SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
4/15/16, 4:17 PMCyber Security from China’s Perspective – What the Experts Say – Boston Global Forum
Page 1 of 3http://bostonglobalforum.org/2016/02/cyber-security-from-chinas-perspective-what-the-experts-say/
SUBSCRIBE & FOLLOW
SEARCH …
Primary Menu
Primary Menu
Primary Menu
CYBER SECURITY FROM CHINA’S PERSPECTIVE – WHAT THE EXPERTS SAYCYBER SECURITY FROM CHINA’S PERSPECTIVE – WHAT THE EXPERTS SAY
0
(12th Feb 2016) Dick Pirozzolo – Managing Director of Pirozzolo Company Public Relations shared his view about how China thinks about
cyber-security. Dick Pirozzolo serves on the editorial board of Boston Global Forum and is co-author, with Michael Morris, of a forthcoming
novel that takes place in Vietnam during April of 1975.
U.S. OFFICIALLY LAUNCHESU.S. OFFICIALLY LAUNCHES
CYBERWAR ON ISLAMIC STATECYBERWAR ON ISLAMIC STATE
LINKS TO CHINESE OFFICIALS INLINKS TO CHINESE OFFICIALS IN
OFFSHORE TAX-HAVENOFFSHORE TAX-HAVEN
DOCUMENT DROPDOCUMENT DROP
FIGHT OVER DATA PRIVACY MAYFIGHT OVER DATA PRIVACY MAY
BE JUST STARTINGBE JUST STARTING
FBI PUTS 2 SYRIAN HACKERS ONFBI PUTS 2 SYRIAN HACKERS ON
A MOST-WANTED LISTA MOST-WANTED LIST
CHINESE CYBER-ATTACKS ONCHINESE CYBER-ATTACKS ON
U.S. CONTINUE UNABATEDU.S. CONTINUE UNABATED
APPLE HYPOCRITICAL IN BATTLEAPPLE HYPOCRITICAL IN BATTLE
WITH FBI OVER IPHONE?WITH FBI OVER IPHONE?
APPLE SHOULD GIVE ACCESS TOAPPLE SHOULD GIVE ACCESS TO
TERRORIST’S IPHONETERRORIST’S IPHONE
DNI: CHINA CONTINUES CYBERDNI: CHINA CONTINUES CYBER
ESPIONAGEESPIONAGE
A FIGHT OVER ADS,A FIGHT OVER ADS,
ENCRYPTION AND LAWENCRYPTION AND LAW
ENFORCEMENTENFORCEMENT
OBAMA PLEADS FOROBAMA PLEADS FOR
COOPERATION ON SMARTPHONECOOPERATION ON SMARTPHONE
4/15/16, 4:17 PMCyber Security from China’s Perspective – What the Experts Say – Boston Global Forum
Page 2 of 3http://bostonglobalforum.org/2016/02/cyber-security-from-chinas-perspective-what-the-experts-say/
Read his view below
Why China hacks may be more in the Communist Party’s DNA and view of the Internet than anything else, according to Sharon Hom,
executive director of Human Rights in China, a Chinese Non-Government Organization. Hom spoke during a recent panel discussion
organized by the Christian Science Monitor in Boston.
Hom explained, “While in the US and most of the world, citizens regard the Internet as a big open international and transparent
communication phenomenon,
the Communist Party wants control of society and information. Though it is not a linear path from censorship and control to hacking the Internet,
the Party needs to manage expression online.” In China, “Cyber security means security of the Party.”
The event was organized, in part, to promote the Monitor’s online section Passcode which it bills as a field guide to security and privacy.
When it comes to establishing international norms for Internet behavior that would presumably reduce hacking, Hom is not optimistic pointing
out that whenever norms come up, China, Iran, Russia, Pakistan and other bad actors, unite to pose obstacles in a, “race to the bottom.”
In sharp contrast to these nations, Boston Global Forum has recognized Japan, host of the next G7 meeting in March, for supporting
international norms. Commenting on the Forum’s international ethics code of conduct, Japan’s Prime Minister Shinzo Abe told Boston-based
think tank members: “Japan will continue to cooperate closely with the US and other partners … while playing a leading role in achieving the
peace and stability of the international community.”
In addition to Japan and the US, G7 nations include Canada, France, Germany, Great Britain, and Italy.
