U.S. Poised to Fight Back Against China's Cyber Attacks

Jay Maxwell By Jay Maxwell, 20th Feb 2013 | Follow this author | RSS Feed
Posted in Wikinut>News>World

Businesses should be assured that law enforcement will operate with the utmost sensitivity toward victims of cyber attacks. - Preet Bharara

The Chinese Military

LOLITA C. BALDOR reports for the Associated Press: The Chinese military is now said to be the culprit behind various targeted U.S. cyber attacks. Further, the security breach has allowed them access to an inordinate amount of U.S. government data and corporate trade secrets. Is the Obama administration in a position to enact punitive measures against China? It is common knowledge that they hold the note on a staggering amount of American debt. That fact alone weakens our hand and may lead to more venomous attacks. Under consideration by the Obama administration, is the imposition of fines and other trade sanctions it may inflict upon Beijing or any other country guilty of cyber espionage. According to Washington insiders, the White House will draft a new proposal Wednesday that recommends initial, more robust measures the U.S. would take in response to what top authorities say has been an unrelenting campaign of cyber stealing traced to the Chinese government. The officials spoke on condition of anonymity because they were not permitted to speak openly about the proposed action.

What the White House Plans

The White House plans emerges after a Virginia-based cyber security firm released a cascade of details Monday that connected a covert Chinese military unit in Shanghai to years of cyber attacks against U.S. enterprises. After investigating breaches that victimized more than 140 businesses, it was concluded that they can be linked to the People's Liberation Army's Unit. Military officials accredits the unit for being part of the People's Liberation Army's cyber-command. As such, its activities would be subject to approval by the top echelon of China's military.The release of this invaluable report, underscoring the details of three of the alleged hackers and photographs of one of the military unit's buildings in Shanghai, makes public what U.S. authorities have said less publicly for years. But it also exerts pressure on the U.S. to respond more aggressively against the Chinese for what experts say has been years of systematic espionage. What would the repercussions be if the Chinese government violated our air space consistently? They would be escorted away by our planes, and further breaches would encourage threats of retaliation. Well espionage of this nature is committed numerous times per day, and there needs to be a defining line for repeated offenses and what the consequences are.

Spotlight Ways to Deter Hackers

Some experts contend that rather than tell companies to beef up their cyber security, the government needs to spotlight ways to deter the hackers and the nations that are hacking them. White House insiders intimate, that for the past year the White House has been pondering ways to respond to China, noting that this will be the year they will twists China's elbow to amend their ways. Although they concede there is no easy way to prevent this altogether. As expected The Chinese government, has denied involvement in the barrage of cyber-attacks that has drawn so much criticism. At the government level, this report is viewed as an instrument that can be used to have engaging dialogues with the Chinese, with allies, with others who are troubled by this problem and have an open dialogue without having to worry about disclosing classified information. So, one is left to assume that a lot of hot air will be devoted to this issue in the near future - and who knows beyond that point?

Tags

Cyber Attack 2013, Cyber Attacks, Cyber Attacks China, Cyber Attacks On Us, Cyber Espionage, Cyber Stealing, Hackers, The Chinese Military

Meet the author

author avatar Jay Maxwell


I am endeavoring to become a freelance article writer for now. Recent studies include a freelance writer's article and blog course offered by Growth Education.

Share this page

moderator Mark Gordon Brown moderated this page.
If you have any complaints about this content, please let us know

Comments

Add a comment
Username
Can't login?
Password