Blog archive
Two knights facing each other on chess board

China's cyber spying: Time for a Cold War response?

The Internet has created “a golden age for intelligence collection,” says James Lewis, a fellow at the Center for Strategic and International Studies. In fact, he writes in a new paper on conflict in cyberspace,  “The primary challenge for sophisticated intelligence agencies is not the collection of data, so porous are Internet-based systems, but the ability to store, process and analyze the data they have acquired.”

This is not much of a surprise in the wake of recent reports such as that from Mandiant  detailing the incursion efforts by the Chinese People’s Liberation Army, believed responsible for penetrating the systems of more than 140 companies, many of them in the United States. The Mandiant study itself builds on earlier work by other security researchers. The clear message is that the Chinese are in U.S. systems, have been for some time, and are not likely to leave any time soon.

All of which raises the question: How do we protect ourselves against these attacks? Better security awareness would help. Organizations, both government and private, need to know what resources must be protected and then focus their efforts on those. Even organizations that are not targets can become vulnerable links in a chain of complex attacks and they need to protect themselves accordingly.

But relying on technology alone is not enough, Lewis says. The stakes are too high and the systems being targeted are too complex for that.

“Any analysis of cybersecurity needs to accept the fact that cyber espionage will continue,” he writes. Improving system security can discourage amateurs and criminals looking for easy money, “but advanced services, with their resources and their combined technical means, will retain an advantage. The task of cyber espionage will become more difficult, and a sophisticated opponent will still be able to achieve success.”

Government must bring to bear its intelligence, diplomatic and political resources, treating espionage as an IP and trade issue rather than a cybersecurity issue, Lewis writes. “Vigorous response is the key to managing cyber espionage.”

One roadblock to this approach has been the lack of attribution — the ability to identify the ultimate source of attacks with a high degree of confidence.

But Lewis says this is a false barrier, for two reasons. First, everybody knows China is doing this; and second, this is a matter of diplomacy, not a court of law, and proof doesn’t need to be established beyond a reasonable doubt. Diplomatic pressure and economic sanctions backed by intelligence could make it politically difficult for China to continue this behavior.

What is needed is an accepted set of international norms concerning behavior in cyberspace — the kinds of norms that helped the United States survive the Cold War. The Cold War “worked,” in that the United States and the Soviet Union were able to confront each other without nuclear war because there were more or less clearly defined roles and conventions with an understanding of what could be done and how. Currently, that is missing from cyberspace.

None of this means that firewalls and vulnerability patching are not important. They are. But while system administrators raise the technical bars, the policy wonks also will have to raise the political bars.

Posted by William Jackson on Feb 21, 2013 at 9:39 AM

inside gcn

  • cloud video processing

    Sprocket kicks video processing into high gear

Reader Comments

Fri, Feb 22, 2013

It is all too late though, because all ethernet NICs are equipped with hardware-backkdoors! And guess where they come from?

Fri, Feb 22, 2013

Economic dependency cuts both ways. The Chinese depend on the American market for their growth and also must protect their investments in U.S. paper. They dare not push us too far and are susceptible to diplomatic and economic pressure.

Thu, Feb 21, 2013 SS

The internet that is shared with state secrets should be on a non-linked system. If information is needed that should not be seen by other countries. Then it should be hand delivered, the cost can’t be more than what internet security cost.

Thu, Feb 21, 2013

The problem with the cold war analogy is that at the time, the Soviets did not own billions in US paper. We dare not push them too far lest they stop funding our govt.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above


HTML - No Current Item Deck
  • Transforming Constituent Services with Business Process Management
  • Improving Performance in Hybrid Clouds
  • Data Center Consolidation & Energy Efficiency in Federal Facilities

More from 1105 Public Sector Media Group