Panelist Adam Segal added, that the Chinese government sees the Internet from the perspective of “cyber sovereignty and as an entity that the
government can develop as it sees fit.”
Segal, director of the Digital Cyberspace Policy Program at the Council on Foreign Relations emphasized that a big part of China’s incentive to
hack other nation’s computers is to obtain intellectual property from foreign companies. Segal told attendees, “China does not want to be the
factory of the world and is worried about the future of technology.” For example, “While China probably manufacturers all the DVD players
sold in the world, the head that reads the disc is proprietary and owned by companies in Japan.”
Though China’s theft of 22 million personnel records from the Federal Office of Personnel Management is well known, private companies have
been closed mouthed about such intrusions until Google announced, “We’ve been hacked along with 30 other companies,” according to
Segal. Segal also reported on a hack of Boeing’s computer’s a few years ago in his cover article titled: Why China Hacks the World, in the
February 1, 2016 edition of The Christian Science Monitor Weekly.
ACCESSACCESS
4/15/16, 4:17 PMCyber Security from China’s Perspective – What the Experts Say – Boston Global Forum
Page 3 of 3http://bostonglobalforum.org/2016/02/cyber-security-from-chinas-perspective-what-the-experts-say/
JOHN SAVAGE Live on Feb 22: John Savage’s talk on Strategies for Combating Cyber-
Terrorism
In addition to stealing intellectual property to gain technological advantage, China is also engaged in what Segal called the world’s oldest
profession “espionage” and strives to obtain secrets about the F22 and F35 fighter jets and other weapon systems. China also uses hacking as
a form of external censorship by “intimidating reporters, “ who write articles unfavorable to this nation of 1.4 Billion.
“Is there bad hacking and good hacking?” asked moderator Mike Farrell, editor of the Monitor’s Passcode publication. Panelists agreed that
government-to-government spying is considered acceptable, but for a government to hack into another country’s businesses steal the information
and pass it to companies inside its own borders is outside any acceptable norm.
Michael Sulmeyer, director of the Belfer Center’s Cyber Security Project at the Harvard Kennedy School, pointed out that the current state of
cyber security “is like leaving a bag money on your front lawn and being stunned to learn that someone stole it during the night. At least make
harder. Make them work. Make sure it’s not the jayvee team but that the varsity team is needed hack into your systems.”
While it might be comforting to think about like-kind retaliation, it is not always possible. Segal explained relationships between the US and
China are complex and come with competing values, “Fifty percent of Apple’s revenue comes from China. One of the worlds biggest
technology companies is not likely to want heavy-handed retaliation.”
Though Hom devotes much of her time to combatting cyber hacking and theft, she says people in her office continue to ignore fundamental
security measures and continue to, “stick Post-it notes to their computers containing their passwords, because they have so many to remember.”
“Cyber defenses though are a stopgap. The real solution is more evolutionary,” says Hom and will come about, ‘When governments like China
stop using the Internet as a tool of social engineering.”
Tweet
0
Posted in BGF's Focus
0LikeLike
ShareShare
BOSTON GLOBAL FORUMBOSTON GLOBAL FORUM
BEACON HILL, BOSTON, MA 02108
TEL: +1 (617) 286 6589
SKYPE: BOSTONGLOBALFORUM
E-MAIL: OFFICE@BOSTONGLOBALFORUM.ORG
SUBSCRIBE & FOLLOW
Copyright © 2016 Boston Global Forum www.bostonglobalforum.org

