What is the best strategy against Chinese cyberattacks?

June 9, 2011

By Ian Bremmer
The views expressed are his own.

All eyes should be peeled on China, but not for the reason you think. While the biggest structural risk right now is global rebalancing, especially between China and the U.S., there is another important threat from China: cyberwars. Cyberattacks are one of the biggest fat tails (along with climate and North Korea).

It’s no surprise that the latest Google hack attack came from China. The presumption is that the vast majority of cyber attacks hitting the U.S. are coming from the Chinese government. It’s very hard to know where threats are originating – country-wise and/or person-wise — because it’s very difficult to go back and figure out the paper trail. But at a minimum, there is an environment in China that tolerates cyber attacks.

Proprietary information around technologies – gaining profit shares, increasing revenues – allows a country to be much more economically competitive. China has leverage because everyone wants to get into China. If you want to make something in their country, you have to share the technology.

The Chinese government can really benefit from having access to proprietary data, whether it’s about Exxon’s oil reserves or pricing of commodities of proprietary technologies, such as American telecommunications. China’s become much more competitive and therefore has become much more of a threat. If it’s using a non-judicious system to gain economic advantage, we need to take that very seriously.

China did something similar with high-speed rail – and that was through legal means. They undermined German and French companies in order to gain access to the technology and they now have built the best high speed rail system. If they can access that kind of information through hacking, that’s going to be seen as a direct threat.

This isn’t to say that the Chinese are evil. Historically, Western institutions invested in China, but then took the money back West. China obviously wants a good chunk of that action.

The question for Western companies and governments is: What is the appropriate way to respond to what is essentially asymmetric warfare? Cyberattacks could start affecting day to day lives of people if, for instance, a company is brought down by it. Those companies employ people and have share prices. They are a big part of American wealth.

There are ways, however, to protect yourself — and your portfolio — against such attacks. Look at companies that are most exposed as cyberattacks like Google, and companies in sectors where the Chinese are trying to gain an advantage – telecommunications, IT firms, commodities.

It’s extremely hard to prepare for the known unknowns until you take them seriously. But you should try to make sure you’re not in a position where you are angering folks connected to the inside of Chinese government, which Google is now learning. Also, you should work closely with home governments, like the NSA in the U.S. You need to share your data with them because you may need political leverage.

Cyber threats are probably going to have to get worse before the issue gets policy traction in Washington, and at that point the U.S. will have to make them a priority. When the U.S. does, it will lead to big tensions. But it’s really important for governments to be transparent, and at least officially committed to the rule of law.

Note: This essay is based on a transcribed interview with Bremmer.


We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. For more information on our comment policy, see http://blogs.reuters.com/fulldisclosure/2010/09/27/toward-a-more-thoughtful-conversation-on-stories/

Nice article, bad headline….. as the question posed, is not addressed in the article…. Is anyone thinking on that end ? ? ?
Get schooled, it’s educational.

Posted by edgyinchina | Report as abusive

[…] And of course, there’s… China. […]

Posted by Could China Be the Culprit, After All? | Wall Street Scanner | Report as abusive

There is another layer below muscle flexing ‘cyber attacks’, of which Mr Bremmer seems unaware.
Following the most successful heist in history: the APT of March 2011 on EMC/RSA Securities, the Chinese have evidently realized that the most vulnerable spot in the financial and military supremacy the West has is located in one, and only one digital processing system. Public Key Encryption.
All this requires to make completely redundant is a non Prime Number based and non random unit combination replacement for the ‘Fundamental Theorem of Arithmetic’. Tall order? Not really.It’s just one of those innate assumptions that rarely gets questioned. If you look at it in detail, and are capable of counting to ten with some degree of mathematical insight, its self evident nonsense. Its only redeeming feature is that nobody has yet provided a replacement. When they do, you’d get a regular unit formation sequence algorithm that… surprise surprise, also forms the essential basis of your ‘quantum computer’program. Numerical formation regularity and exponential processing power increase in one package.
And when might the FTA replacement become available? Ten years time, a century, a month? Maybe.
Or perhaps it already has…

Posted by rhoops | Report as abusive

[…] What is the best strategy against Chinese cyberattacks? | The Great Debate. […]

Posted by What is the best strategy against Chinese cyberattacks? | The Great Debate | changingworlddotorg | Report as abusive

The 1 July 1997 was HongKong SAR independent from UK. We’ll see today with new authority like Donald Tsang and Tung C. Hwa challenge, also Li Ka-Shing’s businesses. Life goes on..

Posted by ABS2204 | Report as abusive

[…] View full post on Global Investing […]

Posted by Law News Asia » Blog Archive » What is the best strategy against Chinese cyberattacks? | Report as abusive

[…] especially between China and the U.S., there is another important threat from China: cyberwars. Global Investing Tags: against, best, Chinese, cyberattacks, […]

Posted by What is the best strategy against Chinese cyberattacks? | Report as abusive

[…] What is the best strategy against Chinese cyberattacks? | The Great … blogs.reuters.com/…/what-is-the-best-str ategy-against-chinese-cyberat… […]

Posted by CHINA » Best In China | Report as abusive

Show some evidence!You are foolish.Here has a chinese proverb to give you this foolish:allow government to fire the residential house but the citizen cann’t light a candle!

Posted by xhzily-koala | Report as abusive