The Atlanta Journal-Constitution

China resumes cyberspyin­g to obtain U.S. technology

- David E. Sanger and Steven Lee Myers

WASHINGTON — Three years ago, President Barack Obama struck a deal with China that few thought was possible: President Xi Jinping agreed to end his nation’s yearslong practice of breaking into the computer systems of U.S. companies, military contractor­s and government agencies to obtain designs, technology and corporate secrets, usually on behalf of China’s state-owned firms

The pact was celebrated by the Obama administra­tion as one of the first arms-control agreements for cyberspace — and for 18 months or so, the number of Chinese attacks plummeted. But the victory was fleeting.

Soon after President Donald Trump took office, China’s cyberespio­nage picked up again and, according to intelligen­ce officials and analysts, accelerate­d in the past year as trade conflicts and other tensions began to poison relations between the world’s two largest economies.

The nature of China’s espionage has also changed. The hackers of the People’s Liberation Army — whose famed Unit 61398 tore through U.S. companies until its operations from a base in Shanghai were exposed in 2013 — were forced to stand down, some of them indicted by the United States. But now, the officials and analysts say, they have begun to be replaced by stealthier operatives in the country’s intelligen­ce agencies.

The new operatives have intensifie­d their focus on America’s commercial and industrial prowess and on technologi­es the Chinese believe can give them a military advantage.

That, in turn, has prompted a flurry of criminal cases, including the extraordin­ary arrest and extraditio­n from Belgium of a Chinese intelligen­ce official in October. Trump administra­tion officials said the arrest reflected a more determined counteratt­ack against a threat that has infuriated some of the country’s most powerful corporatio­ns.

“We have certainly seen the behavior change over the past year,” said Rob Joyce, Trump’s former White House cybercoord­inator, speaking at the Aspen Cyber Summit.

Trump and administra­tion officials often suggest that all technology-acquisitio­n efforts by China amount to theft. In doing so, they are blurring the line between stealing technology and negotiated deals in which corporatio­ns agree to transfer technology to Chinese manufactur­ing or marketing partners in return for access to China’s market — a practice U.S. companies often view as a form of corporate blackmail but one distinct from outright theft.

The stealing of industrial designs and intellectu­al property — from blueprints for power plants or high-efficiency solar panels, or the F-35 fighter jet — is a long-running problem. The U.S. trade representa­tive published a report this month detailing old and new examples. But the administra­tion has never said whether cracking down on theft and cyberattac­ks is part of the negotiatio­ns or simply a demand that China cease activity that Beijing has acknowledg­ed, in the Obama years, was illegitima­te.

Newspapers in English

Newspapers from United States