Cyberspace Cooperation

The Global Cooperation in Cyberspace Initiative seeks to reduce conflict, crime and other disruptions in cyberspace and promote stability, innovation and inclusion.

Learn More

Politico Cites EWI's Austin on Chinese Hacking

EWI's Professorial Fellow Greg Austin spoke to Politico on assertions about Chinese government-affiliated hacking. 

EWI's Professorial Fellow Greg Austin was quoted in Politico's October 20 article "Doubts greet CrowdStrike's assertions about Chinese hacking." 

As quoted in this article: There's also the agreement itself. It didn't ban hacking, or even ban economic espionage. It only called for an end to stealing intellectual property and trade secrets for the benefit of Chinese firms, not to stop stealing it entirely, said Greg Austin, a professorial fellow with the EastWest Institute.

To read the full article at Politico (paywall), click here

Al Jazeera America Quotes EWI's Gady on Facebook's Warning System

EWI's Senior Fellow Franz-Stefan Gady spoke to Al Jazeera America in regards to Facebook's new system that alerts users when a government has hacked their accounts.

EWI's Senior Fellow Franz-Stefan Gady was quoted in Al Jazeera America's October 21 article "Facebook warns users of 'state-sponsored' hacking." 

As quoted in this article: One interpretation of Facebook's new “state-sponsored” warning system is as a public relations push “to assuage fears outside the U.S., since Facebook has been collaborating with U.S. government entities and handing over data," said Franz-Stefan Gady, a senior fellow at the EastWest Institute and a founding member of the Worldwide Cybersecurity Initiative. Alternatively, it could also be a message to “whomever is mining these systems” that Facebook is cracking down. 

Experts also noted that the algorithms Facebook uses to determine the identity or affiliation of an attacker remain confidential, making it difficult to know how effective they are. Often, the fingerprints of a state-sponsored actor can be detected by the highly advanced nature or resources required of an attack, or by its targets: namely, government officials or corporate executives with access to sensitive information. But “these sorts of things are happening every second on the Internet,” Gady said, “and it would be really tricky to figure out who is behind every attack.

To read the full article at Al Jazeera America, click here.

Pages

Subscribe to RSS - Cyberspace Cooperation