Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
'The New Normal': US Charges Chinese Military Officers With Cyber Espionage
Threaded  |  Newest First  |  Oldest First
Charlie Babcock
100%
0%
Charlie Babcock,
User Rank: Ninja
5/19/2014 | 10:15:35 PM
'Yes, but we do it for freedom...'
This case is not exactly going to be "the shot heard 'round the world," whatever the its merits. Most of our allies suspect we have conducted business spying on them. They won't believe for a second that we haven't already done to the Chinese what we accuse them of doing to us. The former director of the CIA explained, "Yes, but we did it for freedom...." In the court of public opinion, that's a conflicted argument.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
5/20/2014 | 6:17:22 AM
Re: 'Yes, but we do it for freedom...'
The big difference here between NSA's spying and China's cyber espionage spying strategy is that China's is all about market competition, while NSA's purpose is national defense. While I agree the Snowden leaks show NSA overreach in some of its operations, the goals/mission are/were not the same as China's here. As George Kurtz said, the NSA isn't stealing aircraft plans from Airbus and giving them to Boeing. 
macker490
50%
50%
macker490,
User Rank: Ninja
5/20/2014 | 7:52:33 AM
Re: 'Yes, but we do it for freedom...'
@kelly

= "NSA's purpose is national defense."

their purported purpose... is looking for "terrorists" .   do you believe that?   or are they really looking for *dissidents* -- just like every ordinary tyrant.
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
5/20/2014 | 8:30:09 AM
Re: 'Yes, but we do it for freedom...'
I have a hard time believing the NSA is a tyrannical agency. An agency that oversteps at times? Yes. Are there some bad individuals in the agency? Likely. But it should come as no surprise after the "We failed to connect the dots" for 9/11 conclusion would not ultimately swing the pendulum to the extreme in its mission to help prevent another terrorist attack.
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
5/20/2014 | 7:34:43 AM
Re: 'Yes, but we do it for freedom...'
As I declared this morning to the Reuters I'm not surprised at the latest turn of events, this is just the "tip of the iceberg".

http://www.reuters.com/article/2014/05/20/us-cybercrime-usa-china-unit-idUSBREA4J08M20140520

http://securityaffairs.co/wordpress/25070/cyber-crime/pla-officials-accused-hacking.html

"I believe there's an ongoing battle in the cyberspace. These countries are investing large amounts in cyber units that are able to create specific malware and have the ability to get into foreign networks and computers to steal trade secrets and intellectual properties," he said.

As Charlie highlighted almost every US allies is sure that also NSA was spying on them also for marketing competition. 

Why spy on German Industries? Why spy on allies?

Anyway cyber espionage is common practice, I believe that first of all we must be concerned of militarization of Internet, other bad actors could benefit of this situation like cyber criminals and cyber terrorists.

Regards

Pierluigi

 

 


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7822
PUBLISHED: 2020-08-04
DaviewIndy has a Heap-based overflow vulnerability, triggered when the user opens a malformed image file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.
CVE-2020-7823
PUBLISHED: 2020-08-04
DaviewIndy has a Memory corruption vulnerability, triggered when the user opens a malformed image file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.
CVE-2020-6012
PUBLISHED: 2020-08-04
ZoneAlarm Anti-Ransomware before version 1.0.713 copies files for the report from a directory with low privileges. A sophisticated timed attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems.
CVE-2019-20001
PUBLISHED: 2020-08-04
An issue was discovered in RICOH Streamline NX Client Tool and RICOH Streamline NX PC Client that allows attackers to escalate local privileges.
CVE-2020-15467
PUBLISHED: 2020-08-04
The administrative interface of Cohesive Networks vns3:vpn appliances before version 4.11.1 is vulnerable to authenticated remote code execution leading to server compromise.