Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
'The New Normal': US Charges Chinese Military Officers With Cyber Espionage
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
5/20/2014 | 8:30:09 AM
Re: 'Yes, but we do it for freedom...'
I have a hard time believing the NSA is a tyrannical agency. An agency that oversteps at times? Yes. Are there some bad individuals in the agency? Likely. But it should come as no surprise after the "We failed to connect the dots" for 9/11 conclusion would not ultimately swing the pendulum to the extreme in its mission to help prevent another terrorist attack.
macker490
50%
50%
macker490,
User Rank: Ninja
5/20/2014 | 7:52:33 AM
Re: 'Yes, but we do it for freedom...'
@kelly

= "NSA's purpose is national defense."

their purported purpose... is looking for "terrorists" .   do you believe that?   or are they really looking for *dissidents* -- just like every ordinary tyrant.
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
5/20/2014 | 7:34:43 AM
Re: 'Yes, but we do it for freedom...'
As I declared this morning to the Reuters I'm not surprised at the latest turn of events, this is just the "tip of the iceberg".

http://www.reuters.com/article/2014/05/20/us-cybercrime-usa-china-unit-idUSBREA4J08M20140520

http://securityaffairs.co/wordpress/25070/cyber-crime/pla-officials-accused-hacking.html

"I believe there's an ongoing battle in the cyberspace. These countries are investing large amounts in cyber units that are able to create specific malware and have the ability to get into foreign networks and computers to steal trade secrets and intellectual properties," he said.

As Charlie highlighted almost every US allies is sure that also NSA was spying on them also for marketing competition. 

Why spy on German Industries? Why spy on allies?

Anyway cyber espionage is common practice, I believe that first of all we must be concerned of militarization of Internet, other bad actors could benefit of this situation like cyber criminals and cyber terrorists.

Regards

Pierluigi

 

 
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
5/20/2014 | 6:17:22 AM
Re: 'Yes, but we do it for freedom...'
The big difference here between NSA's spying and China's cyber espionage spying strategy is that China's is all about market competition, while NSA's purpose is national defense. While I agree the Snowden leaks show NSA overreach in some of its operations, the goals/mission are/were not the same as China's here. As George Kurtz said, the NSA isn't stealing aircraft plans from Airbus and giving them to Boeing. 
Charlie Babcock
100%
0%
Charlie Babcock,
User Rank: Ninja
5/19/2014 | 10:15:35 PM
'Yes, but we do it for freedom...'
This case is not exactly going to be "the shot heard 'round the world," whatever the its merits. Most of our allies suspect we have conducted business spying on them. They won't believe for a second that we haven't already done to the Chinese what we accuse them of doing to us. The former director of the CIA explained, "Yes, but we did it for freedom...." In the court of public opinion, that's a conflicted argument.


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19071
PUBLISHED: 2019-11-18
A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.
CVE-2019-19072
PUBLISHED: 2019-11-18
A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
CVE-2019-19073
PUBLISHED: 2019-11-18
Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, ...
CVE-2019-19074
PUBLISHED: 2019-11-18
A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
CVE-2019-19075
PUBLISHED: 2019-11-18
A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.