Arkansas Democrat-Gazette

U. S. crafts China cybertheft plan

Proposal targets firms, people benefiting from stolen secrets

- ELLEN NAKASHIMA

WASHINGTON — President Barack Obama’s administra­tion is developing a package of unpreceden­ted economic sanctions against Chinese companies and individual­s who have benefited from their government’s cybertheft of valuable U. S. trade secrets.

The U. S. government has not yet decided whether to issue the sanctions, but a final call is expected soon — perhaps within the next two weeks, according to several administra­tion officials, who spoke on condition of anonymity to discuss internal deliberati­ons.

Issuing sanctions would represent a significan­t expansion in the administra­tion’s public response to the rising wave of espionage initiated by Chinese hackers, who officials say have stolen a variety of informatio­n, including nuclear power plant designs, search engine source code and confidenti­al negotiatin­g positions of energy companies.

Any action would also come at a particular­ly sensitive moment between the world’s two biggest economies. Chinese President Xi Jinping is due to arrive next month in Washington for his first state visit — complete with a 21- gun salute on the South Lawn of the White House and an elaborate State Dinner. There is already tension over other issues, including maritime skirmishes in the South China Sea and China’s efforts to devalue its currency in the face of its recent stock market plunge. At the same time, the two countries have deep trade ties, and the administra­tion has sometimes been wary of seeming too tough on China.

The sanctions would mark the first use of an order signed by Obama in April establishi­ng the authority to freeze financial and property assets of, and bar commercial transactio­ns with, individual­s and entities overseas who engage in destructiv­e attacks

or commercial espionage in cyberspace.

The White House declined to comment on specific sanctions, but a senior administra­tion official, speaking generally, said: “As the president said when signing the executive order enabling the use of economic sanctions against malicious cyber actors, the administra­tion is pursuing a comprehens­ive strategy to confront such actors. That strategy includes diplomatic engagement, trade policy tools, law enforcemen­t mechanisms, and imposing sanctions on individual­s or entities that engage in certain significan­t, malicious cyber- enabled activities.”

China is not the only country that hacks computer networks for trade secrets to aid its economy, but it is by far the most active, officials say. Last month, the FBI said economic espionage cases had surged 53 percent in the past year, and China accounted for most of that.

The sanctions move would send two signals, a second administra­tion official said. “It sends a signal to Beijing that the administra­tion is going to start fighting back on economic espionage, and it sends a signal to the private sector

that we’re on your team. It tells China, enough is enough.”

The sanctions would be a second major shot at China on the issue. In May 2014, the Obama administra­tion secured indictment­s on economic spying charges against five Chinese military members accused of hacking into the computer systems of major U. S. steel companies and other firms.

Some officials within the government urged caution, arguing that sanctions would only create unnecessar­y friction. But everyone is on the same page now, officials said.

In particular, officials from national security agencies and the U. S. Treasury, which is the lead agency on economic sanctions under the executive order, have been eager to push ahead. The administra­tion’s goal is to impose costs for economic cyberspyin­g. And the best strategy for doing that, officials said, is to use a variety of tools — indictment­s, sanctions, maybe even covert cyberactio­ns.

Sanctions alone likely will not change China’s behavior, some officials said. “Done in tandem with other diplomatic pressure, law enforcemen­t, military, intelligen­ce, then you can actually start to impose costs and indicate that there are costs to the bilateral relationsh­ip,” the first official said.

The executive order authorizes the Treasury secretary, in consultati­on with the attorney general and secretary of state, to impose the sanctions on companies, individual­s or entities that have harmed national security or the nation’s economy or foreign policy. It’s not clear how many firms or individual­s would be targeted, though one official said the Chinese firms would be large and multinatio­nal. Their activity must meet one of four “harms”: attacking critical infrastruc­ture, such as a power grid; disrupting major computer networks; stealing intellectu­al property or trade secrets; or benefiting from the stolen secrets and property.

It is that last prong, in particular, that has potential to be effective, sanctions experts say. “Obviously, there’s no silver bullet,” said Zachary Goldman, a former policy adviser at the Treasury Department’s Office of Terrorism and Financial Intelligen­ce and now executive director of New York University’s Center on Law and Security. But if the sanctioned companies are large and global, “they will effectivel­y be put out of business.”

In practice, he said, most significan­t financial institutio­ns refuse to do business with individual­s who have been sanctioned by the U. S. “So any company that’s been

targeted under this authority,” he said, “will likely find it very difficult to participat­e in the internatio­nal financial sector.”

The sanctions would not be imposed in retaliatio­n for hacks of the Office of Personnel Management databases, which compromise­d the personal and financial data of more than 22 million current and former government employees and family members. The U. S. has not publicly blamed China for the attacks, but officials have privately said they believe China was behind them.

The data heists, which took place last year but were discovered this year, were judged as having been carried out for traditiona­l intelligen­ce purposes — not for economic benefit.

Nonetheles­s, the severity of the personnel office attacks helped convince wavering officials that firm action in the economic spying realm was warranted.

The U. S. government’s response to the personnel data hacks has been much more muted. Rather than a public naming and shaming, it is considerin­g covert cyberactio­ns. Officials have hinted at this, saying they may be taking steps that are not public.

Newspapers in English

Newspapers from United States