Top US Spy Says Sceptical About US-China Cyber Agreement

Advertisement
By Reuters | Updated: 30 September 2015 14:10 IST
The top US intelligence official said he was sceptical that a new US-China cyber agreement would slow a growing torrent of cyber-attacks on US computer networks, adding that his approach will be to "trust but verify."

Director of National Intelligence James Clapper told the Senate Armed Services Committee on Tuesday that the agreement did not include specific penalties for violations but that the US government could use economic sanctions and other tools to respond if needed.

Clapper and other officials said they viewed last week's cyber agreement between China and the United States on curbing economic cyber espionage as a "good first step" but noted it was not clear how effective the pact would be.

President Barack Obama said on Friday that he had reached a "common understanding" with China's President Xi Jinping that neither government would knowingly support cyber theft of corporate secrets or business information.

Advertisement

Asked if he was optimistic the agreement would eliminate Chinese cyber-attacks, Clapper said simply: "No."

Advertisement

Clapper said he was sceptical because Chinese cyber espionage aimed at extracting US intellectual property was so pervasive, and there were questions about the extent to which it was orchestrated by the Chinese government.

He said the United States should "trust but verify," a reference to former President Ronald Reagan's approach to nuclear disarmament with the former Soviet Union.

Advertisement

Clapper and other top US military officials said cyber threats were increasing in frequency, scale, sophistication and severity, and the United States needed the same kind of deterrent capability in cyberspace that it maintains for nuclear weapons.

Attacks by countries such as Russia, China, Iran and North Korea, as well as non-state actors, would increase and likely grow more sophisticated in coming years, expanding to include manipulation of data, he said.

Advertisement

"Such malicious cyber activity will continue and probably accelerate until we establish and demonstrate the capability to deter malicious state-sponsored cyber activity," he said. Establishing a credible deterrent requires agreement on norms of cyber behaviour by the international community, he said.

However, they said attributing a cyber-attack was far more difficult than determining who launched a missile.

Clapper said the current environment was like "the Wild West" and the world needed to deal with the evolving threats.

One key question, he said, was whether to limit spying activity, such as the incident that compromised personal data of 21 million individuals in a database maintained by the Office Of Personnel Management.

Deputy Defence Secretary Robert Work told the committee that the US response would be "vigorous" if another incident on the scale of the OPM breach was firmly linked to China. He said the Pentagon was finalising a broad cyber warfare policy that was supposed to have been shared with Congress over a year ago.

He said the response could involve a variety of tools, including economic sanctions and criminal indictments, as well as potential use of offensive cyber weapons.

US officials have linked the OPM breach to China, but have not said whether they believe its government was responsible.

Clapper said no definite statement had been made about the origin of the OPM hack since officials were not fully confident about the three types of evidence that were needed to link an attack to a given country: the geographic point of origin, the identity of the "actual perpetrator doing the keystrokes," and who was responsible for directing the act.

Separately, the four-star general leading the US military command that transports troops and cargo told Reuters that he was concerned about cyber-attacks on its contractors and industry partners.

Air Force General Darren McDew, who heads the US Transportation Command, said that while efforts had been made to improve the command's cyber-security, his "concern is outside of that sphere". He added that the protection of US defence contractors "is not as robust".

A little over a year ago, a Senate Armed Services Committee report said the Transportation Command's computer systems had been breached at least 20 times in a year and cast doubt about the security measures being undertaken.

© Thomson Reuters 2015

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. The Upcoming Poco X8 Pro Series Could be Launched Globally on This Date
  2. OnePlus 15T Display Size Teased; Geekbench Listing Suggests Chipset
  3. Vivo X300 Max With Zeiss Cameras Spied at MWC 2026, Could Launch Soon
  4. Laalo – Krishna Sada Sahaayate OTT Release: All You Need to Know
  1. The Boys Season 5 OTT Release: When, Where to Watch the Final Season of the Superhero Series
  2. Laalo – Krishna Sada Sahaayate OTT Release: When, Where to Watch the Gujarati Spiritual Drama
  3. Vikram On Duty OTT Release: When, Where to Watch Nikhil Maliyakkal’s Telugu Crime Thriller
  4. Annagaru Vostaru OTT Release: When, Where to Watch Karthi’s Telugu Action-Comedy
  5. Local Times OTT Release: Know When and Where to Watch the Tamil Comedy Drama Online
  6. Vivo X300 Max With Zeiss Cameras and Android 16 Spotted at MWC 2026, Could Launch Soon
  7. WhatsApp Update Introduces Support for Discovering Stickers While Typing Emoji: How It Works
  8. This AI-Powered Portable Device Claims to Detect Microphones and Jam Audio Recordings
  9. Poco X8 Pro Series Global Launch Date Leaked Ahead of Anticipated Debut: Expected Price, Specifications
  10. MacBook Neo Geekbench Scores Indicate It Performs on Par With iPhone 16 Pro Max
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.