Abstract
In 2010 economic cyber-espionage emerged as a top national security threat for the US government. Analysis suggests that the government’s swift mobilization of resources to block the problem stems from a major event in January 2010: Google’s announcement that hackers in China had penetrated its computer systems. Following that incident, the government’s threat perception of economic cyber-espionage changed and led to new efforts to counter the problem. This argument is substantiated in two main steps. In step one, it is shown how the American government conceptualized the threat of economic cyber-espionage before and after the announcement. In step two, we trace how this perception-shift led to a series of countermeasures. During both steps, we adopt an analytical framework called threat politics, which maintains that influential actors in and around government play a crucial role in convincing key policymakers how to perceive and respond to threats.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Cornell University Law School’s definition of “economic espionage” refers to the practice generally, not necessarily online or offline.
- 2.
This chapter was written in October 2012.
References
Aftergood, S. (2010, March 3). White house offers glimpse of cybersecurity program. Secrecy news. Retrieved 20 Oct 2011 from http://www.fas.org/blog/secrecy/2010/03/wh_cyber.html
Anderlini, J., Marsh, P., Reed, J., Menn, J., Hollinger, P., Schäfer, D. (2011, Feb 1). Industrial espionage: Data out of the door. Financial times. Retrieved 20 Oct 2011 from http://www.ft.com/intl/cms/s/0/ba6c82c0-2e44-11e0-8733-00144feabdc0.html#axzz1ThWqmEDe
Aradau, C. (2001). Migration: The spiral of (In)security. Rubikon March 2001. Retrieved 20 Oct 2011 from http://web.archive.org/web/20070403192142/http://venus.ci.uw.edu.pl/~rubikon/forum/claudia1.htm#_ftnref12
BBC (2010, Jan 21). Hillary Clinton calls on China to probe Google attack. Retrieved 20 Oct 2011 from http://news.bbc.co.uk/2/hi/8472683.stm
Bendrath, R. (2001). The Cyberwar debate: Perception and politics in US critical infrastructure protection. Information and Security: An International Journal, 7(2001), 80–103.
Benford, R. D., & Snow, D. A. (2000). Framing processes and social movements: An overview and assessment. Annual Review of Sociology, 26(2000), 611–639.
Burns, A. (2010, Jan 14). Clinton weighs in on Google-China clash. Politico. Retrieved 20 Oct 2011 from http://www.politico.com/news/stories/0110/31483.html
Burstein, A. (2009). Trade secrecy as an instrument of national security? Rethinking the foundations of economic espionage. Arizona State Law Journal, 41, 937–938.
Bush, G. H. W. (1992). National policy for the security of national security telecommunications and information systems. Federation of American scientists. Retrieved 20 Oct 2011 from http://www.fas.org/irp/offdocs/nsd/nsd_42.htm
Bush, G. W. (2002). National strategy for homeland security. Washington DC: US Government Publishing Office.
Bush, G. W. (2003a). National strategy for physical protection of critical infrastructure and key assets. Washington DC: US Government Publishing Office.
Bush, G. W. (2003b). National strategy to secure cyberspace. Washington DC: US Government Publishing Office.
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Rienner.
Carter, J. (1977). Presidential directive 16 Dec 1977. Federation of American scientists. Retrieved 20 Oct 2011 from http://www.fas.org/irp/offdocs/pd/index.html
Cavelty, M. D. (2008). Cyber-security and threat politics: US efforts to secure the information age. New York: Routledge.
Cha, A. E., Nakashima, E. (2010, Jan 14). Google China Cyberattack part of vast espionage campaign, Experts say. Washington post. Retrieved 20 Oct 2011 from http://www.washingtonpost.com/wp-dyn/content/article/2010/01/13/AR2010011300359.html
Chong, D., & Druckman, J. N. (2007). Framing Theory. Annual Review of Political Science, 10(2007), 103–126.
