海角大神

Influencers: US should sanction China for economic espionage

In a survey, a strong majority of Passcode鈥檚 pool of security and privacy experts said sanctions aimed at curbing China鈥檚 economic espionage would send the right message.

Illustration by Jake Turcotte

September 16, 2015

The US should impose sanctions on Chinese entities that launch cyberattacks on American businesses to steal trade secrets, a strong majority of Passcode鈥檚 pool of digital security and privacy experts听said.

The Obama administration听against Chinese companies that have benefited from the theft of US intellectual property, along with individuals who orchestrated the cyberspying. Economic espionage is expected to be a hot topic as Chinese President Xi Jinping visits Washington later this month, in the wake of high-profile hacks of US businesses; China is also the lead suspect of the massive Office of Personnel Management听breach.

As Washington considers how to respond, 73 percent of Passcode鈥檚 Influencers said sanctions aimed at curbing China鈥檚 economic espionage would send the right听message.

Trump promised to bring jobs to the Rust Belt. The Sun Belt may get them instead.

鈥淭hus far, our diplomatic and other efforts have not made a dent in stemming the flow of intellectual property from US businesses,鈥 said Dmitri Alperovitch, cofounder and chief technology officer of security company CrowdStrike. 鈥淲e need to start considering new approaches to put pressure on Chinese companies to stop stealing and begin competing fairly in the global marketplace.鈥

Passcode鈥檚 Influencers Poll听听in digital security and privacy. They have the option to comment on the record or anonymously to preserve the candor of their responses.

The US听says it does not participate听of corporate espionage 鈥 using its intelligence and national security apparatus to spy for the benefit of American businesses 鈥 for moral reasons. And yet, Representative Jim Langevin (D) of Rhode Island said the costs of corporate espionage to the US is 鈥渞eal and massive, and present a serious threat to our long-term economic and national security.鈥

There has been 鈥渘o sign the hacks targeting the American economy are abating,鈥 Rep. Langevin continued, despite the Obama administration鈥檚 diplomatic outreach and听听of Chinese military hackers targeting US companies in the nuclear power, metals, and solar products industries.

鈥淢ore aggressive action by the administration, including the imposition of sanctions, is overdue,鈥 Langevin said, noting there could be a need for an even stronger response down the road: 鈥淚 hope that they will be enough to induce China to stop its campaign of theft and cheating and join the community of responsible nations in cyberspace, but if they are not, I will support further proportional retaliatory measures.鈥

What鈥檚 behind Trump鈥檚 assault on Harvard and crown-jewel US universities?

Since the US would need to prove the targeted organizations were involved in illegal conduct in order to impose sanctions, said Jay Healey, a senior research scholar at Columbia University鈥檚 School of International and Public Affairs, the move would ratchet up the pressure.

鈥淭he sanctions are not against 鈥楥hina,鈥 but the specific entities involved in the theft of trade secrets,鈥 Mr. Healey said. 鈥淭his is directly targeting those involved in the illegal conduct, locking them out of US markets or refusing them visas. So while it is certainly escalatory, it is less so than counter-hacking or other aggressive state versus state听action.鈥

Still, a 27 percent minority of Passcode Influencers said US sanctions would not be the most effective tool against Chinese espionage.

鈥淪anctions run the risk of an ever increasing escalation of retaliation but will do little or nothing to stop state sponsored espionage,鈥 said Cris Thomas (aka Space Rogue), a strategist at Tenable Security. 鈥淪anctions do, however, work to help silence the critics that accuse the administration of doing nothing.鈥

Instead, he said, the correct response by the US government should be to ensure all its agencies are implementing basic security controls. 鈥淭hings like knowing what is on the network, who has root access and when it is being used, and what the patch levels are. These basic things will not prevent espionage, but will make the effort much more difficult.鈥

There are also some risks to imposing sanctions for digital espionage, experts said. For instance, without properly verifying the attackers鈥 identities, the 听US runs the risk of falsely blaming, and punishing, China. For its part, China routinely denies that it carries out corporate espionage.

鈥淭his is a complex issue.... For sanctions to be imposed there have to be two things. Clear attribution of the attack to the entity against which sanctions are being made, and disclosure of the facts that have led to the decision to impose sanctions,鈥 an influencer, who chose to remain anonymous, said. 鈥淭he level of sophisticated forensics required to determine attribution should not be underestimated, nor should the desire to keep such forensics听secret.鈥

The emphasis in US policy, the influencer continued, 鈥渘eeds to shift to resilience and deterrence at that level rather than sanctions. This, combined with increased political collaboration, is a better way to deal with the cybertheft of trade secrets.鈥

What do you think?听听of the Passcode Influencers Poll.

