• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Cybersecurity

Stealing back the story line on China cyber theft

By
Nina Easton
Nina Easton
Down Arrow Button Icon
By
Nina Easton
Nina Easton
Down Arrow Button Icon
July 7, 2014, 7:00 AM ET
Technology
contract Armin Harris. Kyle Bean for FortuneKyle Bean for Fortune

Propaganda is a time-honored weapon in the conduct of warfare—a truism that China’s leaders have shown they fully appreciate in the ongoing cyber cold war with the U.S.

In the 18 months since American security expert Kevin Mandia publicly fingered a Chinese military unit hacking into the trade secrets of Fortune 1,000 companies, China has effectively turned the tables, lobbing cyber accusations back at Washington. Beijing’s timely—and incredibly effective—ally: Edward Snowden.

“We had been talking about this mass scale of Chinese theft—by some measures the largest theft in all of human history—ranging from sophisticated jet fighter blueprints to soft drink companies negotiating strategies,” notes Peter Singer, author of Cybersecurity and Cyberwar: What Everyone Needs to Know. “This was going to be a major part of the agenda with China. We were laying the groundwork, trying to cajole them and convince them. Along comes Mr. Snowden, and the legs are kicked out from under that narrative.”

Beijing not only trumpets Snowden’s revelations of NSA spying, but is now accusing U.S. tech companies of stealing from and spying on Chinese customers. Google’s efforts to end-run China’s censors have only further inflamed a state-controlled media on the frontlines of this war of words.

Despite a muddled narrative, Chinese cyber theft of trade secrets continues on a grand scale, says Mandia, the executive who released last year’s report documenting cyber attacks by a Shanghai-based military unit. Mandia, who has been investigating foreign hacking since 1997, has come to believe that an entrenched cultural divide stands in the way of any diplomatic progress to control Chinese hacking. While Americans argue that the NSA spies for national security, not commercial theft, the Chinese “think hacking is hacking, regardless of motivation,” says FireEye chief operating officer Mandia, who shared his exclusive story with Fortune last year.

In May, the Obama administration tried to regain the upper hand in the propaganda war with the Justice Department’s grand jury indictment of five Chinese military hackers. While the indictments won’t go anywhere—the men are in China—the effort helps the U.S. build a case should it decide to sharply escalate the conflict by going to a court that Beijing actually cares about: the World Trade Organization. Meanwhile, America’s new ambassador to China, Max Baucus, has publicly warned Beijing that the U.S. won’t stand by while “state actors” commit cyber theft.

So where does that leave companies here and abroad? Sadly, diplomacy is a slow and uneven slog. Unless China can be convinced there is a painful price to pay in the long run, companies in the U.S., Europe, India, and elsewhere remain exposed.

Now is the time to consider ways to help the private sector develop more robust defenses. In today’s environment, executives are reluctant to share information after cyber attacks occur. Therefore, as Mandia often says, “no one gets smarter.”

EAS.07.21.14[1]
Graphic Source: Verizon
CYBER THEFT ON THE RISE Until China feels there’s a price to pay for cyber theft in the long run, companies in the U.S. and elsewhere remain exposed.

Singer proposes an approach like that of the government-backed Centers for Disease Control and Prevention—where anonymous data provided by the private sector is deployed on behalf of public health (or in this case, cyber health). “We need a trusted clearinghouse that examines trends, threats, overall ecosystems,” he says.

Costly cyber theft, of course, goes beyond China. Hackers out of Russia staged the largest retail hack in history, stealing 40 million credit card numbers from Target. Retailers like Neiman Marcus had their own costly episodes last year.

Chinese hackers typically don’t steal directly from customers. That’s a signature Russian heist. Neither do they destroy computers or files. You won’t see angry customers boycotting or suing because their credit cards were hacked. Chinese commercial espionage is quieter—but just as nefarious. Which is why we need to get beyond Snowden and make a vigorous case against Chinese cyber theft, even as companies bolster their defenses. Says Singer: “We have to find our narrative. We have to get our moxie back.”

This story is from the July 21, 2014 issue of  Fortune.

About the Author
By Nina Easton
See full bioRight Arrow Button Icon

Latest in International

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Most Popular

California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
North America
California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
By Sasha RogelbergMay 7, 2026
2 days ago
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
Magazine
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
By Sharon GoldmanMay 6, 2026
3 days ago
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
Arts & Entertainment
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
By Dave Lozo and Morning BrewMay 7, 2026
2 days ago
Current price of oil as of May 8, 2026
Personal Finance
Current price of oil as of May 8, 2026
By Joseph HostetlerMay 8, 2026
1 day ago
The CEO of Maersk, which ships 14% of everything you buy, said the Iran war is adding $500 million in monthly costs it's trying not to pass down
Energy
The CEO of Maersk, which ships 14% of everything you buy, said the Iran war is adding $500 million in monthly costs it's trying not to pass down
By Sasha RogelbergMay 8, 2026
24 hours ago
Airbnb CEO Brian Chesky warns two types of people won’t survive the AI era: ‘pure people managers’ and workers who resist change
Success
Airbnb CEO Brian Chesky warns two types of people won’t survive the AI era: ‘pure people managers’ and workers who resist change
By Emma BurleighMay 7, 2026
2 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.