U.S. report warns of Russia, China cyber spying
Espionage attempts are expected to increase as more sensitive information moves online
IDG News Service - The U.S. can expect more aggressive efforts from countries such as Russia and China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing, according to a new government report released Thursday.
The two countries were singled out in the report from the Office of the National Counterintelligence Executive, which also issued recommendations for how organizations can strengthen their defenses.
"Chinese actors are the world's most active and persistent perpetrators of economic espionage," the report said. "Russia's intelligence services are conducting a range of activities to collect economic information and technology from U.S. targets."
The growing complexity of IT systems will work to the advantage of cyberspies, as more sensitive information is held on devices such as smartphones and laptops.
Cyberspying is efficient since it can be conducted with relatively limited resources from far away. Once an intrusion is detected, it can be difficult to trace the origin since attacks can be routed through computers worldwide.
The information haul can be devastating. The reported cited the case of Dongfan Chung, who was an engineer with Rockwell and Boeing and was sentenced in 2010. He worked on the B-1 bomber program and was found to have 250,000 pages of documents in his house, which would have filled four, four-drawer filing cabinets.
If converted to digits, the information would fit onto one CD. "Cyberspace makes possible the near instantaneous transfer of enormous quantities of economic and other information," the report said.
China's intelligence agencies often leverage people who have insider access to corporate networks to gain trade secrets and copy them to removable media. Russia's desire to diversify its economy will drive the country to use its highly capable intelligence services, including cybertechniques, to try to gain an economic advantage.
"We judge that the governments of China and Russia will remain aggressive and capable collectors of sensitive U.S. economic information and technologies, particularly in cyberspace," the report said.
It recommended that organizations encrypt information, use multifactor authentication and conduct real-time monitoring of networks, among others.
The report covers 2009 through this year and is part of a law that requires the U.S. president to send Congress a biennial report on the threat to U.S. industry from industrial espionage.
Send news tips and comments to email@example.com
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- SANS: Next-Generation Datacenters = Next-Generation Security
- This whitepaper takes a look at some new technology that may allow security teams to implement more flexible and capable protection models in...
- SANS: Protecting Virtual Endpoints with McAfee Server Security Suite Essentials
- SANS review of McAfees Server Security Suite Essentials that address some of the emerging challenges of securing virtual platforms and cloud environments.
- Safeguarding the Next-Generation Data Center
- Use of virtual and cloud servers has exploded. Unfortunately, security often lags behind. McAfee recommends looking at innovative solutions in order to erect...
- Aberdeen: Securing the Evolving Datacenter
- This report highlights ways security technologies and services are evolving to provide the visibility and control needed to deploy workloads flexibly in the... All Government IT White Papers
- Is SQL Server AlwaysOn really as powerful? Tips and Tricks from the field With the introduction of AlwaysOn, Windows Clustering Services is now more critical than ever.
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- All Government IT Webcasts