Cyber security is in the forefront of our international relations. Security concerns range from personal and business infrastructure to the protection of our National Nuclear Security Administration (NNSA). The NNSA learned in 2010 how much damage could stem from a computer worm, as it shut down secure systems. According to experts, hackers associated with a national government could be the only team to develop a worm as intricate as the Stuxnet worm of 2010. While they’re unaware of any such malware that could launch a nuclear warhead, only a national government might find interest in the task. (Koebler, 2012)
With accusations of cyber warfare coming from all directions, China and the U.S. have agreed to work together to establish better security. While the details have remained a secret, China has said it is the victim of numerous cyber-attacks stemming from the US. On that same note, the US has claimed proof that a majority of the attacks on large corporations and government are from a “secretive Chinese military unit.” (Terril Yue Jones, 2013) What better place to strengthen ties and develop a mutual trust with one another than in cyberspace.
While news of the truce was encouraging earlier in the month of April, the U.S. remains skeptical that China will cease their intrusions. Stealing secrets is one way that China can exceed in the industry. The Chinese government has indicated their dislike of being accused without proof of such acts. In May of 2012, a US intelligence officer laid out the proof of three cases during diplomatic talks. “It would be like a wife going to a husband saying, I know you cheated and laying out the photos, the phone bills, and the DNA evidence’ said the former senior U.S. official.” (Gorman, 2013)
Our government is working on future responses to cyber-terrorism, options that could include prosecution. Prosecution in itself could compromise secrets, as to prosecute there would be a revelation of how our intelligent sources discovered the crime. (Gorman, 2013) The episode will continue to require attention with future developments.
Through the Tom and Jerry episode of the missing mouse, we learn a mouse can bring mass destruction. When government officials declare the mouse will not explode, “Don’t you believe it.”
Gorman, S. (2013, 04 21). U.S. Eyes Pushback On China Hacking. Retrieved 04 24, 2013, from The Wall Street Journal: http://online.wsj.com/
Koebler, J. (2012, 03 20). "U.S. Nukes Face Up to 10 Million Cyber Attacks Daily". Retrieved 04 24, 2013, from US News: http://www.usnews.com/news/articles/2012/03/20/us-nukes-face-up-to-10-million-cyber-attacks-daily
Terril Yue Jones, J. S. (2013, 04 13). U.S., China agree to work together on cyber security. Retrieved 04 24, 2013, from Reuters: http://www.reuters.com/article/2013/04/13/us-china-us-cyber-idUSBRE93C05T20130413
Tom and Jerry Qoutes. (n.d.). Retrieved 04 24, 2013, from Great-Quotes.com: http://www.great-quotes.com/quotes/movie/Tom+and+Jerry