Hostname: page-component-586b7cd67f-l7hp2 Total loading time: 0 Render date: 2024-11-27T02:03:58.963Z Has data issue: false hasContentIssue false

Mounting U.S. Government Concern over Attacks on Private and Government Computer Networks Originating in China

Published online by Cambridge University Press:  20 January 2017

Abstract

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Contemporary Practice of the United States Relating to International Law
Copyright
Copyright © American Society of International Law 2013

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 See Crook, John R., Contemporary Practice of the United States, 107 AJIL 431, 447 (2013)Google Scholar; Ellen Nakashima, Pentagon Plans to Add 13 Offensive Teams to Combat Online Threat , Wash. Post, Mar. 13, 2013, at A2; Craig Timberg, Report: China Is Top Source of Cyber-spying, Wash. Post, Apr. 23, 2013, at A12; David E. Sanger & Nicole Perlroth, Chinese Hackers Resume Attacks on U.S. Targets, N.Y. Times, May 20, 2013, at A1.

2 Jane Perlez, U.S. Treasury Secretary and China’s President Meet, N.Y. Times, Mar. 20, 2013, at A6; William Wan, U.S. Presses China on Breaches, Wash. Post, Mar. 21, 2013, at A10; William Wan, U.S. Pushes China on Internet Matters, Wash. Post, Apr. 10, 2013, at A6; Ernesto Londoño, Hagel Chides China for Cyberspying, Which Draws Rebuke from a General, Wash. Post, June 2, 2013, at A15.

3 Philip Rucker, Obama Warns Xi on Continued Cybertheft, Wash. Post, June 9, 2013, at A5.

4 U.S. National Security Adviser Thomas Donilon, Address to the Asia Society in New York: The United States and the Asia-Pacific in 2013 (Mar. 11, 2013), available at http://asiasociety.org/new-york/complete-transcript-thomas-donilon-asia-society-new-york [hereinafter Donilon Address]; see also Mark Landler & David E. Sanger, U.S. Demands Chinese Block Cyberattacks, N.Y. Times, Mar. 12, 2013, at A1; Ellen Nakashima, U.S. to China: Stop Corporate Spying, Wash. Post, Mar. 12, 2013, at A3.

5 Donilon Address, supra note 4.

6 Ellen Nakashima, Key U.S. Weapon Designs Hacked, Wash. Post, May 28, 2013, at A1.

7 David E. Sanger, China’s Military Is Accused by U.S. in Cyberattacks, N.Y. Times, May 7, 2013, at A1; Ernesto Londoño, Pentagon Accuses China of Hacking, Wash. Post, May 7, 2013, at A6; Editorial, China and Cyberwar, N.Y. Times, May 8, 2013, at A22.

8 Office of the Secretary of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2013, at 36–37 (2013), available at http://www.defense.gov/pubs/2013_China_Report_FINAL.pdf.

9 See Landler & Sanger, supra note 4; Keith Bradsher, China Blasts Hacking Claim by Pentagon, N.Y. Times, May 8, 2013, at A8; William Wan, China Says It Has No Need to Steal U.S. Military Technology, Wash. Post, May 31, 2013, at A8; Londoño, supra note 2.