Wednesday, June 29, 2022
No Result
View All Result
  • Media
Support Us
Macdonald-Laurier Institute
  • Home
  • About
    • Who We Are
    • Who Makes MLI Work
    • Tenth Anniversary
    • Jobs
  • Experts
  • Issues
    • Domestic Policy Program
      • Agriculture and Agri-Food
      • Canada’s Political Tradition
      • Economic policy
      • Energy
      • Health Care
      • Justice
      • Social issues
    • Foreign Policy Program
      • Foreign Affairs
      • National Defence
      • National Security
    • Indigenous Affairs Program
  • Projects
    • COVID and after: A mandate for recovery
    • COVID Misery Index
      • Beyond Lockdown
    • Provincial COVID Misery Index
    • Centre for Advancing Canada’s Interests Abroad
      • Dragon at the Door
      • The Eavesdropping Dragon: Huawei
    • An Intellectual Property Strategy for Canada
    • Speak for Ourselves
    • Canada and the Indo-Pacific Initiative
    • DisInfoWatch.org
    • The Transatlantic Program
    • Indigenous Prosperity at a Crossroads
      • Aboriginal Canada and Natural Resources
    • Talkin’ in the Free World with Mariam Memarsadeghi
    • Past Projects
      • Justice Report Card
      • Munk Senior Fellows
      • A Mandate for Canada
      • Confederation Series
      • Fiscal Reform
      • The Canadian Century project
      • Fixing Canadian health care
      • Internal trade
      • From a mandate for change
      • Size of government in Canada
  • Events
    • Upcoming Events
    • Past Events
      • MLI Dinners
      • Great Canadian Debates
  • Latest News
  • Libraries
    • Inside Policy Magazine
      • Inside Policy Back Issues
      • Inside Policy Blog
    • Papers
    • Columns
    • Books
    • Commentary
    • Straight Talk
    • Video
    • Multimedia
    • Podcasts
    • Leading Economic Indicator
    • Labour Market Report
    • MLI in the Media
  • Home
  • About
    • Who We Are
    • Who Makes MLI Work
    • Tenth Anniversary
    • Jobs
  • Experts
  • Issues
    • Domestic Policy Program
      • Agriculture and Agri-Food
      • Canada’s Political Tradition
      • Economic policy
      • Energy
      • Health Care
      • Justice
      • Social issues
    • Foreign Policy Program
      • Foreign Affairs
      • National Defence
      • National Security
    • Indigenous Affairs Program
  • Projects
    • COVID and after: A mandate for recovery
    • COVID Misery Index
      • Beyond Lockdown
    • Provincial COVID Misery Index
    • Centre for Advancing Canada’s Interests Abroad
      • Dragon at the Door
      • The Eavesdropping Dragon: Huawei
    • An Intellectual Property Strategy for Canada
    • Speak for Ourselves
    • Canada and the Indo-Pacific Initiative
    • DisInfoWatch.org
    • The Transatlantic Program
    • Indigenous Prosperity at a Crossroads
      • Aboriginal Canada and Natural Resources
    • Talkin’ in the Free World with Mariam Memarsadeghi
    • Past Projects
      • Justice Report Card
      • Munk Senior Fellows
      • A Mandate for Canada
      • Confederation Series
      • Fiscal Reform
      • The Canadian Century project
      • Fixing Canadian health care
      • Internal trade
      • From a mandate for change
      • Size of government in Canada
  • Events
    • Upcoming Events
    • Past Events
      • MLI Dinners
      • Great Canadian Debates
  • Latest News
  • Libraries
    • Inside Policy Magazine
      • Inside Policy Back Issues
      • Inside Policy Blog
    • Papers
    • Columns
    • Books
    • Commentary
    • Straight Talk
    • Video
    • Multimedia
    • Podcasts
    • Leading Economic Indicator
    • Labour Market Report
    • MLI in the Media
No Result
View All Result
Macdonald-Laurier Institute

The Canada-China Cyber Agreement remains questionable: David Swan for Inside Policy

December 8, 2017
in Centre for Advancing Canada's Interests Abroad, Columns, Dragon at the Door, Foreign Affairs, Foreign Policy Program, In the Media, Indo-Pacific, Inside Policy, Latest News
Reading Time: 5 mins read
A A

The Canada-China cyber agreement has little apparent “upside” to Canada, writes David Swan. China is unlikely to change its approach to hacking or intellectual property, so more cyber attacks should be expected.

By David Swan, Dec. 8, 2017

In June 2017, Canada and the People’s Republic of China (PRC) signed their first ever cyber agreement, which stipulated that neither government would support or sponsor the theft of intellectual property (IP). This would be a worthy agreement IF both countries meant what they said. A review of China’s history of hacking in Canada, its infrastructure to undertake such activities, and the PRC’s lack of treaty compliance, suggests this is an agreement of little value.

