Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home CRM Systems Customer Service Contact Centers Business Intelligence More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
Data Security
Next Generation Data Center Is Here!
Average Rating:
Rate this article:  
US Indicts 5 Chinese Officers on Cyber-Espionage Charges
US Indicts 5 Chinese Officers on Cyber-Espionage Charges

By Jennifer LeClaire
May 19, 2014 1:44PM

Bookmark and Share
U.S. Attorney General Eric Holder said the case represents the first-ever charges against a state actor for this type of hacking. He called the range of trade secrets and other sensitive business information stolen "significant" and said it demanded an aggressive response. Five Chinese military officers were indicted on cyber-espionage charges.
 



Five Chinese military officers were indicted Monday by a federal grand jury in the Western District of Pennsylvania on charges of computer hacking and economic espionage, among other crimes. The hackers were allegedly targeting six entities in the U.S. nuclear power, metals and solar products industries.

According to the indictment, the defendants conspired to hack into American entities so they could gain and maintain illegal access to their computers and to steal information that would be useful to their competitors in China, including state-owned enterprises.

The indictment also alleges that the hackers, using Chinese military and intelligence resources, downloaded massive amounts of industrial information, including strategic plans, from U.S. businesses. The six U.S. entities were Westinghouse Electric, U.S. Steel, SolarWorld, the United Steel Workers Union, Allegheny Technologies and Alcoa.

First Time for Everything

U.S. Attorney General Eric Holder said the case represents the first-ever charges against a state actor for this type of hacking. He called the range of trade secrets and other sensitive business information stolen in this case "significant" and said it demands an aggressive response.

"Success in the global market place should be based solely on a company's ability to innovate and compete, not on a sponsor government's ability to spy and steal business secrets," Holder said. "This administration will not tolerate actions by any nation that seeks to illegally sabotage American companies and undermine the integrity of fair competition in the operation of the free market."

Mike Davis, CTO of CounterTack, a real-time endpoint security firm, told us there's a growing legion of criminal enterprises like the Chinese People's Liberation Army that are looking to try anything to get data as part of large-scale cyber-espionage efforts.

"It's just part of the game now, but these enterprises are well funded, and they are persistent. It's interesting that this news surfaced today," Davis said. "There is a substantial long-term play in terms of how the U.S. will prosecute these types of criminals, striking a delicate balance between using a heavy hand now to send a message -- depending on what the charges and sentence is -- but also to say that the U.S. isn't showing any type of weakness in its cyber-security approach."

An Important Move

Tom Cross, director of security research at network security firm Lancope, said this was an important move by the U.S. Department of Justice toward establishing a set of international norms regarding cyber-espionage. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Data Security
1.   Retailers Hacked by New Malware
2.   IBM Beefs Up Identity Intelligence
3.   Tor Internet Privacy Service Breached
4.   Tor Working To Fix Security Exploit
5.   Protect Yourself from Identity Theft


advertisement
IBM Beefs Up Identity Intelligence
To offer biz better security products.
Average Rating:
Tor Internet Privacy Service Breached
Users should assume they're affected.
Average Rating:
Protect Yourself from Identity Theft
Even if your data was compromised.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Contact Centers | Business Intelligence | Sales & Marketing | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.