America, still not cyber mugged by reality

Shutterstock

Article Highlights

  • A leaked report on Chinese cyber espionage shows just how dysfunctional the Sino-U.S. relationship is.

    Tweet This

  • To end the abuse in this relationship, America could end the charade of military-to-military exchanges.

    Tweet This

  • At a minimum, cyber espionage should be the No. 1 agenda item in Sino-U.S. relations.

    Tweet This

America's national security adviser and Pacific Fleet commander have been in China this week, bearing messages of goodwill and eagerness to deepen ties. Unfortunately, a leaked report on Chinese cyber espionage shows just how dysfunctional the Sino-U.S. relationship is. Washington needs to admit that it is in an abusive relationship, and then find the courage to protect itself against further mistreatment.

China's top military leader told U.S. National Security Adviser Tom Donilon that Beijing wanted to create a "new type of major power relations." Apparently that new relationship entails robbing your partner blind of his most sensitive secrets, then welcoming him for tea while mouthing nostrums about good fellowship.

While President Obama's emissaries were getting the red-carpet treatment, military observers in Washington were learning that weapons systems compromised by cyber espionage include the F-35 stealth fighter, the F/A-18 fighter, the Global Hawk drone and the Aegis Ballistic Missile Defense System, among others. China has also been stealing research on cutting-edge technologies from American labs, including directed energy, the Navy's rail gun, electronic warfare and composites for lightweight ballistic armor. As any child can tell you, shoplifting is one way to reduce your purchasing costs—even into the hundreds of billions of dollars, apparently.

In its weakness, the Obama administration is following the sorry example of the Clinton and Bush administrations, which also saw U.S. military secrets stolen by the terabyte and did nothing about it. In the 1990s, Beijing was shown to have stolen ballistic-missile technology that greatly aided their development of long-range missiles. During George W. Bush's presidency, China hacked the F-35 program, gaining access to code for America's most advanced fighter.

Given this record, one can't blame Beijing for its light-fingered approach to military modernization. After all, if your victim encourages your attacks by doing nothing in return, what's the risk?

Unfortunately, the risk falls on the men and women of the U.S. military, whose primary weapons systems may well be vulnerable to Chinese counterattacks. The long list of hacked programs gives no indication of how compromised they are, but at a minimum America's warriors may one day face Chinese knock-offs of their planes, drones, missiles and body armor. A second victim in all this cyber-skullduggery is the U.S. taxpayer, who has been unknowingly underwriting the massive growth of the Chinese military.

To end the abuse in this relationship, America could end the charade of military-to-military exchanges (except for intelligence-gathering purposes). No more cuddly visits of Chinese generals to America's military command centers. Second, any Chinese companies identified as trafficking in pilfered U.S. secrets should be sanctioned and barred from business in the U.S. In addition, Chinese businessmen and officials involved in weapons espionage should be named, shamed and barred from travel to the U.S.

It's also time to send some viruses back along the cyber routes that are worming into America's weapons labs and government offices. And Washington should rally its friends and allies who have been similarly hacked to form a common front against China's cyber-aggressors.

Unfortunately, the White House is busy touting next week's summit between Mr. Obama and Chinese President Xi Jinping. This confab will be all about dialogue, we're told, not about solutions. But before winging out to California, Mr. Obama should reflect that in China's case, actions speak louder than words. At a minimum, cyber espionage should be the No. 1 agenda item in Sino-U.S. relations. Otherwise, America's president will prove that the U.S. government forgets everything and learns nothing.

Also Visit
AEIdeas Blog The American Magazine
About the Author

 

Michael
Auslin

What's new on AEI

Defeating ISIS: AEI experts weigh-in before the president’s address on Wednesday
image Degrading, defeating, and destroying the Islamic State
image Wealth Building Home Loan: Building wealth through homeownership and retirement savings
image The $3 iPhone
AEI on Facebook
Events Calendar
  • 15
    MON
  • 16
    TUE
  • 17
    WED
  • 18
    THU
  • 19
    FRI
Tuesday, September 16, 2014 | 5:00 p.m. – 6:00 p.m.
The Constitution as political theory

Please join us for the third-annual Walter Berns Constitution Day Lecture as James Ceasar, Harry F. Byrd Professor of Politics at the University of Virginia, explores some of the Constitution’s most significant contributions to political theory, focusing on themes that have been largely unexamined in current scholarship.

Wednesday, September 17, 2014 | 8:10 a.m. – Thursday, September 18, 2014 | 1:30 p.m.
Third international conference on housing risk: New risk measures and their applications

We invite you to join us for this year’s international conference on housing risk — cosponsored by the Collateral Risk Network and AEI International Center on Housing Risk — which will focus on new mortgage and collateral risk measures and their applications.

Event Registration is Closed
Thursday, September 18, 2014 | 2:15 p.m. – 3:00 p.m.
Speaker of the House John Boehner on resetting America’s economic foundation

Please join us as Speaker John Boehner (R-OH) delivers his five-point policy vision to reset America’s economy.

Event Registration is Closed
Friday, September 19, 2014 | 9:15 a.m. – 11:00 a.m.
Reforming Medicare: What does the public think?

Please join us as a panel of distinguished experts explore the implications of the report and the consumer role in shaping the future of Medicare.

No events scheduled this day.
No events scheduled this day.
No events scheduled this day.
No events scheduled this day.