lose hundreds of billions of dollars per year. Last year, for instance, US companies lost more from stolen tech than Wal-Mart made in sales all year [17].

The impact of such theft is undeniable. The result of this is not only the decay of America’s technological superiority, but jobs as well. It is estimated that IP theft has cost tens of millions of American [18] jobs [19], and China has played a significant role in that theft.

When viewed in this light, China’s announcement becomes even more worrying.

The problem is that communist regimes restrict the flow of information, which depletes creativity. In communistic and other dictatorial regimes, people do not ‘add value’ in the conventional sense of the word. Instead of taking risks, they toe the party line and adhere to ancient principles.

Consequently, such regimes do not innovate as the ‘value added’ is not in creation, but in ‘containment’. China realizes their innovative impotence and has relied on theft of technology so that they do not fall dangerously behind [20].

china cyberwar

So, What’s New?

At this point, you may be wondering why the US is doing so little to confront this foreign threat. The unfortunately reality is that one of the biggest impediments in dealing with the China threat is US corporations – those who are most at risk.

Firstly, companies do not like to admit that their systems have been breached. They reason that by announcing their vulnerability, they will suffer further attack. But this is only part of the story.

Corporate greed also plays a role as well. With a market size of 1.34 billion people, companies are loathe to confront the ‘Chinese dragon’ out of fear of reprisal. Companies would rather convince the US public that doing business in China is not that different from doing business back home, and that China threats can be managed.

Corporate heads can then rest assured that stockholders will not question their involvement with China and the risks therein. By remaining mum, these corporate directors can smirk all the way to the bank as they cash in their options and buy a new home, thanks to that fat bonus check.

As far as the U.S. government is concerned, they acknowledge that the problem exists, but have no coherent plan of defense. Chalk this up to equal measures of greed, ignorance and ‘politics as usual’.

Various governmental officials have been wooed by the Chinese and their cash. These politicians figure that by selling out our security and land [21], they can secure a few more years in office and perhaps a nice consulting gig with a Chinese company upon retirement.

Their actions may be out of ignorance of how things work in China. Perhaps they truly believe that irrespective of all the data that exists to the contrary; China truly wants to increase American prosperity, economy and jobs.

On a positive note, it appears that the US Congress is now calling for a comprehensive assessment of Chinese cyber-spying. They would then seek to impose penalties on companies that benefit from this espionage [22]. The act by Congress is a good start, but is it enough?

With China literally stealing our competitive edge from right out of U.S. computers, something has to be done. At an individual level, citizens of Western nations can get educated about the hacking threat China poses, and then spread the word.

References & Image Credits:
[1] The Diplomat
[2][5] Free Beacon
[3] Communist leaders who are sons of the revolution.
[4] Free Beacon
[6] Bloomberg
[7] ARS Technica
[8] CNS News
[9] Examiner
[10] Telegraph
[12] NY Times
[13] Smithsonian Mag
[14] Business Tech
[15] Smithsonian Mag
[16] The Cable
[17] Top Secret Writers
[18] KCS Group
[19] Security Affairs
[20] Some would argue that China is innovative and points to patent generation in order to support this theory. See the article on the myth of Chinese innovation.
[23] Security Affairs
[24] Foreign Policy
[25] Reuters

Originally published on

“The thing about the truth is, not a lot of people can handle it.” -Conor McGregor

BECOME A PATREON SUPPORTER and decide what stories we investigate!

Donate to Support TSW!

Top Secret Editors

Ryan is the founder of Top Secret Writers. He is an IT analyst, blogger, journalist, and a researcher for the truth behind strange stories.
Lori is TSW's editor. Freelance writer and editor for over 17 years, she loves to read and loves fringe science and conspiracy theory.

Top Secret Writers

Gabrielle is a journalist who finds strange stories the media misses, and enlightens readers about news they never knew existed.
Sally is TSW’s health/environmental expert. As a blogger/organic gardener, she’s investigates critical environmental issues.
Mark Dorr grew up the son of a treasure hunter. His experiences led to working internationally in some surprising situations!
Mark R. Whittington, from Houston, Texas, frequently writes on space, science, political commentary and political culture.

Join Other Conspiracy Theory Researchers on Facebook!

Get a Top Secret Bumper Sticker!

Comment on Breaking Stories

Powered by Disqus