US-China Cybersecurity Cooperation

U.S.-China Cybersecurity Cooperation
Capstone Report
School of International and Public Affairs
Columbia University
Ian Adelson
Mellissa Z. Ahmed
Vivian Coyne
Han Lim
Zhifan Jia
L.C. Paisley
Kim Truong
Faculty Advisor: Roy D. Kamphausen
June 2014
The thoughts, ideas, opinions and language of this document are those of the authors and do not represent the views
of the United States Government (USG) or the Department of Homeland Security (DHS). Any assistance provided
to the authors by DHS personnel and any mention of DHS in the document does not constitute or imply the
endorsement, recommendation, or favoring by DHS, or the USG. Further, neither the USG nor DHS validates the
accuracy of the research or writing of the authors, and neither the USG nor DHS provides any warranties regarding
the veracity of any statements contained in this article.
U.S.-China Cybersecurity Cooperation
Summary
Cybersecurity has historically been a contentious issue between China and the United States, yet
both countries would benefit from strategic cooperation in this area. The two global powers are
vested stakeholders in an interconnected international system of trade, finance, and other
globalized institutional systems. Cyber networks underpin the critical infrastructures of such
systems, and cyber protection necessitates the information exchange of threats as well as
coordinated efforts in managing defensive capabilities.
The organization of this report addresses two main realms of analysis: 1) Foundational
knowledge on China in cyberspace and information culture, and 2) Proposed infrastructure
sectors for U.S.-China cyber cooperation. To address barriers to constructive dialogue, the report
describes key practices in Chinese cultural communication intended to maximize mutual
understanding. To provide context on China’s perspective on cybersecurity, we then outline its
cyber priorities and key actors, namely CNCERT. The second half of the report details the
particular critical infrastructure sectors that are most ripe for cooperation: finance, commercial
port cybersecurity, and civilian nuclear energy. These areas provide compelling cases for
building cybersecurity cooperation between the U.S. and China based on our analysis of mutual
interests and shared threat vulnerabilities. The three infrastructure sectors also present viable
opportunities for building cooperation through information sharing against third party threats,
establishing boundaries of cooperation, initiating multilateral exercises, and exchanging of best
practices. Our research, based on recent literature and a dozen expert interviews, concludes with
the following recommendations:
Financial Systems
 Timely information sharing on threats to develop effective measures against cyber attacks
 Given China’s vested monetary interests in U.S. financial cyber networks, establish
cooperation to defend against third-party attacks
 Agree that certain areas are sacred and should be safeguarded from malicious activity by
governments, such as financial exchanges and clearinghouses
Commercial Port Security:
 Bilateral information sharing against third-party threats
 Regular exchange of best practices in commercial port cybersecurity
 Joint proposal to amend IMO International Port Security standards to include
cybersecurity
Civilian Nuclear Energy:
 Initiate cyber cooperation with the China Atomic Energy Authority on civilian nuclear
energy and its related infrastructure components
 Cooperation with the China-U.S. Center of Excellence on Nuclear Security
1
U.S.-China Cybersecurity Cooperation
Contents
Acronyms...…………………………………………….………………………..3
Overview……………………………………………………………..………….4
Chinese Culture & Communication Strategies………………………………….5
Chinese Cyber Priorities, Perceptions and Key Actors………………………….9
Lessons Learned: Attacks on Government Infrastructure………....…………....15
Proposed Infrastructure Sectors for Cooperation….…………………………....18
Cooperation Sector 1: Financial Systems…………………………………...18
Cooperation Sector 2: Commercial Port Security…………………………...21
Cooperation Sector 3: Civilian Nuclear Energy…………………………….24
Conclusion………………………………………………………………………28
Appendices
Appendix A: Chinese Perceptions of Internet Information Access & Usage…...29
Appendix B: List of Experts Interviewed.………..……………………………..30
Authors’ Contact Information…………………………………………………...31
Endnotes…………………………………………………………………………32
2
U.S.-China Cybersecurity Cooperation
Acronyms
CCG
Chinese Coast Guard
CAEA
China Atomic Energy Authority
CERT
Computer Emergency Response Team
CHIPS
Clearing House Interbank Payments System
CNCERT
China's Computer Emergency Response Team
CND
Computer Network Defense
CSI
Container Security Initiative
DDoS
Distributed Denial of Service
DHS
U.S. Department of Homeland Security
DoE
U.S. Department of Energy
EDF
Électricité de France (Electricity of France)
ENISA
European Network and Information Security Agency
EU
European Union
GAC
Chinese General Administration of Customs
ICE
Immigration and Customs Enforcement
ICS
Industrial Control Systems
IMO
International Maritime Organization
ISAC
Information Sharing and Analysis Center
NCCIC
National Cybersecurity and Communications Integration Center
NNSA
National Nuclear Safety Administration
NSS
Nuclear Security Summit
RFID
Radio-Frequency Identification
SCADA
Supervisory Control and Data Acquisition
STIX
Structured Threat Information eXpression
SWIFT
Society for Worldwide Interbank Financial Telecommunication
TAXII
Trusted Automatic eXchange of Indicator Information
3
U.S.-China Cybersecurity Cooperation
Overview
This report examines U.S.-China relations and seeks opportunities to leverage cooperation on
computer network defense (CND) activities to achieve shared goals. The Department of
Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC),
was a source of information for our capstone team as we worked to identify cultural barriers to
communication and cooperation with potential Chinese counterparts, and to develop specific
scenarios and recommendations for improving cooperation between the two countries on CND
activities.
Our recommended areas of cooperation focus on areas outside defense and national security in
order to avoid contentious issues and mistrust. This report finds that there are opportunities for
the United States to propose cyber cooperation with China in the areas of protecting financial
systems, commercial port security, and civilian nuclear energy.
While acknowledging the large amount of recent public information about cyber attacks on U.S.
entities coming from the People’s Republic of China, this report does not focus on a restatement
of the Chinese cyber threat or its competitor status, and explicitly seeks the least politically
contentious areas for cooperation. We also propose several diplomatic initiatives as part of
recommendations for cyber cooperation but do not elaborate on the mechanics of how these
initiatives would be executed—this level of detail is beyond the scope this report but presents an
interesting and necessary area of further research for implementation.
Methodology
We first reviewed the critical infrastructure sectors that DHS is tasked to protect as well as
industries represented by Information Sharing and Analysis Centers (ISACs). We examined
which infrastructure sectors were least politicized and most urgent for cooperation with China by
considering the following questions:



Do the U.S. and China share vulnerabilities and third party threats in this sector?
Do the U.S. and China share economic or other interdependencies in this sector?
Are there viable opportunities and imperatives for information exchange?
Some infrastructure areas, such as transportation and water systems, are structurally more
confined within domestic borders as compared to internationally integrated areas, such as trade
and finance. We focused our analyses on these latter sectors. In order to provide actionable
guidance on approaching the Chinese on cybersecurity on infrastructure systems, we identified
Chinese counterparts that NCCIC should consider approaching, outlined cultural
communications strategies, and conducted a brief literature review of recent areas of cyber
cooperation and lessons learned. The findings and recommendations are also based on a dozen
interviews with selected regional and functional experts in U.S.-China relations, cybersecurity,
and critical infrastructure.1
1
For a full listing of all interviewees, see Appendix B. Our interviews did not include native Chinese
cybersecurity experts due to our limited time and resources.
4
U.S.-China Cybersecurity Cooperation
Culture and Communications Strategies2
Introduction
To build productive dialogue, it is essential to understand the differences in culture and
communications between the two countries. Unlike the U.S., Chinese strategic culture is
characterized by ambiguity, disinformation and secrecy. Through this approach, China aims to
achieve its strategic objectives, thereby “winning without fighting.” The way in which an entity
shares information reflects its strategic culture, which in China, is traditionally dominated by the
state.1
Differences in cultural values and assumptions are usually invisible, often subconscious, and
difficult to discern by an outside observer. Because of the subtlety surrounding cultural values, it
is necessary to pay attention to some distinct facets of Chinese culture, especially bureaucratic
culture, which Chinese counterparts may reflect.
Key Concepts of Chinese Culture
"Guānxì”, or Personal Connections
"Guānxì" (关系) is one of the most powerful forces in Chinese culture. Though the direct
translation of "guānxì" is "relationship," the concept as it is used and applied in Chinese culture
is much richer and encompasses more than a simple interaction.
