The (secret) plan to shame China into curbing cyber-espionage

China gaming expo
(Image credit: Imaginechina/Corbis)

Before Edward Snowden and what intelligence community denizens like to call the "recent unpleasantness," the U.S. government had a plan to deal with Chinese cyber-hacking. Fittingly, it was a secret plan, coordinated by the Department of Justice, the National Security Agency, the FBI, and the National Security Staff at the White House. Chinese cyber espionage had gotten so out of hand, per the premise of the plan, that only radical measures would suffice.

Cyber-hack them back? Nope. Shame them. Shame China. Here's something I wrote last year:

The Week

Escape your echo chamber. Get the facts behind the news, plus analysis from multiple perspectives.

SUBSCRIBE & SAVE
https://cdn.mos.cms.futurecdn.net/flexiimages/jacafc5zvs1692883516.jpg

Sign up for The Week's Free Newsletters

From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.

From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.

Sign up

"The Cold War enforced norms, and the Soviets and the U.S. didn't go outside a set of boundaries. But China is going outside those boundaries now. Homeostasis is being upset," the official said.

In essence, the NSA will give American companies the ability to fight back. The idea is two-fold. One: Behavior modification by exposing Chinese tactics, which, in theory, would embarrass the Chinese. Two: This will force China will develop new hacking avenues, but this will take time, giving U.S. companies the chance to catch up.

K, well, that turned out to be a plan without follow-through. Snowden's revelations about SIGINT threw the NSA off-balance. A top secret cyber-espionage presidential directive was leaked on the day that President Obama planned to confront China's president about using the military for economic cyber-espionage, a practice that the U.S would never engage in. Reporting about the Snowden revelations conflated concepts.

The U.S. does not steal proprietary secrets to help U.S. corporations compete in the world. It does steal secrets to help the U.S., broadly, compete in the world.

China's policy to compete in the 21st century is predicated on a regime of aggressive, state-sanctioned spying, stealing technology from other companies to leap ahead of the Chinese industrial base's natural evolution. China is blunt about why this is necessary: they've got a billion plus people to take care, a growth rate that needs to be kept absurdly high in order to take care of them, and a political system that is barely legitimate because it can (barely) take care of the basic needs of enough people.

The U.S. does invade the internet servers and computers of foreign countries, looking to collect intelligence that will add value to American policy-makers' decisions about trade deals, sanctions, counter-narcotics, counter-trafficking, and counter-terrorism. It does so with the help of American countries. It does not, at least explicitly, steal secrets from, say, Chinese companies in order to directly benefit American companies working with the same technology. But it does create backdoors into state-owned or operated companies in order to spy. Maybe it is a distinction without a difference, at least in terms of how the world perceives U.S. spying.

Today, a year on, it looks like the U.S. policy to shame China is back on track. The Justice Department is indicting several officials in the People's Liberation Army and charging them with stealing specific secrets from American companies. This an action without real precedent. The upshot is that the U.S. believes that the economic damage to American companies — and perhaps to the unspoken "rules" of the road that keep the countries nominally cooperating with each other — is enough to warrant this action.

Marc Ambinder is TheWeek.com's editor-at-large. He is the author, with D.B. Grady, of The Command and Deep State: Inside the Government Secrecy Industry. Marc is also a contributing editor for The Atlantic and GQ. Formerly, he served as White House correspondent for National Journal, chief political consultant for CBS News, and politics editor at The Atlantic. Marc is a 2001 graduate of Harvard. He is married to Michael Park, a corporate strategy consultant, and lives in Los Angeles.