China & US Are ‘Eliminating Dangerous Spying Phase’

China and US cybersecurity talks are reaching for an agreement to eliminate “random factors” that can begin a cyberwar.

Beijing and Washington are satisfied with the dialogue regarding the fight against cybercrime. A day earlier, US negotiator Suzanne Spaulding noted the progress in the exchange of information on cyber threats. Sputnik News spoke with a Russian expert Eugene Yuchik regarding cyber warfare.

Professor of Ural State Economic University and expert on competitive intelligence, Eugene Yuschik, considers the agreements that have been reached so far to reflect the desire of China and the United States to eliminate “random factors” that can begin a cyberwar.

“The situation mirrors the time when there was a nuclear arms race. Methods of cyber war today are liable to destruction, maybe less than nuclear bombardment of a village, but nevertheless still destructible,” Yuschik said.

He further said that cyber espionage can be very expensive and very dangerous because it can cause far-reaching and long-lasting consequences if important and huge corporations and organizations get hit.

“In this situation it is necessary, as the experience of the nuclear standoff of the 70-80s showed, to exclude two factors. First is to avoid accidentally pressing the trigger, when the actions of the other side are misinterpreted. Second is to avoid a third party that could intervene in between the two states. For these two factors there is a hotline which can quickly clarify unclear issues,” Yuschik said.

He mentioned that eliminating these two factors must be done with evidence, “in order to prevent the situation from sliding into a dangerous phase.”

“So the Sino-US agreement is primarily an opportunity to eliminate such random factors. It is not necessarily a demonstration of good will or good relations with each other,” the analyst said. 

Yuschik further said that by starting the inter-governmental consultations on combating cyber espionage, Xi Jinping and Barack Obama avoided bringing up the issue of limiting intelligence against each other. This is quite understandable because it makes no sense to hold back or not hold back information regarding mutual intelligence gathering and industrial espionage.

“It is a fact, that in any country, such as the United Kingdom, Russia and the United States there is a legislature that regulates spying in the context of who conducts it and who is the object of it.”

“Therefore, neither China nor the United States has anything to hide because this is already clear by default. Moreover, intelligence gathering is considered to be an absolutely normal activity because in fact, there is no other way to obtain any sort of sensitive information,” the analyst pointed out.

Following the recent dialogue between China and the US, China’s Xinhua news agency pointed out the main results of the two previous rounds of high-level talks. The first was held in Washington and the second in December of last year from June 13-14 in Beijing.

According to the agency, the plan of the two states is to strengthen cooperation on protecting cyberspace from potential threats. There has been an exchange of information disclosing crimes on the internet. There is now a system where expert consultants can work out the rules of the game in this sphere.

Finally, there is an agreement to hold a third round of dialogue in Washington. US authorities so far are satisfied with the progress in the exchange of information with China about cyber threats, as the representative of the US Department of Homeland Security Suzanne Spaulding had said.

She has high hopes for the development and adoption of obligations which attempt to put an end to the theft of trade secrets and confidential business information. She also noted the importance of regular contact with China regarding this situation and the importance of high-level cooperation between negotiators and experts.

Sputnik:

« NATO Does Not Appear To Have A Clear Cyberwar Strategy
UK Cybercrime Now Costs £1 Billion And Attacks Are Up 22% »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

Cyber Security Audit Corp (C3SA)

Cyber Security Audit Corp (C3SA)

C3SA specializes in architecting, operating, managing and improving defensible and resilient IT infrastructures for Canada's public and private sectors.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

Etonwood

Etonwood

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management.

VikingCloud

VikingCloud

VikingCloud (formerly Sysnet Global Solutions) offers organizations an integrated cybersecurity and compliance solution to make informed, predictive, and cost-effective risk mitigation and prevention

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

VISO Cyber Security

VISO Cyber Security

VISO provide Cyber Security Consulting and CISO as a Service to companies who need to augment their leadership teams with information security expertise.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.