19.11.2016 Views

ANNUAL REPORT

2016%20Annual%20Report%20to%20Congress

2016%20Annual%20Report%20to%20Congress

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

56<br />

U.S. Tech Firms and Their Chinese Partners—Continued<br />

to allow the Chinese government to review some of its product<br />

source code in a controlled environment.*<br />

China is also intensifying its advocacy of “cyber sovereignty” as a<br />

global regulatory norm. In his keynote address at the second annual<br />

World Internet Conference in December 2015, President Xi argued<br />

for “the right of individual countries to independently choose their<br />

own path of cyber development, model of cyber regulation and Internet<br />

public policies, and participate in international cyberspace governance<br />

on an equal footing” and defended Beijing’s Internet censorship.<br />

151 Chinese authorities have shifted away from not publicly<br />

admitting China’s censorship efforts to using the concept of “cyber<br />

sovereignty” to argue for increased government control of the Internet.<br />

According to Samm Sacks, a China technology policy analyst at<br />

the Eurasia Group, the Chinese government’s intense advocacy of<br />

sovereignty in cyberspace “could eventually over the long term lead<br />

to fragmentation of the U.S.-led global Internet.” 152<br />

Update on China’s Commercial Cyber Espionage<br />

In addition to enacting ICT and cybersecurity policies aimed at extracting<br />

technologies from U.S. companies, China has conducted cyber<br />

theft operations to gain access to U.S. intellectual property and technology.<br />

Pervasive Chinese cyber espionage against U.S. commercial entities—detailed<br />

in the Commission’s 2015 Annual Report to Congress †—<br />

continues to pose a grave threat to U.S. economic security despite<br />

China’s agreement in 2015 not to support commercial cyber espionage<br />

conducted by Chinese actors. In a September 2015 memorandum of understanding<br />

(MOU), the United States and China pledged that “neither<br />

country’s government will conduct or knowingly support cyber-enabled<br />

theft of intellectual property, including trade secrets or other confidential<br />

business information, with the intent of providing competitive<br />

advantages to companies or commercial sectors.” 153 (For a discussion<br />

of China’s non-commercial cyber espionage activities, see Chapter 2,<br />

Section 3, “China’s Intelligence Services and Espionage Threats to the<br />

United States.”)<br />

Public reports suggest Chinese cyber espionage against U.S. companies<br />

persists, but has declined in frequency since September 2015. 154 It<br />

is unclear whether this trend is attributable to the MOU. 155 FireEye,<br />

a cybersecurity firm, reported in June 2016 that a precipitous drop in<br />

detected incidents of Chinese cyber espionage against U.S. companies<br />

began more than one year before the MOU came into effect. 156 Notably,<br />

the beginning of this decline roughly coincided with the U.S. Depart-<br />

* IBM said in a statement it “has in several countries established the capability to conduct limited<br />

demonstrations of specific aspects of [its] technology in highly-controlled IBM environments<br />

that have no external communication links.” According to the company, its intent in sharing some<br />

product source code was “to reassure key stakeholders, including our clients, that no means exist<br />

for other parties to access IBM technology or data we manage on behalf of clients.” IBM further<br />

maintained it “does not provide government access to client data or ‘back doors’ into [its] technology.”<br />

IBM, “IBM Statement on Limited Technology Demonstrations,” October 16, 2015.<br />

† U.S.-China Economic and Security Review Commission, Chapter 1, Section 4, “Commercial<br />

Cyber Espionage and Barriers to Digital Trade in China,” in 2015 Annual Report to Congress,<br />

November 2015, 192–225.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!