U.S & China Talk Truce But Cyber War Remains

President Obama’s lavish White House welcome for Chinese President Xi Jinping was the first time the United States has hosted an “Official State Visit” for a country the US is at war with, however issues still exist.

The top US intelligence official told a hearing recently that he doesn't think a deal between the US and China will protect business from cyberattacks.

The US and China reached an agreement not to conduct or support cyberattacks on businesses during Chinese President Xi Jinping state visit last week. The US had been considering sanctions against China if it did not take steps to rain in cyber economic espionage.

But James Clapper said sanctions may still be needed. Clapper, the director of National Intelligence, told a Senate hearing on cybersecurity he was not optimistic about the agreement.

Mr Clapper said it was difficult to measure how much cyber espionage was conducted by the Chinese government, and would therefore be subject to the agreement. But this time it’s cyberwarfare, with potential worldwide economic implications if the Chinese decide to ban US software and hardware from their borders, which is a distinct possibility given their recent launch of nearly exact replicas of everything from Apple devices to Windows XP.

It’s almost certain that Beijing is waging large-scale, government-directed, cyberattacks at us: from our stock exchanges to our publicly exposed energy infrastructure to the recent hack of highly sensitive information on millions of US government employees.

This is not just a matter of trying to topple infrastructure, but rather a national security catastrophe that has given the Chinese the ability to target individuals who work in our government in any myriad of ways.
Yet, we can’t say with 100 percent certainty what we know to be true. If a country launches missiles, you have satellite evidence of their origin. If a fleet of ships attacks our shores, the culprit wants to be known. But when an opponent uses means of indirection to attack publicly exposed infrastructure, it’s difficult to name that opponent with certainty.
The sudden destruction of a Soviet natural gas pipeline going through Siberia in 1982 was allegedly a huge contributor to the nation’s bankruptcy and ultimate destruction, reportedly the result of us booby-trapping microchips to cause a massive explosion.

More recently the Stuxnet virus, almost certainly a NSA cyber-weapon, rigged centrifuges in Iran to self-destruct when they tried to enrich uranium. In fact, President Obama may be much more a fan of pre-emptive war than many believe, if you consider cyber attacks the modern-day equivalent.

The Chinese have long believed that US software contained back doors enabling snooping, and their fears were likely confirmed by former NSA contractor Edward Snowden’s leak of the PRISM program. The program is likely the reason that sitting at Obama’s state dinner table with the Chinese president were Microsoft CEO Satya Nadella, Apple CEO Tim Cook, Facebook CEO Mark Zuckerberg and Marc Benioff, CEO of Salesforce.com. Those four had one job: to reassure the Chinese that their software contained no back doors for enabling American spying.

At this point, that may well be true. Silicon Valley leaders have pushed back hard against PRISM, and there would be no good business reason to facilitate American spying at this point, unless forced to do so.

Obama and Xi put on a good show, answering press questions in tandem and proclaiming they had reached “an understanding” about cyber-warfare coming to a close. I don’t believe it for a second. The “Great Firewall” of China is here to stay until we find a way to bring Beijing to its knees, until we find their version of a trans-Siberian natural gas pipeline.

Ein News: http://bit.ly/1KVKoT2
BBC: http://bbc.in/1L8Jx56

« Integrating Video Analytics Technologies At Airports.
India Discusses Cyber 9/11 Prevention »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

RiskRecon

RiskRecon

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties.

Fortalice

Fortalice

Fortalice provide customizable consulting services built on proven methodology to strengthen your business cyber security defenses.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

Network Center Inc (NCI)

Network Center Inc (NCI)

NCI is one of the largest IT solution providers in the Midwest. We specialize in industry specific technology solutions, service, support, and expertise for small to enterprise businesses.

Razorpoint Cybersecurity

Razorpoint Cybersecurity

Razorpoint’s world-class security experts have provided advanced, effective cybersecurity expertise to corporate and public-sector organizations around the world.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.