Risk
2/20/2013
04:20 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

U.S. Trade Secret Strategy Targets Hackers

Amidst new reports of theft of intellectual property by Chinese hackers, the White House on Wednesday released a new strategy to fight trade secret theft.

Spy Tech: 10 CIA-Backed Investments
Spy Tech: 10 CIA-Backed Investments
(click image for larger view and for slideshow)
In the face of increasing concerns about the theft of U.S. intellectual property by foreign hackers, the White House Wednesday rolled out a strategy to protect U.S. trade secrets.

Attorney General Eric Holder, General Electric general counsel Karan Bhatia and other government and industry officials we among those speaking at a Wednesday afternoon White House event to announce the strategy document.

"We are fighting back more aggressively and more collaboratively than ever before [and] are poised to build on our recent successes," Holder said at the event. "We need to increase cooperation and coordination, we need to find ways to work together more effectively and efficiently, and we need to do so starting immediately because continuing technological expansion could lead to a dramatic increase in trade secret theft."

[ Want more on U.S. cybersecurity guidelines? Read White House Cybersecurity Executive Order: What It Means. ]

The White House places the fight against cyber attacks squarely at the center of its strategy. "U.S. companies, law firms, academia and financial institutions are experiencing cyber intrusion activity against electronic repositories containing trade secret information," the White House wrote in the introduction to the report.

Officials tied the plan to a recently issued White House executive order on cybersecurity that encourages cyber threat information sharing and adoption of cybersecurity standards. "We believe this new framework will ultimately improve the resiliency of businesses and prevent theft," Department of Commerce deputy secretary Rebecca Blank said at the White House event.

The release of the plan comes only a day after cybersecurity company Mandiant released a 60-page investigative report claiming that the Chinese military is behind many attacks against American companies over the last several years. China quickly denied involvement in any such attacks and slammed what it said was lack of proof in the report. Assistant attorney general Lanny Breuer, head of the Department of Justice's criminal division, cited the report at the event in detailing his concerns about trade secret theft.

Earlier in February, the President used the State of the Union address to express the need to combat the theft of trade secrets. "We know foreign countries and companies swipe our corporate secrets," Obama said. "We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.

The new strategy has five key parts, including coordinated international engagement, an effort to spur companies to look at their internal policies and encourage sharing of best practices to prevent trade secret theft, increased law enforcement efforts, efforts to strengthen trade secret laws such as recently happened when Congress closed loopholes for theft of source code, and increasing public awareness of trade secret theft problems.

In addition to Holder, Batia and Blank, other officials participating in the strategy announcement included U.S. intellectual property enforcement coordinator Victoria Espinel, Under Secretary of State for Economic Growth Robert Hormats, deputy U.S. trade representative Demetrios Marantis, national counterintelligence executive of the Office of the Director of National Intelligence Frank Montoya, Information Technology Industry Council CEO Dean Garfield, and American Superconductor Corp. general counsel John Powell.

Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple Deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR02 by March 2 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology. Register for Interop today!

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9651
Published: 2015-08-28
Buffer overflow in CHICKEN 4.9.0.x before 4.9.0.2, 4.9.x before 4.9.1, and before 5.0 allows attackers to have unspecified impact via a positive START argument to the "substring-index[-ci] procedures."

CVE-2015-1171
Published: 2015-08-28
Stack-based buffer overflow in GSM SIM Utility (aka SIM Card Editor) 6.6 allows remote attackers to execute arbitrary code via a long entry in a .sms file.

CVE-2015-2987
Published: 2015-08-28
Type74 ED before 4.0 misuses 128-bit ECB encryption for small files, which makes it easier for attackers to obtain plaintext data via differential cryptanalysis of a file with an original length smaller than 128 bits.

CVE-2015-6266
Published: 2015-08-28
The guest portal in Cisco Identity Services Engine (ISE) 3300 1.2(0.899) does not restrict access to uploaded HTML documents, which allows remote attackers to obtain sensitive information from customized documents via a direct request, aka Bug ID CSCuo78045.

CVE-2015-6267
Published: 2015-08-28
Cisco IOS XE before 2.2.3 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted L2TP packet, aka Bug IDs CSCsw95722 and CSCsw95496.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.