U.S., China Trade Accusations, Talk Of Cooperation In Cyberspace

  /     /     /  
Publicated : 22/11/2024   Category : security


U.S., China Trade Accusations, Talk Of Cooperation In Cyberspace


The White House is calling for China to adopt acceptable norms of behavior in cyberspace, but Beijing denies involvement in attacks



Policing cyberspace in an age of cyberespionage and advanced persistent threats is made more difficult by the real and perceived involvement of state actors.
The challenge facing those fighting malware threats was underscored in the back-and-forth between the White House and the Chinese government. In a March 11 speech to the Asia Society in New York, U.S. National Security Adviser Tom Donilon called for China to stop the theft of data from American networks and adopt acceptable norms of behavior in cyberspace.
We have worked hard to build a constructive bilateral relationship that allows us to engage forthrightly on priority issues of concern, he said in a speech. And the United States and China, the world’s two largest economies, both dependent on the Internet, must lead the way in addressing this problem.
The White House wants three things from China, said Donilon. First, China needs to recognize the problem and risk it poses to international trade, the reputation of Chinese industry, and overall foreign relations. Second, China should take serious steps to address these activities. Finally, there needs to be cooperation between China and the U.S. to establish a constructive dialogue regarding a set of rules to govern cyberspace.
Donilons remarks follow statements by Chinas foreign minister, Yang Jiechi, who slammed allegations that China was involved in cyberattacks in the wake of the report
released by Mandiant
(PDF). The report details activities of a reputed Chinese hacking group, the company dubbed APT1 -- believed to be Unit 61398 of Chinas People Liberation Army.
China denies any connection to cyberattacks against America.
Those reports may have caught the eye of many people, but they are built on shaky ground,
the China Daily
newspaper quoted Yang as saying March 10.
Chinas Ministry of National Defense has ripped the allegations as well, stating that China has never directly accused the U.S. government with being the source of attacks on Chinas military computers, even though a considerable number of them originate from IP addresses in the U.S. , the China Daily reported.
Cybercapabilities have become intrinsically intertwined in most nations offense and defense warfare postures, says LogRhythm CTO Chris Petersen, who called Donilons remarks encouraging. With the recently publicized evidence against China’s use of these capabilities for wide-scale cyberespionage, this issue has become front and center for most Americans. As a nation and a world, we are now forced to ask ourselves, What is acceptable use of these weapons -- in time of war and in time of peace?”
One of the often cited dangers of cyberweapons is the prospect of the targets reverse-engineering the tools used against them and then launching them back at the sender. However Cedric Leighton, CEO of risk-management consultancy Cedric Leighton Associates and former deputy training director for the National Security Agency (NSA), says that risk can be mitigated by developers having an antidote to the malware they create.
The most recent statements by White House National Security Adviser Tom Donilon and other officials finally raise the discussion about state-sponsored hacking activities to the level it should have been at long ago, he says.
Despite the controversy, a Chinese foreign ministry spokesperson told the media in a news briefing Tuesday that China was willing to have a constructive dialogue about the issue on the basis of the principles of mutual respect and mutual trust,
Reuters reported.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
U.S., China Trade Accusations, Talk Of Cooperation In Cyberspace