

“The Chinese government is set on stealing your technology-whatever it is that makes your industry tick-and using it to undercut your business and dominate your market.” “I’ll start with what this danger looks like,” Wray said. “And they’re set on using every tool at their disposal to do it,” he added. McCallum echoed the statement, calling on leaders to act while the CCP covertly applies pressure across the globe. “We will never encourage, support, or condone cyber attacks,” the statement said. Still, the FBI and MI5 leaders say otherwise. The FBI director said the Chinese government steals valuable technology from American businesses right through the front door. MI5’s General McCallum added that CCP operatives “slowly” cultivate friendships only to obtain commercially unavailable information and use it to promote national interest. “The aim of these tactics is to create a debt of obligation on the part of the target, who will eventually find it difficult to refuse inevitable requests for favors in return,” McCallum said. “When you deal with a Chinese company, know you’re also dealing with the Chinese government,” he said Wray warned of conducting business with Chinese companies because the CCP owns them. Instead, the Chinese military group temporarily limited its large-scale cyber espionage campaign and took steps to mask its activities, according to a forthcoming report by the U.S.-China Economic and Security Review Commission.McCallum and Wray shifted from the complex danger China poses to companies to forecasting “the most horrific business disruptions the world has ever seen” if China forcibly took over Taiwan. The report concludes that the Chinese government is engaged in a concerted campaign of cyber attacks led by a Shanghai-based unit.Ĭhina’s cyber spying is designed to gain information for its military programs and civilian enterprises, and also for preparing the military to conduct attacks in a future conflict. "The Chinese government is directing and executing a large-scale cyber espionage campaign against the United States, and to date has successfully targeted the networks of U.S. "These activities are designed to achieve a number of broad economic and strategic objectives, such as gathering intelligence, providing Chinese firms with an advantage over its competitors worldwide, advancing long-term research and development objectives, and gaining information that could enable future military operations." government and private organizations, including those of DoD, defense contractors, and private firms," the report said. In February, the private security group Mandiant revealed Unit 61398 of the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s Third Department. The military unit since 2006 has attacked and penetrated networks of at least 141 organizations located in 15 countries and representing 20 major industries, from information technology to financial services.Īfter the disclosures, Unit 61398 took steps to make it more difficult to track its cyber strikes. The exposure also led to a temporary decrease in the unit’s attacks for a month.


The temporary reduction coincided with the U.S. government’s release of a list of Internet Protocol addresses used by the Chinese cyber spies.Ĭurrently, cyber spying by Unit 61398 is "as active as it was before Mandiant’s report was released," the report said. The Obama administration’s response to Chinese cyber attacks so far was to set up a diplomatic Cyber Working Group between the two countries in April. Efforts to "shame" China into curbing cyber attacks were undermined in May when NSA contractor Edward Snowden disclosed U.S.