Clarke, R. A. (2012, April 2). How China steals our secrets. New York Times. Retrieved 20 Oct 2011 from http://www.nytimes.com/2012/04/03/opinion/how-china-steals-our-secrets.html?ref=computersecurity
Clinton, H. (2010). Speech on internet freedom. Washington DC, 21 January 2010. Retrieved 20 Oct 2011 from http://www.state.gov/secretary/rm/2010/01/135519.htm
Clinton, W. (2000). Defending America’s cyberspace—national plan for information systems protection. Washington DC: US Government Publishing Office.
Cohen, M. D., March, J. G., & Olsen, J. P. (1972). A garbage can model of organizational choice. Administrative Science Quarterly, 17(1972), 1–25.
Cornell University Law School (2012). Economic espionage, Legal Information Institute. Retrieved 21 Oct 2012 from http://www.law.cornell.edu/wex/economic_espionage
CSIS (2011). Cybersecurity commission members. Retrieved 21 Oct 2012 from http://csis.org/node/30500
Damballa, (2011). Advanced persistent threats (APT). Accessed 21 Oct 2012. http://www.damballa.com/knowledge/advanced-persistent-threats.php
Drummond, D. (2010a, Jan 12). A new approach to China. Official Google blog. Accessed 21 Oct 2012. http://googleblog.blogspot.com/2010/01/new-approach-to-china.html
Drummond, D. (2010b, March 22). A New Approach to China: An update. Official Google blog. Accessed 21 Oct 2012. http://googleblog.blogspot.com/2010/03/new-approach-to-china-update.html
Durant, R. F., & Diehl, P. F. (1989). Agendas, alternatives, and public policy: Lessons from the U.S. foreign policy Arena. Journal of Public Policy, 9(2), 179–205.
Eriksson, J. (2001). Cyberplagues, IT, and security: Threat politics in the information age. Journal of Contingencies and Crisis Management, 9(4), 200–210.
Fialka, J. J. (1996). Stealing the spark: Why economic espionage works in America. The Washington Quarterly, 4(10), 172–189.
George, A. L., & Bennett, A. (2005). Case studies and theory development in the social sciences. Cambridge: MIT Press.
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly, 53(4), 1155–1175.
Jacobs, A. (2011, Feb 17), China assails New US policy on internet freedom. The New York Times. Accessed 21 Oct 2012. http://www.nytimes.com/2011/02/18/world/asia/18beijing.html
Jenkins, J. P. (2011) Oklahoma city bombing. encyclopedia britannica. Accessed 21 Oct 2012. http://www.britannica.com/EBchecked/topic/735994/Oklahoma-City-bombing
Kurtz, G. (2010, Jan 14). Operation “Aurora” Hit Google, others. McAfee, Blog central. Accessed 21 Oct 2012. http://blogs.mcafee.com/corporate/cto/operation-%E2%80%9Caurora%E2%80%9D-hit-google-others
Larson, C. (2010, Sep 7). State department innovator goes to Google. Foreign policy. Accessed 21 Oct 2012. http://www.foreignpolicy.com/articles/2010/09/07/jared_cohen?page=0,0
Lewis, J. A., Langevin, J. R., McCaul, M. T., & Raduege, H. (2011). Cybersecurity two years later. Washington DC: CSIS.
Lewis, J. A. (2011, June 21). Significant cyber incidents since 2006. CSIS. Accessed 21 Oct 2012. http://csis.org/publication/cyber-events-2006
Lewis, J. A., Langevin, J. R., McCaul, M. T., Charney, S., & Raduege, H. (2008). Securing cyberspace for the 44th presidency. Washington DC: CSIS.
Lubman, S. (2011, July 22). Changes to China’s “Indigenous Innovation” policy: Don’t get Too excited. Wall Street Journal. Accessed 21 Oct 2012. http://blogs.wsj.com/chinarealtime/2011/07/22/changes-to-chinas-indigenous-innovation-policy-dont-get-too-excited/?mod=google_news_blog
Lynn, W. J. (2010). Defending the new domain. Foreign affairs September/October.
