U.S. to formally accuse Chinese military of hacking
Will charge members of the PLA's Unit 61398 with stealing trade secrets, first-ever accusations against a foreign power
Computerworld - U.S. officials later today will charge several individuals connected to China's military with hacking American firms, online reports said early Monday.
The Department of Justice (DOJ) and Federal Bureau of Investigation (FBI) will announce the charges, the first ever leveled against employees of a foreign power, that will include allegations of theft of trade secrets and economic espionage, ABC News, NBC News, and the Wall Street Journal (subscription required) said Monday, citing anonymous sources.
Five will be charged, the news outlets said, but differed on how they described the individuals' links to China's government. ABC and NBC only noted that the five were government employees or officials, while the Wall Street Journal claimed that they were members of the People's Liberation Army (PLA), China's military.
According to the newspaper, the five allegedly worked for the PLA's Unit 61398, based in Shanghai.
Unit 61398 had been previously tapped by American security professionals as responsible for hacking firms in the U.S. and other Western countries. The U.S. government had also previously called on China to rein in its hackers, but officials there have regularly dismissed such charges.
The U.S. and China have traded hacking accusations for years, with the former claiming that the latter is deeply involved in widespread computer attacks to steal trade secrets and intellectual property, and disrupt infrastructure. Today's charges would considerably increase the tension between the two nations over hacking, which at times have been discussed at the highest levels.
Last year, for instance, President Obama addressed cybersecurity issues with Chinese President Xi Jinping.
A formal announcement is expected later today from U.S. Attorney General Eric Holder; senior officials from the FBI; and John Carlin, the assistant attorney general for the DOJ's national security division, in a Washington D.C. press conference.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is email@example.com.
- DOJ's charges against China reframe security, surveillance debate
- Hacker indictments against China's military unlikely to change anything
- U.S. to formally accuse Chinese military of hacking
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts