設萬維讀者為首頁 廣告服務 技術服務 聯繫我們 關於萬維
簡體 繁體 手機版
分類廣告
版主:納川
萬維讀者網 > 天下論壇 > 帖子
美中黑客協議,美國人發現吃虧上當了!
送交者: 春秋戈博客 2015年10月07日00:07:26 於 [天下論壇] 發送悄悄話

US, China Have Dueling Definitions of Cybersecurity

Doug Bernard

October 06, 2015 7:58 AM

WASHINGTON DC—

One of the most-anticipated outcomes of the president of China’s recent state visit to the United States was an agreement between the two countries on beefing up cybersecurity and putting a halt to economic espionage. But analysts question whether the deal actually can deliver. 

In a September 25 ceremony on the White House lawn, Chinese President Xi Jinping pledged that China would not participate in cyber espionage. U.S. President Barack Obama announced that both leaders had promised their respective countries’ increased cooperation in fighting corruption, money laundering and terrorist financing online.

"This is progress,” Obama said of the agreement, “but I have to insist that our work is not yet done."

Yet less than a week after Xi’s departure, James Clapper, the top U.S. intelligence official, appeared to throw cold water on the agreement. When asked at a Senate Armed Services Committee hearing whether the framework agreement could prevent Chinese hacking, Clapper gave a one-word answer: “No.” 

A growing number of analysts are questioning whether the framework is substantive enough to improve cybersecurity cooperation between China and the U.S. – or whether any such agreement is even possible, particularly when it comes to the theft of intellectual property.

Dueling definitions of cybersecurity

“I think it was a broad statement of generalities, which is not necessarily a bad thing,” said Dean Cheng, senior Chinese affairs research fellow at the Heritage Foundation, a nonprofit think tank. “But is that enough? Depends who you ask.”

While there are no specifics in the framework cybersecurity agreement – or “common understanding,” as it’s officially known – Obama said it affirms the principle that “governments don't engage in cyber espionage for commercial gain against companies."

But that, according to Cheng, is unlikely in the extreme.

“Deterring economic espionage is hard,” he said. “OK, the Chinese agreed not to engage is cyber espionage, which they’ve always said they never did anyway. Especially on economic issues, which, again, they’ve always denied. So what have we really got?”

China and much of the West, he said, have very different definitions of what constitutes cybersecurity. In the U.S., the term usually applies to hacking attacks and the basic integrity of computer networks, he said. However, in China, “cybersecurity” applies to nearly any activity that bolsters the nation or threatens Communist Party rule.

“China just passed a new national security law, which has a very broad and expansive view of what constitutes national security,” he said. “Economics is part of Chinese national security under the new law, which directly touches on economic cyber espionage.”

“In the U.S., the government sees itself as a partner to private industry, and not in the lead in safeguarding the Web,” said Tristan Reed, security analyst at Stratfor Global Intelligence. “This contrasts greatly with a country like China, where everything serves the state.”

China and Chinese industry, he said, has every incentive to continue economic espionage against the United States.

“The U.S. has far more to lose than China in intellectual property,” Reed said, “so while this agreement is probably the most significant step yet made, it’s not the solution and it’s not likely to end or even slow attacks coming from China.”

As long as Chinese industry continues to benefit from intellectual property stolen from U.S. firms, Reed told VOA, there’s not much the U.S. government can do in the short term except to help the private sector defend its data networks. “This agreement is a move for the U.S. to find an effective long-term policy,” he added.

Cyber’s attribution problem

International agreements on cyber espionage also present a unique challenge: that of attribution, or proving that a particular individual or government is responsible for a hack.

Attribution, the first step in determining a response, “is particularly challenging,” said Reed. “Though there are a lot of attacks from China, they’re all not necessarily going to be state-sponsored. Remember, it’s the economic incentive [of Chinese industry] that’s driving this.”

Cheng agreed. “Attribution can take a lot of time, and that raises the issue of how quickly you can retaliate. Cyber’s a cheap game. It’s not quite anyone with a laptop, but it’s very close, so you have to be very careful before you start retaliating,” he told VOA. 

While governments are traditionally leery of publicly revealing and possibly compromising their intelligence assets, the U.S. Department of Justice last year took the unusual step of indicting five Chinese army officers for infiltrating computer networks of six large U.S. corporations, making their attribution evidence public.

However, such measures are rare as they can compromise other valuable national intelligence assets.

Imposing economic sanctions might be another tool for government to deter cyber espionage. But the U.S. at least temporarily pulled such sanctions off the table before Xi’s state visit.

“Part of the problem with this framework agreement, which didn’t really agree on much, is that it’s put on hold the prospect of sanctions for some period of time,” Cheng said. “It would be remarkably rude for President Obama to say goodbye to Xi Jinping and then impose sanctions. But now we have to ask how long we wait for Chinese actions to change.”

Stratfor’s Reed said that overall, the framework is a good first step, but any effective deterrence policy must by necessity involve the U.S. tech and Internet industries.

“That’s one reason for Xi’s visit to Washington state,” he said, referencing the Chinese president’s meetings with the leaders of tech giants Apple, Facebook and Microsoft, among others. “The private sector is the target, and ultimately the one [that] has to be involved in talks and any agreement.”

Cheng, who calls the agreement “not particularly helpful,” targets another group for help in building lasting cybersecurity agreements: U.S. allies such as the United Kingdom, Japan, South Korea, Israel and Canada.

“There’s a lot of players in the cyber game,” he said. “It might be more helpful to sit down with our friends and allies, who share certain views of what constitutes security and acceptable behavior, to create a shared standard among ourselves." 

"That, arguably, would have been a better first starting point, rather than meeting with a country with very different views about what is acceptable cyber behavior.”


0%(0)
0%(0)
標 題 (必選項):
內 容 (選填項):
實用資訊
回國機票$360起 | 商務艙省$200 | 全球最佳航空公司出爐:海航獲五星
海外華人福利!在線看陳建斌《三叉戟》熱血歸回 豪情築夢 高清免費看 無地區限制
一周點擊熱帖 更多>>
一周回復熱帖
歷史上的今天:回復熱帖
2014: 為啥中共對香港普選害怕的要死?
2014: 毛澤東與境外反華勢力的故事補充1
2013: 王錚給薄熙來的第一封匯報信
2013: 毛左同志們鬧來鬧去無非是想延緩民主自
2012: 2B瘋傳的幾個謠言, 侮辱網友智商。
2012: 韓德強:給人民網講點法律
2011: 世界上最慘絕人寰的人為災難竟在中國(
2011: 老喬的死有那麼偉大嗎?兼談國人的文化
2010: 多印人民幣發給老百姓,可以阻止人民幣
2010: 毛澤東為什麼發動“文化大革命”?