Read Tiger Trap: America's Secret Spy War With China Online

Authors: David Wise

Tags: #Political Science, #International Relations, #General

Tiger Trap: America's Secret Spy War With China (36 page)

BOOK: Tiger Trap: America's Secret Spy War With China
7.18Mb size Format: txt, pdf, ePub
ads

Although the evidence is murky, Chinese hackers may have targeted that country's critics in the United States. Two Republican members of Congress claimed in 2008 that the computers in their offices on Capitol Hill had been penetrated by hackers they believed were in China.
The two representatives, Chris Smith, of New Jersey, and Frank Wolf, of Virginia, both conservatives, were longtime vocal critics of China's human rights record.

And in an Atlanta suburb in 2006, Peter Yuan Li, a computer technology specialist, naturalized American citizen, and critic of the Chinese government, was robbed, beaten, tied up, and blindfolded
by three or four armed Asian men who invaded his home and took two laptop computers, leaving behind other valuable items. He required fifteen stitches to treat a facial injury suffered in the attack.

Li was a locally prominent follower of Falun Gong, a spiritual movement that China has outlawed as an "evil cult." The FBI and Fulton County detectives investigated the robbery and attack on Li, but there were no arrests. Li, for one, had no doubt about why he was targeted. He blamed China for the break-in, which he claimed was designed to silence him. He expressed surprise "that in the US they could do such things."

In 1987 Li came to the United States for graduate studies at Princeton, where he received a PhD in electrical engineering. For several years he has worked with other activists to combat Internet censorship in China. "Initially we provided e-mails to China, we had twenty million e-mail addresses and sent articles to them," he said. "Around 2004 proxy servers didn't work anymore, they were easily blocked, and we had to go to more sophisticated methods."

Along with his group, Li then began supplying Internet users in China with software that allowed them to navigate around the government's firewall. There were various ways to get the software into China. "They block e-mails, but we can still send some, either through e-mail or Skype."
Inside China, he said, the software is passed along by word of mouth or on the Internet. When a computer user in China clicks on a link provided in an e-mail, the user can download software that connects to a computer overseas, which then reroutes the traffic to the restricted Chinese website.

In Li's view, cyberattacks on the Pentagon and other US agencies are originating in China. "The Chinese government regards hackers as heroes," he said. "The government does not crack down on the hackers. The way for students to show genius is to do hacking. I believe they [the Chinese government] are organizing these attacks."

Most concerns over cyberspying aimed at US defense and intelligence networks have been focused on software, the use of programs that can disable or steal data from the target computers. But computer security experts today are increasingly worried about the compromise of hardware—computer chips that control missiles, aircraft, and radars.

One reason is that only about 2 percent of the integrated circuits purchased every year by the military are manufactured in the United States.
And even most American chip makers have moved offshore, where labor is cheaper. A computer chip made with a hidden, malicious flaw could sabotage a weapons system. And the compromised hardware is almost impossible to detect.

A chip might even be embedded with a "kill switch," allowing the weapon to be disabled by remote control. When the Israeli air force attacked a suspected nuclear reactor site in Syria in 2007, observers wondered why the Syrian air defenses did not respond.
Later, there were unconfirmed reports that a kill switch, provided by the United States to Israeli intelligence, had been used to disarm the Syrian radars.

The United States has been slow to discern the threat to national security of cyberspies and hackers. President Obama, recognizing the problem, declared in May 2009, "We're not as prepared as we should be as a government or as a country." He spoke ruefully of how, during his presidential campaign a year earlier, "hackers gained access to emails and a range of campaign files,
from policy position papers to travel plans."

He talked about "spyware and malware and spoofing and phishing and botnets." And, he warned, "In today's world, acts of terror could come not only from a few extremists in suicide vests but from a few key strokes on the computer—a weapon of mass disruption."

Obama announced that he would appoint a White House cybersecurity coordinator to work with federal, state, and local government agencies and the private sector to defend against cyberattacks on the nation's infrastructure. The following month, the Defense Department ordered the creation of the nation's first military cyber command. The appointment of Lieutenant General Keith B. Alexander, who was also director of the National Security Agency, to head the new command stirred controversy. A powerful argument can be made that the NSA, already snooping on e-mails and phone calls under a secret program instituted by President George W. Bush and later approved by Congress, should not exercise control over computer security.

