China & US Are ‘Eliminating Dangerous Spying Phase’

China and US cybersecurity talks are reaching for an agreement to eliminate “random factors” that can begin a cyberwar.

Beijing and Washington are satisfied with the dialogue regarding the fight against cybercrime. A day earlier, US negotiator Suzanne Spaulding noted the progress in the exchange of information on cyber threats. Sputnik News spoke with a Russian expert Eugene Yuchik regarding cyber warfare.

Professor of Ural State Economic University and expert on competitive intelligence, Eugene Yuschik, considers the agreements that have been reached so far to reflect the desire of China and the United States to eliminate “random factors” that can begin a cyberwar.

“The situation mirrors the time when there was a nuclear arms race. Methods of cyber war today are liable to destruction, maybe less than nuclear bombardment of a village, but nevertheless still destructible,” Yuschik said.

He further said that cyber espionage can be very expensive and very dangerous because it can cause far-reaching and long-lasting consequences if important and huge corporations and organizations get hit.

“In this situation it is necessary, as the experience of the nuclear standoff of the 70-80s showed, to exclude two factors. First is to avoid accidentally pressing the trigger, when the actions of the other side are misinterpreted. Second is to avoid a third party that could intervene in between the two states. For these two factors there is a hotline which can quickly clarify unclear issues,” Yuschik said.

He mentioned that eliminating these two factors must be done with evidence, “in order to prevent the situation from sliding into a dangerous phase.”

“So the Sino-US agreement is primarily an opportunity to eliminate such random factors. It is not necessarily a demonstration of good will or good relations with each other,” the analyst said. 

Yuschik further said that by starting the inter-governmental consultations on combating cyber espionage, Xi Jinping and Barack Obama avoided bringing up the issue of limiting intelligence against each other. This is quite understandable because it makes no sense to hold back or not hold back information regarding mutual intelligence gathering and industrial espionage.

“It is a fact, that in any country, such as the United Kingdom, Russia and the United States there is a legislature that regulates spying in the context of who conducts it and who is the object of it.”

“Therefore, neither China nor the United States has anything to hide because this is already clear by default. Moreover, intelligence gathering is considered to be an absolutely normal activity because in fact, there is no other way to obtain any sort of sensitive information,” the analyst pointed out.

Following the recent dialogue between China and the US, China’s Xinhua news agency pointed out the main results of the two previous rounds of high-level talks. The first was held in Washington and the second in December of last year from June 13-14 in Beijing.

According to the agency, the plan of the two states is to strengthen cooperation on protecting cyberspace from potential threats. There has been an exchange of information disclosing crimes on the internet. There is now a system where expert consultants can work out the rules of the game in this sphere.

Finally, there is an agreement to hold a third round of dialogue in Washington. US authorities so far are satisfied with the progress in the exchange of information with China about cyber threats, as the representative of the US Department of Homeland Security Suzanne Spaulding had said.

She has high hopes for the development and adoption of obligations which attempt to put an end to the theft of trade secrets and confidential business information. She also noted the importance of regular contact with China regarding this situation and the importance of high-level cooperation between negotiators and experts.

Sputnik:

« NATO Does Not Appear To Have A Clear Cyberwar Strategy
UK Cybercrime Now Costs £1 Billion And Attacks Are Up 22% »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Acuity Risk Management

Acuity Risk Management

Acuity Risk Management helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

LaoCERT

LaoCERT

LaoCERT is the national Computer Incident Response Team for Laos.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

Zero Networks

Zero Networks

With Zero Network, you can achieve affordable, airtight network access security at scale.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

DataViper

DataViper

Data viper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

Myntex

Myntex

Myntex® builds the future of mobile security. We empower our partners to deliver exclusive mobile endpoint security software, fortifying against mobile threats, device exploits and data exfiltration.