Is China winning the cyber war?

Leaked documents suggest China might have the upper hand

The Cold War took its name from the relative lack of shooting that characterized it. The United States and Soviet Union fought one another politically, diplomatically and economically but rarely with guns or tanks. It was not a hot war.

We have a couple of hot wars going on now, but there's another cold war under way, too — one being fought between the United States and China, primarily using IT.

And it looks as though China has the upper hand at the moment.

"According to U.S. investigators, China has stolen terabytes of sensitive data, from user names and passwords for State Department computers to designs for multibillion-dollar weapons systems," write Brian Grow and Mark Hosenball in a report for Reuters. "And Chinese hackers show no signs of letting up."

Grow and Hosenball credit WikiLeaks for revealing many previously secret details about China's ongoing cyber assault, which the U.S. government has code named Byzantine Hades. Specifically, they write, the State Department cables that WikiLeaks published show that the Chinese military was the source of those attacks, not some rogue hacker group.

Responding to the Reuters report, Adam Martin, blogging for The Atlantic, said: "In short, the Chinese are way better at cyber spying than pretty much anybody else."

However, he dismisses the idea that cyber spying is a serious threat to U.S. national security. "The Chinese are unlikely to invade any time soon, even if they find out when the secretary of Defense takes his lunch break," Martin writes. "Rather, the attacks are one of many tactics China is employing to keep its economy growing." Chinese cyberattacks have also targeted private businesses, and news reports detailing individual intrusions are plentiful, he said.

Collin Spears, a blogger for the Foreign Policy Association, read the situation the same way.

"The infamous 'Google E-mail Hacks' of 2010 are a case [in] point," Spears writes. "Google openly implicated China in an e-mail hacking scandal, but this situation is actually not uncommon. It is just that Google went public and garnered significant media attention due to its status."

Spears notes that more than 34 other companies, including technology and defense firms, are believed to have been cyber targets.

But William Jasper, writing in the New American, takes a dimmer view of China's motives. Although some experts think China might not be the perpetrator but instead the victim of outside forces hacking its poorly defended systems and using them to stage attacks, those arguments are unsupported, Jasper writes.

People who feared Soviet infiltration of the United States during the Cold War have been proven correct in at least some instances, Jasper writes. "The arrests in the past months of Russian and Chinese spies in the United States provide ample evidence that the communist propensity for espionage and deception has not abated among the supposedly 'reformed' leadership of the Beijing regime."

Jasper and others also point out that the cyberattacks haven't been trivial test runs. Chinese hackers penetrated Defense Department computers and gained access to material on the Joint Strike Fighter program. Chinese hackers have also apparently penetrated the United States' energy grid and left behind software that could be used to disable the grid remotely, the Wall Street Journal reports.

The concerns are not new. In September 2007, the Times of London published an article headlined, "China’s cyber army is preparing to march on America, says Pentagon." Reporter Tim Reid said U.S. military officials believed that the Chinese military had a detailed plan "to disable America’s aircraft battle carrier fleet with a devastating cyberattack."

About the Author

Technology journalist Michael Hardy is a former FCW editor.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.


  • computer network

    How Einstein changes the way government does business

    The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

  • Defense Secretary Jim Mattis. Army photo by Monica King. Jan. 26, 2017.

    Mattis mulls consolidation in IT, cyber

    In a Feb. 17 memo, Defense Secretary Jim Mattis told senior leadership to establish teams to look for duplication across the armed services in business operations, including in IT and cybersecurity.

  • Image from

    DHS vague on rules for election aid, say states

    State election officials had more questions than answers after a Department of Homeland Security presentation on the designation of election systems as critical U.S. infrastructure.

  • Org Chart Stock Art - Shutterstock

    How the hiring freeze targets millennials

    The government desperately needs younger talent to replace an aging workforce, and experts say that a freeze on hiring doesn't help.

  • Shutterstock image: healthcare digital interface.

    VA moves ahead with homegrown scheduling IT

    The Department of Veterans Affairs will test an internally developed scheduling module at primary care sites nationwide to see if it's ready to service the entire agency.

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    MGT Act poised for a comeback

    After missing in the last Congress, drafters of a bill to encourage cloud adoption are looking for a new plan.

Reader comments

Fri, Apr 22, 2011 RayW the saying goes.

You have the big push to put everything out on facebook, twitter, and other open uncontrolled sites, the "cloud", centralized data bases, mandated off site centralized CAC security check points, all intranet routed through a central point to access the internet or even just to go back to your own base, monoculture computing (if it ain't Microsoft, you can’t use it mentality), open computers that can be controlled or updated remotely even when you are trying to work, it all makes it easy to focus all your hacking talent into narrow fields to glean all the data you can use and then some, and to access many systems throughout the government, not just one system.

Thu, Apr 21, 2011 LC

Of course China is kicking our IT butts. What exactly has the US done that has made us the leader in anything the past 30 years besides give the American lifestyle away. Why are we so concerned about everyone else while our own nation is in melt down?

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group