- The Strategist - https://www.aspistrategist.org.au -
China’s cyber espionage surge in Australia: opportunism not punishment
Posted By Tom Uren on July 31, 2020 @ 06:00
One of the theories floated about China’s recent cyber espionage campaign [1] against Australia is that it’s being used to punish us for banning Huawei from our future 5G networks and for introducing laws to combat foreign interference. Some in the UK expressed similar fears [2] after the government’s decision [3] to remove Huawei from the country’s telecommunications networks. But this cyber-operations-as-punishment theory is probably not correct. Although there has been a sustained increase in cyber activity targeting Australia [4], the Chinese state is not trying to punish us, or, if it is, it’s a misguided application of state power. If punishing Australia is a key foreign policy goal for Beijing, there are far cheaper and more effective ways to do that.
Historically, China’s cyber espionage targets have been closely aligned with its strategic technology goals. In addition to spying on governments and militaries—which many, if not all, countries do—the Chinese state has used cyber espionage to steal commercial intellectual property to further its technology goals. Recent Western victims of Chinese commercial intellectual property theft have often been in the technology sectors that feature in Beijing’s ‘Made in China 2025 [5]’ strategy, including next-generation information technology, biotechnology, advanced manufacturing and environmental technologies.
One well-documented example [6] shows [7] that the Jiangsu bureau of the China’s Ministry of State Security [8] carried out a multi-year combined cyber espionage and intelligence-gathering campaign to steal technology used in making components for the domestic airliner [9] being built by the Chinese state–owned aerospace company Comac. This reportedly included successful compromises of companies such as Ametek, Honeywell, Safran, Capstone Turbine and General Electric, each of which makes jetliner parts.
Technology acquisition is not merely a secondary priority for the Chinese state. Technology directly addresses a key Chinese Communist Party concern [10]—the possibility of domestic unrest. By providing economic growth, and hence jobs and prosperity, technology acquisition reduces unemployment and discontent and therefore the risk of political instability.
Although China’s cyber espionage operations occur on a massive scale, they are still specialist capabilities and, crucially, they have large opportunity costs. Every hacker, unit, operation or campaign devoted to punishing Australia is effort diverted from addressing other key intelligence priorities, whether they be internal security matters (such as surveilling the Uyghur community [11] or keeping tabs on domestic dissidents and the Hong Kong protest movement), external matters (such as monitoring international progress on Covid-19 treatments and vaccines), or normal military and government intelligence matters (such as those stemming from escalating tensions with the US).
In the midst of the Covid-19 pandemic that has cruelled the global economy, China is suffering its first economic contraction in 40 years [12]. Given that Beijing is also responding to a combative and unpredictable US leadership while dealing with multiple challenges, including domestic perceptions of its own handling of the Covid-19 crisis, the current moment seems an unlikely time for ‘punishing Australia’ to be a key intelligence priority.
These circumstances also point to other, more plausible reasons for the increased activity that the Australian government has observed. It could be that the Chinese government, facing tremendous economic pressure during the Covid-19 pandemic, has altered its intelligence priorities and its collection agencies are scrambling to refocus their efforts. This could, for example, include a new focus on Covid-19 vaccine and treatment research [13]. Another possibility is that the intelligence agencies are scrambling to take advantage of the heightened emotions surrounding the pandemic that provide fertile opportunities to use Covid-related themes [14] for phishing attacks as fear and urgency override caution.
Using cyber espionage as punishment is also not a very clear or direct form of signalling. For the Australian government to understand the message, it would have to combine and correlate hundreds or thousands of potentially unrelated hacking incidents into what could be described as a ‘campaign’, track this campaign and assemble clues to determine the responsible party, and then apply professional judgement on the assembled data to ascribe a motive.
The Australian government has done the analytic work to convert incidents into a coherent campaign, but how exactly are officials meant to interpret a broad-based and widespread hacking campaign as punishment?