Contenu connexe

Tendances

What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?Phil Cryer
 
[CB20] Is Dis-information more attractive than True-information? : Reduce the...
[CB20] Is Dis-information more attractive than True-information? : Reduce the...[CB20] Is Dis-information more attractive than True-information? : Reduce the...
[CB20] Is Dis-information more attractive than True-information? : Reduce the...CODE BLUE
 
[CB20] Dissecting China’s Information Operations with Threat Intelligence by ...
[CB20] Dissecting China’s Information Operations with Threat Intelligence by ...[CB20] Dissecting China’s Information Operations with Threat Intelligence by ...
[CB20] Dissecting China’s Information Operations with Threat Intelligence by ...CODE BLUE
 
The Social Media Privacy Flap
The Social Media Privacy FlapThe Social Media Privacy Flap
The Social Media Privacy FlapAnn Shea
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Matthew Lease
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionalsVadim Dryganov
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellUBA-komitet
 
1stamendment online
1stamendment online1stamendment online
1stamendment onlineTed Leach
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safetyalandang
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?DannyTio
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingNicole Black
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionAlvaro Lopez Ortega
 
Privacy and education in the internet age
Privacy and education in the internet agePrivacy and education in the internet age
Privacy and education in the internet ageCliff Landis
 
The Europe's East: Oppression, Technology, Power
The Europe's East: Oppression, Technology, PowerThe Europe's East: Oppression, Technology, Power
The Europe's East: Oppression, Technology, PowerPoint_conference
 
2015 05-22-sarajevo-panel-sidorenko
2015 05-22-sarajevo-panel-sidorenko2015 05-22-sarajevo-panel-sidorenko
2015 05-22-sarajevo-panel-sidorenkoPoint_conference
 

Tendances (19)

What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
 
[CB20] Is Dis-information more attractive than True-information? : Reduce the...
[CB20] Is Dis-information more attractive than True-information? : Reduce the...[CB20] Is Dis-information more attractive than True-information? : Reduce the...
[CB20] Is Dis-information more attractive than True-information? : Reduce the...
 
[CB20] Dissecting China’s Information Operations with Threat Intelligence by ...
[CB20] Dissecting China’s Information Operations with Threat Intelligence by ...[CB20] Dissecting China’s Information Operations with Threat Intelligence by ...
[CB20] Dissecting China’s Information Operations with Threat Intelligence by ...
 
The Social Media Privacy Flap
The Social Media Privacy FlapThe Social Media Privacy Flap
The Social Media Privacy Flap
 
Gibson final
Gibson  finalGibson  final
Gibson final
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences.
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
 
1stamendment online
1stamendment online1stamendment online
1stamendment online
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safety
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
Privacy and education in the internet age
Privacy and education in the internet agePrivacy and education in the internet age
Privacy and education in the internet age
 
The Europe's East: Oppression, Technology, Power
The Europe's East: Oppression, Technology, PowerThe Europe's East: Oppression, Technology, Power
The Europe's East: Oppression, Technology, Power
 
2015 05-22-sarajevo-panel-sidorenko
2015 05-22-sarajevo-panel-sidorenko2015 05-22-sarajevo-panel-sidorenko
2015 05-22-sarajevo-panel-sidorenko
 

Similaire à Cyber Security from China’s Perspective – What the Experts Say – Boston Global Forum

Ameaças e oportunidades das novas tecnologias para o desenvolvimento e a demo...
Ameaças e oportunidades das novas tecnologias para o desenvolvimento e a demo...Ameaças e oportunidades das novas tecnologias para o desenvolvimento e a demo...
Ameaças e oportunidades das novas tecnologias para o desenvolvimento e a demo...Fundação Fernando Henrique Cardoso
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Journal of Physical Security 6(1)
Journal of Physical Security 6(1)Journal of Physical Security 6(1)
Journal of Physical Security 6(1)Roger Johnston
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
AI and its Effects on the Global World Order
AI and its Effects on the Global World OrderAI and its Effects on the Global World Order
AI and its Effects on the Global World OrderThe Future Society
 
AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesYokimura Dimaunahan
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...Nicholas Tancredi
 
The China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith KrachThe China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith KrachKeith Krach
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesChikere Uchegbu
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALLouise Collins
 
Cybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationCybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationBrunswick Group
 
20150210usa-1
20150210usa-120150210usa-1
20150210usa-1Xiao Hong
 
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Nicholas Tancredi
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 

Similaire à Cyber Security from China’s Perspective – What the Experts Say – Boston Global Forum (20)

