SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Phillip LiPari, Writing for Intelligence
30 September 2015
Chinese Cyber-attacks on US Private Companies Decreasing
Executive Summary:
Chinese cyberattacks on US companies targeting intellectual property (IP) are likely to decrease
in the wake of Chinese president Xi Jinping`s visit to the US. Xi Jinping expressed interest in
developing relationships with US technology companies as well as retaining diplomatic relations
with the US. In addition to growing domestic concerns in China, there is a downward trend in
Chinese cyber-attacks against the US.
Discussion:
During his visit to the US, Chinese president Xi Jinping participated in talks with President
Obama regarding Chinese cyber-aggression. On 25 September 2015, the US and China
announced a tentative agreement to cease support of cyber-attacks on private companies.1 Xi
Jinping emphasized communication and openness between the nations, claiming sanctions were
detrimental to all involved. DNI James Clapper stated he was not “optimistic” but that the
agreement was a “step in the right direction” between the US and China.2 The agreement will
pressure the Chinese government to acknowledge and respond to accusations of cyber-attacks
rather than ignore them.3
Prior to the meeting between Xi Jinping and President Obama, there was a downward trend in
cyber-attacks originating in China against US companies.4 The full scale of these attacks is
unclear due to the increasingly complex methods of attack.5 Chinese cyber-aggression seems to
be decreasing in the wake of numerous large scale breaches as well as talks between President
Obama and Xi Jinping.
Xi Jinping also met with a number of US technology companies in Seattle, Washington prior to
meeting President Obama. US technology companies are interested in expanding business in
China but are concerned over increasing Chinese economic regulation.6 Forty eight percent of
the Chinese population accesses the internet and roughly 55% of economic transactions occur
via the internet. This increase in internet usage makes China an enticing market to US
technology companies.7 A reduction in cyber-attacks on US private companies reassures
companies of the Chinese government`s interest in expanding their consumer technological
market.
Cyber-attacks are becoming a less critical national interest for the Chinese government due to
concern over the economy and integrity of infrastructure. China is undergoing large scale
overproduction of industrial resources, recently reaching 30% overproduction of resources such
as steel.8 Chinese industrial products have been heavily devalued and remain overstocked. The
Chinese Communist Party (CCP) faces criticism over lack of proper safety precautions when it
conflicts with economic expansion, as in the Tianjin chemical explosion.9 These growing
domestic issues could further pull Chinese government resources from cyber-attacks.
Source Reliability: Moderate
Analytic Confidence: Moderate
Analytic Confidence: Analytic confidence is moderate due to the reliability of sources as well
as the use of the ACH structured analytic technique. The analyst collaborated and brainstormed
with a partner. Sources agreed with each other on most content and the deadline was easy to
meet.
With questions or comments, please contact the author:
Email: plipar35@lakers.mercyhurst.edu
Phone: (585) 752-9449
Peer reviewed by Austin Wood
1 http://www.wsj.com/articles/u-s-china-agree-over-cyberattacks-that-steal-company-records-1443205327
2 http://www.chinatopix.com/articles/66326/20150930/senior-american-intelligence-officials-skeptical-china-u-s-
cyber-agreement.htm
3 http://www.reuters.com/article/2015/09/30/us-usa-cybersecurity-idUSKCN0RT1Q820150930
4 http://www.reuters.com/article/2015/09/19/usa-china-cybersecurity-idUSL1N11O11W20150919
5 http://www.nato.int/docu/review/2013/cyber/timeline/EN/index.htm
6 http://www.usatoday.com/story/tech/2015/09/21/china-president-xi-seattle-internet-cyber-security/72425102/
7 http://www.shanghaidaily.com/business/economy/Huge-online-users-make-Internet-vital-in-reshaping-Chinas-
economy/shdaily.shtml
8 http://blogs.reuters.com/great-debate/2015/09/25/as-xi-visits-the-united-states-chinas-economy-is-at-a-tipping-
point/
9 http://www.scientificamerican.com/article/firm-in-china-chemical-blast-skirted-safety-rules/

Mais conteúdo relacionado

Destaque

Taman nasional indonesia
Taman nasional indonesiaTaman nasional indonesia
Taman nasional indonesiaChaing Saing
 
Egape txo!2 (15 16)
Egape txo!2 (15 16)Egape txo!2 (15 16)
Egape txo!2 (15 16)beitza
 
презентатция на тему «распечатывааем презентацию» Nikiforov Vladimir
презентатция на тему «распечатывааем презентацию» Nikiforov Vladimirпрезентатция на тему «распечатывааем презентацию» Nikiforov Vladimir
презентатция на тему «распечатывааем презентацию» Nikiforov Vladimirecko_1972
 
EDEHA-IDEJI C. EMAMEZI'S RESULT
EDEHA-IDEJI C. EMAMEZI'S RESULT EDEHA-IDEJI C. EMAMEZI'S RESULT
EDEHA-IDEJI C. EMAMEZI'S RESULT Ideji Collins
 
PO WER - XX LO Gdańsk - Electricity in biology - UG
PO WER - XX LO Gdańsk - Electricity in biology - UGPO WER - XX LO Gdańsk - Electricity in biology - UG
PO WER - XX LO Gdańsk - Electricity in biology - UGAgnieszka J.
 
Synthetic biology
Synthetic biology Synthetic biology
Synthetic biology Elham Lasemi
 
Effectively Utilising BYOD
Effectively Utilising BYOD Effectively Utilising BYOD
Effectively Utilising BYOD Kylie Davis
 
RSRDeck_2016_11_30_v3_KBDS
RSRDeck_2016_11_30_v3_KBDSRSRDeck_2016_11_30_v3_KBDS
RSRDeck_2016_11_30_v3_KBDSNeil Alberico
 
Sabbatical (Massey University) - An Introduction to a New Research Paradigm: ...
Sabbatical (Massey University) - An Introduction to a New Research Paradigm: ...Sabbatical (Massey University) - An Introduction to a New Research Paradigm: ...
Sabbatical (Massey University) - An Introduction to a New Research Paradigm: ...Michael Barbour
 

Destaque (12)

Taman nasional indonesia
Taman nasional indonesiaTaman nasional indonesia
Taman nasional indonesia
 
Egape txo!2 (15 16)
Egape txo!2 (15 16)Egape txo!2 (15 16)
Egape txo!2 (15 16)
 
7954 chaos 2
7954 chaos 27954 chaos 2
7954 chaos 2
 
презентатция на тему «распечатывааем презентацию» Nikiforov Vladimir
презентатция на тему «распечатывааем презентацию» Nikiforov Vladimirпрезентатция на тему «распечатывааем презентацию» Nikiforov Vladimir
презентатция на тему «распечатывааем презентацию» Nikiforov Vladimir
 
EDEHA-IDEJI C. EMAMEZI'S RESULT
EDEHA-IDEJI C. EMAMEZI'S RESULT EDEHA-IDEJI C. EMAMEZI'S RESULT
EDEHA-IDEJI C. EMAMEZI'S RESULT
 
PO WER - XX LO Gdańsk - Electricity in biology - UG
PO WER - XX LO Gdańsk - Electricity in biology - UGPO WER - XX LO Gdańsk - Electricity in biology - UG
PO WER - XX LO Gdańsk - Electricity in biology - UG
 
Moritanya ulke raporu_2013
Moritanya ulke raporu_2013Moritanya ulke raporu_2013
Moritanya ulke raporu_2013
 
Synthetic biology
Synthetic biology Synthetic biology
Synthetic biology
 
Effectively Utilising BYOD
Effectively Utilising BYOD Effectively Utilising BYOD
Effectively Utilising BYOD
 
RSRDeck_2016_11_30_v3_KBDS
RSRDeck_2016_11_30_v3_KBDSRSRDeck_2016_11_30_v3_KBDS
RSRDeck_2016_11_30_v3_KBDS
 
Sabbatical (Massey University) - An Introduction to a New Research Paradigm: ...
Sabbatical (Massey University) - An Introduction to a New Research Paradigm: ...Sabbatical (Massey University) - An Introduction to a New Research Paradigm: ...
Sabbatical (Massey University) - An Introduction to a New Research Paradigm: ...
 
Educational Opportunities in Cuba
Educational Opportunities in CubaEducational Opportunities in Cuba
Educational Opportunities in Cuba
 

Semelhante a LiPari_Assignment9

Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Kate Neal
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Kate Neal
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber WarfareBill Hagestad II
 
20150210usa-1
20150210usa-120150210usa-1
20150210usa-1Xiao Hong
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareSecuricon
 
Entangled j mendoza20200521 hi-res pdf
Entangled   j mendoza20200521 hi-res pdfEntangled   j mendoza20200521 hi-res pdf
Entangled j mendoza20200521 hi-res pdfJulian Mendoza
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresJason Fernandes
 
Clean Network HBS Case Study
Clean Network HBS Case StudyClean Network HBS Case Study
Clean Network HBS Case StudyKeith Krach
 
Corporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friCorporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friAlleneMcclendon878
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALLouise Collins
 
Cybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationCybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationBrunswick Group
 
National security during covid
National security during covidNational security during covid
National security during covidShaynaBlum
 
Decoupling of Investment in China
Decoupling of Investment in ChinaDecoupling of Investment in China
Decoupling of Investment in ChinaInvestingTips
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Kevin Murphy
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
当力拓公司(Rio Tinto)包括一位澳大利亚籍公民在内的4名员工因涉嫌...
当力拓公司(Rio Tinto)包括一位澳大利亚籍公民在内的4名员工因涉嫌...当力拓公司(Rio Tinto)包括一位澳大利亚籍公民在内的4名员工因涉嫌...
当力拓公司(Rio Tinto)包括一位澳大利亚籍公民在内的4名员工因涉嫌...Zhou Jun
 

Semelhante a LiPari_Assignment9 (20)

Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
 
20150210usa-1
20150210usa-120150210usa-1
20150210usa-1
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Entangled j mendoza20200521 hi-res pdf
Entangled   j mendoza20200521 hi-res pdfEntangled   j mendoza20200521 hi-res pdf
Entangled j mendoza20200521 hi-res pdf
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosures
 
Clean Network HBS Case Study
Clean Network HBS Case StudyClean Network HBS Case Study
Clean Network HBS Case Study
 
Corporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friCorporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best fri
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
Cybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationCybersecurity under the Trump Administration
Cybersecurity under the Trump Administration
 
National security during covid
National security during covidNational security during covid
National security during covid
 
Decoupling of Investment in China
Decoupling of Investment in ChinaDecoupling of Investment in China
Decoupling of Investment in China
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
当力拓公司(Rio Tinto)包括一位澳大利亚籍公民在内的4名员工因涉嫌...
当力拓公司(Rio Tinto)包括一位澳大利亚籍公民在内的4名员工因涉嫌...当力拓公司(Rio Tinto)包括一位澳大利亚籍公民在内的4名员工因涉嫌...
当力拓公司(Rio Tinto)包括一位澳大利亚籍公民在内的4名员工因涉嫌...
 

LiPari_Assignment9

  • 1. Phillip LiPari, Writing for Intelligence 30 September 2015 Chinese Cyber-attacks on US Private Companies Decreasing Executive Summary: Chinese cyberattacks on US companies targeting intellectual property (IP) are likely to decrease in the wake of Chinese president Xi Jinping`s visit to the US. Xi Jinping expressed interest in developing relationships with US technology companies as well as retaining diplomatic relations with the US. In addition to growing domestic concerns in China, there is a downward trend in Chinese cyber-attacks against the US. Discussion: During his visit to the US, Chinese president Xi Jinping participated in talks with President Obama regarding Chinese cyber-aggression. On 25 September 2015, the US and China announced a tentative agreement to cease support of cyber-attacks on private companies.1 Xi Jinping emphasized communication and openness between the nations, claiming sanctions were detrimental to all involved. DNI James Clapper stated he was not “optimistic” but that the agreement was a “step in the right direction” between the US and China.2 The agreement will pressure the Chinese government to acknowledge and respond to accusations of cyber-attacks rather than ignore them.3 Prior to the meeting between Xi Jinping and President Obama, there was a downward trend in cyber-attacks originating in China against US companies.4 The full scale of these attacks is unclear due to the increasingly complex methods of attack.5 Chinese cyber-aggression seems to be decreasing in the wake of numerous large scale breaches as well as talks between President Obama and Xi Jinping. Xi Jinping also met with a number of US technology companies in Seattle, Washington prior to meeting President Obama. US technology companies are interested in expanding business in China but are concerned over increasing Chinese economic regulation.6 Forty eight percent of the Chinese population accesses the internet and roughly 55% of economic transactions occur via the internet. This increase in internet usage makes China an enticing market to US technology companies.7 A reduction in cyber-attacks on US private companies reassures companies of the Chinese government`s interest in expanding their consumer technological market. Cyber-attacks are becoming a less critical national interest for the Chinese government due to concern over the economy and integrity of infrastructure. China is undergoing large scale overproduction of industrial resources, recently reaching 30% overproduction of resources such as steel.8 Chinese industrial products have been heavily devalued and remain overstocked. The
  • 2. Chinese Communist Party (CCP) faces criticism over lack of proper safety precautions when it conflicts with economic expansion, as in the Tianjin chemical explosion.9 These growing domestic issues could further pull Chinese government resources from cyber-attacks. Source Reliability: Moderate Analytic Confidence: Moderate Analytic Confidence: Analytic confidence is moderate due to the reliability of sources as well as the use of the ACH structured analytic technique. The analyst collaborated and brainstormed with a partner. Sources agreed with each other on most content and the deadline was easy to meet. With questions or comments, please contact the author: Email: plipar35@lakers.mercyhurst.edu Phone: (585) 752-9449 Peer reviewed by Austin Wood 1 http://www.wsj.com/articles/u-s-china-agree-over-cyberattacks-that-steal-company-records-1443205327 2 http://www.chinatopix.com/articles/66326/20150930/senior-american-intelligence-officials-skeptical-china-u-s- cyber-agreement.htm 3 http://www.reuters.com/article/2015/09/30/us-usa-cybersecurity-idUSKCN0RT1Q820150930 4 http://www.reuters.com/article/2015/09/19/usa-china-cybersecurity-idUSL1N11O11W20150919 5 http://www.nato.int/docu/review/2013/cyber/timeline/EN/index.htm 6 http://www.usatoday.com/story/tech/2015/09/21/china-president-xi-seattle-internet-cyber-security/72425102/ 7 http://www.shanghaidaily.com/business/economy/Huge-online-users-make-Internet-vital-in-reshaping-Chinas- economy/shdaily.shtml 8 http://blogs.reuters.com/great-debate/2015/09/25/as-xi-visits-the-united-states-chinas-economy-is-at-a-tipping- point/ 9 http://www.scientificamerican.com/article/firm-in-china-chemical-blast-skirted-safety-rules/