12.07.2015 Views

2011 report to congress - U.S.-China Economic and Security Review ...

2011 report to congress - U.S.-China Economic and Security Review ...

2011 report to congress - U.S.-China Economic and Security Review ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

173network exploitations <strong>to</strong> facilitate industrial espionage <strong>and</strong> thecompromise of U.S. <strong>and</strong> foreign government computer systems. Evidencealso surfaced that suggests Chinese state-level involvementin targeted cyber attacks. Expert testimony <strong>to</strong> the Commission explained<strong>and</strong> contextualized <strong>China</strong>’s strategy for the use of such attacks<strong>to</strong> achieve military objectives. In parallel <strong>to</strong> these developments,<strong>China</strong> asserted a greater level of control on domestic Internetcontent <strong>and</strong> engaged in various online surveillance activities.‡Malicious Cyber Activities onU.S. Department of Defense NetworksAs the Commission <strong>report</strong>ed in 2010, the U.S. government as awhole does not publish comprehensive statistics about maliciouscyber activities on its networks. The Commission uses statisticspublished by the Department of Defense about exploitations <strong>and</strong>attacks on the department’s information systems as one indica<strong>to</strong>rof overall trends in the cybersecurity environment. Figure2, below, demonstrates changes in the volume of such activitiesover the past decade. Not all of the incidents depicted below specificallyrelate <strong>to</strong> <strong>China</strong> (the department has not made availablethat level of detail).dkrause on DSKHT7XVN1PROD with $$_JOB‡ This subsection’s findings follow from numerous studies <strong>and</strong> <strong>report</strong>s over the past year thatimplicate <strong>China</strong>. Many times, investiga<strong>to</strong>rs attribute incidents on the basis of technical or operationalinformation, the details of which rarely become public. Other times, conclusions rely oninference. In either case, professional investiga<strong>to</strong>rs typically offer attribution assessments witha specified degree of confidence. Such qualifications sometimes are inadequately conveyed, especiallyin secondary <strong>report</strong>s. Moreover, third parties likely use a variety of measures <strong>to</strong> maketheir attacks appear as coming from <strong>China</strong> in order <strong>to</strong> conceal their identities. (This model isa reasonable explanation for some penetrations, such as those for intellectual property theft, butless so for others, such as those that target Chinese dissidents.) Still, in the aggregate, the developmentsdescribed below present compelling evidence of Chinese intrusions in practice.VerDate Nov 24 2008 13:46 Nov 10, <strong>2011</strong> Jkt 067464 PO 00000 Frm 00185 Fmt 6601 Sfmt 6601 G:\GSDD\USCC\<strong>2011</strong>\067464.XXX 067464

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!