China & US Are ‘Eliminating Dangerous Spying Phase’

China and US cybersecurity talks are reaching for an agreement to eliminate “random factors” that can begin a cyberwar.

Beijing and Washington are satisfied with the dialogue regarding the fight against cybercrime. A day earlier, US negotiator Suzanne Spaulding noted the progress in the exchange of information on cyber threats. Sputnik News spoke with a Russian expert Eugene Yuchik regarding cyber warfare.

Professor of Ural State Economic University and expert on competitive intelligence, Eugene Yuschik, considers the agreements that have been reached so far to reflect the desire of China and the United States to eliminate “random factors” that can begin a cyberwar.

“The situation mirrors the time when there was a nuclear arms race. Methods of cyber war today are liable to destruction, maybe less than nuclear bombardment of a village, but nevertheless still destructible,” Yuschik said.

He further said that cyber espionage can be very expensive and very dangerous because it can cause far-reaching and long-lasting consequences if important and huge corporations and organizations get hit.

“In this situation it is necessary, as the experience of the nuclear standoff of the 70-80s showed, to exclude two factors. First is to avoid accidentally pressing the trigger, when the actions of the other side are misinterpreted. Second is to avoid a third party that could intervene in between the two states. For these two factors there is a hotline which can quickly clarify unclear issues,” Yuschik said.

He mentioned that eliminating these two factors must be done with evidence, “in order to prevent the situation from sliding into a dangerous phase.”

“So the Sino-US agreement is primarily an opportunity to eliminate such random factors. It is not necessarily a demonstration of good will or good relations with each other,” the analyst said. 

Yuschik further said that by starting the inter-governmental consultations on combating cyber espionage, Xi Jinping and Barack Obama avoided bringing up the issue of limiting intelligence against each other. This is quite understandable because it makes no sense to hold back or not hold back information regarding mutual intelligence gathering and industrial espionage.

“It is a fact, that in any country, such as the United Kingdom, Russia and the United States there is a legislature that regulates spying in the context of who conducts it and who is the object of it.”

“Therefore, neither China nor the United States has anything to hide because this is already clear by default. Moreover, intelligence gathering is considered to be an absolutely normal activity because in fact, there is no other way to obtain any sort of sensitive information,” the analyst pointed out.

Following the recent dialogue between China and the US, China’s Xinhua news agency pointed out the main results of the two previous rounds of high-level talks. The first was held in Washington and the second in December of last year from June 13-14 in Beijing.

According to the agency, the plan of the two states is to strengthen cooperation on protecting cyberspace from potential threats. There has been an exchange of information disclosing crimes on the internet. There is now a system where expert consultants can work out the rules of the game in this sphere.

Finally, there is an agreement to hold a third round of dialogue in Washington. US authorities so far are satisfied with the progress in the exchange of information with China about cyber threats, as the representative of the US Department of Homeland Security Suzanne Spaulding had said.

She has high hopes for the development and adoption of obligations which attempt to put an end to the theft of trade secrets and confidential business information. She also noted the importance of regular contact with China regarding this situation and the importance of high-level cooperation between negotiators and experts.

Sputnik:

« NATO Does Not Appear To Have A Clear Cyberwar Strategy
UK Cybercrime Now Costs £1 Billion And Attacks Are Up 22% »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

StationX

StationX

StationX is a leading provider of cyber security training, consultancy and services.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

Qrypt

Qrypt

Qrypt has developed the only cryptographic solution capable of securing information indefinitely with mathematical proof as evidence.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

Resillion

Resillion

Resillion (formerly Eurofins Digital Testing) is a global leader in quality engineering and cyber security services with operations in Europe, US, UK, India and China.

Ethnos Cyber

Ethnos Cyber

Ethnos Cyber is Africa’s leading cybersecurity and compliance management company. We provide Information Security, Risk Management, Cybersecurity and Compliance Management solutions to clients.

MARS Suite

MARS Suite

MARS Suite is your all-in-one solution for cyber protection & compliance. Cybersecurity and risk management is what we do best. And we’re making it simple and easy.

Qi An Xin (QAX)

Qi An Xin (QAX)

QAX is a listed company based in China, and a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.