U.S & China Talk Truce But Cyber War Remains

President Obama’s lavish White House welcome for Chinese President Xi Jinping was the first time the United States has hosted an “Official State Visit” for a country the US is at war with, however issues still exist.

The top US intelligence official told a hearing recently that he doesn't think a deal between the US and China will protect business from cyberattacks.

The US and China reached an agreement not to conduct or support cyberattacks on businesses during Chinese President Xi Jinping state visit last week. The US had been considering sanctions against China if it did not take steps to rain in cyber economic espionage.

But James Clapper said sanctions may still be needed. Clapper, the director of National Intelligence, told a Senate hearing on cybersecurity he was not optimistic about the agreement.

Mr Clapper said it was difficult to measure how much cyber espionage was conducted by the Chinese government, and would therefore be subject to the agreement. But this time it’s cyberwarfare, with potential worldwide economic implications if the Chinese decide to ban US software and hardware from their borders, which is a distinct possibility given their recent launch of nearly exact replicas of everything from Apple devices to Windows XP.

It’s almost certain that Beijing is waging large-scale, government-directed, cyberattacks at us: from our stock exchanges to our publicly exposed energy infrastructure to the recent hack of highly sensitive information on millions of US government employees.

This is not just a matter of trying to topple infrastructure, but rather a national security catastrophe that has given the Chinese the ability to target individuals who work in our government in any myriad of ways.
Yet, we can’t say with 100 percent certainty what we know to be true. If a country launches missiles, you have satellite evidence of their origin. If a fleet of ships attacks our shores, the culprit wants to be known. But when an opponent uses means of indirection to attack publicly exposed infrastructure, it’s difficult to name that opponent with certainty.
The sudden destruction of a Soviet natural gas pipeline going through Siberia in 1982 was allegedly a huge contributor to the nation’s bankruptcy and ultimate destruction, reportedly the result of us booby-trapping microchips to cause a massive explosion.

More recently the Stuxnet virus, almost certainly a NSA cyber-weapon, rigged centrifuges in Iran to self-destruct when they tried to enrich uranium. In fact, President Obama may be much more a fan of pre-emptive war than many believe, if you consider cyber attacks the modern-day equivalent.

The Chinese have long believed that US software contained back doors enabling snooping, and their fears were likely confirmed by former NSA contractor Edward Snowden’s leak of the PRISM program. The program is likely the reason that sitting at Obama’s state dinner table with the Chinese president were Microsoft CEO Satya Nadella, Apple CEO Tim Cook, Facebook CEO Mark Zuckerberg and Marc Benioff, CEO of Salesforce.com. Those four had one job: to reassure the Chinese that their software contained no back doors for enabling American spying.

At this point, that may well be true. Silicon Valley leaders have pushed back hard against PRISM, and there would be no good business reason to facilitate American spying at this point, unless forced to do so.

Obama and Xi put on a good show, answering press questions in tandem and proclaiming they had reached “an understanding” about cyber-warfare coming to a close. I don’t believe it for a second. The “Great Firewall” of China is here to stay until we find a way to bring Beijing to its knees, until we find their version of a trans-Siberian natural gas pipeline.

Ein News: http://bit.ly/1KVKoT2
BBC: http://bbc.in/1L8Jx56

« Integrating Video Analytics Technologies At Airports.
India Discusses Cyber 9/11 Prevention »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Black Duck Software

Black Duck Software

Black Duck Hub allows organizations to manage open source code security as well as license compliance risks.

AFCON Control & Automation

AFCON Control & Automation

AFCON is a leading global provider of software solutions and services for the smart management of Control & Automation systems in the age of Digital Transformation.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

TROOPERS

TROOPERS

TROOPERS InfoSec event consists of two days of high-end training, followed by a two-day, three-track conference, culminating in Roundtables on the final day.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Newberry Group

Newberry Group

The Newberry Group provides comprehensive IT services and solutions that optimize operations, minimize risk and deliver measurable business value.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

Apexanalytix

Apexanalytix

Apexanalytix is a leading provider of supplier onboarding, risk management and recovery solutions.