MacLeod, C. (2011, April 28). US and China miles apart on human rights. USA today. Accessed 21 Oct 2012. http://www.usatoday.com/news/world/2011-04-29-china-human-rights-dissidents-talks_n.htm
Mandiant, (2011) Advanced persistent threat. Accessed 21 Oct 2012. http://www.mandiant.com/services/advanced_persistent_threat/
Markoff, J. (2010, Feb 4). Google asks spy agency for help with inquiry into Cyberattacks. The New York Times. Accessed 21 Oct 2012. http://www.nytimes.com/2010/02/05/science/05google.html
Markoff, J., Barboza, D. (2010, Feb 18). 2 China schools said to be tied to online attacks. The New York Times. Accessed 21 Oct 2012. http://www.nytimes.com/2010/02/19/technology/19china.html
McAfee. (2010). Protecting your critical assets—Lessons learned from “Operation Aurora.” White Paper, McAfee Labs and McAfee Foundstone Professional Services.
Nakashima, E. (2008, Jan 26). Bush order expands network monitoring.Washington Post. Accessed 21 Oct 2012. http://www.washingtonpost.com/wp-dyn/content/article/2008/01/25/AR2008012503261.html
Nakashima, E. (2010, Feb 4). Google to enlist NSA to help it ward off cyberattacks. Washington Post. Accessed 21 Oct 2012. http://www.washingtonpost.com/wp-dyn/content/article/2010/02/03/AR2010020304057.html
Obama, B. (2009). Cyberspace policy review. Washington DC: US Government Publishing Office.
Obama, B. (2010). 2010 joint strategic plan on intellectual property enforcement. Washington DC: US Government Publishing Office.
Obama, B. (2011a). Administration’s white paper on intellectual property enforcement. Washington DC: US Government Publishing Office.
Obama, B. (2011b). International strategy for cyberspace—prosperity, security, and openness in a networked world. Washington DC: US Government Printing Office.
Office of the National Counterintelligence Executive. (2011). Foreign spies stealing US economic secrets in cyberspace. Washington DC: US Government Printing Office.
Palmer, D. (2010, May 12). US to press China on indigenous innovation. Reuters. Accessed 21 Oct 2012. http://www.reuters.com/article/2010/05/12/us-usa-china-trade-idUSTRE64B52A20100512
Perlroth, N. (2012, Feb 14). How much have foreign Hackers Stolen? The New York Times. Accessed 21 Oct 2012. http://bits.blogs.nytimes.com/2012/02/14/how-much-have-foreign-hackers-stolen/?ref=computersecurity
Reagan, R. (1984). National security decision directive number 145. Federation of American scientists. Accessed 21 Oct 2012. http://www.fas.org/irp/offdocs/nsdd145.htm
Rogers, M. (2011). Opening statement, cyber threats and ongoing efforts to protect the nation, US house of representatives permanent select committee on intelligence, 3 Oct 2011.
Rohrabacher, D. (2011). Opening statement, communist Chinese cyber-attacks, cyber-espionage and theft of American technology, House committee on foreign affairs, 15 April 2011.
Ruggie, J. G. (1998). What makes the world hang together? Neo-utilitarianism and the social constructivist challenge. International Organization, 52(4), 855–885.
Sanger, D.E., Markoff, J. (2009, May 29). Obama outlines coordinated cyber-security plan. The New York Times. Accessed 21 Oct 2012. http://www.nytimes.com/2009/05/30/us/politics/30cyber.html
Segal, Adam. (2012). Chinese computer games. Foreign affairs March/April, 2012, 14–20.
Segal, A. (2011, June 21). The role of cybersecurity in US-China relations. East Asia Forum. Accessed 21 Oct 2012. http://www.eastasiaforum.org/2011/06/21/the-role-of-cyber-security-in-us-china-relations/
Senate Armed Services Committee (2008). Report 110-335, National Defense Authorization act for Fiscal Year 2009. Washington DC.
