U.S & China Talk Truce But Cyber War Remains

President Obama’s lavish White House welcome for Chinese President Xi Jinping was the first time the United States has hosted an “Official State Visit” for a country the US is at war with, however issues still exist.

The top US intelligence official told a hearing recently that he doesn't think a deal between the US and China will protect business from cyberattacks.

The US and China reached an agreement not to conduct or support cyberattacks on businesses during Chinese President Xi Jinping state visit last week. The US had been considering sanctions against China if it did not take steps to rain in cyber economic espionage.

But James Clapper said sanctions may still be needed. Clapper, the director of National Intelligence, told a Senate hearing on cybersecurity he was not optimistic about the agreement.

Mr Clapper said it was difficult to measure how much cyber espionage was conducted by the Chinese government, and would therefore be subject to the agreement. But this time it’s cyberwarfare, with potential worldwide economic implications if the Chinese decide to ban US software and hardware from their borders, which is a distinct possibility given their recent launch of nearly exact replicas of everything from Apple devices to Windows XP.

It’s almost certain that Beijing is waging large-scale, government-directed, cyberattacks at us: from our stock exchanges to our publicly exposed energy infrastructure to the recent hack of highly sensitive information on millions of US government employees.

This is not just a matter of trying to topple infrastructure, but rather a national security catastrophe that has given the Chinese the ability to target individuals who work in our government in any myriad of ways.
Yet, we can’t say with 100 percent certainty what we know to be true. If a country launches missiles, you have satellite evidence of their origin. If a fleet of ships attacks our shores, the culprit wants to be known. But when an opponent uses means of indirection to attack publicly exposed infrastructure, it’s difficult to name that opponent with certainty.
The sudden destruction of a Soviet natural gas pipeline going through Siberia in 1982 was allegedly a huge contributor to the nation’s bankruptcy and ultimate destruction, reportedly the result of us booby-trapping microchips to cause a massive explosion.

More recently the Stuxnet virus, almost certainly a NSA cyber-weapon, rigged centrifuges in Iran to self-destruct when they tried to enrich uranium. In fact, President Obama may be much more a fan of pre-emptive war than many believe, if you consider cyber attacks the modern-day equivalent.

The Chinese have long believed that US software contained back doors enabling snooping, and their fears were likely confirmed by former NSA contractor Edward Snowden’s leak of the PRISM program. The program is likely the reason that sitting at Obama’s state dinner table with the Chinese president were Microsoft CEO Satya Nadella, Apple CEO Tim Cook, Facebook CEO Mark Zuckerberg and Marc Benioff, CEO of Salesforce.com. Those four had one job: to reassure the Chinese that their software contained no back doors for enabling American spying.

At this point, that may well be true. Silicon Valley leaders have pushed back hard against PRISM, and there would be no good business reason to facilitate American spying at this point, unless forced to do so.

Obama and Xi put on a good show, answering press questions in tandem and proclaiming they had reached “an understanding” about cyber-warfare coming to a close. I don’t believe it for a second. The “Great Firewall” of China is here to stay until we find a way to bring Beijing to its knees, until we find their version of a trans-Siberian natural gas pipeline.

Ein News: http://bit.ly/1KVKoT2
BBC: http://bbc.in/1L8Jx56

« Integrating Video Analytics Technologies At Airports.
India Discusses Cyber 9/11 Prevention »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

EIT Digital

EIT Digital

EIT Digital is a leading digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. Areas of focus include digital infrastructure and cyber security.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

ACPL Systems

ACPL Systems

We offer leading-edge technology solutions, expert professional and managed services and proven methodologies to ensure your data is protected and business risks are reduced.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.

Corgea

Corgea

Corgea is AI-powered security platform that finds, triages and fixes your insecure code.

AC3

AC3

AC3 is a leading secure cloud services provider, focused on turning your technology challenges into real results.