China says no cyber warfare with U.S.


There is no cyber warfare taking place between China and the United States, a senior Chinese official said after weeks of friction over accusations that China may have launched a string of Internet hacking attacks.

The two countries might suffer from cyber attacks, but they were in no way directed by either government, Vice Foreign Minister Cui Tiankai told a small group of foreign reporters ahead of a meeting with U.S. officials in Hawaii this weekend.
“I want to clear something up: there are no contradictions between China and the United States” on the issue of hacking, Cui said, Reuters reports.
“Though hackers attack the U.S. Internet and China’s Internet, I believe they do not represent any country,” he added.

Both countries were in fact already discussing the problem of hacking during their regular strategic consultations, Cui said.
“The international community ought to come up with some rules to prevent this misuse of advanced technology,” he added.

State Department spokesman Mark Toner declined to comment on Cui’s cyber-war comments, but said the inaugural U.S.-China Asia-Pacific Consultations in Honolulu had a general regional focus and no particular cyber warfare agenda.
“My understanding is that it is about the Asia-Pacific region, writ large,” he said in Washington. Kurt Campbell, the assistant secretary of state for East Asian and Pacific affairs, would be Cui’s counterpart in the talks, he said.

The accusations against China have centred on an intrusion into the security networks of Lockheed Martin Corp and other U.S. military contractors, as well as efforts to gain access to the Google email accounts of U.S. officials and Chinese human rights advocates.

China has vociferously denied having anything to do with hacking attacks, saying it too is a major victim.
“Internet security is an issue for all countries, and it is a most pressing matter,” Cui said.
“Of course, every country has different abilities when it comes to this problem,” he added.
“The United States is the most advanced country in the world when it comes to this technology, and we hope they can step up communication and cooperation on this with other countries. We also hope this advanced technology is not used for destructive purposes.”

The Internet has become a major bone of contention between Washington and Beijing.

This month, Defense Secretary Robert Gates said Washington was seriously concerned about cyber attacks and was prepared to use force against those it considered an act of war.

The latest friction over hacking could bring Internet policy back to the foreground of U.S.-China relations, reprising tension from last year when the Obama administration took up Google’s complaints about hacking and censorship from China.

Google partly pulled out of China after that dispute. Since then, it has lost more share to rival Baidu Inc in China’s Internet market.

China, with more than 450 million Internet users, exercises tight control and censorship over the Web at home, and has strengthened its grip in recent months.

In February, overseas Chinese websites, inspired by anti-authoritarian uprisings across the Arab world, called for protests across China, raising Beijing’s alarm about dissent and prompting tightened restrictions over the Internet.

China already blocks major foreign social websites such as Facebook and Twitter.

Commerce Secretary Gary Locke, named by President Barack Obama as the next U.S. ambassador to China, said last week that the United States was looking into ways to craft trade countermeasures that treat curbs on Internet commerce as non-tariff barriers to trade.The recent spate of cyber attacks have raised questions about the security of government and corporate computer systems, and the ability of law enforcement to track down hackers.

Here’s a breakdown of the different types of cyber assaults, from “hactivists” to serious criminals.


The Lulz Security and Anonymous groups have broken into computer servers to steal data that they publish on the Internet to embarrass their targets. Examples of this include LulzSec hacking into Fox TV’s “X Factor” contestant database, or breaking into FBI affiliate Infraguard and publishing its user base, Reuters reorts.

So-called hactivists also use distributed denial of service attacks, in which they get supporters to crash the websites of their targets by overwhelming the servers with traffic. The Anonymous group launched DOS attacks against Visa and MasterCard because the group thought the companies were hostile to Wikileaks and its founder Julian Assange.


Primarily based on getting financial information, such as payment card data or bank account details, perpetrators tend to keep their attacks secret because the data is more valuable if victims do not know it has been stolen.

Citigroup (C.N) disclosed that unknown hackers in May had stolen information from 360,083 credit card accounts in North America, in what was the most significant known direct assault on a financial institution.

These attacks can come from just about anywhere, although Western security experts have said that Russia and China deliberately turn a blind eye to this kind of activity from within their borders, provided it is not targeted domestically.


Hacking by governments or state-sponsored groups is usually aimed at stealing classified information, such as military secrets or other prized data. Security experts have cited attacks on the International Monetary Fund and Google Inc’s email service as recent examples.

There is often finger-pointing at Russia and China after such attacks, although experts suspect other nations including the United States of using this technique more quietly.

There are also occasional suspected state-backed DDOS attacks, such as on Estonia and Georgia in 2007.


These are cyber attacks aimed at causing actual physical damage, such as by hacking into industrial computer controls to destroy military assets or public infrastructure.

The Stuxnet virus, which Iran has said was used to attack computers at its Bushehr nuclear reactor, is the only case so far that security experts widely agree fits into this category.