backtop


Print 50 comment(s) - last by RedemptionAD.. on Feb 25 at 11:56 AM

One third of the world's cyberattacks come from China, Chinese government feigns ignorance

In a newly published document entitled "ADMINISTRATION STRATEGY ON MITIGATING THE THEFT OF U.S. TRADE SECRETS" [PDF], the White House threatens China and other countries with both trade and diplomatic consequences if cyberattacks on U.S. corporations, media, and advocacy groups continue to be traced to their doorstep.

I. Brazen Attacks by Chinese Continue

At a White House press conference, Attorney General Eric Holder paints a grim picture of the state of cyberdefense, commenting, "There are only two categories of companies affected by trade-secret theft: those that know they've been compromised and those that don't know it yet.  A hacker in China can acquire source code from a software company in Virginia without leaving his or her desk."

Many top companies, including General Motors Comp. (GM), E. I. DuPont De Nemours and Comp. (DD), Google Inc. (GOOG), and American Superconductor, Corp. (AMSC), have seen trade secrets stolen by hackers in China.  At the press conference John Powell, general counsel for American Superconductor, shared a particularly troubling tale of how a big Chinese wind company -- formerly the largest client of his firm -- recruited a former employee and used their knowledge to remotely steal trade secrets.  He comments, "It's a real threat and it's a really costly threat."

Eric Holder
AG Eric Holder blasted Chinese cyberagression and called for tough action if attacks continue.
[Image Source: AP]

Pressure is mounting on the U.S. federal government, particularly the Obama administration, to give a stronger response in the wake of brazen attacks from China on U.S. media agencies including The New York Times and The Wall Street Journal.  

Reports have emerged that these attacks may all have been the work of an elite unit of Chinese military hackers.  While the U.S. works hard to imprison many of its most talented "black hat" hackers, China reportedly goes to great lengths to recruit its own black hats, lavishing them with rock star salaries and other perks.

II. Government Struggles With How to Counter Chinese Aggression

The document is ambiguous on how the U.S. will respond, but it makes it clear that Washington D.C. is well aware of the attacks from China on top U.S. corporations.  Currently, the ability to mount a strong counteroffensive is stifled by the relative "greenness" of America's cyber-fighting force. This force is composed mostly of straight-shooting college IT types, many of whom have never hacked into a system they weren't allowed to.  

Over the last year, the National Security Agency (NSA) has been showing up at top hacker conventions trying to convince more talented hackers to join its ranks -- but such efforts remain in their infancy and are being heavily stifled by animosity from the hacker community over punitive computer crimes law enforcement.

Security firm Akama Technologies, Inc. (AKAM) estimates that in 2012 33 percent of attack traffic originated from China.  By contrast, the U.S. -- in second place -- only claimed 13 percent of global attack contract.  Chinese government officials claim that hacking is illegal in China and that its own companies are also victimized by their domestic hackers.  However, many of the attacks appear to be geared towards suppressing dissidents or attacking U.S. media entities that expose secrets of Chinese politicians.

China hackers
Chinese hackers are responsible for a third of the world's cyberattacks. [Image Source: Kealtu]

The result is that the cyberwar between the U.S. and China is playing out as a classic bully-victim situation.  China denies everything while constantly abusing both U.S. government agencies and private companies.  And experts believe the U.S. is doing far precious little to fight back.

Last week, President Obama signed a cybersecurity executive order calling for voluntary corporate information sharing on security risks.  Congress is in the process of establishing a more rigid framework for the sharing.

James Lewis, a former top State Department official who is now a cybersecurity specialist at the Center for Strategic and International Studies, praised the Obama administration's actions in an interview with The Wall Street Journal, stating, "This is what you have to do to get the Chinese to behave differently.  You've got to keep pushing on them; you've got to keep grinding."

Trade pacts like the Trans-Pacific Partnership may provide a forum to push for stricter intellectual property protections.  And Mr. Lewis suggests that the U.S. could put pressure on China by denying Chinese companies access to American banks, or by denying Chinese researchers visas, if attacks continue.

Sources: The White House {PDF], The Wall Street Journal



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: America's Next Top Target
By Noya on 2/21/2013 10:51:43 PM , Rating: 2
quote:
is people are hard wired to need a foe to slay and in the absence of one they turn on each other instead. Observe the people around you for a while and see how frequently they categorize people as either us or them based on all kinds of things large and small.


It's our animal instincts to dominate, to defeat others.

In my opinion, it's simply the uncontrolled breeding of the weaker (all survive vs. high intelligent), less intelligent members of society that make the majority of society to have this mental condition.

With that said, aggressive governments (US) have always exploited the fact that the majority cannot see through the charades of good vs. bad, us vs. them, Left vs. Right and play along with the corrupt system that continues to move farther to the right than it has ever been in the last century.


RE: America's Next Top Target
By vortmax2 on 2/22/2013 6:48:21 PM , Rating: 2
quote:
It's our animal instincts to dominate, to defeat others.


If we continue to teach that we're 'only' animals, then we will continue to act like animals. Get ready, it's only going to get worse...


RE: America's Next Top Target
By RedemptionAD on 2/25/2013 11:56:36 AM , Rating: 2
The actual issue in the majority is lack of pattern recognition. That is in effect what allows people to be controlled and/or manipulated.

Governments have always have used such methods for legitimate uses like national security or to buy time so that prior plans for the greater good of the country have time to take effect. The abuse of the technique is what can be used to mask corruption and other nefarious uses.


"People Don't Respect Confidentiality in This Industry" -- Sony Computer Entertainment of America President and CEO Jack Tretton














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki