U.S & China Talk Truce But Cyber War Remains

President Obama’s lavish White House welcome for Chinese President Xi Jinping was the first time the United States has hosted an “Official State Visit” for a country the US is at war with, however issues still exist.

The top US intelligence official told a hearing recently that he doesn't think a deal between the US and China will protect business from cyberattacks.

The US and China reached an agreement not to conduct or support cyberattacks on businesses during Chinese President Xi Jinping state visit last week. The US had been considering sanctions against China if it did not take steps to rain in cyber economic espionage.

But James Clapper said sanctions may still be needed. Clapper, the director of National Intelligence, told a Senate hearing on cybersecurity he was not optimistic about the agreement.

Mr Clapper said it was difficult to measure how much cyber espionage was conducted by the Chinese government, and would therefore be subject to the agreement. But this time it’s cyberwarfare, with potential worldwide economic implications if the Chinese decide to ban US software and hardware from their borders, which is a distinct possibility given their recent launch of nearly exact replicas of everything from Apple devices to Windows XP.

It’s almost certain that Beijing is waging large-scale, government-directed, cyberattacks at us: from our stock exchanges to our publicly exposed energy infrastructure to the recent hack of highly sensitive information on millions of US government employees.

This is not just a matter of trying to topple infrastructure, but rather a national security catastrophe that has given the Chinese the ability to target individuals who work in our government in any myriad of ways.
Yet, we can’t say with 100 percent certainty what we know to be true. If a country launches missiles, you have satellite evidence of their origin. If a fleet of ships attacks our shores, the culprit wants to be known. But when an opponent uses means of indirection to attack publicly exposed infrastructure, it’s difficult to name that opponent with certainty.
The sudden destruction of a Soviet natural gas pipeline going through Siberia in 1982 was allegedly a huge contributor to the nation’s bankruptcy and ultimate destruction, reportedly the result of us booby-trapping microchips to cause a massive explosion.

More recently the Stuxnet virus, almost certainly a NSA cyber-weapon, rigged centrifuges in Iran to self-destruct when they tried to enrich uranium. In fact, President Obama may be much more a fan of pre-emptive war than many believe, if you consider cyber attacks the modern-day equivalent.

The Chinese have long believed that US software contained back doors enabling snooping, and their fears were likely confirmed by former NSA contractor Edward Snowden’s leak of the PRISM program. The program is likely the reason that sitting at Obama’s state dinner table with the Chinese president were Microsoft CEO Satya Nadella, Apple CEO Tim Cook, Facebook CEO Mark Zuckerberg and Marc Benioff, CEO of Salesforce.com. Those four had one job: to reassure the Chinese that their software contained no back doors for enabling American spying.

At this point, that may well be true. Silicon Valley leaders have pushed back hard against PRISM, and there would be no good business reason to facilitate American spying at this point, unless forced to do so.

Obama and Xi put on a good show, answering press questions in tandem and proclaiming they had reached “an understanding” about cyber-warfare coming to a close. I don’t believe it for a second. The “Great Firewall” of China is here to stay until we find a way to bring Beijing to its knees, until we find their version of a trans-Siberian natural gas pipeline.

Ein News: http://bit.ly/1KVKoT2
BBC: http://bbc.in/1L8Jx56

« Integrating Video Analytics Technologies At Airports.
India Discusses Cyber 9/11 Prevention »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

CyberCareers.gov

CyberCareers.gov

CyberCareers.gov is a platform for Cybersecurity Job Seekers, Federal Hiring Managers and Supervisors, Current Federal Cybersecurity Employees, Students and Universities.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

SignalFire

SignalFire

SignalFire invest across both enterprise and consumer sectors at the seed and early growth stages.

PreVeil

PreVeil

We started PreVeil to bring radically better security to ordinary business and personal communication and information storage.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.