Shanker, T. (2011, Nov 3). US report accuses China and Russia of internet spying. The New York Times. Accessed 21 Oct 2012. http://www.nytimes.com/2011/11/04/world/us-report-accuses-china-and-russia-of-internet-spying.html?_r=1&ref=computersecurity
Smith, J. (2011, June 8). Commerce department calls for voluntary Cybersecurity codes. National Journal. Accessed 20 Oct 2012. http://www.nationaljournal.com/tech/commerce-department-calls-for-voluntary-cybersecurity-codes-20110608
Snyder, W. (2010, Oct 14). Richard clarke again calls for imputed responsibility and a new protocol for the internet. Crossroads. Accessed 21 Oct 2012. http://blog.cybersecuritylaw.us/2010/10/14/richard-clarke-again-calls-for-imputed-responsibility-and-a-new-protocol-for-the-internet-the-regist/
Soroka, S. (1999). Policy agenda-setting theory revisited: A critique of Howlett on downs, baumgartner and Jones, and Kingdon. Canadian Journal of Political Science, 32(4), 763–772.
US-China Economic and Security Review Commission (2010). 2010 Report to Congress. Washington DC.
US Department of Commerce. (2011a). Cybersecurity. Washington, DC: Innovation and the internet Economy.
US Department of Commerce (2011b). Press release: Commerce department proposes new policy framework to strengthen cybersecurity protections for businesses online. Washington DC, 8 June 2011.
US Department of Homeland Security (2011). Critical infrastructure structures. department of homeland security. Accessed 21 Oct 2012. http://www.dhs.gov/critical-infrastructure-sectors
US Department of Justice (1999) Critical infrastructure protection. Accessed 13 Aug 2011. http://www.justice.gov/criminal/cybercrime/critinfr.htm#Vc
US Department of State (2011) Internet freedom. Accessed 27 July 2011. http://www.state.gov/e/eeb/cip/netfreedom/index.htm
US House (2012). HR 6029: Foreign and economic espionage penalty enhancement Act of 2012. GovTrack.us. Accessed 20 Oct 2012. http://www.govtrack.us/congress/bills/112/hr6029
US International Trade Commission. (2011). China: effects of intellectual property infringement and indigenous innovation policies on the US economy. DC: Washington.
US National Security Council (2010). The comprehensive national cybersecurity initiative.” whitehouse.gov. Accessed 21 Oct 2012. http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative
US Senate (1996). Report 104-359: The industrial espionage Act of 1996. Accessed 21 Oct 2012. http://www.fas.org/irp/congress/1996_rpt/s104359.htm
US Senate (2011). S678: Economic espionage penalty enhancement Act 2011. GovTrack.us. Accessed 21 Oct 2012. http://www.govtrack.us/congress/bills/112/s678
van Munster, R. (2007). Security on a shoestring: A Hitchhiker’s guide to critical schools of security in Europe. Cooperation and Conflict: Journal of the Nordic International Studies Association, 42(2), 235–243.
Vijayan, J. (2010, March 2). Obama administration partially lifts secrecy on classified cybersecurity project. Computerworld. Accessed 21 Oct 2012. http://www.computerworld.com/s/article/9164818/Obama_administration_partially_lifts_secrecy_on_classified_cybersecurity_project
Wæver, O. (2004). Aberystwyth, Paris, Copenhagen: New schools in security theory and their origins between core and periphery. Montreal, 17–29 March 2004
Wæver, O. (1995). Securitization and desecuritization. In R. Lipshutz (Ed.), On security. New York: Columbia University Press.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Read, O. (2014). How the 2010 Attack on Google Changed the US Government’s Threat Perception of Economic Cyber Espionage. In: Kremer, JF., Müller, B. (eds) Cyberspace and International Relations. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37481-4_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-37481-4_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37480-7
Online ISBN: 978-3-642-37481-4
eBook Packages: Humanities, Social Sciences and LawPolitical Science and International Studies (R0)