CIO Today

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
Daily Briefing for Technology's Top Decision-Makers
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Wednesday, April 23rd 
24/7/365 Network Uptime!
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Enterprise Software
Enterprise Hardware
Big Data
Network Security
Cloud Computing
CRM Systems
Data Storage
Operating Systems
Communications
CIO Issues
Mobile Tech
Chips & Processors
World Wide Web
Business Briefing
After Hours
Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Network Security

Intelligence Report: China Targets U.S. with Cyber-Espionage

Intelligence Report: China Targets U.S. with Cyber-Espionage
February 11, 2013 1:59PM

Bookmark and Share
The National Intelligence Estimate noted that hacking for economic intelligence has been conducted by Russia, Israel and France, but said their efforts were minor compared with the attacks emanating from China. According to The Washington Post, the Obama administration is reviewing options, including formal diplomatic protests or expulsion of Chinese diplomats.

APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.

It seems like the premise of a Cold War novel. A new intelligence assessment concludes that the United States is the target of a sustained campaign of cyber-espionage being directed out of China.

According to a report in Sunday's Washington Post, the National Intelligence Estimate pinpoints China as aggressively attempting to infiltrate the computers of American companies and governmental agencies, as a way to gain economic leverage. The report cites "individuals familiar with the report," who spoke on condition of anonymity.

The Estimate is the consensus view of U.S. intelligence agencies, and it said the sustained hacking attacks over the last five years targeted a variety of economically critical industries, including finance, energy, IT, aerospace and automobiles. The financial impact is not included in the report, but the Post story said that outside experts estimate the impact as being in the tens of billions of dollars. The Chinese government has consistently denied any role in cyber-attacks.

Stream of Stories

A steady stream of stories in the last few years have consistently pointed to major, organized hacking efforts originating in China.

A survey last spring of IT professionals by security firm Bit9, for instance, found that 64 percent of respondents expected their organization to be the target of an organized cyber-attack within six months. Among those who expressed concern about attacks from specific nations, China was tops.

In February of last year, Nortel Networks revealed that hackers, thought to be based in China, had access to the company's internal network for almost a decade. The hackers obtained technical papers, R&D reports, business plans, and internal e-mails, among other documents. There were indications that some of the data was sent to e-mail addresses in Shanghai.

In August 2011, a report from security firm McAfee detailed sophisticated cyber-attacks over five years on 72 organizations, including the United Nations, the International Olympic Committee, the government of India, and military contractors and steel companies in the U.S. Although the attacker was not identified, some security experts said there were signs pointing to China -- including the fact that Chinese institutions and companies were not targeted.

U.S. Reviewing Options

In June 2011, Google reported that a cyber-attack, originating in China, had attempted to steal Gmail user names and passwords, including those of U.S. government officials and Chinese political activists. Google's report was substantiated by one of the U.S. diplomatic cables released by WikiLeaks. The cable, sent by the U.S. Embassy in China to Washington, D.C., reported that it knew of a "Chinese contact" who confirmed that country's role in the attack.

There have also been cyber-attacks that reportedly came from China on the network security company RSA Security, the defense contractor Lockheed Martin, and The New York Times, The Wall Street Journal and The Washington Post.

The Post noted that the Obama administration is reviewing options to combat online attacks, including those on trade secrets, through formal diplomatic protests or expulsion of Chinese diplomats, complaints filed to the World Trade Organization, and other measures.

The Intelligence Estimate noted that hacking for economic intelligence has also been conducted by Russia, Israel and France, but said their efforts were minor compared with the attacks emanating from China.

Tell Us What You Think
Comment:

Name:



 Network Security
1. Lessons from Verizon's Threat Report
2. Verizon Report Exposes Cyberthreats
3. How Are Web Sites Post-Heartbleed?
4. White House Updating Privacy Policy
5. Target Hackers May Be Tough To Find




 Most Popular Articles
1. BlackBerry Drops T-Mobile After Nasty Spat
2. Cisco, IBM Launch Internet of Things Consortium
3. Salesforce CRM Gets Industry Specific for Internet of Customers
4. Intel Bets on Cloudera for Big Data Analytics
5. SAP HANA Data Warehouse App Gets Faster Analytics

Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Google Maps, Now with Time Travel
  Lessons from Verizon's Threat Report
  NYPD Twitter Campaign Backfires
  Net Gets Faster, But Easier to Attack
  OnePlus One Boasts Android Weapon

 Technology Marketplace
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 
Navigation
CIO Today
Home/Top News | Enterprise Software | Enterprise Hardware | Big Data | Network Security | Cloud Computing | CRM Systems
Data Storage | Operating Systems | Communications | CIO Issues | Mobile Tech | Chips & Processors | World Wide Web
Business Briefing | After Hours | Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 CIO Today. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.