Thursday, June 26, 2025

Creating liberating content

Choose your language

hello@global-herald.net

How to Understand Fantasy...

How to Understand Cricket Stats – A Beginner’s Guide for Fantasy Players In...

Watch live: White House...

White House press secretary Karoline Leavitt will brief reporters Thursday afternoon with...

Gov. Kathy Hochul visits...

Gov. Kathy Hochul visited the Hicksville School District on Tuesday, June 24,...

Sofina Foods to pay...

Sofina Foods to pay $330K after Edmonton worker trapped in hot smokehouse...
HomeEconomyAsiaUS missing the...

US missing the point on China’s industrial cyberespionage


The United States is attempting to decouple its economy from rivals such as China. Efforts toward this include policymakers raising tariffs on Chinese goods, blocking exports of advanced technology and offering subsidies to boost American manufacturing.

The goal is to reduce reliance on China for critical products, in the hope that this will also protect US intellectual property from theft. The idea that decoupling will help stem state-sponsored cyber-economic espionage has become a key justification for these measures.

For instance, then-US Trade Representative Katherine Tai framed the continuation of China-specific tariffs as serving the “statutory goal to stop [China’s] harmful … cyber intrusions and cyber theft.”

Early tariff rounds during the first Trump administration were likewise framed as forcing Beijing to confront “deeply entrenched” theft of US intellectual property.

This push to “onshore” key industries is driven by very real concerns. By some estimates, theft of US trade secrets, often through hacking – costs the American economy hundreds of billions of dollars per year. In that light, decoupling is a defensive economic shield – a way to keep vital technology out of an adversary’s reach.

But will decoupling and cutting trade ties truly make America’s innovations safer from prying eyes? I’m a political scientist who studies state-sponsored cyberespionage, and my research suggests that the answer is a definitive no. Indeed, it might actually have the opposite effect.

To understand why, it helps to look at what really drives state-sponsored hacking.

Rivalry, not reliance

Intuitively, you might think a country is most tempted to steal secrets from a nation it depends on. For example, if Country A must import jet engines or microchips from Country B, Country A might try to hack Country B’s companies to copy that technology and become self-sufficient. This is the industrial dependence theory of cyber theft.

There is some truth to this motive. If your economy needs what another country produces, stealing that know-how can boost your own industries and reduce reliance.

However, in a recent study, I show that a more powerful predictor of cyberespionage is industrial similarity. Countries with overlapping advanced industries, such as aerospace, electronics, or pharmaceuticals, are the ones most likely to target each other with cyberattacks.

Why would having similar industries spur more spying? The reason is competition. If two nations both specialize in cutting-edge sectors, each has a lot to gain by stealing the other’s innovations.

If you’re a tech powerhouse, you have valuable secrets worth stealing, and you have the capability and motivation to steal others’ secrets. In essence, simply trading with a rival isn’t the core issue. Rather, it’s the underlying technological rivalry that fuels espionage.

For example, a cyberattack in 2012 targeted SolarWorld, a US solar panel manufacturer, and the perpetrators stole the company’s trade secrets. Chinese solar companies then developed competing products based on the stolen designs, costing SolarWorld millions in lost revenue.

This is a classic example of industrial similarity at work. China was building its own solar industry, so it hacked a US rival to leapfrog in technology.

YouTube video

China has made major investments in its cyberespionage capabilities.

Boosting trade barriers can fan the flames

Crucially, cutting trade ties doesn’t remove this rivalry. If anything, decoupling might intensify it. When the US and China exchange tariff blows or cut off tech transfers, it doesn’t make China give up – it likely pushes Chinese intelligence agencies to work even harder to steal what they can’t buy.

This dynamic isn’t unique to China. Any country that suddenly loses access to an important technology may turn to espionage as Plan B.

History provides examples. When South Africa was isolated by sanctions in the 1980s, it covertly obtained nuclear weapons technology. Similarly, when Israel faced arms embargoes in the 1960s, it engaged in clandestine efforts to get military technology. Isolation can breed desperation, and hacking is a low-cost, high-reward tool for the desperate.

If decoupling won’t end cyberespionage, what will?

There’s no easy fix for state-sponsored hacking as long as countries remain locked in high-tech competition. However, there are steps that can mitigate the damage and perhaps dial down the frequency of these attacks.

One is investing in cyber defense. Just as a homeowner adds locks and alarms after a burglary, companies and governments should continually strengthen their cyber defenses. Assuming that espionage attempts are likely to happen is key.

Advanced network monitoring, employee training against phishing, and robust encryption can make it much harder for hackers to succeed, even if they keep trying.

Another is building resilience and redundancy. If you know that some secrets might get stolen, plan for it. Businesses can shorten product development cycles and innovate faster so that even if a rival copies today’s tech, you’re already moving on to the next generation. Staying ahead of thieves is a form of defense, too.

Ultimately, rather than viewing tariffs and export bans as silver bullets against espionage, US leaders and industry might be safer focusing on resilience and stress-testing cybersecurity firms. Make it harder for adversaries to steal secrets, and less rewarding even if they do.

William Akoto is assistant professor of global security, American University

This article is republished from The Conversation under a Creative Commons license. Read the original article.



Source link

Get notified whenever we post something new!

spot_img

Create a website from scratch

Just drag and drop elements in a page to get started with Newspaper Theme.

Continue reading

How to Understand Fantasy Cricket Stats – A Beginner’s Guide for Fantasy Players

How to Understand Cricket Stats – A Beginner’s Guide for Fantasy Players In today’s fantasy sports world, numbers don’t just tell stories — they win matches. Whether you’re building your Dream11 team or making picks on the AllCric app,...

Watch live: White House briefs reporters with administration pushing back on Iran leak

White House press secretary Karoline Leavitt will brief reporters Thursday afternoon with the Trump administration criticizing reporting over the outcome of Saturday's strikes on three Iranian nuclear facilities. Reports emerged earlier this week that the attacks only set Tehran's...

Gov. Kathy Hochul visits Hicksville to discuss cell phone ban

Gov. Kathy Hochul visited the Hicksville School District on Tuesday, June 24, to discuss the upcoming implementation of the state’s bell-to-bell cell phone ban for students. Hochul met with teachers, parents, and students to discuss the district’s plans for...

Enjoy exclusive access to all of our content

Get an online subscription and you can unlock any article you come across.