Chinese economic spying 'intolerable': US lawmaker

Oct 04, 2011
A US lawmaker said on Tuesday that Chinese economic espionage, including cyber spying, has reached an "intolerable level" and called for the United States and its allies to confront Beijing.

A US lawmaker said on Tuesday that Chinese economic espionage, including cyber spying, has reached an "intolerable level" and called for the United States and its allies to confront Beijing.

"Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop," Mike Rogers, chairman of the House Intelligence Committee, said during a hearing on .

"I don't believe that there is a precedent in history for such a massive and sustained intelligence effort by a government to blatantly steal commercial data and intellectual property," Rogers said.

"China's has reached an intolerable level and I believe that the United States and our allies in Europe and Asia have an obligation to confront Beijing and demand that they put a stop to this piracy," he said.

"Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage to put an end to this scourge," he said.

Rogers, a Republican from Michigan, singled out China in his opening remarks to a hearing of the House Intelligence Committee on improving US cybersecurity.

Among those testifying to the committee was retired general Michael Hayden, a former director of the and the .

Hayden echoed Rogers in describing the scope of China's economic espionage activities.

"As a professional intelligence officer, I step back in awe at the breadth, depth, sophistication and persistence of the Chinese espionage effort against the of America," Hayden said.

Rogers said past espionage activities focused on foreign governments and militaries, "not on brazen and wide-scale theft of intellectual property from foreign commercial competitors."

"You don't have to look far these days to find a press report about another firm, like , whose networks have been penetrated by Chinese cyber espionage and have lost valuable corporate ," he said.

"And thats just the tip of the iceberg," Rogers said. "There are more companies that have been hit that wont talk about it in the press, for fear of provoking further Chinese attacks.

"Attributing this espionage isn't easy, but talk to any private sector cyber analyst, and they will tell you there is little doubt that this is a massive campaign being conducted by the Chinese government," he said.

Explore further: Twitter admits to diversity problem in workforce

add to favorites email to friend print save as pdf

Related Stories

US senators call for cybersecurity czar

Apr 01, 2009

Two US senators introduced legislation on Wednesday aimed at creating a powerful national cybersecurity advisor who would report directly to the president.

U.S.: China must 'crack down' on piracy

Nov 14, 2005

The Chinese government must "crack down" on piracy and enforce intellectual-property rights, the top U.S. trade official said Monday in Beijing.

China hit by 500,000 cyberattacks in 2010

Aug 09, 2011

China said Tuesday it was hit by nearly 500,000 cyberattacks last year, about half of which originated from foreign countries including the United States and India.

Rare economic espionage case going to trial

Oct 21, 2009

(AP) -- Two men accused of stealing computer chip blueprints - and trying to tap the Chinese government to help launch a startup built on the contraband - are becoming the first defendants charged with economic espionage ...

Recommended for you

UK: Former reporter sentenced for phone hacking

4 hours ago

(AP)—A former British tabloid reporter was given a 10-month suspended prison sentence Thursday for his role in the long-running phone hacking scandal that shook Rupert Murdoch's media empire.

Evaluating system security by analyzing spam volume

5 hours ago

The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company's spam volume to evaluate its security vulnerability through the SpamRankings.net ...

Surveillance a part of everyday life

6 hours ago

Details of casual conversations and a comprehensive store of 'deleted' information were just some of what Victoria University of Wellington students found during a project to uncover what records companies ...

European Central Bank hit by data theft

6 hours ago

(AP)—The European Central Bank said Thursday that email addresses and other contact information have been stolen from a database that serves its public website, though it stressed that no internal systems or market-sensitive ...

Twitter admits to diversity problem in workforce

9 hours ago

(AP)—Twitter acknowledged Wednesday that it has been hiring too many white and Asian men to fill high-paying technology jobs, just like several other major companies in Silicon Valley.

Social Security spent $300M on 'IT boondoggle'

20 hours ago

(AP)—Six years ago the Social Security Administration embarked on an aggressive plan to replace outdated computer systems overwhelmed by a growing flood of disability claims.

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

Jonseer
not rated yet Oct 04, 2011
This battle was lost years ago, when the previous Republican administration allowed and encouraged through tax breaks the off shoring of tech manufacturing

Various legislators can complain about it all they want, but today whatever they use to communicate their feelings is likely done on a gadget made in China.

Companies like Apple have outsourced almost all their manufacturing to China.

All the while pretending that while doing so, their secrets were too securely locked away to become victims of Chinese Espionage, riiiiight.

I don't think we have a chance of stopping them.

After all as it is now, the Chinese get the first crack at any technology our tech geniuses can imagine, because it's the Chinese who turn their "imaginations and designs" into hardware that can be used and abused.

By the time our best and brightest get a crack at the new technology, the Chinese have already figured out the strengths and weaknesses and know how to counter any effort we might make to stifle it.