Risk
2/20/2013
04:20 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

U.S. Trade Secret Strategy Targets Hackers

Amidst new reports of theft of intellectual property by Chinese hackers, the White House on Wednesday released a new strategy to fight trade secret theft.

Spy Tech: 10 CIA-Backed Investments
Spy Tech: 10 CIA-Backed Investments
(click image for larger view and for slideshow)
In the face of increasing concerns about the theft of U.S. intellectual property by foreign hackers, the White House Wednesday rolled out a strategy to protect U.S. trade secrets.

Attorney General Eric Holder, General Electric general counsel Karan Bhatia and other government and industry officials we among those speaking at a Wednesday afternoon White House event to announce the strategy document.

"We are fighting back more aggressively and more collaboratively than ever before [and] are poised to build on our recent successes," Holder said at the event. "We need to increase cooperation and coordination, we need to find ways to work together more effectively and efficiently, and we need to do so starting immediately because continuing technological expansion could lead to a dramatic increase in trade secret theft."

[ Want more on U.S. cybersecurity guidelines? Read White House Cybersecurity Executive Order: What It Means. ]

The White House places the fight against cyber attacks squarely at the center of its strategy. "U.S. companies, law firms, academia and financial institutions are experiencing cyber intrusion activity against electronic repositories containing trade secret information," the White House wrote in the introduction to the report.

Officials tied the plan to a recently issued White House executive order on cybersecurity that encourages cyber threat information sharing and adoption of cybersecurity standards. "We believe this new framework will ultimately improve the resiliency of businesses and prevent theft," Department of Commerce deputy secretary Rebecca Blank said at the White House event.

The release of the plan comes only a day after cybersecurity company Mandiant released a 60-page investigative report claiming that the Chinese military is behind many attacks against American companies over the last several years. China quickly denied involvement in any such attacks and slammed what it said was lack of proof in the report. Assistant attorney general Lanny Breuer, head of the Department of Justice's criminal division, cited the report at the event in detailing his concerns about trade secret theft.

Earlier in February, the President used the State of the Union address to express the need to combat the theft of trade secrets. "We know foreign countries and companies swipe our corporate secrets," Obama said. "We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.

The new strategy has five key parts, including coordinated international engagement, an effort to spur companies to look at their internal policies and encourage sharing of best practices to prevent trade secret theft, increased law enforcement efforts, efforts to strengthen trade secret laws such as recently happened when Congress closed loopholes for theft of source code, and increasing public awareness of trade secret theft problems.

In addition to Holder, Batia and Blank, other officials participating in the strategy announcement included U.S. intellectual property enforcement coordinator Victoria Espinel, Under Secretary of State for Economic Growth Robert Hormats, deputy U.S. trade representative Demetrios Marantis, national counterintelligence executive of the Office of the Director of National Intelligence Frank Montoya, Information Technology Industry Council CEO Dean Garfield, and American Superconductor Corp. general counsel John Powell.

Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple Deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR02 by March 2 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology. Register for Interop today!

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio