SlideShare a Scribd company logo
• WASHINGTON — Nine months after President Obama and President Xi Jinping of China agreed to a broad crackdown on cyberespionage
aimed at curbing the theft of intellectual property, the first detailed study of Chinese hacking has found a sharp drop-off in almost daily
raids on Silicon Valley firms, military contractors and other commercial targets.
• But the study, conducted by the iSight intelligence unit of FireEye, a company that manages large network breaches, also concluded that
the drop-off began a year before Mr. Obama and Mr. Xi announced their accord in the White House Rose Garden. In a conclusion that is
largely echoed by American intelligence officials, the study said the change is part of Mr. Xi’s broad effort to bring the Chinese military,
which is considered one of the main sponsors of the attacks, further under his control.
• As a result, the same political forces that may be alleviating the theft of data from American companies are also responsible for Mr. Xi’s
stunningly swift crackdown on the Chinese media, bloggers and others who could challenge the Communist Party.
• “It’s a mixed bag,” said Kevin Mandia, the founder of Mandiant, now part of FireEye, which first detailed the activities of a People’s
Liberation Army cyber-arm, called Unit 61398, that had been responsible for some of the most highly publicized thefts of American
technology. “We still see semiconductor companies and aerospace firms attacked.”
• But the daily barrage of attacks has diminished, which Mr. Mandia attributed to “public pressure” from, among others, the Justice
Department’s decision to indict five members of the P.L.A. unit about a year after its activities were exposed.
• Today, Unit 61398 appears to be largely out of business, its hackers dispersed to other military, private and intelligence units. Many
China scholars and legal experts remain skeptical that the Chinese are deterred by American indictments, since the P.L.A. officers are
unlikely to see the inside of an American courtroom. But John P. Carlin, the assistant attorney general for national security, said the
report validated his strategy.
• “The lesson is that when you figure out who has done this kind of theft, don’t fear making it public,” he said. “This is a slow process, but
we are beginning to make people realize that even in cyberspace, laws and norms are applicable.”
• Mr. Obama and Mr. Xi drew up their agreement narrowly. It covers intellectual property theft — Chinese cybercriminals have stolen
everything from designs for the F-35 fighter jet to the design of gas distribution networks — but not ordinary espionage against
government targets.
• So, for example, the administration has not publicly talked about penalizing China for the theft of personal data on roughly 22 million
Americans, whose security-clearance information was taken from the Office of Personnel Management. In fact, the administration has
never publicly blamed China for that theft, although the director of national intelligence, James R. Clapper Jr., did talk about China’s role

More Related Content

What's hot

Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
Bill Bode
 
The Security Era
The Security EraThe Security Era
The Security Era
jk_welder
 
Breach of Privacy in the Age of Technology
Breach of Privacy in the Age of Technology Breach of Privacy in the Age of Technology
Breach of Privacy in the Age of Technology
BriannaPrice5
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015
Dr. Tim Dosemagen
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
raevenroxas
 
Ap comparative brazil privacy
Ap comparative brazil privacyAp comparative brazil privacy
Ap comparative brazil privacy
MariaElenaGB
 

What's hot (20)

After 9 11
After 9 11After 9 11
After 9 11
 
Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Breach of Privacy in the Age of Technology
Breach of Privacy in the Age of Technology Breach of Privacy in the Age of Technology
Breach of Privacy in the Age of Technology
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
Keynote - Cindy Cohn
Keynote - Cindy CohnKeynote - Cindy Cohn
Keynote - Cindy Cohn
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The LawBSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
SOPA
SOPASOPA
SOPA
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Cyber Threats to Human Rights
Cyber Threats to Human RightsCyber Threats to Human Rights
Cyber Threats to Human Rights
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks
 
Ap comparative brazil privacy
Ap comparative brazil privacyAp comparative brazil privacy
Ap comparative brazil privacy
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 

Similar to Presentación3

Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
Kati Mccarthy
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
DIPESH30
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
Kate Neal
 
CACLU_september_newsletter_electronica
CACLU_september_newsletter_electronicaCACLU_september_newsletter_electronica
CACLU_september_newsletter_electronica
Greg Burton
 

Similar to Presentación3 (20)

Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Q&A about PRISM
Q&A about PRISMQ&A about PRISM
Q&A about PRISM
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledge
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping Scandal
 
LiPari_Assignment9
LiPari_Assignment9LiPari_Assignment9
LiPari_Assignment9
 
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhouse
 
Cybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationCybersecurity under the Trump Administration
Cybersecurity under the Trump Administration
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelations
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
 
CACLU_september_newsletter_electronica
CACLU_september_newsletter_electronicaCACLU_september_newsletter_electronica
CACLU_september_newsletter_electronica
 
How America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mobHow America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mob
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Watchdog Jeopardy
Watchdog JeopardyWatchdog Jeopardy
Watchdog Jeopardy
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
 

Recently uploaded

一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
aveka1
 
一比一原版(IC毕业证)帝国理工大学毕业证成绩单
一比一原版(IC毕业证)帝国理工大学毕业证成绩单一比一原版(IC毕业证)帝国理工大学毕业证成绩单
一比一原版(IC毕业证)帝国理工大学毕业证成绩单
exuyk
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
enbam
 

Recently uploaded (20)

PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
 
Item # 6 - 7001 Broadway Significance Review
Item # 6 - 7001 Broadway Significance ReviewItem # 6 - 7001 Broadway Significance Review
Item # 6 - 7001 Broadway Significance Review
 
CrossWalksInspirations for Brockville***
CrossWalksInspirations for Brockville***CrossWalksInspirations for Brockville***
CrossWalksInspirations for Brockville***
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
一比一原版(IC毕业证)帝国理工大学毕业证成绩单
一比一原版(IC毕业证)帝国理工大学毕业证成绩单一比一原版(IC毕业证)帝国理工大学毕业证成绩单
一比一原版(IC毕业证)帝国理工大学毕业证成绩单
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
Honeycomb for The Hive Design Inspirations
Honeycomb for The Hive Design InspirationsHoneycomb for The Hive Design Inspirations
Honeycomb for The Hive Design Inspirations
 
Creating an Effective Veteran Policy in Ukraine
Creating an Effective Veteran Policy in UkraineCreating an Effective Veteran Policy in Ukraine
Creating an Effective Veteran Policy in Ukraine
 
How to Save a Place: How to Fund Your Preservation Project
How to Save a Place: How to Fund Your Preservation ProjectHow to Save a Place: How to Fund Your Preservation Project
How to Save a Place: How to Fund Your Preservation Project
 
“Educate an African fit for the 21st Century: Building resilient education sy...
“Educate an African fit for the 21st Century: Building resilient education sy...“Educate an African fit for the 21st Century: Building resilient education sy...
“Educate an African fit for the 21st Century: Building resilient education sy...
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 

Presentación3

  • 1.
  • 2. • WASHINGTON — Nine months after President Obama and President Xi Jinping of China agreed to a broad crackdown on cyberespionage aimed at curbing the theft of intellectual property, the first detailed study of Chinese hacking has found a sharp drop-off in almost daily raids on Silicon Valley firms, military contractors and other commercial targets. • But the study, conducted by the iSight intelligence unit of FireEye, a company that manages large network breaches, also concluded that the drop-off began a year before Mr. Obama and Mr. Xi announced their accord in the White House Rose Garden. In a conclusion that is largely echoed by American intelligence officials, the study said the change is part of Mr. Xi’s broad effort to bring the Chinese military, which is considered one of the main sponsors of the attacks, further under his control. • As a result, the same political forces that may be alleviating the theft of data from American companies are also responsible for Mr. Xi’s stunningly swift crackdown on the Chinese media, bloggers and others who could challenge the Communist Party. • “It’s a mixed bag,” said Kevin Mandia, the founder of Mandiant, now part of FireEye, which first detailed the activities of a People’s Liberation Army cyber-arm, called Unit 61398, that had been responsible for some of the most highly publicized thefts of American technology. “We still see semiconductor companies and aerospace firms attacked.” • But the daily barrage of attacks has diminished, which Mr. Mandia attributed to “public pressure” from, among others, the Justice Department’s decision to indict five members of the P.L.A. unit about a year after its activities were exposed. • Today, Unit 61398 appears to be largely out of business, its hackers dispersed to other military, private and intelligence units. Many China scholars and legal experts remain skeptical that the Chinese are deterred by American indictments, since the P.L.A. officers are unlikely to see the inside of an American courtroom. But John P. Carlin, the assistant attorney general for national security, said the report validated his strategy. • “The lesson is that when you figure out who has done this kind of theft, don’t fear making it public,” he said. “This is a slow process, but we are beginning to make people realize that even in cyberspace, laws and norms are applicable.” • Mr. Obama and Mr. Xi drew up their agreement narrowly. It covers intellectual property theft — Chinese cybercriminals have stolen everything from designs for the F-35 fighter jet to the design of gas distribution networks — but not ordinary espionage against government targets. • So, for example, the administration has not publicly talked about penalizing China for the theft of personal data on roughly 22 million Americans, whose security-clearance information was taken from the Office of Personnel Management. In fact, the administration has never publicly blamed China for that theft, although the director of national intelligence, James R. Clapper Jr., did talk about China’s role