GO
Loading...

China Asks US to Explain Internet Surveillance

President Barack Obama (R) and Chinese President Xi Jinping take a walk at the Annenberg Retreat at Sunnylands in Rancho Mirage, California, on June 8, 2013.
Jewel Samad | AFP | Getty Images
President Barack Obama (R) and Chinese President Xi Jinping take a walk at the Annenberg Retreat at Sunnylands in Rancho Mirage, California, on June 8, 2013.

China made its first substantive comments on Monday to reports of U.S. surveillance of the Internet, demanding that Washington explain its monitoring programs to the international community.

Several nations, including U.S. allies, have reacted angrily to revelations by an ex-CIA employee over a week ago that U.S. authorities had tapped the servers of internet companies for personal data.

"We believe the United States should pay attention to the international community's concerns and demands and give the international community the necessary explanation," Chinese Foreign Ministry spokeswoman Hua Chunying said at a daily briefing.

The Chinese government has previously not commented directly on the case, simply repeating the government's standard line that China is one of the world's biggest victims of hacking attacks.

(Read More: Obama's Impact on Chinese Hacking 'Limited': Hunstman)

A senior source with ties to the Communist Party leadership said Beijing was reluctant to jeopardize recently improved ties with Washington.

The explosive revelations of the U.S. National Security Agency's (NSA) spying programs were provided by Edward Snowden, a former CIA employee and NSA contractor currently holed up in Hong Kong, a China-controlled city.

Snowden told the South China Morning Post, Hong Kong's main English language newspaper, last week that Americans had spied extensively on targets in China and Hong Kong.

He said these included the Chinese University of Hong Kong, the site of an exchange which handles nearly all the city's domestic web traffic. Other alleged targets included government officials, businesses and students.

At the briefing, Hua rejected a suggestion that Snowden was a spy for China.

"This is sheer nonsense," she said, without elaborating.

(Read More: ChineseHackers Resume Attacks on US Targets)

It will likely be up to the central government to decide what happens if Washington requests Snowden's extradition, as Beijing controls Hong Kong's diplomatic affairs. The U.S. Justice Department is investigating the case but Snowden has not been charged with any crime.

In a poll on the website of the Global Times, a popular tabloid published by the Communist Party's official People's Daily, 98 percent of respondents said China should refuse to send him back to the United States.

"Unlike a common criminal, Snowden did not hurt anybody. His 'crime' is that he blew the whistle on the U.S. government's violation of civil rights," the newspaper said in an editorial.

(Read More: Cyber Espionage: The Chinese Threat)

"His whistle-blowing is in the global public interest. Therefore, extraditing Snowden back to the U.S. would not only be a betrayal of Snowden's trust, but a disappointment for expectations around the world. The image of Hong Kong would be forever tarnished."

The former British colony of Hong Kong is supposed to enjoy wide-ranging autonomy and broad freedoms denied to people in mainland China, including an independent judiciary and free press.

(Read More: Inside a Cyber War Room: The Fight Against Hacking)

Since its return to Chinese rule in 1997, however, the city's pro-democracy politicians and activists have complained that Beijing has been steadily eroding Hong Kong's freedoms despite constitutional safeguards granting a high degree of autonomy.

Featured

  • CNBC's senior correspondent and lead investigative reporter, Scott Cohn also appears on "NBC Nightly News with Brian Williams," "Today" and on MSNBC.

  • “Squawk on the Street” Co-Anchor

  • CNBC Washington Reporter

Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.

Technology

Technology Explained