The process from our being hacked to the government understanding that we are being punished is simply too long and indirect—effective signalling should be clear, specific and timely, and using cyber operations as punishment is none of those.
In contrast, economic coercion—whether the leverage is import restrictions on commodities such barley [15], beef [16] and coal [17], the threat to reduce Chinese student numbers [18] in Australia, or even a potential Chinese consumer boycott [19] of Australian products—sends a very clear message that the Australian polity receives loud and clear. Because these forms of economic coercion are overt, they have the additional benefit of mobilising interest [20] groups [21] to lobby government to ‘fix’ the China relationship. This approach has a huge advantage over covert cyber operations.
Public forms of economic coercion can, from a CCP point of view, be cheap or even costless. Threats to reduce student numbers, for example, cost nothing when international travel is extremely limited due to the pandemic. Similarly, the threat of a consumer boycott costs nothing to the Chinese government, and costs Chinese consumers only if it actually takes place.
Cyber operations have large opportunity costs and their typically covert nature means that they’re not well suited for punishment or deterrence. It is possible that Beijing is trying to punish us with cyber operations; not all actors in cyberspace are rational. But without firm evidence we shouldn’t uncritically accept this theory as it could blind us to the real motives of Chinese intelligence agencies.
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/chinas-cyber-espionage-surge-in-australia-opportunism-not-punishment/
URLs in this post:
[1] cyber espionage campaign: https://www.smh.com.au/national/like-when-the-asteroid-is-heading-for-earth-why-scott-morrison-sounded-the-cyber-alarm-20200622-p554v8.html
[2] fears: https://www.dailymail.co.uk/news/article-8513735/Ministers-fear-China-blitz-UK-devastating-online-attack.html
[3] decision: https://www.gov.uk/government/news/huawei-to-be-removed-from-uk-5g-networks-by-2027
[4] targeting Australia: https://www.aspistrategist.org.au/what-who-and-why-explaining-the-cyberattacks-against-australia/
[5] Made in China 2025: https://www.cfr.org/backgrounder/made-china-2025-threat-global-trade
[6] example: https://www.justice.gov/opa/pr/chinese-intelligence-officer-charged-economic-espionage-involving-theft-trade-secrets-leading
[7] shows: https://www.justice.gov/opa/press-release/file/1106491/download
[8] Ministry of State Security: https://www.cfr.org/cyber-operations/jiangsu-province-ministry-state-security-jssd
[9] domestic airliner: https://en.wikipedia.org/wiki/Comac_C919
[10] Chinese Communist Party concern: https://www.cfr.org/backgrounder/chinese-communist-party
[11] Uyghur community: https://www.wired.com/story/amid-covid-19-crisis-china-hacking-uighur-iphones/
[12] economic contraction in 40 years: https://www.bloombergquint.com/china/china-manufacturing-and-retail-contract-for-first-time-on-virus
[13] vaccine and treatment research: https://risky.biz/covidespionage/
[14] Covid-related themes: https://blog.google/technology/safety-security/threat-analysis-group/findings-covid-19-and-online-security-threats/
[15] barley: https://thediplomat.com/2020/06/chinas-tariffs-on-australian-barley-coercion-protectionism-or-both/
[16] beef: https://www.abc.net.au/news/2020-05-13/china-meat-sales-suspension-federal-government-opposition/12240234
[17] coal: https://www.afr.com/world/asia/china-to-extend-restrictions-on-australian-coal-say-analysts-20191029-p535e0
[18] Chinese student numbers: https://www.afr.com/world/asia/china-warns-students-to-reconsider-australia-study-plans-20200609-p550y8
[19] consumer boycott: https://www.afr.com/politics/federal/china-consumer-backlash-looms-over-morrison-s-coronavirus-probe-20200423-p54mpl
[20] interest: https://www.afr.com/politics/federal/later-billionaires-defy-china-critics-in-diplomatic-row-20200430-p54om1
[21] groups: https://www.afr.com/politics/federal/don-t-poke-china-in-the-eye-stokes-20200430-p54ojp
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.