"Guānxì" expresses the relationship of one person to another, or one party to another. More
importantly, the term also expresses an obligation of one party to another, built over time by the
reciprocation of social exchanges and favors. If one has "guānxì" with another, one will perform
a favor or act on another’s behalf, and depending on the depth of the relationship, do anything
necessary for the other party. By establishing this type of relationship with someone, the other
party is implicitly agreeing also to be available to reciprocate when the need arises. Thus,
"guānxì" can be considered as a type of currency that can be saved and spent between the two
parties. Like money, it is a resource that can also be also be exhausted, so one must be sensitive
not to overextend or use up the "guānxì" that has been established.
However, reciprocity does not suggest immediate, American-style reciprocity. In China, favors
should be always remembered and returned, though not necessarily right away. Long-term
reciprocity is a cornerstone of enduring personal relationships.
Hierarchy and Holistic Thinking
Under Chinese bureaucracy, the extreme respect for authority tends to result in centralized
decision-making and acceptance of hierarchy. However, respect for hierarchy tends to hinder the
development of individual responsibility and initiative.
2
For more information regarding cultural communication, please see the following resources: The
Chinese Negotiation by John L. Graham and N. Mark Lam, UMD LSBE Study-in-China 2010, and
Harvard Business Review on Doing Business in China.
5
U.S.-China Cybersecurity Cooperation
For example, holistic thinking is an indirect result of hierarchy. Under such a system, individual
ideas are no longer important, and the reluctance to express one’s own ideas is reinforced by the
belief that it is risky and irresponsible to stand out. Another embodiment of holistic thinking is
that the Chinese think in terms of the whole, while Americans think sequentially and
divisionally, breaking up complex negotiation tasks into a series of smaller issues, such as price,
quantity, warranty, and delivery. Chinese negotiators tend to focus on the whole of the matter,
skipping among smaller sub-issues, and from American perspective, seemingly not settling any
of them.
“Face” or Social Capital
Fundamentally, “face,” or “miànzi,” (面子) represents a person’s reputation and feelings of
prestige (both real and imagined) within their workplace, society, and family. The concept of
“face” can be more deeply understood within the historical context of China as a highly
hierarchical society.
The position that a Chinese person occupies relative to others commands a certain degree of
respect and requires certain types of behavior. For example, a director of a Chinese government
organization might expect their subordinates to use the honorific, which includes the person’s
position (e.g. Director Chen), when addressing him or her. If the subordinate fails to use the
honorific or polite speech, the director could potentially feel slighted, embarrassed, and/or angry.
In effect, the director would lose “face” in the eyes of their colleagues and observers.
While Americans tend to think in absolute terms—a person either has or does not have prestige
and dignity—the Chinese think of face in quantitative terms. Face, like money, can be earned,
lost, given, or taken away.
Recommended Confidence Building Measures
1. It is acceptable to approach a Chinese official at a meeting event and introduce yourself.
However, it is even better if someone the official knows makes the introduction.
2. It is not acceptable for a junior member of a foreign delegation to reply to or challenge
the arguments of a senior Chinese delegation member during a meeting because the
senior Chinese official could lose face. “Matching” is important in China. A safe way is
to always use a senior delegation member as a spokesperson and have the junior members
remind that person if any important point has been left out.
3. Chinese counterparts would be pleased to hear you speak basic Chinese (e.g. greetings)
as it shows that you are interested in understanding more of Chinese culture and you have
made efforts to do so. In the worst case, you all will have a good laugh about it and they
would likely be more than happy to help you improve your skills, presenting another
opportunity to advance your relationship.
4. When drinking alcohol during a Chinese party, people will likely toast you to show their
respect and hospitality. As a foreigner, you are not expected to do likewise, but it will be
much appreciated if you do. Once you have started, make sure you start to toast your
partners from the highest-ranked officials. This act is called “jìngjĭu,” which is proposing
a drink. When you toast, finishing your drink helps convey your respect. You may
6
U.S.-China Cybersecurity Cooperation
propose a simple toast, “gānbēi,” which translates literally as “drying the cup.” Given the
culture of holistic thinking, performance at any out-of-office events has an impact on the
overall relationship.
A Note on Expectations for Hosts
It is important to note that reciprocation can itself act as a confidence building measure when
your organization is hosting its Chinese counterpart. As hosts, Chinese organizations can be
exceptionally enthusiastic in structuring their guests’ stay beyond the typical meeting and
institutional tour, in contrast to American hosts, who would prefer to structure their free time
individually. This can be attributed in part to an appreciation for the rich historical continuity of
Chinese culture. Chinese hosts also take great pride in anticipating the needs of their guests, and
view a busy schedule as one way of expressing that care. However, many Chinese hosts are
increasingly aware of the differences between Chinese and American host etiquette and may opt
to leave their American guests the ability to structure their own free time.
When hosting a Chinese delegation, the best option is to assume a similar level of enthusiasm or
involvement when planning your guests’ stay—within the limits set on your organization. While
it may certainly be impossible to host dinners and accompany your guests on a tour of the local
sights, it would be extremely well received to schedule your guests for a meaningful tour of
Washington, D.C. or to assign a point person to manage your guests’ trip.
Summary: American vs. Chinese Cultural Values and Ways of Thinking
American
Chinese
Individualist
Collectivist
Egalitarian
Hierarchical
Information-oriented
Relationship-oriented
Reductionist
Holistic
Sequential
Circular (indirect)
Proposal First
Explanation First
Method of persuasion
Impatient
Enduring
Terms of agreement
Forging a “good deal”
Forging a “long-term
relationship”
Qualities
7
U.S.-China Cybersecurity Cooperation
Terminology
Some English words are difficult to translate or have no equivalents in Chinese, thus,
misunderstanding may occur. The following are a few examples:
Untranslatable Word
Engage/engagement (in a business sense)
Frame (as a verb)
Embody/ Embodiment:
Connotation
Denotation
Alternative
Involve, participate
Form, devise
Includes/contains (something)
Implication
Use literal or primary meaning
Useful Chinese Phrases



“Nihao” (你好)means “hello”, “xiexie” (谢谢) means “thank you”, and “zaijian” (再
见) means “goodbye”
When you see your Chinese partners for the second time, you can begin with
“haojiubujian,” (好久不见) meaning “long time no see”
When you want to express that you and your counterparts should “make much of what is
common and minimize differences,” you can use “qiútóngcúnyì,” (求同存异),which is
widely used by Chinese government officials
8
U.S.-China Cybersecurity Cooperation
Chinese Priorities and Key Actors
China’s Cyber Priorities
China’s main priorities are to maintain regime stability, combat third party threats, enforce laws,
and promote innovation in cyberspace. The first priority, of combating anti-government speech,
is worth noting, but may not be a fruitful avenue for cooperation given that this is primarily a
domestic issue and not one on which the two sides agree. Combating third-party threats holds
more promise: framing cyber priorities as a joint desire to prevent a bored young man in Eastern
Europe from accessing U.S. or Chinese bank accounts or shutting down a major container port
could be a productive way to view this issue. China must also, like the U.S., combat traditional
criminals who are now able to sell illegal goods or communicate more easily online. Finally, as
in the United States, the need for security must be balanced with freedom to innovate.
On a conceptual level, the Chinese government supports cooperation on cybersecurity with
entities such as the United States and European Union (EU). A recently released Chinese policy
paper on the EU called on both sides to “facilitate practical cooperation between China and the
EU in fighting cyber-crimes, emergency response to cybersecurity incidents and cyber capacity
building through platforms such as the China-EU Cyber Taskforce and work together for the
formulation of a code of conduct in cyberspace within the UN framework.”2 There have also
been numerous attempts at cooperation between various Chinese and American agencies on
cybersecurity.
The nature of U.S.-China cybersecurity relations implies that certain forms of cooperation are
possible while others are not. Information sharing and other tactics that promote improved
communication are the most likely methods to improve this area. The two countries cannot be
expected to cooperate in areas of key national security concern or areas that are strictly confined
within domestic borders. The Chinese legal system reinforces these notions; for example, the use
of foreign encryption is banned.3 An intangible barrier to cooperation is the mutual suspicion and
low expectations each side has for the other—many interviewees expressed concern regarding
the difficulty of the task.
An Emerging Cyber Priority: The Internet of Things
The Internet of Things (IoT) is an emerging issue in cybersecurity for both the U.S. and China.
In the United States, the National Intelligence Council presented the IoT as one of six
“Disruptive Civil Technologies…with potential impacts on U.S. interests out to 2025.”4 National
Intelligence Director James Clapper testified recently before the Senate Select Committee on
Intelligence, citing the complexity and nature of the IoT as one of potential cyber threats. 5
Concern has been echoed in the private sector as well. Symantec has warned of a new
cybersecurity threat that is on the rise due to the spread of the IoT. Cisco estimates that there are
over 10 billion connected devices in the world, and the number is expected to reach 50 billion by
2020.6 The expansion of cyberspace, in part due to transition to IPv6 and lowering costs to
produce network-ready devices, increases the cybersecurity risk of all connected users.
China has expressed an appreciable degree of interest in the IoT as well. Premier Wen Jiabao has
elevated the status of the technology by identifying the IoT as an “emerging strategic industry”
and pledged to invest 5 billion Yuan ($800 million) by 2015. The National Development and
9
U.S.-China Cybersecurity Cooperation
Reform Commission has also included the IoT in the 12th Five-year plan, and charged the
Ministry of Industry and Information Technology to construct the policies that pertain to the
development of the IoT.7
The risks that the IoT presents were exposed at the Hack in the Box cybersecurity conference
held in April 2013 using a web service called Shodan. The website collects information from
more than 500 million web-connected devices, and the conference showed how a variety of
devices, ranging from servers and computers to routers, printers, and even home appliances, is
prone to external security breach.8 It must be noted that although this technology may be in its
infancy, cyber threats already exist.
Perceptions of Cyberspace3
The Chinese are just as concerned about sovereignty in virtual arenas as they are in physical
ones. Cyberspace is seen as a collection of jurisdictions, rather than a common, global space to
be jointly used and controlled. Consequently, although China has demonstrated its willingness to
cooperate with the EU on creating a joint task force and a code of conduct, the Chinese
government reserves certain rights to itself.9 The Chinese government punishes citizens for
online dissent, and has not reciprocated the recent U.S. briefing on cyberwar methods and
priorities.
The Chinese government sees its population as especially vulnerable to cyber threats.10 China
sees itself as primarily a victim of hacking, which often originates in the U.S. Widespread use of
pirated software, sometimes unknowingly, is a major vulnerability since such software lacks
protections from hackers.11 Identity theft and malware attacks on computers are common;
meanwhile, protective measures on websites are inadequate.12 The rate of increase of internetconnected people in China, who now outnumber the population of the U.S., has outpaced the
speed of adoption of proper security measures.
Perceptions of DHS NCCIC
In the Chinese system, security and intelligence functions are both accomplished within the
Ministry of State Security. DHS will need to be aware of that dimension as they interact with
Chinese colleagues whose starting point in understanding DHS is their own bureaucratic system.
In a post-Snowden era, Chinese officials are going to be cautious in interacting with any U.S.
government agency. However, given the pervasive involvement of the state in the operations of
Chinese companies, this may not be a major obstacle. CNCERT is closely affiliated with the
Internet Emergency Response Coordination Office, and, like many ostensibly nongovernmental
agencies in China, may act only with at least implicit permission from the government on most
issues. If CNCERT projects this state of affairs onto NCCIC, the fact that DHS is a government
organization may not mean as much as it would to an American, given that they most likely
assume groups taking diplomatic action do so with the blessing of their own government.
3
For more information regarding perceptions of cyberspace among CNCERT’s leadership, see Appendix
A.
10
U.S.-China Cybersecurity Cooperation
Key Actors: CNCERT
China’s Computer Emergency Response Team (国家互联网应急中心, CNCERT) plays an
important coordination role within China and in its relations with other actors. Founded in 1999,
CNCERT works on “building up the national monitoring, warning, emergency response,
evaluation and public opinion centers for network security.”13 It produces a weekly English and
Chinese language overview of the threat landscape and statistics on how this compares to prior
periods. It coordinates relations with other CERTs and with subordinate bodies in China, as seen
in its organization chart (Figure 1). One example of ongoing cooperation is with Japanese and
Korean CERTs: the three described a recent history of information sharing (including a 24/7
technical hotline) and crisis de-escalation in a statement to the media after their first annual
trilateral meeting last August.14 The Chinese version of the site regularly updates a set of articles
about international issues in cyberspace. The English version of the website is not quite as
extensive, but it is more developed, frequently updated, and well-translated than many
comparable Chinese government websites.
CNCERT will most likely toe the party line. Its representatives have been quoted as criticizing
the United States for being the biggest host for cyber attacks against China, while also objecting
to U.S. reports that China launches a large number of cyber attacks against the U.S.15 It is not a
government body, but does not have the autonomy to deviate from official policy lines and
expectations.
The Director General of CNCERT is Huang Chengqing, who is also a Vice President of the
Internet Society of China (formerly Deputy Secretary, then Secretary General). As with many
Chinese officials in similar positions, he has commented on the hypocrisy of the United States’
condemnation of China for instigating cyber attacks against China given the volume of attacks
on China originating from the U.S., warning that his team had “mountains of data” implicating
the U.S. in such attacks. However, his words on that occasion were relatively restrained, given
his emphasis on practical matters like cooperation over accusation.16
Zhou Yonglin is the Secretary General of CNCERT and its former deputy director. He has
participated in efforts to cooperate on cybersecurity with the United States in the past.17 Two of
the obstacles he highlighted in discussing this exchange in 2011 were the lack of knowledge
about safety in cyberspace among the Chinese public and a language barrier between U.S. and
Chinese officials.18 He has spoken out about the number of Chinese websites defaced and the
volume of other hacking attacks each year, calling China the most frequent victim of cyber
attacks in the world.19
11
U.S.-China Cybersecurity Cooperation
Figure 1: Organizational chart of CNCERT
12
U.S.-China Cybersecurity Cooperation
Other Key Actors
Prevailing Western perceptions infer that China’s policy process is strongly coordinated from the
central government. However, China does not have monolithic, centralized approach to
cybersecurity and its policy governance is fragmented regionally and functionally. At least six
different entities have input on cybersecurity policy: the Ministry of Public Security, State
Encryption Bureau, State Secrets Bureau, Ministry of State Security, Ministry of Industry and
Information Technology, and People’s Liberation Army.20This large number of institutions is
indicative of the diversity of perspective across these groups.21
The Ministry of State Security’s Technology Bureau is responsible for drafting computer
security policies and largely in charge of the country’s cybersecurity. The Public Information
Network Security Supervision and Info-Communications departments under the Ministry of
Public Safety are in charge of investigating cyber crimes. In addition to CNCERT, these
branches may prove important Chinese counterparts to begin initial cooperation effort.
As in the United States, those who understand the technology or the policy discussions
surrounding this topic vastly outnumber those who understand both.22 In addition, many
functional departments have subdivisions that work on cybersecurity within their agency.
China recently created a small leading group on cyber and incident management headed by
President Xi. This new group is an effort to centralize Chinese cyber policy and may be the third
incarnation of such a body.23
Past U.S.-China Cyber Cooperation
Cyber crime, such as computer and network intrusions as well as identity theft and fraud, is an
area where the U.S. and China have already cooperated. For instance, the Federal Bureau of
Investigations has worked with law enforcement units in China to arrest consumers and hackers
of online personal information.24 In addition, in 2012, Chinese authorities approached U.S.
counterparts first while investigating a fraudulent bank scheme that involved a Chinese national
in Delaware.25 Fighting cyber crime often involves coordination among multiple governments
due to the nature of the offenses committed online, which are not subject to geography, and can
threaten the security and interests of many countries. As the Delaware investigation indicates,
China, if deemed beneficial to its interests, is willing to work with the U.S.
Cooperation between the two governments in fighting future cyber crime can be enhanced by
extending—within defined boundaries—the use of common technical specifications. For
example, DHS is undertaking a broad effort to advance technical specifications, like STIX and
TAXII, that are international in scope and free for public use. International adoption of STIX and
TAXII may promote automated information sharing among computer security incident response
teams globally.26
At the multilateral level, Asia Pacific Computer Emergency Response Team (APCERT) has
been conducting joint exercises – the Cyber Exercise Drill – to prepare for international
cooperation following potential cyber incidents. China has been a part of the annual exercise
drills. The drills have asked CERTs from each country to interact during the drills to enhance
communication protocols, technical capabilities and incident responses. The drills seek to
produce most practical benefits by taking the format of ‘blind drills.’27
13
U.S.-China Cybersecurity Cooperation
NATO’s Locked Shields exercise may serve as another point of reference. Organized by
Cooperative Cyber Defense Centre of Excellence, the annual defense exercise invites the
participation of expert individuals and organizations in both government and the private sector.
