Risk
2/20/2013
04:20 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

U.S. Trade Secret Strategy Targets Hackers

Amidst new reports of theft of intellectual property by Chinese hackers, the White House on Wednesday released a new strategy to fight trade secret theft.

Spy Tech: 10 CIA-Backed Investments
Spy Tech: 10 CIA-Backed Investments
(click image for larger view and for slideshow)
In the face of increasing concerns about the theft of U.S. intellectual property by foreign hackers, the White House Wednesday rolled out a strategy to protect U.S. trade secrets.

Attorney General Eric Holder, General Electric general counsel Karan Bhatia and other government and industry officials we among those speaking at a Wednesday afternoon White House event to announce the strategy document.

"We are fighting back more aggressively and more collaboratively than ever before [and] are poised to build on our recent successes," Holder said at the event. "We need to increase cooperation and coordination, we need to find ways to work together more effectively and efficiently, and we need to do so starting immediately because continuing technological expansion could lead to a dramatic increase in trade secret theft."

[ Want more on U.S. cybersecurity guidelines? Read White House Cybersecurity Executive Order: What It Means. ]

The White House places the fight against cyber attacks squarely at the center of its strategy. "U.S. companies, law firms, academia and financial institutions are experiencing cyber intrusion activity against electronic repositories containing trade secret information," the White House wrote in the introduction to the report.

Officials tied the plan to a recently issued White House executive order on cybersecurity that encourages cyber threat information sharing and adoption of cybersecurity standards. "We believe this new framework will ultimately improve the resiliency of businesses and prevent theft," Department of Commerce deputy secretary Rebecca Blank said at the White House event.

The release of the plan comes only a day after cybersecurity company Mandiant released a 60-page investigative report claiming that the Chinese military is behind many attacks against American companies over the last several years. China quickly denied involvement in any such attacks and slammed what it said was lack of proof in the report. Assistant attorney general Lanny Breuer, head of the Department of Justice's criminal division, cited the report at the event in detailing his concerns about trade secret theft.

Earlier in February, the President used the State of the Union address to express the need to combat the theft of trade secrets. "We know foreign countries and companies swipe our corporate secrets," Obama said. "We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.

The new strategy has five key parts, including coordinated international engagement, an effort to spur companies to look at their internal policies and encourage sharing of best practices to prevent trade secret theft, increased law enforcement efforts, efforts to strengthen trade secret laws such as recently happened when Congress closed loopholes for theft of source code, and increasing public awareness of trade secret theft problems.

In addition to Holder, Batia and Blank, other officials participating in the strategy announcement included U.S. intellectual property enforcement coordinator Victoria Espinel, Under Secretary of State for Economic Growth Robert Hormats, deputy U.S. trade representative Demetrios Marantis, national counterintelligence executive of the Office of the Director of National Intelligence Frank Montoya, Information Technology Industry Council CEO Dean Garfield, and American Superconductor Corp. general counsel John Powell.

Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple Deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR02 by March 2 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology. Register for Interop today!

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2808
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a rel...

CVE-2015-0800
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2...

CVE-2015-0801
Published: 2015-04-01
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.

CVE-2015-0802
Published: 2015-04-01
Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a p...

CVE-2015-0803
Published: 2015-04-01
The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) ...

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.