Many Canadians are unaware of the extent of Chinese hacks and hacking campaigns against Canada. Canadian businesses have been targeted and in some cases destroyed, while intellectual property and trade secrets were laundered in China.  Here are a few examples of Chinese cyber campaigns:

Campaign Description
NORTEL NORTEL’s networks were hacked for up to ten years before the company’s demise in 2009.
Potash Industry In 2011-2012, the PRC invested heavily in acquiring potash for fertilizer production. Hacking targets included potash producers, such as Saskatchewan’s Potash corporation, the federal government and even Bay Street law firms. It was estimated that more than 250 organizations were hacked in the campaign.
National Research Council In 2014, Canada’s premier research and development network, the National Research Council, was hacked. The breach was attributed to the government of the PRC. The cost was estimated at “hundreds of millions of dollars.”
University / Research IP A University Security Team back tracked a hack that compromised a secure server and sensitive Intellectual property (IP). The trail led to an internal server in a Chinese university. The Chinese server included a menu with links to more than 30 Canadian universities and research Institutions – among many others. The menu included tools to defeat security systems. (Sources and detail withheld due to Non-Disclosure Agreement)
Other Government of Canada Hacks The Communications Security Establishment (CSE) responded to a question in the House of Commons in 2016 by releasing the following statement: “government systems in the energy and resources sector suffered 2,078 ‘system compromises’ in 2016. This compares with 2,493 such compromises against all other federal government sectors during the same period.” CSE did not disclose where the attacks originated. Yet many attacks seeking intellectual property and/or trade secrets have originated in the PRC.

The PRC has never admitted to conducting ANY hacking despite indictments against officers of the PLA and criminal hacking indictments and convictions in multiple jurisdictions. In Canada, for instance, indictments for cyber theft and selling to the PRC have included shipbuilding secrets (2013), satellite technology (2016), and espionage by a Toronto Permanent Resident (2017). Cyber forensic investigators, ranging from university computer security teams to cyber security firms, have provided overwhelming evidence of PRC cyber attacks. A general categorization of PRC hackers follows:

1. People’s Liberation Army (PLA) Cyber Units There are a number of PLA “hacker” units that engage in hacking ranging from senior units directly controlled by Beijing to regional and local PLA units that work with universities and/or businesses.
2. Govt / University / Business Partnerships In these three-way ”partnerships,” intellectual property is targeted, stolen and then “reinvented” in PRC universities. The technology is used to launch new/government sponsored businesses.
3. Govt Affiliated Business There are a number of rising PRC companies that have been founded by PLA officers or Communist Party of China members, based on stolen IP.
4. Business Sponsored Hacking / IP Chinese businesses hire “computer security companies” or hackers to steal intellectual property and trade secrets.
5. Criminal Hacking Groups Chinese criminals have been arrested and deported from call centre operations and hacking teams in several African and Asian countries.
6. Hacking Groups / Associations One of the best known Chinese hacking groups are the “Apple” group(s), responsible for creating many Apple apps as well as iOS malware and cracks.
7. Individual Hackers This is hacking by individuals, often university students, that ranges from politically motivated Distributed Denial of Service Attacks (DDoS) to theft of intellectual property and includes the entire spectrum of criminal hacking.

Experts on China have documented PRC government links through all levels. Links can be direct, such as military chains of command or they can be casual, based on media “calls to action.” One example of “casual” attacks was when Chinese students outside of mainland China launched Distributed Denial of Service (DDoS) attacks against the Republic of the Philippines.

The main objective of PRC cyber attacks appears to be the acquisition of intellectual property and trade secrets. Interestingly, the Joint Communiqué issued on June 22 stated in part: “The two sides agreed that neither country’s government would conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.” The Globe and Mail noted that: “This new deal only covers economic espionage – hacking corporate secrets – and does not preclude China from conducting state-sponsored cyberattacks against the Canadian government or military as it did in 2014, when Chinese hackers broke into the main computers at the country’s National Research Council.”

Another way to validate PRC intentions is to see if the PRC has honoured other similar agreements. One of the first cyber agreements China signed was with the United States during the Obama administration. According to FireEye/Mandiant, the quantity of hacking attacks from the PRC against the US “dropped significantly” since the agreement was signed. That said, hacking from the PRC, including cyber attacks by the PRC government, have not stopped. Some intelligence organizations believe this indicates a change in tactics, shifting to more specific targets and using more sophisticated techniques, rather than a change in behaviour.

If the PRC has not stopped hacking the US, why would they stop hacking Canada?

The People’s Republic of China has published their intention to grow all aspects of the country in their “Five Year Plans.” This includes the “need” to catch up with the western world. In order to accomplish this the PRC has been operating hacking campaigns for more than a decade. Consequences have been minimal. In many ways China has already “caught up.” However, as economic plans change, so will the requirements of the PRC leadership. Stated another way, this is the motive for future hacking.

