Bruce Schneier: China cyberwar rhetoric risks dangerous implications

Bruce Schneier: China cyberwar rhetoric risks dangerous implications

Date: Apr 09, 2013

SAN FRANCISCO -- According to security industry luminary Bruce Schneier, escalating global tension with China over what many refer to as cyberespionage -- or even cyberwar -- poses a real threat to U.S. interests, but using highly charged terminology risks evoking the wrong types of responses.

"My real fear here is less [about] the attacks from China and more [about] the increase in rhetoric on both sides that's fueling the cyberwar arms race," Schneier said. "We're in a very dangerous time right now."

In a conversation with SearchSecurity at the 2013 RSA Conference, Schneier, chief technology security officer with London-based BT Counterpane, sought to put the Chinese cybersecurity threat in the proper context. He warned that fear and ignorance about China's activities will change government policy, fostering an increased militarization of cyberspace, an escalating cyber-arms race, and ultimately a loss of privacy and freedom for U.S. citizens.

More on Hacker Tools and Techniques: Underground Sites and Hacking Groups

  • canderson

    Why advanced threats are less dangerous than simple attacks

    VIDEO - Video: BeyondTrust's Marc Maiffret explains why simple attacks are often more effective than advanced threats.
  • canderson

    Gary McGraw warns against conflating cyberwar and cyberespionage

    VIDEO - In this video interview, Cigital CTO Gary McGraw draws a distinction between cyberwar and cyberespionage, saying the two are often wrongly conflated.
  • canderson

    Peter Kuper on hacktivism, the evolution of hacking and mobile threats

    VIDEO - In-Q-Tel's Peter Kuper discusses hacktivists’ desire for attention, and how the growing use of mobile devices is driving the evolution of hacking.
  • pre-installed malware

    Definition - Pre-installed malware is malicious software that is put on a machine before it is delivered to the user. New devices are usually assumed to be uncompromised but there are numerous reports of malware existing on new hardware.
  • The value of open source intelligence tools to enterprises

    Answer - Expert Joseph Granneman offers advice to enterprise security teams on using open source intelligence tools to learn about potential threats.
  • Protect your enterprise from hackers for hire

    Answer - Hackers for hire pose significant enterprise risks. Does your organization know if it's a target? Get the low-down on these organized crime groups.
  • peer-to-peer botnet (P2P botnet)

    Definition - A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge.  Just as in the traditional botnet, which includes a command-and-control server, the bots are typically infected with a Trojan horse and are often used for sending spam or performing DDoS (distributed denial of service) attacks.
  • botnet topology

    Definition - A botnet topology is the network structure by which botnet interconnections are organized. Botnet topologies may be either centralized around a command and control server (C&C server) or decentralized using peer-to-peer (P2P) communication.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: