Every major US company has been hacked by China. So said Richard Clarke in an interview with the Smithsonian. This may or may not be true. Who can say?
The comments are given a degree of credibility because Clarke is the former cybersecurity czar who served under four US presidents for 30 consecutive years from 1973. I interviewed him several times during his tenure and found him to be a pretty conservative man not given to hyperbole. Now he is a managing partner at security consultancy Good Harbor, Clarke is less guarded in what he says.
It is hard to dispute what Clarke is saying – the Chinese vehemently deny any accusations and any compromised company is loath to admit anything in public. What does give his comments some strength is UK Foreign Secretary William Hague’s warning to countries like China and Russia to halt hostile cyber attacks on other states and the revelation that the Foreign Office had been hit by data-stealing viruses.
That the US is indulging in cyber warfare is beyond doubt. In the Smithsonian interview Clarke said that he believes the US made the major contribution to Stuxnet and not the Israelis.
Equally, all evidence points to China for the Operation Aurora attack which Google and others suffered in 2010.
Last week, at a dinner held for journalists at 30 St Mary Ax (better known as the Gherkin) in London, FireEye’s CEO Ashar Aziz made an interesting speculation.
“The US government did a classified study of the feasibility of attacks on the national electrical grid … the project had an interesting name – it was called Project Aurora. What is interesting about that is the Operation Aurora tag. The reason it was named that is because that was the name under which the malware used was compiled. Many think this was a Chinese originated malware – which is probably a reasonable inference – but it’s clearly not a common Chinese name so somebody in their offensive organisation used the name of a major study by the US government into cyber warfare for some reason.”
With defences rapidly appearing to take on the appearance of a Swiss cheese, the natural conclusion is that everything important and all communications should be encrypted. This would strengthen data security even if it does nothing for the overall protection of the network. The downside is that it costs money to maintain the systems and manage all the keys but this is not the main fear.
What could happen is that during a successful attack, the data may not only be stolen but also disrupted rendering the encryption impossible to untangle. With unencrypted data there would be a chance to piece things back together and there is also the probability of a back-up restoration. But what happens if the keys are stolen and erased?
It is time that companies took action to protect their intellectual property because this appears to be the main target for cyber criminals. But it needs to be part of a well-planned architecture that takes into consideration all of the “what ifs” that can be devised – even to the point of taking key documents offline to control access manually.
Legal headache deepens for TikTok in US, after a number of states file lawsuits alleging…
After HBO documentary names Canadian crypto expert Peter Todd as Bitcoin inventor – but he…
Supreme Court clears X to resume access in Brazil, after high profile clash between top…
US Department of Justice mulls asking judge to force Google to sell parts of its…
US Supreme Court declines to hear appeal from X, formerly Twitter, over nondisclosure order attached…
US federal judge orders Google to undertake wide range of measures allowing third-party app stores…