• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Recent Interviews
    • Events
      • Coming Events
    • Radio
    • Television
    • Rumble / Youtube
  • Publications
    • All Posts Archive
    • ACD Presentations
    • Articles
    • Books
    • Papers
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • FREE SPEECH Act Celebration, U.S. Senate, September 20, 2010
      • Some Congressional Testimonies
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / ACD/EWI Blog / Cyber Diplomacy Vs. Cybersecurity *Exclusive

Cyber Diplomacy Vs. Cybersecurity *Exclusive

March 7, 2013 by EWI BLOG | by Rachel Ehrenfeld, Ken Jensen

Since the hacking of the New York Times, the Wall Street Journal, The Washington Post, etc., and the Mandiant revelations about China’s PLA Unit 61398, the media and Internet have offered an explosion of talk about now as a“tipping point” in cybersecurity. We’re, in fact, long past the “tipping point”: what Mandiant had to say about Chinese hacking was actually old news to those who follow cyber news.
As has been the case in the past, there seem to be three camps on the issue of cybersecurity: “the-sky-is-falling” or “cyber-Pearl-Harbor” camp, the “overblown-threat” camp, and the camp worried about the cyberdefense threat to privacy rights. We shouldn’t forget the advocacy of international “rules of the game” for cyberspace, which was recently argued by Zbigniew Brzezinski in the Financial Times. None of these offer much new. And Obama’s cybersecurity executive order on February 12, has elicited few comments beyond “not enough, too preliminary” and “a worrisome expansion of government right-to-prying-on-citizens.”

 

A week later, supposedly demonstrating the Administration’s determination to increase cybersecurity, the Trade Secret Protection Strategy was introduced by Attorney General Eric Holder in a White House press conference. “Trade secret theft can require companies to lay off employees, to close factories, to lose sales and profits … or even to go out of business,” he said.

 

Under Secretary of State for Economic Growth, Energy, and the Environment, Robert Hormats, who attended the meeting, offered a clarification of the new strategy that undoubtedly struck real fear in the hearts of the Chinese, Iranian and other hackers. The new strategy will give “clear” diplomatic signals that “preventing the theft of secrets is the priority” of the United States.

 

While the administration’s soft-approach plan of giving “clear” diplomatic signals takes time and is subject to a different interpretation. We weren’t told of any action that will be taken if the signals have been not as clear as the administration hopes. Signaling displeasure about cyber theft without adding the option of actions to stop the stealing is worthless.

 

In addition, the widespread tendency is to focus on the technical aspects of cyber security, with little or no attention paid to the people who use the technology to commit the intrusion, or the theft.  When the subject comes up, it can be truly stupefying; On March 3, the New York Times decried U.S. intelligence agencies wondering: “Why had the Chinese done it?”  Who cares? They’ve done it, and will do it again unless stopped.

 

The theft of our intellectual property and scientific innovations have already cost billions of dollars and severely damaged our economy. It’ll take time, finances, and lots of effort to gain back the market, that is, if we can stop the hemorrhaging. However, a new study by the civilian Defense Science Board, which was released yesterday, indicates that our national security is under severe threat, and openly criticizes the Defense Department for not being “prepared to defend against this threat.”

 

The report warned that “The cyberattacks could be combined with conventional attacks at sea and in space….Attackers could crash servers, corrupt data, tamper with the supply chain and insert malicious software into critical systems.” Hacking into the systems, attackers could order U.S. guns, missiles and bombs not to fire, or “direct them against our own troops.” Moreover, even our nuclear weapons are vulnerable to cyber sabotage and attack.” If that happens, “military commanders ‘may rapidly lose trust’ in their ability to command.”

 

Since it is not possible to protect all military units and installations from cyberattacks, the report “recommends isolating critical systems and weapons, and equipping small numbers with advanced defensive measures to ensure they survive an attack.”

 

While the administration have great expectations that more “pointed diplomatic and trade measures,” such as threats to cancel certain visas, or put major purchases of Chinese goods through national security reviews, would scare the Chinese, it is essential to adopt Gen. Michael Hayden’s policy that “the best defense is offence.”

 

Strong and sharp teeth are necessary to deter effectively. Instead of holding many public debates and searching for the appropriate diplomatic jargon to signal serious threat, it’s time to do something without too much ado.

 

For example, hackers into our systems should have their computers be hacked instantaneously. Their content should be “vacuumed,”, preferably including their back ups, too, and, if possible, they should be physically destroyed. If this will be done regularly, systematically and secretly the message “don’t mess with me” will be clearer that any diplomatic signal the White House has in mind.  This way there is a chance to retrieve information that was hacked.

 

Replacing an army of hackers with appropriate computers takes time even in China. In the meantime, we could strengthen our defensive and offensive capabilities.

 

Projecting our renewed strength could then bolster our defense. But to get there, we must now mount the best offense we can muster.

 

FURTHER READING:

 

1: Franz-Stefan Gady: Cyber Espionage: Reducing Tensions Between China and the United States 

2: Sudden death of U.S. engineer in Singapore linked to cyber espionage? Some are wondering whether the death of an American engineer working in Singapore could be linked to cyber espionage.
 
3: Reuters: White House, lawmakers resume cybersecurity bill talks  
4: Scott Paul: Is Washington to Blame for Chinese Cyberterrorism? 

5: ALBERTA OIL MAGAZINE: Why the energy sector is attracting the attention of cyber criminals. Experts say size and complexity of the industry make it an appealing target 

 

6: WSJ: Hardening Our Defenses Against Cyberwarfare

 

7: Defense News: Time to Confront China’s Cyber Espionage 

8: EURACTIVE: EU, US go separate ways on cybersecurity [fr]
 

9: FOX BUSINESS: Survey: Investors Crave More Cyber Security Transparency
10: INFOWORLD: Researchers discover new global cyber-espionage campaign. A new cyber-espionage campaign dubbed MiniDuke used the recent Adobe Reader zero-day exploit 

Filed Under: ACD/EWI Blog, ACD/EWI Exclusive, Cyber, U.S. Policy

Primary Sidebar

Spotlight

website capture islamist incitement quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise winning the cyberwar gps concepts and misconceptions libel tourism

Search ACD

Recent Appearances

[9/29/2025] The Shilling Show

[9/2/2025] Wake Up Patriots

[8/29/2025] Decoding Soros

[5/1/2025] National Talk Radio with Shawn Moore

[3/11/2025] Shaun Thompson Interview

[3/10/2025] Larry Conners Interviews Rachel Ehrenfeld

[2/3/2025] The Truth About George Soros - Grey Matter Podcast

[1/22/2025] Fighting Terrorism Funding - SAM Podcast

[1/8/2025] COUNTER NARRATIVE Interview on PATRIOT.TV

[10/2/2024] The Shaun Thompson Show: Dr. Rachel Ehrenfeld

[9/30/2024] Counter Narrative: Soros Power Grab: Media Takeover & Election Manipulation |

See All Appearances

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...
ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims NCCM Norman Bailey Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US USA women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2025 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.