For the past several months, American policymakers have sought to convince allies, partners and potential partners to ban Chinese telecommunications company Huawei from supplying the entirety of, or components for, 5G communications networks around the world. This messaging campaign has centered primarily around concerns that Huawei could assist the Chinese government in spying on other countries or even shutting down or manipulating their 5G networks in a warlike scenario.
Latest in cyberespionage
This week, Adam Segal of the Council on Foreign Relations joins Jack Goldsmith at a Hoover Book Soiree for a discussion of his new book, The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age.
Editor's Note: Sanctions on China are again in the air as policymakers look on Beijing's provocative regional policies with dismay. Although many experts argue that sanctions would achieve little and might even backfire, Zack Cooper and Eric Lorber, at CSIS and the Financial Integrity Network respectively, argue that limited and targeted sanctions can make China more hesitant to engage in aggressive behavior.
Did China’s PLA really stop hacking US companies for commercial secrets? And does it matter? In episode 92, we ask those questions and more of two experts on the topic ‒ Washington Post reporter Ellen Nakashima, and Tony Cole, who has fought off his share of PLA hackers.
When the U.S. and China reached an agreement in late September not to engage in commercially motivated cyber espionage it was viewed as a significant step forward in cybersecurity relations between the two countries.
Buried in this morning's article covering the ongoing U.S.-China cybersecurity talks, Chinese state-owned media outlet Xinhua News said that an investigation had determined that the hack of the Office of Personnel Management was not a state-sponsored cyber attack, but instead the work of criminal hackers. The otherwise throwaway line in an article about diplomatic negotiations is significant as Xinhua is the official press agency of the People's Republic of China.
Our guest for episode 90 is Charlie Savage, New York Times reporter, talking about Power Wars, his monumental new book on the law and politics of terrorism in the Obama (and Bush) administrations.
Yesterday, the 2015 G20 Summit in Turkey released the G20 Leaders' Communiqué. Those provisions relating to commercial cyberespionage and hacking will be a particular interest to Lawfare readers.
At the end of September, the United States and China reached an agreement that promising they would not engage in or support cyber espionage activity aimed at providing competitive advantage to commercial entities.
Assistant Attorneys General John Carlin (National Security Division) and Leslie Caldwell (Criminal Division) spoke last week at Roger Williams’ Cybersecurity conference, outlining an innovative approach to detecting, disrupting, and deterring cyber threats. Caldwell and Carlin cited two recent moves: (1) the U.S.-China agreement to forego theft of intellectual property, and (2) the recent arrest in Malaysia of Ardit Ferizi, a Kosovar who had hacked into U.S.