Ameaças e oportunidades das novas tecnologias para o desenvolvimento e a demo...
Ameaças e oportunidades das novas tecnologias para o desenvolvimento e a demo...Ameaças e oportunidades das novas tecnologias para o desenvolvimento e a demo...
Ameaças e oportunidades das novas tecnologias para o desenvolvimento e a demo...
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Journal of Physical Security 6(1)
Journal of Physical Security 6(1)Journal of Physical Security 6(1)
Journal of Physical Security 6(1)
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
AI and its Effects on the Global World Order
AI and its Effects on the Global World OrderAI and its Effects on the Global World Order
AI and its Effects on the Global World Order
 
AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spies
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
 
The China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith KrachThe China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith Krach
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
Cybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationCybersecurity under the Trump Administration
Cybersecurity under the Trump Administration
 
20150210usa-1
20150210usa-120150210usa-1
20150210usa-1
 
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 

Cyber Security from China’s Perspective – What the Experts Say – Boston Global Forum

  • 1. 4/15/16, 4:17 PMCyber Security from China’s Perspective – What the Experts Say – Boston Global Forum Page 1 of 3http://bostonglobalforum.org/2016/02/cyber-security-from-chinas-perspective-what-the-experts-say/ SUBSCRIBE & FOLLOW SEARCH … Primary Menu Primary Menu Primary Menu CYBER SECURITY FROM CHINA’S PERSPECTIVE – WHAT THE EXPERTS SAYCYBER SECURITY FROM CHINA’S PERSPECTIVE – WHAT THE EXPERTS SAY 0 (12th Feb 2016) Dick Pirozzolo – Managing Director of Pirozzolo Company Public Relations shared his view about how China thinks about cyber-security. Dick Pirozzolo serves on the editorial board of Boston Global Forum and is co-author, with Michael Morris, of a forthcoming novel that takes place in Vietnam during April of 1975. U.S. OFFICIALLY LAUNCHESU.S. OFFICIALLY LAUNCHES CYBERWAR ON ISLAMIC STATECYBERWAR ON ISLAMIC STATE LINKS TO CHINESE OFFICIALS INLINKS TO CHINESE OFFICIALS IN OFFSHORE TAX-HAVENOFFSHORE TAX-HAVEN DOCUMENT DROPDOCUMENT DROP FIGHT OVER DATA PRIVACY MAYFIGHT OVER DATA PRIVACY MAY BE JUST STARTINGBE JUST STARTING FBI PUTS 2 SYRIAN HACKERS ONFBI PUTS 2 SYRIAN HACKERS ON A MOST-WANTED LISTA MOST-WANTED LIST CHINESE CYBER-ATTACKS ONCHINESE CYBER-ATTACKS ON U.S. CONTINUE UNABATEDU.S. CONTINUE UNABATED APPLE HYPOCRITICAL IN BATTLEAPPLE HYPOCRITICAL IN BATTLE WITH FBI OVER IPHONE?WITH FBI OVER IPHONE? APPLE SHOULD GIVE ACCESS TOAPPLE SHOULD GIVE ACCESS TO TERRORIST’S IPHONETERRORIST’S IPHONE DNI: CHINA CONTINUES CYBERDNI: CHINA CONTINUES CYBER ESPIONAGEESPIONAGE A FIGHT OVER ADS,A FIGHT OVER ADS, ENCRYPTION AND LAWENCRYPTION AND LAW ENFORCEMENTENFORCEMENT OBAMA PLEADS FOROBAMA PLEADS FOR COOPERATION ON SMARTPHONECOOPERATION ON SMARTPHONE
  • 2. 4/15/16, 4:17 PMCyber Security from China’s Perspective – What the Experts Say – Boston Global Forum Page 2 of 3http://bostonglobalforum.org/2016/02/cyber-security-from-chinas-perspective-what-the-experts-say/ Read his view below Why China hacks may be more in the Communist Party’s DNA and view of the Internet than anything else, according to Sharon Hom, executive director of Human Rights in China, a Chinese Non-Government Organization. Hom spoke during a recent panel discussion organized by the Christian Science Monitor in Boston. Hom explained, “While in the US and most of the world, citizens regard the Internet as a big open international and transparent communication phenomenon, the Communist Party wants control of society and information. Though it is not a linear path from censorship and control to hacking the Internet, the Party needs to manage expression online.” In China, “Cyber security means security of the Party.” The event was organized, in part, to promote the Monitor’s online section Passcode which it bills as a field guide to security and privacy. When it comes to establishing international norms for Internet behavior that would presumably reduce hacking, Hom is not optimistic pointing out that whenever norms come up, China, Iran, Russia, Pakistan and other bad