Opinion: Chinese cyberespionage is down. That's a win for Obama's diplomacy
Loading...
So have they or haven鈥檛 they?
Ever since President听Obama and听Chinese President Xi Jinping听agreed last September that commercial cyberespionage for profit is off limits, experts and policymakers have asked one听burning question: Has听Beijing really stopped or changed听its operations?
On Tuesday, US Assistant Attorney General John Carlin听听there had been drop in Chinese commercial cyberespionage, but added a needed note of caution: "There is a debate as to how long lasting it might be, but there has been a change."
Mr. Carlin鈥檚 hand may have been forced by a听听last听week by cybersecurity firm FireEye on a听staggering听decline: from a plateau of around 60 to 70 compromises per month by Chinese-linked groups, the number has dropped to about five per month just听two years later.
The decline started in mid-2014, following the听听of Chinese military hackers in May 2014 and really plummeted in July 2015, just after the Obama administration finalized sanction authority to use against China and in the run-up for President Xi鈥檚 visit.
It appears now operations are shifting from the nonstate spies in favor of state-run professional intelligence teams with superior tradecraft. The threat "is less voluminous but more focused, calculated, and still successful in compromising corporate networks," in FireEye鈥檚 words.
So, should we consider this a success or a failure?
It's certainly a win for the political and diplomatic process. After years of tripping over itself, the US government finally started speaking publicly about something we decided to be a critical national security issue.
The US unilaterally took a stand against international commercial cyberespionage and by some miracle (and hard diplomacy) got the听, and the听听to agree.听Even China's head of state jumped in with personal and public commitments in support of the US position. In diplomacy, that's a result.
But in a larger sense, does a decrease in volume but increase in sophistication mean the United States is better off?
There are clear security upsides to this apparent new normal:听A reduction in the volume of Chinese cyberspying means that intellectual property from dozens of corporations won't be flying听over the wires back Beijing.听Those companies now don鈥檛 have to hire cybersecurity companies to try and kick out Chinese spies.
听if the US-China cyberespionage agreement "reduces Chinese espionage by only 5 percent it will be probably the single most effective countermeasure we鈥檝e ever taken鈥 and will 鈥渃ost us almost literally nothing compared to the tens of billions of dollars鈥 spent for programs such as听the Comprehensive National Cybersecurity Initiative, the Obama administration's plan to safeguard America's digital networks.
Even so, I may have underestimated the impact: FireEye reported not a drop of 5 percent but more than 90 percent. What other solution have we听ever听implemented for such success at so little cost?
Moreover, it should be easier for Xi and the Communist Party to keep control over professional spies compared to large numbers of amateurs banging around US networks. This should tamp down chances for escalation in the US-China cyber relationship.
Third, future US countermeasures could be even more effective. With fewer Chinese economic spies, our indictments or sanctions can target the fewer fish in a smaller pond. And should the president ever order US Cyber Command to disrupt the command-and-control infrastructure used to support Chinese espionage, there may be fewer such targets.
Yes,听there are downsides to a smaller, more professional China cyberespionage intelligence operation.听Their pros are going to be more capable and more cunning 鈥 just like our National Security Agency or CIA. When they go after US companies or government agencies, they will be even more likely to get in undetected.
In addition, my colleague Michael Tanji of the cybersecurity firm Kyrus worries about the potential for new rogues actors: 鈥淚f you鈥檙e a Chinese hacker who doesn鈥檛 make the cut to the professional team, what happens? Bagging groceries during the day; pwning US companies at night?鈥 But, fortunately, such rogues would be even more worrisome for China.
Also as The New York Times' David Sanger听,听鈥淭he same political forces that may be alleviating the theft of data from American companies are also responsible for Mr. Xi鈥檚 stunningly swift crackdown on the Chinese media, bloggers, and others who could challenge the Communist Party.鈥澨鼸mpowering these forces likely means more internet crackdowns in China or more censorship, including on US companies operating in China.
On the one year anniversary of the agreement, this September, the Obama administration听should not just confirm听the trend, but support that claim with details backed by declassified intelligence to truly establish if these reports of reduced activity are true or not.
Obama has made the issue of Chinese commercial cyberespionage at the front and center of his overall policy with China. It is time for us to know if Xi is living up to his promises to Obama 鈥 and to all of us in cyberspace.
Jason Healey is senior research scholar at Columbia University鈥檚 School of International and Public Affairs and senior fellow at the Atlantic Council. Follow him on Twitter听.
听