The exercise assigns participants to six different teams according to expertise and interests.28
Such unique aspects of Locked Shields—inviting private sector and rotating roles assigned to
participants—offer a helpful reference for the U.S. and China when considering joint exercises
as a way to engage in practical cooperative cybersecurity.
Considering that the U.S. prefers a multilateral joint cybersecurity exercise, and APCERT’s
openness to participation from CERTs of non-Asia Pacific countries, the U.S. and China could
join the organization’s annual drills. To date, APCERT has allowed the Organisation of the
Islamic Cooperation-Computer Emergency Response Team (OIC-CERT) and the European
Government Computer Security Incident Response Teams (CSIRT) to join the drills. The two
countries could co-construct key shared objectives that could serve the interests of both
governments. Simulating third-party attempts to breach government networks to disrupt
domestic infrastructure may be considered as key themes.
14
U.S.-China Cybersecurity Cooperation
Lessons Learned: Attacks on Government Infrastructure
All nations want to protect their networks and infrastructure from cyber attack. As the global
cyber landscape is growing increasingly more sophisticated and creative, countries are
continually trying to understand the mechanisms, motivations, and strategic contexts behind
emerging attacks to better protect themselves. This section examines prominent cyber attacks on
government infrastructure and extracts several crosscutting themes. Attack examples were
approached from the Chinese perspective with the aim of highlighting areas of shared interest
between the U.S. and China concerning attackers, vulnerabilities, and socioeconomic impact.
Shared Global Threats and Challenges
The threat of transnational threats cannot be addressed within borders.
In the spring of 2007, Estonia was hit with waves of distributed denial of service (DDoS) attacks
that shut down the websites of all its government ministries, two major banks, news outlets, and
several political parties. The attacks occurred in conjunction with public rioting in response to
the relocation of a Soviet war monument. The Russian diaspora have been cited as the most
likely culprits, acting in political protest. Their methods show the extent to which disparate
transnational groups can express their grievances against institutional targets. The attackers
utilized botnets from all over the world, co-opting computers located in over fifty countries. The
hackers also used weblogs, chat rooms in Russian, and other online platforms to schedule attack
activities and disseminate instructions.29
A 2010 article on China Daily indicated that transnational cyber crime is an area where China
would like to cooperate with the U.S., but legal and communications have limited the extent to
which this has been possible. Gu Jian, vice-director of the ministry's network security protection
bureau, stated, “For example, spreading pornography is a crime in China, but not in the U.S.,
where child pornography is nevertheless a crime. These differences make it difficult to cooperate
in policing these activities.” He further elaborated that there were 13 cases of Internet crime,
from fake bank websites to child pornography, for which China sought cooperation that year, but
received no or delayed responses from the U.S.30 This kind of anecdote indicates the past
difficulty for the Chinese to identify or communicate with the right U.S. cyber officials.
Increased attack strength and the need to harden vulnerable systems.
Globally, DDoS attacks increased 32 percent in 2013, costing millions and straining the structure
of the Internet.31 While they have long been a prevalent form of attack, DDoS are becoming
more harmful, intelligent, and forceful. A security firm stated that it recently offset an attack that
reached 400 gigabytes per second, a force 30 percent larger than the largest attack in 2013.4 As
DDoS attacks rely on hijacked and virus-infected computers, it can be argued that the
proliferation of botnets should be confronted more broadly and intensely.
In particular, U.S.-China discussions can narrow in on technical vulnerabilities of compromised
systems. In the latest State of the Internet report by Akamai, both the U.S. and China are among
the top originating countries in attack traffic. The report notes that the originating source
4
The March 2013 cyber attack on Spamhaus was branded that largest attack in the history of the Internet.
15
U.S.-China Cybersecurity Cooperation
identified by IP address does not translate to attribution because anyone from any country can
potentially launch attacks from the compromised systems of another country. 5 A Chinese official
stated in 2010 that eight out of ten computers in China have been controlled by botnets at some
point.32 In August 2013, the Chinese .cn domain was forced off the grid for hours due to a DDoS
attack. Discourse on how to harden systems to prevent the effects of botnets could benefit both
the U.S. and China as both face and are propagating sources of DDoS attacks. The issue is
particularly relevant as the top areas of Chinese foreign direct investment to the U.S. are IT
equipment, software, and IT services.33
Attack Patterns
Attacks are often timed with political or social unrest.
Shamoon, 2007 DDoS attacks on Estonia, recent developments in Ukraine and countless other
examples indicate that entities must be vigilant regarding the possibility of becoming target to
politically-motivated cyber attacks. This not only points to the importance of government-private
partnership in the cyber realm, but the need for infrastructure enterprises to keep abreast of its
political environment. Areas of political unrest, contentious policy, and other socioeconomic
arenas under dispute present moments when disgruntled “hackivists” are likely to target their
grievances. Examples such as Estonia and more recently, Ukraine, show how cyber attacks are
being used as a retaliatory mechanism following a contentious policy decision or political
development.
Negotiations are most promising when broader political discourse supports cooperation over
conflict.
From the reverse perspective, the most promising time to forge discussions is in tandem with
broad U.S.-China discourse towards cooperation. In late March 2014, the Nuclear Security
Summit look place at The Hague, presenting a global platform for national leaders to express
their national standing on other global issues. One of the developments from the event was
President Xi’s pledge towards mutual cooperation with the U.S. in combatting common
challenges.34
Shared Imperatives to Cooperate
Cybersecurity is a global challenge within the international political economy.
In August 2012, the business and administrative systems of the Saudi Arabian Oil Company
(Saudi Aramco) and Qatar’s RasGas, were hit by the Shamoon computer virus. Saudi Aramco is
the world’s largest energy company in the world, holding nearly 10% of the world’s oil supply,
meanwhile, RasGas is the world’s second largest producer of liquefied natural gas.35 Shamoon
demonstrates that the targeted attack of one entity has the potential to shake the underpinnings of
the world economy. Fortunately, Shammon did not penetrate systems governing operations. Had
that been the case, any disruption of production would have immediately impact on oil supply
and prices, leading to far reaching effects on multiple levels and sectors of the global economy.
5
The fact that China is frequently the top originating country of global attack traffic can indicate that the
country has a higher prevalence of compromised systems.
16
U.S.-China Cybersecurity Cooperation
China and the U.S. are the top oil consumers in the world. Since Shamoon, Saudi Arabian
telecommunications companies and Western technology companies have increased efforts to
secure Saudi data and systems.
China is now recognizing the importance of international cybersecurity cooperation.
Rapid international response enabled the Estonian government to combat the attacks. The
government’s CERT relied on assistance from its Finnish, German, Israeli and Slovenian CERT
counterparts to restore normal network operations. NATO CERTs and the EU’s European
Network and Information Security Agency (ENISA) also supported Estonia in providing
technical assessments and other assistance during the attacks.36 International cooperation, along
with cooperation with private sector banks and Internet providers, was essential to strengthening
Estonia’s cyber infrastructure, for example to incrementally increase its throughput capacity.37
Notably, the international responses to aid Estonia happened within established security
communities and strong transnational relationships. China refrained from involvement, viewing
the incidents as an internal matter of Estonia and also did not take part in the international
cybersecurity discussions that followed.38 However, China’s stance is changing as evidenced by
a recent high-level discourse and policy approaches calling for renewed cooperation with the
entities such as the U.S. and European Union.39 Analysts stated that this new direction is
intended to boost Chinese capabilities and hamper notions of a “China threat.”40 International
cooperation and preparedness are now on the Chinese cyber agenda to move its strategic interests
in technology development, global reputation, and economic growth.
17
U.S.-China Cybersecurity Cooperation
Proposed Infrastructure Sectors for Cooperation
The previous sections provided background information, tools, and themes for negotiating with
China’s cybersecurity counterparts. The second area of focus drills down into tangible areas for
information sharing and coordination. The following section details three infrastructure areas
where cybersecurity cooperation is most promising and beneficial to U.S.-China shared interests:
Financial Services, Commercial Port Security, and Civilian Nuclear Energy. Each sector
examines five categories of research: Sector Priorities, Past and Potential Attack Examples,
Shared Vulnerabilities, Chinese Partners and Key Actors, and Recommendations.