actors, unite to pose obstacles in a, “race to the bottom.” In sharp contrast to these nations, Boston Global Forum has recognized Japan, host of the next G7 meeting in March, for supporting international norms. Commenting on the Forum’s international ethics code of conduct, Japan’s Prime Minister Shinzo Abe told Boston-based think tank members: “Japan will continue to cooperate closely with the US and other partners … while playing a leading role in achieving the peace and stability of the international community.” In addition to Japan and the US, G7 nations include Canada, France, Germany, Great Britain, and Italy. Panelist Adam Segal added, that the Chinese government sees the Internet from the perspective of “cyber sovereignty and as an entity that the government can develop as it sees fit.” Segal, director of the Digital Cyberspace Policy Program at the Council on Foreign Relations emphasized that a big part of China’s incentive to hack other nation’s computers is to obtain intellectual property from foreign companies. Segal told attendees, “China does not want to be the factory of the world and is worried about the future of technology.” For example, “While China probably manufacturers all the DVD players sold in the world, the head that reads the disc is proprietary and owned by companies in Japan.” Though China’s theft of 22 million personnel records from the Federal Office of Personnel Management is well known, private companies have been closed mouthed about such intrusions until Google announced, “We’ve been hacked along with 30 other companies,” according to Segal. Segal also reported on a hack of Boeing’s computer’s a few years ago in his cover article titled: Why China Hacks the World, in the February 1, 2016 edition of The Christian Science Monitor Weekly. ACCESSACCESS
  • 3. 4/15/16, 4:17 PMCyber Security from China’s Perspective – What the Experts Say – Boston Global Forum Page 3 of 3http://bostonglobalforum.org/2016/02/cyber-security-from-chinas-perspective-what-the-experts-say/ JOHN SAVAGE Live on Feb 22: John Savage’s talk on Strategies for Combating Cyber- Terrorism In addition to stealing intellectual property to gain technological advantage, China is also engaged in what Segal called the world’s oldest profession “espionage” and strives to obtain secrets about the F22 and F35 fighter jets and other weapon systems. China also uses hacking as a form of external censorship by “intimidating reporters, “ who write articles unfavorable to this nation of 1.4 Billion. “Is there bad hacking and good hacking?” asked moderator Mike Farrell, editor of the Monitor’s Passcode publication. Panelists agreed that government-to-government spying is considered acceptable, but for a government to hack into another country’s businesses steal the information and pass it to companies inside its own borders is outside any acceptable norm. Michael Sulmeyer, director of the Belfer Center’s Cyber Security Project at the Harvard Kennedy School, pointed out that the current state of cyber security “is like leaving a bag money on your front lawn and being stunned to learn that someone stole it during the night. At least make harder. Make them work. Make sure it’s not the jayvee team but that the varsity team is needed hack into your systems.” While it might be comforting to think about like-kind retaliation, it is not always possible. Segal explained relationships between the US and China are complex and come with competing values, “Fifty percent of Apple’s revenue comes from China. One of the worlds biggest technology companies is not likely to want heavy-handed retaliation.” Though Hom devotes much of her time to combatting cyber hacking and theft, she says people in her office continue to ignore fundamental security measures and continue to, “stick Post-it notes to their computers containing their passwords, because they have so many to remember.” “Cyber defenses though are a stopgap. The real solution is more evolutionary,” says Hom and will come about, ‘When governments like China stop using the Internet as a tool of social engineering.” Tweet 0 Posted in BGF's Focus 0LikeLike ShareShare BOSTON GLOBAL FORUMBOSTON GLOBAL FORUM BEACON HILL, BOSTON, MA 02108 TEL: +1 (617) 286 6589 SKYPE: BOSTONGLOBALFORUM E-MAIL: OFFICE@BOSTONGLOBALFORUM.ORG SUBSCRIBE & FOLLOW Copyright © 2016 Boston Global Forum www.bostonglobalforum.org