China Calls US a 'Cyber Bully' After False Accusation

AP_25249825046-540x360.jpg

The New York Times headline: “U.S. Decides to Retaliate Against China's Hacking.”

China has warned the US to “think twice” before lashing out at Beijing due to unfounded hacking accusations, cautioning that it is “strongly determined to protect the safety of its cyber space and reserves all rights to counter any outside threats and intrusions”, the Chinese news agency Xinhua reported. It cautions that the US is “on the brink of making another grave mistake in the name of protecting cyber security”.

“The United States, which made a mistake last year when it brought false charges against Chinese officers, should not repeat the mistake by taking retaliatory measures against China over the OPM incident,” read an op-ed article in New China, the English language website of its state news agency Xinhua.

“Just like it protects its territorial sovereignty and integrity, China is strongly determined to protect the safety of its cyber space and reserves all rights to counter any outside threats and intrusions. It will meet any form of political or economic retaliation with corresponding countermeasures,” it further warns.
The US media have widely reported that President Barack Obama's administration had determined to retaliate against China for its alleged theft of the personnel information of more than 20 million Americans from the database of the Office of Personnel Management (OPM), but the forms and specific measures of the retaliation have not been decided.

The report added that Obama has allegedly ordered his staff to come up with "a more creative set of responses," while a US official hinted that the United States will employ "a full range of tools to tailor a response."

Xinhua says that the US is “demonizing China as the culprit behind the massive breach of the OPM computer networks. As witnessed by most past similar cases, the US government, Congress and media have once again called for punishing China for this, after a top US intelligence official indirectly pointed a finger at China.”
China, however, has repeatedly stated that it is against all forms of cyber-attacks and will crack down on them, as it has long been a major victim of such illegal activities, many of which originated in the United States.
China has also called for conducting cooperation with the US side and any other country to protect cyber-security and its peaceful order.
“By repeatedly blaming China for hacking into its government computers, Washington apparently tries to portray Beijing as the No. 1 bad guy in cyber space, but this is doomed to fail because the United States is the most powerful country with the most advanced cyber-technology,” the agency says.

It supposes that cyber-security has become another tool for Washington to exert pressure on China and another barrier that restrains the further development of China-US relations.
“By heating up the issue of the OPM hacking, Washington perhaps also aims to pressure China to restore the bilateral cyber work group which was suspended last year after Washington sued five Chinese military officers on so-called charges of commercial espionage despite strong protests from China,” it adds.

As exposed by former US defense contractor Edward Snowden, it says, the US government has been notoriously and blatantly engaged in worldwide surveillance operations against numerous other countries. To divert criticism against its relentless espionage activities, it portrays itself as a victim of cyber-attacks.
“If it stubbornly implements retaliatory measures against China in cyber-space, it will be known for being a cyber-bully and will have to shoulder responsibility for escalating confrontation and disrupting the peaceful order in cyber space,” it adds.
Sputnik: http://bit.ly/1hJCDrI

« A Drone That Hacks Computers
Cyber Hackers Can Now Remotely Shoot Someone Else’s Sniper Rifle »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ObserveIT

ObserveIT

ObserveIT helps companies identify & eliminate insider threats. Visually monitor & quickly investigate with our easy-deploy user activity monitoring solution.

IT Security House

IT Security House

IT Security House is a leading European supplier of Cyber Security Intelligence and eCrime services.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

nandin Innovation Centre

nandin Innovation Centre

nandin is ANSTO’s Innovation Centre (Australian Nuclear Science and Technology Organisation) where science and technology entrepreneurs, startups and graduates come together.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.

Securitribe

Securitribe

Securitribe provides cybersecurity and compliance solutions, including vCISO services, ISO27001, and ASD Essential 8 advisory, helping businesses and government strengthen security & compliance.

Click Studios

Click Studios

Click Studios is an Agile software development company specialising in the development of a secure Enterprise Password Management solution called Passwordstate.