Cooperation in Financial Systems
Sector Priorities
The soundness, efficiency and stability of securities markets rely on the quality of information
provided and the robustness of the supporting technological infrastructure. In recent years,
cybersecurity in relation to financial markets, both domestically and internationally, has become
a top priority.
The cornerstone of financial services is the maintenance of trust. The industry is built upon trust
with clients, trust between firms, and trust to ensure the proper function of markets, executions of
transactions and protection of information. Any loss or integrity failure in financial infrastructure
could impact a national economy in significant ways, including the loss of credit and liquidity to
the marketplace, and the loss of confidence in the operational effectiveness of the marketplace,
which would impact other critical infrastructures.
Examples of Past or Potential Attacks
In recent years, cyber attacks on the financial services sector have been increasingly prevalent. In
2012, some of the largest banks in the United States came under cyber attack.41 In 2012 alone,
53% of securities exchanges around the world experienced a cyber attack.42 In 2013, cyber
attacks brought down systems and some of South Korea’s major banks, paralyzing bank
machines across the country.43 Operation High Roller, discovered in 2012, siphoned up to $2.5
billion from bank accounts in Europe, the U.S. and Latin America.44 Numerous stock exchanges
around the world have faced DDoS cyber attacks, which in some cases have forced trading to
halt for brief periods. It is estimated that 60% of cyber crime occurring in China is financerelated. Some Chinese banks are subject to extortion by cyber criminals, including third party
actors from Eastern Europe.45
Shared Vulnerabilities
The economic and financial interdependence between China and the U.S. is remarkable. China
owns nearly 1.3 trillion dollars of U.S. treasury bonds. The U.S. is also one of China’s largest
trading partners, with trading between the two nations reaching over half a trillion dollars each
year.
18
U.S.-China Cybersecurity Cooperation
Furthermore, financial market operations centered in the United States are increasingly
electronically connected around the world. The SWIFT interbank system and the U.S. CHIPS
system process trillions of dollars of payments daily. With China’s increasingly globalized
economy, China has strong incentives to ensure the stability of these systems. Equally
importantly, impacts of financial events sometimes cannot be contained regionally (for example,
the Global Financial Crisis in 2008 and the Southeast Asian Crisis in 1998). Cyber attacks on the
complex and interdependent global financial system could damage the orderly functioning of the
global economy and undermine investor confidence.
Given this interdependence, both countries have a significant stake in ensuring the stability and
safety of the other’s financial cybersecurity and have important incentives to share information
regarding threats from third-party malicious actors such as rogue states, terrorist groups, and the
like.
The majority of interviewees agreed that the financial sector serves as the platform with one of
the greatest opportunities for cybersecurity cooperation between the U.S. and China. However,
these interviewees also believed that the most effective and sustainable mechanism for
encouraging such cooperation has yet to be identified. The remainder of this section identifies
several approaches designed to spur cooperation.
Chinese Counterparts and Key Actors
The U.S. must work with a number of Chinese entities in order to prevent and mitigate cyber
attacks on financial networks. The three main partners should be the China Securities Regulatory
Commission (中国证券监督管理委员会), the China Banking Regulatory Commission (中国银
行业监督管理委员会), and the People’s Bank of China (中国人民银行). The relevant sectors
in the Chinese financial system are securities exchanges, clearinghouses, and large banks.
Recommendations
Information sharing. China and the U.S. should begin cooperating on several areas related to
financial cybersecurity—identifying threats, establishing processes for disseminating
information, coordinating crisis responses, and improving abilities in detecting and forecasting
threats. The timely sharing of threat information is critical in developing and deploying
protective measures against malicious cyber activity. Gaps or lags in information sharing and
analysis necessitates that the industry deploys faster and more effective electronic tools for
detection and intelligence collection in relation to security attacks and incidents. In particular,
there is an increased need for capabilities to assimilate multiple sources of threat data to better
identify threat activity and produce threat profile identification, which might be difficult to
obtain.
The U.S. and Chinese governments should create a formal system to cooperate against cyber
attacks, but as this might take time (as there would be initial sensitivity to establishing this
system), it would be best to encourage the big banks and financial exchanges in each country to
start sharing information first. Interviewees expressed concern surrounding information sharing
and U.S. privacy laws. They recommended that the focus of information sharing be directed
19
U.S.-China Cybersecurity Cooperation
toward information involving globalized financial utilities such as financial exchanges and
clearinghouses.
Defending against third parties. China undoubtedly has an independent incentive in U.S.
financial cybersecurity, as it has so much invested a great deal of capital in the U.S. and the
global financial system. It would therefore be in China’s best interest to cooperate with the U.S.
in preventing other countries, such as Iran, from damaging the U.S. financial system.
Agree that certain areas are sacred. The governments of the U.S., China, and other nations
should find ways to cooperate and agree to maintain the sanctity of certain critical infrastructure
in the financial sector, therefore implicitly discouraging these areas of infrastructure from
becoming targets of attack. In the financial services sector, the important prohibitions would be
no probing, surveillance, or malicious activity by governments or government entities against
this infrastructure. Again, the two most relevant areas of infrastructure are exchanges and
clearinghouses. Not only are these infrastructures extremely important, but there is nothing to be
gained by governments from attacking them. Cooperation between states will make it easier for
them to target non-state actors wishing to cause damage or steal money in these areas.
20
U.S.-China Cybersecurity Cooperation
Cooperation in Commercial Port Security
Sector Priorities
Global commerce is an essential and growing part of the vitality of every nation’s economy. A
large portion of this commerce flows by sea as companies rely on tightly-scheduled exports and
imports to feed their increasingly globally-derived supply chains. Today, China has seven of the
world’s ten largest commercial shipping ports by volume,46 and its commercial ties with the
United States are deep and growing, exporting some $440 billion worth of goods and services to
America in 2013.47 China is the world’s largest exporter of containerized cargo and is the second
largest importer after the United States.
Large commercial shipping ports are growing exponentially around the world and their
operations managers along with international logistics companies are increasingly turning to
automated software such as Radio-frequency identification (RFID) scanners, Supervisory
Control and Data Acquisition (SCADA) systems, and scanned employee ID badges to streamline
security while dealing with the volume of traffic. These technological measures are necessary to
maintain the high operations tempo at larger ports, but also present cyber vulnerabilities.
Examples of Past or Potential Attacks
In May 2013, Europol broke up a ring of hackers that had been hired by organized crime
syndicates to infiltrate the logistics software6 in two companies running the port of Antwerp in
Belgium. For almost two years, these hackers were able to track containers, enabling the crime
group to smuggle cocaine from South America to Europe. The hackers then accessed the release
codes that allowed individual trucks to come collect them at the port before port officials
discovered their contents.48
Cyber attacks are not limited to European ports. Five out of seven of the largest commercial
container ports in the United States report receiving daily attempts by hackers to access their
networks, including brute force attacks and “cyber storms” caused by hackers using DDoS or
other high-volume attack methods.49 It is unlikely that Chinese ports have been excluded from
similar types of cyber probing or attacks. While the Chinese government claims that China is the
“biggest victim” of cyber attacks,50 due to heavy internet regulation and censorship, detailed
reports of specific cyber attacks on Chinese public or private entities are hard to find.
Shared Vulnerabilities
The Chinese government has at least three compelling reasons to want to initiate and maintain
some form of cyber cooperation with the United States vis-à-vis commercial port cybersecurity:
Economic costs. The potential consequences of even a minimal disruption in the flow of goods
between the U.S. and China would be high and would have ripple effects for the global supply
chain. For example, if there were a serious cyber attack on a major Chinese port, the zeroThe hackers were able to infiltrate the logistic companies’ software via KVM attacks to include
keyloggers disguised as USB keyboard port converters, and miniature PCs hidden inside power strips,
allowing them access to the release codes that allowed containers to be collected by authorized firms.
6
21
U.S.-China Cybersecurity Cooperation
inventory, just-in-time flow of goods that sustains commerce in the U.S. would halt, and,
depending on which port is attacked and for how long, there would be major impacts for China’s
export-driven economy as traffic is re-routed to other ports creating delays. China and the U.S.
jointly have a $440 billion reason to work together to prevent this kind of disruption to trade.
Personnel vulnerabilities at the operational level and systemic security issues. Chinese and
U.S. ports use similar industrial control systems (ICS) to manage their day-to-day operations.
Regardless of whether the software for these systems originates in China, the U.S., or elsewhere,
Chinese and American ports are also made vulnerable by the staff accessing and running these
systems daily. According to some experts, the average level of Chinese cybersecurity awareness
is well below that of the United States, especially outside larger cities51. This leads to the
possibility that, like in U.S. ports, the staff running Chinese ports may not possess a
comprehensive understanding or even awareness of the potential harm from common cyber
threats to their port operations networks. The cost of sharing information, for example against
third-party threats such as organized crime elements, and discussing best practices such as how
to conduct thorough port cyber vulnerability assessments, is relatively low compared to what the
costs of a successful cyber attack could be.
Landlord ports. Many of the larger ports in the United States contain a commercial port facility
that may include areas leased to “tenants” who are leasing space but have no role in the port’s
overall management. These tenants often have access to the SCADA systems or other logistics
software that are used to run the port, but are not subject to the same IT oversight that is required
of the port “landlord” staff. This introduces a cyber vulnerability as landlord ports often have
little awareness of what systems are being run by their tenants, if these tenant systems are being
networked to larger port systems, or what cybersecurity measures tenants may or may not have
in place. While operation of Chinese ports tends to fall under the purview of the local municipal
government or other government-related holding companies, many also have tenant operators
that are non-government affiliated and thus may share similar vulnerabilities.
Chinese Counterparts and Key Actors
It will be necessary for the U.S. to reach out to several Chinese government bodies concurrently
in order to achieve the level of hierarchical approval needed to move beyond simply talking
about cyber cooperation on commercial port security. The entity that most closely mirrors DHS’s
administration of ports is the China Maritime Safety Administration (中华人民共和国海事局),
which is subordinate to the Ministry of Transport, but separate from the Chinese Coast Guard
(CCG), which deals with maritime law enforcement and policing.
A secondary counterpart that mirrors DHS’ investigative arm of Immigration and Customs
Enforcement (ICE) is the Chinese General Administration of Customs (GAC, 海关总署). The
GAC is responsible for duty and excise collection, customs control, countering smuggling, and
port management, among other responsibilities. Lastly, it would be ideal to ensure inclusion of
some element of the Chinese Foreign Ministry from the beginning, as it is one of the main policy
making organizations in the Chinese government and its acceptance is critical to ensuring that
any agreement will be implemented by the Chinese side. All three Chinese government elements
would likely be interested in being present at any potential dialogue with the United States
regarding cyber cooperation over commercial port security.
22
U.S.-China Cybersecurity Cooperation
Recommendations
Short-term: Information sharing. China and the U.S. should begin cooperating on shared
vulnerabilities with respect to third-party cyber threats such as organized crime, terrorism, or
human trafficking. Information sharing represents the lowest rung of potential future cooperation
on commercial port cybersecurity matters and does not need to involve allowing the other side
access to port networks, which should help alleviate respective national security concerns. It can
be as informal as U.S. Customs and Border Patrol (CBP) or ICE agents – who are already
present at several of the Chinese ports included in the DHS Container Security Initiative (CSI) –
passing along information to Chinese port officials. While the CBP and ICE officials may not be
expert in technical aspects of cybersecurity for critical infrastructure, this informal mechanism
could serve as an “early warning” notice of recent trends in cyber attacks, contextualized to the
port security environment.7 Timely and routine sharing of third-party threat information is
critical to developing and maintaining situational awareness of cyber threats as well as
developing protective measures.
However, in order to get discussions started it is sometimes helpful to delineate what is not being
discussed. Both sides should agree up front that certain areas of port cybersecurity discussions
will not be discussed and what they are. Many ports are dual-use military and civilian
installations and are therefore considered important assets of national security. Given the recent
accusations of cyber espionage on both sides, focusing on third-party threats to commercial
interests is likely to be the least contentious way to move discussions forward and may be better
received by the Chinese if presented as sharing information on “cyber crime” threats rather than
“cyber attacks,” which many Chinese view as having a military connotation.
Short- to Medium-Term: Exchange of Best Practices. In addition to information sharing,
Chinese and U.S counterparts should discuss and exchange general best practices in commercial
port cybersecurity, such as how to conduct thorough port cyber vulnerability assessments, how to
develop a port cyber incident response plan, or lessons learned for training port operations
personnel. This can be conducted concurrently with information sharing on third-party threats or
could also take place between higher echelon counterparts after a lower-level working group has
been established. Limiting discussions to general best practices should preclude any domestic
national security arguments and provide each side with a better sense that their counterparts are
able to safeguard the networks of their commercial ports on which so much of our combined
trade depends.
Medium- to Long-Term: Joint Proposal to Amend IMO International Port Security Standards.
Should these information sharing and other forums develop into long-standing bilateral
dialogues, China and the United States have the leverage as the world’s largest commercial
exporter and importer to work towards jointly revising international port security codes as set
forth by the International Maritime Organization (IMO) to include cybersecurity measures.
NCCIC and their Chinese counterparts could be called on to play advisory roles in drafting the
joint international port cyber standards, based on the practical experience they might have
developed through cooperation with each other.
7
Current Chinese ports that participate in the CSI are Hong Kong, Shanghai and Shenzhen, which
together account for approximately 70% of Chinese goods being shipped to the U.S.
http://www.dhs.gov/container-security-initiative-ports
23
U.S.-China Cybersecurity Cooperation
24
U.S.-China Cybersecurity Cooperation
Cooperation in Civilian Nuclear Energy
Sector Priorities
The DHS and its bodies, US-CERT and ICS-CERT, are well positioned to take advantage of an
opportunity for cooperation with their Chinese counterparts on nuclear energy system safety and
security. Vulnerabilities in ICS and SCADA systems that control power generation and waste
and water management present an urgent need for cooperation to ensure information security
within the civilian nuclear energy sector and its associated industries.
The Chinese civilian nuclear energy industry is currently experiencing accelerated growth. In an
effort to reduce the environmental pollution produced by its reliance on fossil fuels, China is
quickly developing its nuclear energy industry and has become largely self-sufficient in reactor
design and construction. At present, China operates 20 nuclear reactors, with 28 under
construction and even more to be built. China also plans to export its nuclear reactor construction
and operation services. In 2013 Chinese nuclear energy companies, in partnership with French
nuclear giants EDF and Areva, signed letters of intent to build a nuclear reactor in the United
Kingdom.
This nuclear energy boom naturally coincides with a massive investment in China’s smart grid
infrastructure. That investment will drive the growth of China’s SCADA acquisition from
$3billion to $20billion by 2020. In 2013,China out-spent the United States in smart-grid
technology for the first time. China’s smart grid development strategy requires less of an
investment in new technologies and focuses instead on “better communication, coordination, and
incentives for consumers, power suppliers, and government agencies.”52 While this will enable
China to achieve its smart grid objectives with relative speed, the ICS and SCADA systems
associated with a newly networked smart grid remain vulnerable to zero-day attacks and other
cyber vulnerabilities.
In conjunction with this growing Chinese investment in civilian nuclear energy, cyber
vulnerabilities in nuclear security are a growing topic of concern for the international
community, the United States, and China. The Nuclear Security Summit 2014, at which China
pledged its commitment to international cooperation in nuclear security, gave nuclear
cybersecurity unprecedented prominence in its final communiqué, stating: “We recognise the
growing importance of information security, including information held on computer systems,
related to nuclear material and technology.”53 The communiqué further emphasized the necessity
for government, industry, and academia to coordinate cooperation in these areas.
President Xi Jinping’s speech at NSS 2014 illustrates China’s immediate and long-term concerns
for nuclear security and safety. While President Obama and President Xi avoided the subject of
nuclear security during their meeting at NSS 2014, Xi took the opportunity to give a speech on
China’s approach to nuclear security and his vision for international cooperation in nuclear
security. Chinese media reports that the speech comprised four major points for nuclear security:
“President Xi suggested that to enhance nuclear security, the world should place equal emphasis
on development and security, rights and obligations, independent and collaborative efforts, as
well as on treating symptoms and addressing causes. [emphasis added]”54
25
U.S.-China Cybersecurity Cooperation
Examples of Past or Potential Attacks
As mentioned in the paragraphs above, China’s efforts to expand its nuclear energy industry and
implement its $20 billion smart-grid strategy leaves its nuclear energy infrastructure open to a
host of known and zero-day vulnerabilities. For example, Stuxnet specifically targeted ICS and
SCADA systems, exploiting zero-day vulnerabilities in Windows OS and Siemens software
running on Windows OS. Shamoon is another example of malware exploiting zero-day
vulnerabilities in the energy industry.
In September 2011, it was revealed that Areva, the French nuclear giant, was targeted in a cyber
attack that may have lasted up to two years. While little information has been made public
regarding the perpetrators, intent, and extent of the penetration, after the attack other nuclear
energy companies began partnering with American cybersecurity firms to harden their cyber
defenses.
Shared Vulnerabilities
ICS and SCADA systems present a large target to malicious actors because of the ubiquity of the
software (such as Windows OS) and hardware (produced by a number of international suppliers
such as Siemens, etc.) used by the U.S. and Chinese energy and infrastructure suppliers. In
addition, ICS and SCADA suppliers have had few incentives to harden their products against the
possibility of cyber attack, while operators often lack the training and expertise and ability to
protect themselves from attack or detect an attack once underway. As older, un-networked
SCADA systems come online to the “smart grid,” they are often vulnerable to cyber attack
because of unsecured or easily hacked network connection methods.
These vulnerabilities could lead to a Stuxnet-like attack on the U.S. or Chinese nuclear energy
sectors, or a less obvious attack that could delay or cripple the countries’ energy supply or waste
and water treatment. The impact of cyber attack on civilian nuclear energy facilities from
malicious third party actors could have wide-reaching environmental and economic effects, in
addition to threatening energy security for the U.S., China, and their energy clients.
Chinese Counterparts and Key Actors
The China Atomic Energy Authority (CAEA) (国家原子能机构) oversees Chinese nuclear
energy administration, and is directly under the China National Nuclear Corporation
Commission of Science, Technology and Industry for National Defense. This organization is
China’s representative to the International Atomic Energy Agency.
The National Nuclear Safety Administration (NNSA) (国家核安局) under the CAEA was set up
in 1984 and is the licensing and regulatory body that also maintains international agreements
regarding safety. The NNSA reports to the State Council directly, but is perceived to be
insufficiently independent of the CAEA, which plans new capacity and approves feasibility
studies for new plants. The NNSA also works closely with the U.S. Nuclear Regulatory
Commission in relation to U.S.-designed nuclear reactor technologies.
26
U.S.-China Cybersecurity Cooperation
Given the CAEA and NNSA’s working history with U.S. agencies such as the Department of
Energy, the Department of Defense, and the Nuclear Regulatory Commission, these agencies
appear to be appropriate and committed partners to U.S.-China energy security cooperation.
Recommendations8
Initiate cyber cooperation in civilian nuclear energy and its related infrastructures with the
CAEA. It is critical that the United States work with China to ensure the safety of its own
domestic reactor facilities and components, as well as to prevent illegal proliferation. Intellectual
property theft and nuclear terrorism are also important areas of discussion. As China develops its
own nuclear power capabilities, it intends to export its reactor designs and construction as well as
supply chain components, creating a deeper urgency for cooperation.
At this stage, cooperation would entail dialogue between the CAEA, its American governmental
agency partners and DHS, and will likely involve the Ministry of Foreign Affairs for the reasons
enumerated in the Recommendations for Commercial Port Security. The discussion could
initially be limited to sharing industry best practices, information concerning third-party threats,
and the possibilities for hardening ICS and SCADA systems against cyber attack.
Medium- to long-term cooperation: Cooperation with the China-U.S. Center of Excellence in
Nuclear Security. The Center of Excellence could be a potential mechanism for U.S.-China
nuclear cybersecurity cooperation. The Center of Excellence is currently under construction in
Beijing, with a projected opening in 2015.55 Administered by the CAEA and built with funds
from China and the U.S., the Center of Excellence will serve as a training center for all aspects
of nuclear security. The CAEA will be working with the Department of Energy and the semiautonomous body under it, the National Nuclear Security Authority, as well as the Department of
Defense, in building and implementing the Center’s mission. From the initial press release:
The Center will serve as a forum for exchanging technical information, sharing best
practices, developing training courses, and promoting technical collaborations that
will enhance nuclear security in China and throughout Asia. It will also help meet
the training needs for China’s expanding nuclear sector and promote nuclear
security best practices throughout the region. 56
The Center for Excellence arose out of the first Nuclear Security Summit in 2010, when
President Hu Jintao agreed to build the center to strengthen international nuclear security
cooperation. In addition to the mission above, the center:
…will enable the training of nuclear site personnel on measurements and
accounting of nuclear material and on the design and installation of nuclear material
security systems. It will also have the capability to train protective force personnel
8
This section of the report does not consider either the American or Chinese military applications of
nuclear cybersecurity as we tried to preclude the military aspect from our research and recommendations
for the sake of greater feasibility of cooperation. It is worth noting that China maintains a limited
stockpile of nuclear weapons consistent with their doctrine of defense use, and is unlikely to consider
bilateral or multilateral nuclear arms reductions talks or agreements without further commitments in that
regard from the U.S. and Russia.
27
U.S.-China Cybersecurity Cooperation
using scenario-driven response exercises and give hands-on training on
international nuclear safeguards requirements and inspection techniques.57
It is important to note that cybersecurity cooperation has not been specifically enumerated as part
of the Center’s mission guideline.
DHS should work with the Center to establish training programs, exchanges of expertise and
serve as the conduit for communicating and coordinating defenses to cyber attacks on civilian
nuclear energy facilities and their related infrastructure. The dedicated nature of the Center of
Excellence as a regional hub for Asia-Pacific nuclear security will allow it to act as a force
multiplier and may lead to the development of real-time cyber threat monitoring tools for AsiaPacific nations committed to nuclear safety and security.
28
U.S.-China Cybersecurity Cooperation
Conclusion
The issue of cybersecurity between China and the United States has been heavily discussed due
to its criticality in maintaining the stability of each country’s respective economies and cultures.
As China and the United States are increasingly interconnected and interdependent in many
ways, it is crucial that the two states maximize their potential in securing their cyber networks by
cooperating and working toward mutual goals. China’s current recognition of the importance of
international cooperation in cyber realms provides the impetus for a partnership based on mutual
respect and mutual benefit.
Our team proposed three specific areas that are minimally contentious in terms of national
security with the highest incentives for cooperation – namely, protecting financial systems,
commercial ports, and civilian nuclear energy systems from third-party threats.
Despite evident barriers, identifying mutually beneficial and non-threatening areas that do not
endanger national security interests would help facilitate cooperation between the U.S. and
China. Cyber crime, third party threats, and the Internet of Things may serve as such areas.
Cooperating in such areas requires the two governments to engage in confidence building that
runs parallel with a limited information sharing. As a gradual, incremental measure, joint
cybersecurity exercise might also be deemed helpful. As the U.S. is pointed as in a position to
take the initiative in building cyber cooperation with China, it is important that the U.S.
understands China’s cybersecurity agenda and is able to offer benefits in exchange for China’s
cooperation. Future dialogue and cooperation between the U.S. and China will improve mutual
understanding in challenging key technical, economic, and strategic areas, clarify national and
industrial perspectives, and lead to the sharing of ideas on how to improve the domestic and
global management of cyberspace.
29
U.S.-China Cybersecurity Cooperation
Appendices
Appendix A: Chinese Perceptions of Internet Information Access and Usage
When CNCERT Director General Huang Chengqing was asked about Chinese theft of
U.S. weapons systems blueprints, his response was described in Reuters: “Huang did not deny
the report, but suggested that if the U.S. government wants to keep weapons programs secure, it
should not allow them to be accessed online. “Even following the general principle of secretkeeping, it should not have been linked to the Internet,” Huang said.”58
30
U.S.-China Cybersecurity Cooperation
Appendix B: List of Experts Interviewed
Interviewee
Title
Organization
Hartnett, Daniel
Research Scientist, China
Division
Center for Naval Analyses
Kramek, Joseph**
Commander, United States Coast
Guard
U.S. Coast Guard, Vice
Congressional Affairs
Nathan, Andrew
Class of 1919 Professor of
Political Science
Columbia University
Schimmeck, Karl
Vice President of Financial
Services Operations
Schneider, Roxane
Program Manager, Fraud
Reduction
Securities Industry and
Financial Markets
Association (SIFMA)
Financial Services
Roundtable
Schutzer, Daniel
Chief Technology Officer
Financial Services
Roundtable
Studeman, Michael**
Captain, United States Navy
Chief of Naval Operations
Staff
Swaine, Michael
Senior Associate
Carnegie Endowment for
International Peace
Tishuk, Brian
Executive Director
Chicago First
Wagner, Abraham
Adjunct Professor
Columbia University School
of International and Public
Affairs
** CDR Kramek and CAPT Studeman were interviewed in their capacity as private citizens with
experience in maritime security and cyber issues. Their views are their own and do not represent
that of the United States Government.
Note: Four interviewees expressed a desire to remain anonymous, and we have omitted their
names from the report.
31
U.S.-China Cybersecurity Cooperation
Authors’ Contact Information
Ian Adelson
Mellissa
Ahmed
Vivian Coyne
Han Lim
Zhifan Jia
L.C. Paisley
Kim Truong
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
32
U.S.-China Cybersecurity Cooperation
Endnotes
“China and Cybersecurity: Political, Economic, and Strategic Dimensions: Report from Workshops held
at the University of California, San Diego,” Institute on Global Conflict and Cooperation (IGCC),
April 2012.
2
“China’s Policy Paper on the EU:Deepen the China-EU Comprehensive Strategic Partnership for
Mutual Benefit and Win-win Cooperation.” Xinhua, 2 April 2014.
3
IGCC, 16.
4
“Disruptive Civil Technologies-Six Technologies with potential impacts on US interests Out to 2025,”
National Intelligence Council, April 2008.
5
Eric Chabrow, “Gauging ‘Internet of Things’ Risk,” GovInfoSecurity, February 7, 2014.
6
“The Internet of Things: New Threats Emerge in a Connected World,” Symantec Analyst Relations,
January 23, 2014.
7
Internet Security Issue, Korea Internet & Security Agency, September 2012.
8
Cyber Security Issue, Korea Internet & Security Agency, February 2014.
9
“China’s Policy Paper on the EU”
10
Need citation and precise language.
11
IGCC, 2.
12
IGCC, 4.
13
“About us,” CNCERT, 2013.
14
“JOINT STATEMENT BY CNCERT/CC, JPCERT/CC and KrCERT/CC on The First China-JapanKorea CSIRT Annual Meeting for Cybersecurity Incident Response,” CNCERT/CC, JPCERT/CC and
KrCERT/CC, 9 August 2013.
15
“Hack attacks mainly come from US IPs: CNCERT,” Global Times, 8 February 2013.
16
“China is victim of hacking attacks,” China Daily, 5 June 2013.
17
“网络安全工作委员会周勇林:与国外共享经验,”腾讯科技, 24 July 2011.
18
Ibid.
19
“周勇林:2011 年我国被篡改网站数量超 3.6 万个,”搜狐 IT, 20 March 2012.
20
Adam Segal, “China’s New Small Leading Group on Cybersecurity and Internet Management,”
Council on Foreign Relations, 27 February 2014.
21
IGCC, 2.
22
IGCC, 5.
23
IGCC, 5.
24
Dune Lawrence, “FBI Teams with China to Nab Alleged Hackers,” Bloomberg Businessweek, January
27, 2014.
25
“With phony bank scheme, fake products in China reach new heights,” The Associated Press, June 18,
2012.
26
Barnum, Sean. Standardizing Cyber Threat Intelligence Information with the Structured Threat
Information eXpression (STIX). The MITRE Corporation. 20 Feb. 2014
27
“APCERT Embarks on Global Coordination to Counter Cyber-Ops,” Asia Pacific Computer
Emergency Response Team, February 19, 2014.
28
“Locked Shields,” NATO Cooperative Cyber Defense Centre of Excellence.
29
Richards, Jason. "Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National
Security." International Affairs Review. The Elliott School of International Affairs, The George
Washington University, n.d. Web. 02 Apr. 2014.
30
Wang, Jingqiong. "Internet Policing Hinges on Transnational Cyber Crime."Internet Policing Hinges
on Transnational Cyber Crime. China Daily, 10 Nov. 2010. Web. 03 Apr. 2014.
31
Apps, Peter. "DDoS Cyber Attacks Get Bigger, Smarter, More Damaging."Reuters. Thomson Reuters,
05 Mar. 2014. Web. 03 Apr. 2014.
32
Wang.
1
33
U.S.-China Cybersecurity Cooperation
33
Hanemann, Thilo, and Daniel H. Rosen. San Francisco, CA: Asia Society and Rhodium Group, Apr.
2014. PDF.
34
Holland, Steve, and Jeff Mason. "Obama, China's Xi Pledge Cooperation and Joke about First Lady."
Reuters. Thomson Reuters, 24 Mar. 2014. Web. 03 Apr. 2014.
35
Reed, Stanley. "The World's Most Influential Companies." Businessweek.com. Bloomberg, n.d. Web.
03 Apr. 2014.
36
Herzog, Stephen. "Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational
Responses." Journal of Strategic Security 4, no. 2 (2011): 49-60
37
Kash, Wyatt. "Lessons from the Cyber attacks on Estonia." GCN, 13 June 2008. Web. 03 Apr. 2014.
38
Herzog.
39
"Full Text of China's Policy Paper on the EU - Xinhua." English.news.cn. N.p., 4 Apr. 2014. Web. 06
Apr. 2014.
40
Zhang, Hong. "China to Work with EU on Cybersecurity as Xi Wraps up Europe Tour." South China
Morning Post, 4 Apr. 2014. Web. 6 Apr. 2014.
41
Ellen Nakashima, “U.S. rallied 120 nations in response to 2012 cyber attack on American banks.”
Washington Post, April 11, 2014.
42
“Cyber-crime, securities markets and systemic risk,” Joint Staff Working Paper of the IOSCO Research
Department and World Federation of Exchanges, July 2013.
43
“Cyber attack hits South Korean banks, TV networks.” Associated Press, March 20, 2013
44
Michael Kelley, “Operation High Roller,” Business Insider, June 28, 2012l
45
Yao-Chung Chang, “Cyber crime in the Greater China Region,” Edward Elgar Publishing, Jan 1, 2012.
46
"World Shipping Council - Partners in Trade." Top 50 World Container Ports. World Shipping
Council, 19 Aug. 2014. Web. 12 Feb. 2014.
47
"Foreign Trade." U.S. Trade with China.U.S. Census Bureau, n.d. Web. 12 Feb. 2014.
48
Dunn, John E. "Hackers Planted Remote Devices to Smuggle Drugs through Antwerp Port, Europol
Reveals." TechWorld RSS.Techworld, 16 Oct. 2013. Web. 14 Feb. 2014.
49
Kramek, Joseph. "The Critical Infrastructure Gap: U.S. Port Facilities and Cyber Vulnerabilities." The
Brookings Institution. Brookings, July 2013. Web. 14 Feb. 2014.
50
"China 'biggest Victim' of Cyber Attacks." People's Daily Online. People's Daily, 25 Oct. 2010. Web.
30 Mar. 2014.
51
Phone interview with Daniel Hartnett, Research Scientist in the China Studies Division, Center for
Naval Analyses, 28 Mar. 2014.
52
Liu, Kexin. “Wising Up: Smart Grid as New Opening for U.S. China Energy Cooperation.” China
Environment Forum, Woodrow Wilson Center for International Scholars. Web. Aug. 2009.
53
“The Hague Nuclear Security Summit Communiqué.” The European Union Council, Nuclear Security
Summit 2014, The Hague. 8193/14. Web. 25 Mar. 2014.
54
Yu, Lintao. “Nuclear Philosophy.” Beijing Review, No. 14 3 April 2014. Web. 31 March 2014.
55
“China-U.S. Nuclear Security Center Opens Next Year.” CCTV. Web. 24 Mar. 2014.
56
“U.S., China Sign Agreement to Establish Center of Excellence on Nuclear Security.” Press Release,
National Nuclear Security Administration. 19 Jan 2011. Web. 30 Mar. 2014.
57
Ibid.
58
“China has 'mountains of data' about U.S. cyber attacks: official.” Reuters, 5 Jun 2013, Beijing. Web.
25 Mar. 2014.
34