Senator to Obama: Warn China on Cyber Theft

Senator to Obama: Warn China on Cyber Theft

The chairman of the Senate Armed Services Committee is pressing President Barack Obama to warn his Chinese counterpart that cyber espionage against the United States won’t go unchallenged.

Sen. Carl Levin, D-Mich., in a letter released May 29 urged Obama to raise the issue with Chinese President Xi Jinping when the two leaders meet next week at an estate in Rancho Mirage, Calif. Levin plans to push legislation this year that would allow the president to block imports that benefited from stolen U.S. technology.

“I thought you could refer to this bill in your meeting with President Xi as an example that the U.S. will indeed impose real costs on China should they continue to steal our intellectual property,” he wrote.

The letter came the same week the Defense Department defended its weapons systems amid a report that found many of the designs have been hacked by cyber spies from China.

“We maintain full confidence in our weapons platforms,” Pentagon spokesman George Little said May 28 in an e-mailed statement. “Suggestions that cyber intrusions have somehow led to the erosion of our capabilities or technological edge are incorrect.”

A classified section of a Defense Science Board report from January listed more than two dozen compromised systems, including the F-35 Joint Strike Fighter, Littoral Combat Ship and Aegis Ballistic Missile Defense System, according to an article in The Washington Post.

The platforms form the backbone of the Pentagon’s future weapons portfolio and are made by its biggest defense contractors such as Lockheed Martin Corp., based in Bethesda, Md., and General Dynamics Corp., based in Falls Church, Va.

China called the accusations “erroneous,” according to a May 31 article on the website of the state-run newspaper, People’s Daily Online. A spokesman for the Defense Ministry, Geng Yansheng, said the U.S. report underestimates the Pentagon’s security abilities and China’s engineering prowess.

“China already has the ability to build the weapons needed for national security,” he said. “China’s aircraft carrier, fighter jets, large transport aircraft and Beidou satellite navigation system have clearly demonstrated this.”

The Pentagon in its latest annual assessment of the People’s Liberation Army for the first time blamed China directly for targeting its computer networks. The attacks were focused on extracting information, including sensitive defense technology. China disputed this allegation, as well.

Levin said his bill, the Deter Cyber Theft Act, S.884, would require the director of national intelligence, James Clapper, to produce a report detailing a watch list of foreign countries that engage in economic or industrial espionage against the United States in cyberspace.

Tags: ,

Join the Conversation

In addition to an open letter, can we go on the cyberoffensive soon? Take down the Great Firewall for a few hours, or just go after their high-tech manufacturing base, or the espionage units themselves, or government/aerospace targets. Stole something? Perhaps your hard drives could stand to be government-wiped from afar…

When we’re better at hacker (for the moment) than our opponent, we should keep our mouths shut. The Chinese are just jealous that we’ve probably hacked everything they got and they haven’t been able to do the same to us.

Excuse me. Hacking, not hacker.

Agree and since I bet China pays Obama’s lats years election contributions we wont see this investigation will go any further.

A bill to “report” on a foreign nation that is conducting economic and/or industrial espionage??

Spying is spying. We do it. They do it. Those that get caught get executed, prison or flipped as a double. By United States Code, Espionage by a foreign nation or entity is a federal felony. Punishable to the maximum of the death penalty. No new bill is needed. Just get the Justice Department to do their real job instead of chasing after reporters.

“block imports that benefit from stolen technology” LMAO

could the good Senator be referring to weapon systems we buy from China, nope I didn’t think so.

We need to block ALL imports!!!

I guess we won’t be buying the J-10 from China, sniff, sniff.

we may have to start buying weapons from China, since the F-35 is bleeding us dry

I thought that was POTUS Clinton who got caught takin’ chinese $$$, “but heck I gave it back *grin*”

hey blight:
maybe that “two stage lauch vehicle” was PLA provided for more realism haha

China Chose The AK-47 for its service rifle…grins/ Enough said about China starting with a simple rifle…Im sure All the Rest Follows…Ever bought a Chinese made scooter or moped?…It will break down in around 2 weeks from brand new to a Repair… Will their jets take flight?…or will the burners die like the bottle rockets imported from China.…So LMAO!!.…China is China. U.S?…very very different.….FACT.

The F-35 Striker…I would say the U.S did not design it to have Bamboo flight controls. but it will in the future..hahaha.

No i bet they all support liberal causes.

Of course the Chinese are just using the holes we put in our security so we could spy on our own people. For decades the government has pushed to reduce security and restrict cryptography so they could break into our systems and made sure they had back doors.

The Chinese are just going in through the wide open door we insisted on.

The US government allegedly is buying up the zero-day exploits with intent to use them on targets; but that exposes a bunch of people on our end to those very same zero-day exploits.

Of course, there’s also a probability that whoever gives the US government those exploits can double-sell them to others, so everyone knows about software weaknesses except IT and the vendors. And how will they be able to protect anyone with patches and firmware updates?

As for spying on Americans, it would depend on the nature of the exploits.

Its don’t much more than just buying zero day exploits it’s commissioning them. And for decades it has sat of attempts to improve encryption.

Encryption in what way? The private sector dealing with personal information or money has been pushing ahead on encryption and security, regardless of what aerospace contractors are up to. Most of the spectacular attacks of recently were spear-phish; and not much IT can do about those, though there is two-factor authentication which is at best a band-aid on a gunshot wound.

What we all learned just flying a kite,bought or made by youre self, we all used them for pleasure!


NOTE: Comments are limited to 2500 characters and spaces.

By commenting on this topic you agree to the terms and conditions of our User Agreement

AdChoices | Like us on , follow us on and join us on Google+
© 2015 Military Advantage
A Monster Company.