At the same time, the creation of a White House "cyber czar" and a military cyber command were long overdue, given the continuing computer attacks against the United States. And there was plausible evidence that many of the intrusions originated in China.

In examining cyber espionage, the detailed 2009 report by the University of Toronto researchers, while appropriately cautious in not blaming every hacker attack on the Chinese government, noted that the cyber assaults on 103 countries were targeted against diplomats, military personnel, the staff of prime ministers, and journalists.

"The most logical explanation, and certainly the one in which the circumstantial evidence tilts strongest, would be that this set of high profile targets has been exploited by the Chinese state for military and strategic intelligence purposes.... Many of the ... high-value targets that we identified are clearly linked to Chinese foreign and defence policy.

"Like radar sweeping around the southern border of China, there is an arc of infected nodes from India, Bhutan, Bangladesh and Vietnam, through Laos, Brunei, Philippines, Hong Kong, and Taiwan."

There was one other key piece of intelligence uncovered by the academic researchers. The attackers' Internet Protocol (IP) addresses, the identifying numbers assigned to all computers and servers, "trace back in at least several instances to Hainan Island."

There is a reason the finding was especially significant in the continuing effort to pinpoint the source of the cyberspies. The location is a tourist attraction, but it is also something more. Hainan Island, in the South China Sea, is the site of China's Lingshui signals intelligence facility and the Third Technical Department of the People's Liberation Army.

Perhaps the strongest evidence linking China to cyberspying against the US was provided by WikiLeaks, which began making public 250,000 confidential American diplomatic cables in late November 2010. Among them was a cable to Washington from the US embassy in Beijing, dated in January of that year, reporting that a Chinese contact said that hacker attacks against Google were directed by the Politburo, the highest level of China's government.

The cable stated: "A well-placed contact claims that the Chinese government coordinated the recent intrusions of Google systems. According to our contact, the closely held operations were directed at the Politburo Standing Committee level."

The trove of cables, made public by Julian Assange, the founder of WikiLeaks, described a global, coordinated campaign of computer attacks run by Chinese government officials, and Internet hackers recruited by China's government. The documents described previously secret intrusions of American government agencies, attacks code-named
BYZANTINE CANDOR
and
BYZANTINE HADES
by US investigators.

One 2008 State Department cable quoted an analysis of Chinese cyberattacks by Germany's security service, which surmised "the intention of PRC actors is espionage, and the primary attack vector used in their malicious activity is socially engineered e-mail messages containing malware attachments and/or embedded links to hostile websites." The cable added that the emails "were spoofed to appear targeted specifically to the recipients' interests, duties, or current events."

The WikiLeaks cables provided further confirmation of what had long been suspected: that China, despite its loud denials, was actively engaged in cyberspying against the United States and other targets around the world.

Chapter 22

AN AFTERWORD

I
N JANUARY
2010 Google made a surprise announcement that reverberated across Washington, Beijing, and other world capitals. The technology giant threatened to pull out of China
because of attacks on its computer systems and thirty-four American companies, mostly in Silicon Valley. The cyberattacks were traced to half a dozen servers in Taiwan, but Google strongly suspected that the assaults, aimed partly at Gmail accounts of Chinese human rights activists, had originated in China.

The attacks aimed at the US companies in California, including Northrop Grumman and Dow Chemical, appeared designed to scoop up information about weapons systems, and perhaps their vital "source codes," or computer programming instructions. Google turned to the National Security Agency,
the nation's eavesdropping and code-breaking arm, for help in investigating the attacks.

Google also made clear that it would no longer cooperate with Chinese Internet censorship. Soon afterward, the company closed its search engine service in China, google.cn, and automatically routed users to its uncensored website in Hong Kong, google.com.hk, although Google said it was "well aware" that China could block access there as well at any time.
*

The United States treaded lightly at first in response to the initial Google announcement. The White House was silent. A week went by before Secretary of State Hillary Clinton made a speech calling for global "Internet freedom"
and asking the Chinese authorities to "conduct a thorough investigation of the cyber intrusions." China responded angrily, saying that Clinton's "groundless accusations" were "harmful to US-China relations."