Who are the Passcode Influencers? For a full list, check out our听

Comments: Yes

鈥淭his seems like a prudent escalation beyond the previous indictments of members of the Chinese military. Increasing measures are needed to make it clear that the US will not stand for unbridled cyber theft of valuable US-based intellectual property.鈥 鈥斕Ely Kahn, Sqrrl

鈥淲hile I think sanctions are appropriate when the US has conclusive proof that foreign governments attacked US business systems, I don鈥檛 they will be effective or particularly meaningful. First, businesses need to get to at least a due diligence/basic hygiene level of security - most courts would call those compromised systems 鈥榓ttractive nuisances.鈥 Secondly, the US is trying to make a fine distinction between 鈥榖ad鈥 cyber intrusions and 鈥極K鈥 cyber intrusions, based on whether the goal was political or economic. The two are not separable anymore.鈥 鈥斕John Pescatore, SANS Institute

鈥淚t鈥檚 a good idea but you must be extremely confident in the attribution, it needs to be made public, and the Chinese government must be told ahead of time what is going on and exactly why. This is one of those steps that is needed but there cannot be any miscommunication.鈥 鈥斕Influencer

鈥淲e have to come to grips with attaching consequences to actions, the recent EO [executive order] sets a standard of 鈥榤alicious cyber activity鈥 but it has yet to be applied in practice.鈥 鈥斕Influencer

鈥淭he challenge is attribution. Attackers using Chinese IP space may not be Chinese at all. The US also has to be prepared for sanctions for US cyber activities that the Chinese think are sanction- worthy.鈥 鈥斕Chris Wysopal, Veracode

鈥淏ut only if attribution is assured. Unfortunately, that is much more difficult than most policy makers understand.鈥 鈥斕Influencer

鈥淎 good idea but extremely difficult to implement. How do you know which entity launched the attack? Attribution in cybersecurity is a hard problem.鈥 鈥斕Influencer

鈥淲e are losing the cyberwar. Our national security and the privacy of every American are in serious jeopardy. We must act with equal seriousness.鈥 鈥Jenny Durkan, Quinn Emanuel

鈥淧resident Obama signed an executive order in April giving the administration the ability to sanction entities worldwide for engaging in cyberattacks against US targets. If the US has undeniable proof that China has undertaken a cyberattack and the administration sees such a response as a tactic that will have more positive than negative impact then it should follow through on its promise to respond to such attacks.鈥 鈥斕Influencer

鈥淭he present dynamic is cost-free to the attackers, so let鈥檚 create some costs to those profiting from the attacks. It also creates a few useful concession points to end for negotiations in the future.鈥 鈥斕Influencer

鈥淭here have been exactly zero costs imposed on China for their proliferate hacking of the US (and every other country in the world with any digital property worth stealing). It鈥檚 long past time to impose some costs for their behavior; something is better than nothing.鈥 鈥斕Influencer

鈥淢alicious actions deserve repercussions. It鈥檚 taken the U.S. government far too long to converge on a cost-imposing solution to such unacceptable behavior in cyberspace.鈥 鈥斕Amy Chang, Staff Director of a House Foreign Affairs Subcommittee

鈥淭here are serious privacy, cybersecurity, and commercial competitiveness risks and the consequences should be appropriately calibrated. Imposing sanctions is a better alternative than is hacking back, which could have unintended consequences.鈥 鈥斕Influencer

鈥淭he US needs to create international norms and an agreed-upon framework for responses to cyberattacks. Unilateral action would be a disaster without that rule of law, and the US, in particular, is in a position to help drive this much-needed update to international law.鈥 鈥斕Sascha Meinrath, X-Lab

鈥淎mong other things, deterrence requires a credible response capability and a willingness to deploy it. Cybersecurity doesn鈥檛 turn deterrence theory on its head, but there鈥檚 more nuance here given that all nation states with the technical capacity engage in cyber-espionage. Stealing corporate trade secrets to benefit local industry, however, should be sanctioned to create credible deterrence. The challenge then is how to do so in the big picture of relations between two super-powers. In this case, there are probably small-scale and perhaps escalating responses (diplomatic protest, low-level trade tools, etc.) that can demonstrate a willingness to respond. The USG should also continue to emphasize, as should industry advocacy groups, that one key to China鈥檚 long-term success economically will come from genuine and organic competition and innovation in the market.鈥 鈥斕Influencer

鈥淐hinese leaders do not perceive the US as having the political will to impose sanctions for Chinese theft of commercial secrets from Western companies. If the US wants to change China鈥檚 subjective interpretation of the situation, the administration must change the objective facts. Sanctions are needed to impose visible, public costs on Chinese companies and individuals who benefit from stolen commercial secrets.鈥 鈥斕Richard Bejtlich, FireEye

鈥淢y general position is that the US needs to impose sanctions on any entities that are attacking U.S. companies, citizens and government. That goes beyond China.鈥 鈥斕Influencer

鈥淏ut not before the summit and with providing more evidence than in the past.鈥 鈥斕Adam Segal, Council on Foreign Relations

鈥淗owever, I think we should first exhaust all forms of diplomacy.鈥 -Influencer

鈥淓conomic espionage is different in character and nature from national security 鈥榗overt action鈥 espionage and should be treated differently. Economic sanctions for economic crimes is a proportional response where all sides know the rules of the game.鈥 鈥斕Jeff Moss, DEF CON Communications

鈥淲e certainly already know that it isn鈥檛 a good idea not to,鈥 鈥斕Influencer

鈥淵es, but it is very difficult to consistently perform accurate attribution of network attacks to specific attackers. An IP address is not a person. Consequently, it isn鈥檛 clear what fraction of the overall attack activity can be addressed with this particular approach.鈥 鈥斕Bob Stratton, MACH37

鈥淵es, but not the ones being discussed. 听Rather than tying up their ability to move money in some way that depends on our side having a continuing, workable ability to do so, I would do something more along the lines of simply de-routing all their addresses (both now known and to be discovered) for some fixed time -- much like a jail sentence that says you will sit outside society until we tell you you can return. 听We won鈥檛 get restitution from Chinese firms because we won鈥檛 apply the kind of civil forfeiture to them we routinely apply to minor and not-so-minor thugs here at home. 听We have, for better or worse, come to require numerous safety 鈥 and security 鈥 relevant services from [Internet Service Providers] and though I don鈥檛 like that (end-to-end is better design than safe pipes), ISP regulation is what we institutionally have to work with. 听Just de-route the miscreants. 听Of course, the miscreants may be using stolen or misappropriated assets of otherwise blameless third parties, so the question becomes whether we de-route the third parties as well and/or provide the third parties with material assistance in taking action against said Chinese perpetrators on their own behalf and, by extension, ours. 听In any case, a combination of shunning and surveillance is what I recommend, assuming, as the Passcode question itself assumes, that we can鈥檛 get today鈥檚 or tomorrow鈥檚 victims to just buck up their damned defenses to levels that makes this whole mess go away. 听Getting someone else to go after perps is what you do when you are fully invested in being a mark.鈥 鈥斕Dan Geer, In-Q-Tel

Comments: No

鈥溾橳rade secrets鈥 are pretty low level stuff and they get 鈥榮tolen鈥 all the time. That鈥檚 a business model problem, not a foreign policy problem. But if you asked me about the theft of patented intellectual property, and told me that there was a persistent pattern of theft, then I鈥檇 say that the US government would (and should) consider imposing sanctions regardless of how the theft occurs -- cyber or dumpster diving for example. In other words, what gets stolen to me is more important than how it gets stolen.鈥 鈥斕Steve Weber, UC Berkeley

鈥淢y primary reason for hesitation is the difficulty of precise attribution, though the lack of historical effectiveness of sanctions on behavior is also a factor.鈥 鈥斕Influencer

鈥淪anctions always have unintended consequences. If they restrict trade then the damage done will ricochet against US consumers and businesses.鈥 鈥斕Richard Stiennon, IT-Harvest

鈥淭he lack of positive attribution makes this a dangerous game - too much opportunity for false flag attacks.鈥 鈥斕Influencer

鈥淪anctions will fail to accomplish their objective of stemming the flow of cyber attacks from China, and it will harm US businesses who do business there. Google, who pulled out of China in 2010 for cyberespionage reasons is now returning for financial reasons. That tells you all there is to know about why this sanctions plan is lose-lose for US companies.鈥 鈥听Jeffrey Carr, Taia Global

鈥淪lippery slope, there are other ways to handle the problem.鈥 鈥斕Influencer

鈥淭he problem with the US imposing sanctions on China for economic cyberespionage is that the Chinese don鈥檛 understand the US position that there is a difference between economic espionage - which the US claims it does not do - and national security cyber espionage, something the US does daily. The line seems arbitrary to the Chinese culture. ...The truth is, key players on the international stage believe what China believes. France is notorious for industrial espionage, and the Russians, until recently, have just been stealthier about their operations, compared to their Chinese brethren...The real question is not whether we should distinguish between industrial cyber espionage and state secret cyber espionage. The real question is what do we do about cyber espionage in general. 鈥 After the Cold War and since the Internet has become the ubiquitous access tool it now is, the change in espionage has been one of scale. Before the Cold War, spy organizations stole secrets one at a time at considerable peril to their secret agents in the field. After, cyber spies can now hoover up libraries of secrets from the safety of their own living rooms. China, Russia, and France understand this and believe it would be silly not to take advantage of the situation. Imposing sanctions on countries for pursuing this activity would not stop it. Most countries would consider it the cost of doing business. The libraries of hoovered secrets would be worth the price. So, sanctions are not the answer. What might work are incentives. We need to find ways that make it mutually beneficial to all players not to conduct cyberespionage operations. I am not sure what those might be, but I am positive that the U.S. imposing sanctions on China will have no effect and will just raise tensions between the two countries.鈥 鈥斕Rick Howard, Palo Alto Networks

鈥淭he US leads the world in cyber-hypocrisy, always playing the victim when it鈥檚 really the most cyber-aggressive country in the world, the only country to launch a true cyber war attack, Stuxnet, against Iran. Rather than cyber retaliation, we should be discussing cyber disarmament.鈥 鈥斕James Bamford, Foreign Policy Magazine

What do you think?听听of the Passcode Influencers Poll.