China & US Are ‘Eliminating Dangerous Spying Phase’

China and US cybersecurity talks are reaching for an agreement to eliminate “random factors” that can begin a cyberwar.

Beijing and Washington are satisfied with the dialogue regarding the fight against cybercrime. A day earlier, US negotiator Suzanne Spaulding noted the progress in the exchange of information on cyber threats. Sputnik News spoke with a Russian expert Eugene Yuchik regarding cyber warfare.

Professor of Ural State Economic University and expert on competitive intelligence, Eugene Yuschik, considers the agreements that have been reached so far to reflect the desire of China and the United States to eliminate “random factors” that can begin a cyberwar.

“The situation mirrors the time when there was a nuclear arms race. Methods of cyber war today are liable to destruction, maybe less than nuclear bombardment of a village, but nevertheless still destructible,” Yuschik said.

He further said that cyber espionage can be very expensive and very dangerous because it can cause far-reaching and long-lasting consequences if important and huge corporations and organizations get hit.

“In this situation it is necessary, as the experience of the nuclear standoff of the 70-80s showed, to exclude two factors. First is to avoid accidentally pressing the trigger, when the actions of the other side are misinterpreted. Second is to avoid a third party that could intervene in between the two states. For these two factors there is a hotline which can quickly clarify unclear issues,” Yuschik said.

He mentioned that eliminating these two factors must be done with evidence, “in order to prevent the situation from sliding into a dangerous phase.”

“So the Sino-US agreement is primarily an opportunity to eliminate such random factors. It is not necessarily a demonstration of good will or good relations with each other,” the analyst said. 

Yuschik further said that by starting the inter-governmental consultations on combating cyber espionage, Xi Jinping and Barack Obama avoided bringing up the issue of limiting intelligence against each other. This is quite understandable because it makes no sense to hold back or not hold back information regarding mutual intelligence gathering and industrial espionage.

“It is a fact, that in any country, such as the United Kingdom, Russia and the United States there is a legislature that regulates spying in the context of who conducts it and who is the object of it.”

“Therefore, neither China nor the United States has anything to hide because this is already clear by default. Moreover, intelligence gathering is considered to be an absolutely normal activity because in fact, there is no other way to obtain any sort of sensitive information,” the analyst pointed out.

Following the recent dialogue between China and the US, China’s Xinhua news agency pointed out the main results of the two previous rounds of high-level talks. The first was held in Washington and the second in December of last year from June 13-14 in Beijing.

According to the agency, the plan of the two states is to strengthen cooperation on protecting cyberspace from potential threats. There has been an exchange of information disclosing crimes on the internet. There is now a system where expert consultants can work out the rules of the game in this sphere.

Finally, there is an agreement to hold a third round of dialogue in Washington. US authorities so far are satisfied with the progress in the exchange of information with China about cyber threats, as the representative of the US Department of Homeland Security Suzanne Spaulding had said.

She has high hopes for the development and adoption of obligations which attempt to put an end to the theft of trade secrets and confidential business information. She also noted the importance of regular contact with China regarding this situation and the importance of high-level cooperation between negotiators and experts.

Sputnik:

« NATO Does Not Appear To Have A Clear Cyberwar Strategy
UK Cybercrime Now Costs £1 Billion And Attacks Are Up 22% »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

Information Network Security Agency (INSA) - Ethiopia

Information Network Security Agency (INSA) - Ethiopia

INSA's vision is to realize a globally competent National Cyber capability which plays a key role in protecting the national interests of Ethiopia.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

Flatt Security

Flatt Security

Flatt Security is a cyber security startup based in Japan providing security assessments and other cyber security services.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

Moonsense

Moonsense

Moonsense is on a mission to level the playing field in the fight against online fraud.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.