The Canadian Security Intelligence Service (CSIS), CSE, Department of National Defence and the RCMP are fully aware of the People’s Republic of China’s hacking endeavours in Canada. Their information should have made its way to the Minister of Public Safety and the Department of Global Affairs. These organizations should have advised the Prime Ministers Office that the PRC are unlikely to comply with a cyber agreement.

The Canada-China cyber agreement provided a photo-op and the appearance of good will between the countries but there is no apparent “upside” to the agreement for Canada. The PRC has managed to have the Liberal government “overlook” hundreds of millions of dollars in cyber thefts and damage due to hacking. China has not changed its hacking infrastructure nor its political requirement for western intellectual property, so more cyber attacks should be expected. Given the history of hacking and the expectation of more IP theft, why sign a cyber-agreement and risk political embarrassment?

David Swan is a retired Canadian Army Intelligence Officer (Reserve) who lives in Vulcan, AB. He is the Director of the Cyber Intelligence Defence Centre (CIDC), a component of the Centre for Strategic Cyberspace and Security Science. 

Tags: ChinacyberDavid Swanhacking
Previous Post

“Trust arrives on foot, but leaves on horseback”: Cross at Senate committee

Next Post

Canada needs to be wary of the Chinese Communist Party: Layton in the Toronto Sun

Related Posts

The possibilities and limits of Japan-NATO cooperation: Stephen Nagy in the Japan Times
Foreign Policy Program

The possibilities and limits of Japan-NATO cooperation: Stephen Nagy in the Japan Times

June 28, 2022
Taiwan in Japan’s security puzzle and Abe’s ‘uncontroversial’ Taiwan statement: Stephen Nagy for 9DASHLINE
Foreign Policy Program

Taiwan Wants (And Has) Independence: Here’s Why – J. Michael Cole for 1945

June 28, 2022
Exposing 12 myths that support drug price controls and harm our health system
Releases

Exposing 12 myths that support drug price controls and harm our health system

June 28, 2022
Next Post
Chinese Communist Party

Canada needs to be wary of the Chinese Communist Party: Layton in the Toronto Sun

Macdonald-Laurier Institute

323 Chapel Street, Suite #300
Ottawa, Ontario
K1N 7Z2 Canada

613.482.8327

info@macdonaldlaurier.ca
MLI directory

Follow us on

Newsletter Signup

First Name
Last Name
Email Address

Support Us

Support the Macdonald-Laurier Institute to help ensure that Canada is one of the best governed countries in the world. Click below to learn more or become a sponsor.

Support Us

Inside Policy Magazine

  • Current Issue
  • Back Issues
  • Advertising
  • Inside Policy Blog
  • Privacy Policy

© 2021 Macdonald-Laurier Institute. All Rights reserved.

No Result
View All Result
  • Home
  • About
    • Who We Are
    • Who Makes MLI Work
    • Tenth Anniversary
    • Jobs
  • Experts
  • Issues
    • Domestic Policy Program
      • Agriculture and Agri-Food
      • Canada’s Political Tradition
      • Economic policy
      • Energy
      • Health Care
      • Justice
      • Social issues
    • Foreign Policy Program
      • Foreign Affairs
      • National Defence
      • National Security
    • Indigenous Affairs Program
  • Projects
    • COVID and after: A mandate for recovery
    • COVID Misery Index
      • Beyond Lockdown
    • Provincial COVID Misery Index
    • Centre for Advancing Canada’s Interests Abroad
      • Dragon at the Door
      • The Eavesdropping Dragon: Huawei
    • An Intellectual Property Strategy for Canada
    • Speak for Ourselves
    • Canada and the Indo-Pacific Initiative
    • DisInfoWatch.org
    • The Transatlantic Program
    • Indigenous Prosperity at a Crossroads
      • Aboriginal Canada and Natural Resources
    • Talkin’ in the Free World with Mariam Memarsadeghi
    • Past Projects
      • Justice Report Card
      • Munk Senior Fellows
      • A Mandate for Canada
      • Confederation Series
      • Fiscal Reform
      • The Canadian Century project
      • Fixing Canadian health care
      • Internal trade
      • From a mandate for change
      • Size of government in Canada
  • Events
    • Upcoming Events
    • Past Events
      • MLI Dinners
      • Great Canadian Debates
  • Latest News
  • Libraries
    • Inside Policy Magazine
      • Inside Policy Back Issues
      • Inside Policy Blog
    • Papers
    • Columns
    • Books
    • Commentary
    • Straight Talk
    • Video
    • Multimedia
    • Podcasts
    • Leading Economic Indicator
    • Labour Market Report
    • MLI in the Media

© 2021 Macdonald-Laurier Institute. All Rights reserved.

IDEAS CHANGE THE WORLD!Have the latest Canadian thought leadership delivered straight to your inbox.
First Name
Last Name
Email address

No thanks, I’m not interested.