US bill flags espionage beneficiaries

By on
US bill flags espionage beneficiaries

Would create cyber spy 'watch list'.

US senators have introduced new legislation calling for the creation of a "watch list" of countries believed to be engaging in cyber espionage and the blocking of certain imports.

The bipartisan Deter Cyber Theft Act, introduced on Tuesday, charges James Clapper, the director of national intelligence, to prepare a list of nations believed to be participating in economic or industrial espionage against US companies.

He also must build a priority list of the countries he judges are engaging in the most "egregious" forms of digital spying, according to the proposed legislation (PDF).

In addition, he must chronicle the technologies that are being targeted by the espionage, and a list of products that are created as a result of any hijacked information.

The proposed law would then require the president to bar the import of products containing this technology or ones that benefited from stolen information.

"It is time we fought back to protect American businesses and American innovation," said Senator Carl Levin.

While not specifically named in the proposed measure, China is commonly fingered as the most glaring offender. For years, the country was suspected of launching stealthy attacks against US businesses and government agencies to surreptitiously extract sensitive data.

But a comprehensive report earlier this year from security forensic firm Mandiant, which showcased the inner workings of a Chinese military unit operating out of Shanghai that is responsible for the theft of hundreds of terabytes of information from US organisations, propelled the issue into the mainstream. As did a series of high-profile hacking incidents, including at The New York Times.

Just this week, the Pentagon, in its annual report (PDF) on China's military operations, for the first time accused the country of spearheading cyber espionage attacks, though it likely was referencing Mandiant's findings.

"In 2012, numerous computer systems around the world, including those owned by the US Government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese Government and military," the report said. "These intrusions were focused on exfiltrating information."

Chinese officials have refuted those claims.

"We firmly oppose any groundless criticism and hype, because groundless hype and criticism will only harm bilateral efforts at cooperation and dialogue," Chinese Foreign Ministry spokeswoman Hua Chunying said, according to Reuters.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition
Tags:
In Partnership With

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?