China's leaders need to look hard at the "Chinese Dream" they are trying to realize for their country and decide if that dream rests more on cooperation at this defining moment with the world's other largest economy, the United States, or on an absurd and outdated allegiance to the bizarre and historically obsolete feudal regime of the Kim family in Pyongyang.
Although John McCain's sidekick in threat exaggeration and bellicose strutting, Lindsay Graham, was outraged that President Obama called North Korea's action "cyber vandalism," that is probably the best description.
Sony Pictures and the rest of corporate America must realize that the proliferation of cyber miscreants and illicit activities that steal Intellectual Property and sensitive data are finding it easier than ever.
Santa huddled with his legal team, the elves and Mrs. Claus wondering whether to bow to the group's demands. Cancel Christmas? Sure, the holiday had descended into a blur of Labor Day Christmas sales. But foregoing his yearly journey would mean disappointing millions of children.
The vulnerabilities that Dr. Charlie Miller points to are real and require our attention if we are to ensure that fiction does not become reality, and that the most recent cyber attacks on Sony are the end and not the beginning of a new era in state-sponsored cyber attacks.
Stephen Del Rosso,Program Director, International Peace & Security This article is excerpted from The Carnegie Reporter ...
Despite precautions, cyber attackers can often stay one step ahead of protection mechanisms. Sony, of course, had little in the way of cyber security protections, making it an easy soft target for hackers. But even better protected systems can be penetrated.
To mitigate the damage and restore confidence, Sony Pictures executives need to develop a plan so this is unlikely to reoccur. While this is easier said than done, IT solutions are available to thwart hackers.
As bad as Sony's cave-in, though, is the ridiculously false "shock" at the hackers' success in exposing the emails. There is incredible naiveté from everyone involved.
I find it more than a little ironic that as we wring our collective hands over the interrogation tactics used by the U.S. intelligence community, we are sitting idly by while attackers unknown are torturing and holding hostage an American company.
What is important is that these hacks presage what is going to happen for years to come and at far greater cost than what is being imposed on Sony. The weaponization of code is the most significant development in warfare since the weaponization of fissile material.
The success of the Internet in China over the past 20 years shows that successful foreign companies in China respect China's market environment and abide by China's law and regulations. U.S. companies operating in China show that those who respect the Chinese law can seize the opportunity of China' s Internet innovation and create immense value, while those who chose opposition stand will be isolated by themselves and finally abandoned by the Chinese market.
It seems like there were more companies that had privacy-related problems in 2014 than didn't. And the lucky ones that didn't "get got" were separated by only one or two degrees from those that did. As we look ahead to 2015, I see a mix of old privacy concerns along with a few emerging dangers.
With new DOD leadership, troops returning to Iraq, and an extension of the U.S. stay in Afghanistan, doing more of the same is clearly not enough; it is time to embrace fresh national security ideas.
We're only a week in to December and there's already been significant cyber security activity. There have been a number of well publicized high profile breaches, malware attacks and phishing attacks as we head in to the final stretch of the year.
China's concept of Internet sovereignty seems likely to result in a diplomatic cul-de-sac. However, Chinese officials will continue to employ sovereignty issues to occupy conference agendas and stall real progress on international cooperation in cyberspace.