American companies are at war, but don't ask them why. They won't tell. They're besieged not by one another, but by hackers who target their intellectual property and confidential information. By Ian Bremmer.
Just how deep this cyberwar goes is largely unknown to all but the companies being targeted. That’s because they are staying silent in an effort to not aggravate the countries in which they are being hacked. China is the site of the most cyber-aggression, and in many instances, the biggest opportunity for many businesses. Companies are turning the other cheek in an attempt to turn another check.
If the companies are not talking, how do we know it’s happening? Because the U.S. government has noticed. On Tuesday, The New York Times ran a piece highlighting the link between anti-U.S. cyberattacks and the Chinese military. In the Washington Post last week, word leaked that the United States has put out a National Intelligence Estimate that “identifies China as the country most aggressively seeking to penetrate the computer systems of American businesses and institutions to gain access to data that could be used for economic gain.”
This is the front in the U.S. cyberwar that we’re not winning. We know the U.S. does fine when it comes to its sovereign cyber-warfare, waged on a state-to-state platform. Take Stuxnet – the US/Israel initiative to destroy Iranian nuclear centrifuges through a complex cyberattack (not to mention an odd follow-up that purportedly blasted AC/DC’s “Thunderstruck” at odd hours).
But when it comes to corporate sabotage and espionage, the United States is far less experienced than China. Blame free-market capitalism: The U.S. government does not intervene on the private sector’s behalf to obtain information that would benefit the economy. China, however, is far more adept at this because of its use of state capitalism (a system in which the state uses markets to create wealth that can consolidate its hold on power).
Yes, Obama announced some cyber-security proposals in his State of the Union address. But any broad initiative to combat corporate cyber-espionage will have to come from corporate entities themselves. So why haven’t we heard about such efforts? Swaths of companies are getting hit, as the leaked elements of the National Intelligence Estimate imply, but they fear losing business from the world’s second-largest economy and its largest trader (in terms of value of goods and services sold).
We’ve seen at least one company push back against China’s repressive policies in the past: Google famously moved its Chinese searches to a Hong Kong URL so it could avoid Chinese Web censorship. But Microsoft saw Google’s exit as an opportunity. Referring directly to Google’s decision to leave, Microsoft’s chief research and strategy officer proclaimed, “Microsoft is committed to stay.” Google has paid a price: Its share of search in China is down from about a third to somewhere around 5 percent, lagging far behind its Chinese competitor, Baidu, which controls the majority. Baidu, of course, has close ties to the Chinese government.
The New York Times took a stand too. After publishing a piece on then-Prime Minister Wen Jiabao’s secret wealth in October, the Times was bombarded by cyberattacks. Instead of keeping quiet, it retaliated by reporting on the attacks themselves. The Washington Post and the Wall Street Journal spoke out in a similar fashion.
The business models of Google and these publications revolve around freedom of information. For other businesses, the cons often vastly outweigh the pros. That might help explain why Coke said nothing after it was hacked in 2009. After Coke tried to buy a Chinese juice company for $2.4 billion, hackers took internal documents about the deal, which, as Bloomberg writes, “would have been the largest foreign takeover of a Chinese company at the time.” (The story also claims that several other companies, including Chesapeake Energy, have been hacked but have said nothing.)
While it was well after the fact, Coke did admit to the hackings once the story broke in late 2012, but it tried to minimize the importance of the breach. That late admission is still much better than the approaches of many other companies. If anyone is able to take on China and bring about change, it would be an industry leader willing to make clear that it will not do business with a regime determined to undermine it. But there’s another concern: Not only does Coca-Cola fear lost business, it fears competitors might step in to fill the gap.
The best way to combat cyberattacks would be for dominant multinationals to coordinate with their closest competitors to draw attention to the problem and apply some pressure. If Coca-Cola and PepsiCo were to wage a mutual initiative, we would see far more progress. The same would go for Boeing and Airbus – or any other hegemon that teamed up with its closest competitor(s) – if they could collaborate on a united front. If the companies themselves don’t want to go out on a limb, they could get industry associations to do it for them. For the pressure to be truly successful, it will need to be a concerted, coordinated effort among the companies getting hacked. With their backing, the Obama administration can remind the private sector that even though they may not agree on domestic issues, international trade and fairness, they’re well aligned.
In October, Secretary of Defense Leon Panetta claimed that a future cyberattack on critical U.S. infrastructure could cause a “cyber Pearl Harbor.” On top of the potential for a catastrophic blockbuster event, attacks on American companies are already being waged every minute of every day. It’s time for those companies to collaborate and pool their influence. DM
(Ian Bremmer is the president of Eurasia Group, the leading global political risk research and consulting firm. Bremmer created Wall Street’s first global political risk index, and has authored several books, including the national bestseller, The End of the Free Market: Who Wins the War Between States and Corporations?, which details the new global phenomenon of state capitalism and its geopolitical implications. He has a PhD in political science from Stanford University (1994), and was the youngest-ever national fellow at the Hoover Institution.)
Photo: Eugene Kaspersky, Chairman and CEO of Kaspersky Labs, speaks at a Tel Aviv University cyber security conference June 6, 2012. Kaspersky, whose lab discovered the Flame virus that has attacked computers in Iran and elsewhere in the Middle East, said on Wednesday only a global effort could stop a new era of “cyber terrorism”. REUTERS/Baz Ratne.
Watermelons were originally cultivated in Africa.