Aside from the difficulty of proving that the Chinese government, rather than individual hackers, was behind the spying, there were geopolitical and financial reasons for the muted response by Washington. In 2010 China held more than a trillion dollars of US debt.
If the United States were a house, China would hold the mortgage. The Google episode, more than anything else, captured the ambiguous and mutually dependent nature of the relationship between the United States and China in the twenty-first century.

Politics aside, in the espionage war, as this history has demonstrated, China has often, although certainly not always, been successful. Indeed, China may be America's single most effective and dangerous adversary. It managed over the years to penetrate both the CIA and the FBI. It acquired highly classified and guarded nuclear weapons secrets. The FBI's counterintelligence agents have also won significant battles, detecting several of China's spies, including a number who have been arrested and successfully prosecuted. Yet the record of China's achievements is formidable.

What is strikingly different about many of the Chinese spy cases is how they overlap and interlock, a tangled web of espionage with tendrils spreading in different directions. The threads of the Chi Mak, Dongfan Chung, Tai Shen Kuo, Gregg Bergersen, and James Fondren cases, for example, were all held by a single spymaster in China, Lin Hong.

There is a controversial subtext to Chinese spying in the United States. Asian Americans have good reason, historically, to be skeptical of the US government. For sixty years, beginning in 1882 and lasting into World War II, Chinese were barred from immigrating to the United States by the Chinese Exclusion Act. In 1917 Congress created an Asiatic Barred Zone, prohibiting immigration from much of East Asia and the Pacific Islands; the law was not abolished until 1952. Thousands of Japanese Americans were shunted off to internment camps in the paranoia after Pearl Harbor, a blot on Franklin D. Roosevelt's otherwise admirable record as a peacetime and wartime leader. Xenophobia, particularly with respect to those who look different, is embedded in US history.

When the FBI investigates or arrests a Chinese national or an American of Chinese background, it inevitably opens itself up to charges of racism. When Katrina Leung was arrested, even though she was exposed as someone working for the MSS, using a Chinese code name and reporting to a handler in Beijing, some prominent Chinese Americans in Los Angeles leaped to her defense and implied that she was being singled out because of her ethnicity and gender.

In the backlash after the government's unconscionable treatment of Wen Ho Lee, who was no hero, many Chinese Americans and others concluded that the government and the FBI were in the business of targeting ethnic Chinese as spies.

The fact that Lee's background was ethnic Chinese may well have influenced the Department of Energy to single him out, although the evidence on that point remains ambiguous and may never be fully resolved. Yet, as already noted, there were good reasons, unrelated to Lee's ethnicity, that he became a suspect. He had worked on the W-88 nuclear warhead in the most secret division at Los Alamos, the vault where nuclear bombs are designed. So had others. But Wen Ho Lee stood out as the subject of two previous FBI investigations, for telephoning the
TIGER TRAP
spy suspect and lying about it, and for failing to report that he had been questioned about key US nuclear secrets when China's top bomb designer visited him privately in a hotel room in Beijing.

The record of Chinese espionage against defense and intelligence agencies in the United States demonstrates that it is China, rather than the FBI, that targets ethnic Chinese. In any number of cases, the MSS and the intelligence arm of the People's Liberation Army have sought, sometimes successfully, to recruit Chinese Americans, by appealing to their roots and family ties to the "motherland." Of course, that reality should not obscure the fact that the vast majority of Chinese Americans are loyal to the United States.

BOOK: Tiger Trap: America's Secret Spy War With China
7.18Mb size Format: txt, pdf, ePub
ads

Other books

Her Doctor Daddy by Shelly Douglas
Hereward by James Wilde
Linda Needham by My Wicked Earl
In Memory of Angel Clare by Christopher Bram
Venture Forward by Kristen Luciani
Undead to the World by DD Barant
Over Her Head by Shelley Bates


readsbookonline.com Copyright 2016 - 2024