China & US Are ‘Eliminating Dangerous Spying Phase’

China and US cybersecurity talks are reaching for an agreement to eliminate “random factors” that can begin a cyberwar.

Beijing and Washington are satisfied with the dialogue regarding the fight against cybercrime. A day earlier, US negotiator Suzanne Spaulding noted the progress in the exchange of information on cyber threats. Sputnik News spoke with a Russian expert Eugene Yuchik regarding cyber warfare.

Professor of Ural State Economic University and expert on competitive intelligence, Eugene Yuschik, considers the agreements that have been reached so far to reflect the desire of China and the United States to eliminate “random factors” that can begin a cyberwar.

“The situation mirrors the time when there was a nuclear arms race. Methods of cyber war today are liable to destruction, maybe less than nuclear bombardment of a village, but nevertheless still destructible,” Yuschik said.

He further said that cyber espionage can be very expensive and very dangerous because it can cause far-reaching and long-lasting consequences if important and huge corporations and organizations get hit.

“In this situation it is necessary, as the experience of the nuclear standoff of the 70-80s showed, to exclude two factors. First is to avoid accidentally pressing the trigger, when the actions of the other side are misinterpreted. Second is to avoid a third party that could intervene in between the two states. For these two factors there is a hotline which can quickly clarify unclear issues,” Yuschik said.

He mentioned that eliminating these two factors must be done with evidence, “in order to prevent the situation from sliding into a dangerous phase.”

“So the Sino-US agreement is primarily an opportunity to eliminate such random factors. It is not necessarily a demonstration of good will or good relations with each other,” the analyst said. 

Yuschik further said that by starting the inter-governmental consultations on combating cyber espionage, Xi Jinping and Barack Obama avoided bringing up the issue of limiting intelligence against each other. This is quite understandable because it makes no sense to hold back or not hold back information regarding mutual intelligence gathering and industrial espionage.

“It is a fact, that in any country, such as the United Kingdom, Russia and the United States there is a legislature that regulates spying in the context of who conducts it and who is the object of it.”

“Therefore, neither China nor the United States has anything to hide because this is already clear by default. Moreover, intelligence gathering is considered to be an absolutely normal activity because in fact, there is no other way to obtain any sort of sensitive information,” the analyst pointed out.

Following the recent dialogue between China and the US, China’s Xinhua news agency pointed out the main results of the two previous rounds of high-level talks. The first was held in Washington and the second in December of last year from June 13-14 in Beijing.

According to the agency, the plan of the two states is to strengthen cooperation on protecting cyberspace from potential threats. There has been an exchange of information disclosing crimes on the internet. There is now a system where expert consultants can work out the rules of the game in this sphere.

Finally, there is an agreement to hold a third round of dialogue in Washington. US authorities so far are satisfied with the progress in the exchange of information with China about cyber threats, as the representative of the US Department of Homeland Security Suzanne Spaulding had said.

She has high hopes for the development and adoption of obligations which attempt to put an end to the theft of trade secrets and confidential business information. She also noted the importance of regular contact with China regarding this situation and the importance of high-level cooperation between negotiators and experts.

Sputnik:

« NATO Does Not Appear To Have A Clear Cyberwar Strategy
UK Cybercrime Now Costs £1 Billion And Attacks Are Up 22% »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Coalfire

Coalfire

Coalfire specialises in cyber risk management and compliance. Our services span the cybersecurity lifecycle from advisory and compliance, to testing and engineering, monitoring and optimization.

StratoKey

StratoKey

StratoKey is an intelligent Cloud Access Security Broker (CASB) that secures your cloud and SaaS applications against data breaches, so you can do secure and compliant business in the cloud.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

Content+Cloud

Content+Cloud

Content+Cloud is a leading technology services business and Managed Services Provider (MSP) with a genuine passion for helping your organisation to succeed, whatever your ambitions.

Intracom Telecom

Intracom Telecom

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of professional services and solutions including Information Security.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

Early Game Ventures (EGV)

Early Game Ventures (EGV)

Early Game Ventures invests in startups that jumpstart new industries in the emerging markets of Europe.

CompassMSP

CompassMSP

CompassMSP deliver Managed IT and cybersecurity solutions designed to unleash your business's full potential.