Skip to main content

Advertisement

Advertisement

US retaliation risks a trade war with China

Washington is angry. Really angry. It is just not sure what to do about it.

Washington is angry. Really angry. It is just not sure what to do about it.

United States officials have accused Chinese hackers of stealing corporate trade secrets since the mid-2000s but during the past few months the outrage has reached a political tipping point. Cyber security has been thrust to the top of the agenda in US-China relations.

The Obama administration, members of Congress and the think-tanks that advise them have cast around for ways to punish hackers from China and elsewhere. Washington is considering a series of unilateral trade and other sanctions against Chinese entities and individuals. When Mr Barack Obama welcomes Mr Xi Jinping for their first presidential meeting on Friday, he will press his Chinese counterpart on the issue of cybertheft.

Yet while political pressure is building for Washington to find ways to do something about the theft of trade secrets, it faces two big problems.

First, it is not clear if any of the suggested remedies are workable. Moreover, given that China denies the US allegations, American attempts at retaliation risk escalating into a broader trade war between the world’s biggest economies.

Mr John Veroneau, a former Deputy US Trade Representative, worries that the mounting tensions over cybertheft could cause deep damage to the global trading system. “The great recession did not cause a surge in protectionism despite many predictions,” he says. “But cybertheft is changing things.”

BEYOND CONVENTIONAL ESPIONAGE

China has pushed back vigorously against growing US complaints about hacking. “As we all know, the US is the real ‘hacking empire’,” said a commentary last month in the People’s daily, the Chinese Communist Party mouthpiece.

All governments conduct espionage on both friends and rivals, focusing on their political plans and military capabilities. But in Washington’s view, there is a crucial difference between trying to get hold of sensitive military information and the theft of trade secrets that are then handed to companies.

Former and current US officials describe a Chinese enterprise that goes well beyond conventional espionage — a deliberate, co-ordinated and well-resourced strategy to steal the intellectual property of American companies that has been going on for years and is gathering pace.

Among a broader political audience, the tipping point came with the publication in March of a report in which Mandiant, a security consultancy, for the first time named a specific unit of the People’s Liberation Army in central Shanghai that it claimed was stealing US companies’ trade secrets.

Within the administration, minds have been concentrated by a new intelligence assessment detailing the threat to the country’s economic competitiveness from cybertheft. Pointing a finger publicly at Beijing for the first time, White House National Security Adviser Tom Donilon complained in March of cyberattacks “emanating from China on an unprecedented scale”.

PROPOSAL TO BLOCK IMPORTS

Having tried quiet diplomatic pressure, apparently to no avail, Washington is looking for other tools.

One proposal is to strengthen trade laws that allow the authorities to block the import of goods that infringe patent laws. Mr Dennis Blair, former Director of National Intelligence, says that the procedures need to be changed to make it faster and easier to bring such a complaint.

Legislation introduced this month by a bipartisan group of senators would require the intelligence services to publish a list of technologies that had been stolen, the products in which that intellectual property was used and the countries behind the spying. The administration would then be required to block imports of products derived from cyber espionage.

In its initial form, the Bill allows for wide powers of retaliation. The administration, for example, could block products made by “state-controlled enterprises” from countries named on the list or any products made by those companies. The US must “hold countries who engage in cybertheft accountable for their illegal activities”, says Mr Jay Rockefeller, the Democratic Senator who is one of the sponsors of the Bill.

Lawyers and former officials say, however, that such an approach would be fraught with difficulties. The people who really know which imports are benefiting from cybertheft are the US companies whose technology has been stolen, but have been reluctant to get involved in such investigations because many fear retribution from the Chinese authorities.

Foreign companies already face a web of industrial policies in China that can be used to favour local businesses at their expense. Corporate America is collectively furious at the hacking but few companies want to stick their neck out.

CHINA NOT SOLE CULPRIT

There is a slew of difficult technical questions that such legislation would need to address. How will the US prove that the stolen technologies were introduced into the Chinese company’s research and development process? And can such actions be taken quickly enough so that the commercial damage is not already done?

Involving the intelligence services in trade disputes could put them in an uncomfortable position. Intelligence officers are trained to make nuanced judgments about capabilities and intentions, not to build legal cases. They might also be forced to reveal sources and methods; as a former National Security Agency official points out, one of the most effective ways in which the US intelligence community could collect such information is through hacking.

Moreover, China is not the only culprit. Various surveys have concluded that Chinese entities are responsible for between a half and 80 per cent of the online intrusions directed at US companies. However, according to former US officials, the list of countries conducting this sort of corporate espionage includes nations with which Washington has much closer ties — including France.

NAME, SHAME, BAN

Another approach being considered is visa bans for accused hackers. Mr Mike Rogers, Chairman of the House Intelligence Committee, is set to introduce a Bill that would ban hackers from visiting the country and freeze their assets in the US.

“The visa issue should not get into a trade war because it is so targeted towards the specific perpetrators,” says Mr Rogers. “But we cannot be afraid that enforcing the law on stealing intellectual property will lead to a trade war or we are always going to be on the losing end of this”.

Mandiant’s research into PLA hackers has shown that it is possible to identify those directly involved, but denying them visas would likely have little impact given their low position in the system. Many experts on Chinese politics believe that no single institution controls the various military hacking platforms so it is hard to pinpoint the senior officers directly responsible.

Naming and shaming senior Chinese officers would also raise political concerns. They would in effect be placed on the same list of sanctioned individuals as drug-runners and terrorists — a diplomatic bombshell at the very time that the Obama administration is eager to improve relations with the PLA in order to manage the rivalry in the western Pacific.

CAN OBAMA MAKE DIFFERENCE?

Given the huge technical and political difficulties in taking legal action against Chinese hackers, some observers believe the most workable route is through increased diplomatic pressure. Mr James Lewis, a former government official now at the Center for Strategic and International Studies, says that the administration should learn from the experience of the ’90s when China came under pressure to stop selling its nuclear technology.

The approach involved making sure that every American official who met a Chinese counterpart raised the issue at the top of the agenda. Other governments in Europe and Asia did the same, while some Chinese companies were also blacklisted. “If we can get the Europeans and other Asians to act together, then it might affect Chinese thinking,” he says.

Mr Richard Bejtlich, Chief Security Officer at Mandiant, doubts that political pressure alone will have any impact on Chinese cyber espionage. After Mandiant published its report, Unit 61398, the team on which it focused, went quiet for a while. However, other Chinese hacking groups that Mandiant tracks carried on as normal and Unit 61398 had also started up again.

“If the Chinese wanted to show some goodwill or if they were interested in having better relations with the US, they would have asked some of their people to stop,” says Mr Bejtlich

However, Mr Liberthal believes that presidential intervention can have an impact. The summit this week between Mr Obama and Mr Xi provides a good opportunity for the US to raise the diplomatic stakes. “Both men will be testing each other, so Mr Obama should make this a test of how sincere Mr Xi is about wanting good relations with the US,” he says.

“There are lots of things China wants from the relationship in order to move forward. Mr Obama needs to tell Mr Xi that if we do not see the level of (hacking) activity fall, there will be consequences.” The Financial Times Limited

ABOUT THE AUTHOR: Geoff Dyer is the Financial Times’ Beijing Bureau Chief

Read more of the latest in

Advertisement

Advertisement

Stay in the know. Anytime. Anywhere.

Subscribe to get daily news updates, insights and must reads delivered straight to your inbox.

By clicking subscribe, I agree for my personal data to be used to send me TODAY newsletters, promotional offers and for research and analysis.