Crossroads Blog | CYBER SECURITY LAW AND POLICY

cyber attack, Cyber Exploitation

Most China-based Hacking Done By Select Few: CBS News

On Dec. 12th, 2011, CBS News reported on how analysts have determined that 12 different Chinese groups are responsible for most of the China-based hacking against the United States.  According to the article, these groups have the backing of the Chinese government, and analysts used digital signatures to trace the activities of these specific groups.  Moreover, US authorities have given the hackers names, can tell where they are, and may be able to tell who they are.  The article also says that the Chinese government gives these hackers shopping lists for specific US technologies or confidential information.  Sometimes two hacker groups are given the same list, and they compete to see who can bring home the most US technology the fastest.

The article really highlights the lack of US deterrence to these cyberattacks.  Without reciprocity agreements, the US can't legally get to the Chinese hackers.  The article quoted James Cartwright, former vice chairman of the Joint Chiefs of Staff, as saying "Right now we have the worst of worlds . . . If you want to attack me you can do it all you want, because I can't do anything about it. It's risk-free, and you're willing to take almost any risk to come after me."

The rest of the article can be found here.

Leave a Reply

cyber attack, Cyber Exploitation

Most China-based Hacking Done By Select Few: CBS News

On Dec. 12th, 2011, CBS News reported on how analysts have determined that 12 different Chinese groups are responsible for most of the China-based hacking against the United States.  According to the article, these groups have the backing of the Chinese government, and analysts used digital signatures to trace the activities of these specific groups.  Moreover, US authorities have given the hackers names, can tell where they are, and may be able to tell who they are.  The article also says that the Chinese government gives these hackers shopping lists for specific US technologies or confidential information.  Sometimes two hacker groups are given the same list, and they compete to see who can bring home the most US technology the fastest.

The article really highlights the lack of US deterrence to these cyberattacks.  Without reciprocity agreements, the US can't legally get to the Chinese hackers.  The article quoted James Cartwright, former vice chairman of the Joint Chiefs of Staff, as saying "Right now we have the worst of worlds . . . If you want to attack me you can do it all you want, because I can't do anything about it. It's risk-free, and you're willing to take almost any risk to come after me."

The rest of the article can be found here.

Leave a Reply