theDocumentId => 1132810 Secretary Clinton: Countries, Individuals Who Wage ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/21/2010
03:43 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Secretary Clinton: Countries, Individuals Who Wage Cyberattacks Should 'Face Consequences And International Condemnation'

U.S. Secretary of State again calls on China to investigate attacks on Google, others

It was a speech mostly promoting Internet freedom around the world, but U.S. Secretary of State Hillary Clinton today also called out China in light of allegations by Google that a wave of targeted attacks on Google and other companies originated from that country.

"The most recent situation involving Google has attracted a great deal of interest. And we look to the Chinese authorities to conduct a thorough review of the cyberintrusions that led Google to make its announcement. And we also look for that investigation and its results to be transparent," Clinton said today in a speech at the Newseum in Washington, D.C.

Google has threatened to pull out its operations in China in light of the attacks, which resulted in the loss of source code from the search engine giant. In order to do business there, Google had to make censorship concessions with the Chinese government.

Earlier in the speech, Clinton had remarked that an attack on one nation's network can constitute an attack on all nations in the Internet-connected world. She also warned that nations need to unite against these attacks: "Countries or individuals that engage in cyberattacks should face consequences and international condemnation," Clinton said.

Clinton maintained that governments and their people should be able to rely on safe and "resilient" networks running their national security and economic interests. "Now this is about more than petty hackers who deface Websites. Our ability to bank online, use electronic commerce, and safeguard billions of dollars in intellectual property are all at stake if we cannot rely on the security of our information networks," she said. "Disruptions in these systems demand a coordinated response by all governments, the private sector, and the international community. We need more tools to help law enforcement agencies cooperate across jurisdictions when criminal hackers and organized crime syndicates attack networks for financial gain."

Tom Kellermann, vice president of security awareness for Core Security, says Clinton's remarks missed the mark given the recent events, demonstrating the lack of a cohesive cyberstrategy within the Obama administration: "The focus [in her speech] was more on open access to communications within China. It should be more focused on determining the Chinese cyber-threat by the government or the tens of thousands of proxies hacking away at corporate America and government agencies," Kellermann says.

Clinton called for coordinated efforts among governments, the private sector, and the international community: "We need more tools to help law enforcement agencies cooperate across jurisdictions when criminal hackers and organized crime syndicates attack networks for financial gain," she said, and that this includes fighting "social ills," such as child pornography and the exploitation of trafficked women and girls online.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23412
PUBLISHED: 2021-07-23
All versions of package gitlogplus are vulnerable to Command Injection via the main functionality, as options attributes are appended to the command to be executed without sanitization.
CVE-2021-3159
PUBLISHED: 2021-07-23
A stored cross site scripting (XSS) vulnerability in the /sys/attachment/uploaderServlet component of Landray EKP V12.0.9.R.20160325 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG, SHTML, or MHT file.
CVE-2021-25203
PUBLISHED: 2021-07-23
Arbitrary file upload vulnerability in Victor CMS v 1.0 allows attackers to execute arbitrary code via the file upload to \CMSsite-master\admin\includes\admin_add_post.php.
CVE-2021-25204
PUBLISHED: 2021-07-23
Cross-site scripting (XSS) vulnerability in SourceCodester E-Commerce Website v 1.0 allows remote attackers to inject arbitrary web script or HTM via the subject field to feedback_process.php.
CVE-2021-25206
PUBLISHED: 2021-07-23
Arbitrary file upload vulnerability in SourceCodester Responsive Ordering System v 1.0 allows attackers to execute arbitrary code via the file upload to Product_model.php.