{"id":153667,"date":"2013-03-27T20:15:25","date_gmt":"2013-03-28T03:15:25","guid":{"rendered":"http:\/\/chinadigitaltimes.net\/?p=153667"},"modified":"2013-03-28T12:53:03","modified_gmt":"2013-03-28T19:53:03","slug":"former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks","status":"publish","type":"post","link":"https:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/","title":{"rendered":"Former U.S. Defense Chief: Time for Quiet Diplomacy on Cyberattacks"},"content":{"rendered":"

As accusations of hacking take an increasingly prominent role in Sino-U.S. relations<\/a>, former U.S. Defense Secretary William Cohen argues that a quieter approach will yield better results than “megaphone diplomacy”<\/strong><\/a>. From Bob Davis at China Real Time Report:<\/p>\n

\n

While the publicity given to China\u2019s alleged hacking of U.S. companies has put the spotlight on the issue, Mr. Cohen said in an interview, it\u2019s now time for private negotiations between the U.S. and China. \u201cIf you continue to simply shout in public, we\u2019re likely to get a negative reaction\u201d from Beijing, he said<\/p>\n

At issue, he added, is drafting \u201crules of the road and rules of engagement\u201d concerning cyber activity, particularly what \u201cthreshold\u201d of cyber activity should prompt a home government to crack down on perpetrators. \u201cWhat level of activity can be tolerated by any country?\u201d Mr. Cohen asked.<\/p>\n

[\u2026] The former defense secretary, who now runs a consulting firm [with some dealings in China<\/a>], said multilateral negotiations on cybersecurity could play a role, but could take years to yield results. The U.S. needs to figure out before then \u201chow to take measures to suppress activity that threatens our industry and critical infrastructure,\u201d he said.<\/p>\n

\u201cMy hope,\u201d he added, \u201cis that we can undertake this process in a fashion that prevents megaphone diplomacy from taking root and the adverse consequences that can flow from it.\u201d<\/p>\n<\/blockquote>\n

Such consequences might ultimately include self-fulfilling prophecies of cyberconflict<\/strong><\/a>. From Kim Zetter at Wired:<\/p>\n

\n

Referring to [the] announcement by the U.S. director of national intelligence that cyberattacks were the biggest threat the nation faced, Martin Libicki, senior management scientist at the RAND Corporation, told the House Homeland Security Committee that making strong statements about cyberattacks \u201ctends to compel the United States to respond vigorously should any such cyberattack occur, or even merely when the possible precursors to a potential cyberattack have been identified. Having created a demand among the public to do something, the government is then committed to doing something even when doing little or nothing is called for.\u201d<\/p>\n

Put in perspective, cyber attacks might disrupt life, but they cannot be used to occupy another nation\u2019s capital or force regime change. No one has yet died from a cyberattack either, he noted. Therefore, a cyberattack in and of itself, \u201cdoes not demand an immediate response to safeguard national security,\u201d Libicki said during a hearing on cyberthreats against critical infrastructure from China, Russia and Iran.<\/p>\n

[\u2026] \u201c[W]e are right to be worried about a \u20199\/11 in cyberspace,\u2019 but we also ought to worry about what a \u20199\/12 in cyberspace\u2019 would look like,\u201d he said.<\/p>\n<\/blockquote>\n

Security guru Bruce Schneier has also struck a note of caution about the tone of rhetoric on cybersecurity<\/strong><\/a>:<\/p>\n

\n

Our nationalist worries have recently been fueled by a media frenzy surrounding attacks from China. These attacks aren’t new-cyber-security experts have been writing about them for at least a decade, and the popular media reported about similar attacks in 2009 and again in 2010-and the current allegations aren’t even very different than what came before. This isn’t to say that the Chinese attacks aren’t serious. The country’s espionage campaign is sophisticated, and ongoing. And because they’re in the news, people are understandably worried about them.<\/p>\n

[\u2026] Unfortunately, both the reality and the rhetoric play right into the hands of the military and corporate interests that are behind the cyberwar arms race in the first place. There is an enormous amount of power at stake here: not only power within governments and militaries, but power and profit amongst the corporations that supply the tools and infrastructure for cyber-attack and cyber-defense. The more we believe we are “at war” and believe the jingoistic rhetoric, the more willing we are to give up our privacy, freedoms, and control over how the Internet is run.<\/p>\n

Nationalism is rife on the Internet, and it’s getting worse. We need to damp down the rhetoric and-more importantly-stop believing the propaganda from those who profit from this Internet nationalism. Those who are beating the drums of cyberwar don’t have the best interests of society, or the Internet, at heart.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"

As accusations of hacking take an increasingly prominent role in Sino-U.S. relations, former U.S. Defense Secretary William Cohen argues that a quieter approach will yield better results than “megaphone diplomacy”. From Bob Davis at China Real Time Report: While the publicity given to China\u2019s alleged hacking of U.S. companies has put the spotlight on the […]<\/p>\n","protected":false},"author":962,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[116,7,14744,14745,14746,100,6,1051],"tags":[14683,1369,596,597,6379],"class_list":["post-153667","post","type-post","status-publish","format-standard","hentry","category-world","category-information-revolution","category-level-2-article","category-level-3-article","category-level-4-article","category-politics","category-sci-tech","category-top-article","tag-cybersecurity","tag-diplomacy","tag-hackers","tag-hacking","tag-united-states","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"yoast_head":"\nFormer U.S. Defense Chief: Time for Quiet Diplomacy on Cyberattacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Former U.S. Defense Chief: Time for Quiet Diplomacy on Cyberattacks\" \/>\n<meta property=\"og:description\" content=\"As accusations of hacking take an increasingly prominent role in Sino-U.S. relations, former U.S. Defense Secretary William Cohen argues that a quieter approach will yield better results than “megaphone diplomacy”. From Bob Davis at China Real Time Report: While the publicity given to China\u2019s alleged hacking of U.S. companies has put the spotlight on the […]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"China Digital Times (CDT)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ChinaDigitalTimes\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-28T03:15:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-03-28T19:53:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"186\" \/>\n\t<meta property=\"og:image:height\" content=\"177\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Samuel Wade\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cdt\" \/>\n<meta name=\"twitter:site\" content=\"@cdt\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Samuel Wade\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/\"},\"author\":{\"name\":\"Samuel Wade\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/4b33a6e88a49d3a6787f02f798de0d8e\"},\"headline\":\"Former U.S. Defense Chief: Time for Quiet Diplomacy on Cyberattacks\",\"datePublished\":\"2013-03-28T03:15:25+00:00\",\"dateModified\":\"2013-03-28T19:53:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/\"},\"wordCount\":693,\"publisher\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#organization\"},\"keywords\":[\"cybersecurity\",\"diplomacy\",\"hackers\",\"hacking\",\"United States\"],\"articleSection\":[\"China & the World\",\"Information Revolution\",\"Level 2 Article\",\"Level 3 Article\",\"Level 4 Article\",\"Politics\",\"Sci-Tech\",\"Top Article\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/\",\"url\":\"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/\",\"name\":\"Former U.S. Defense Chief: Time for Quiet Diplomacy on Cyberattacks\",\"isPartOf\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#website\"},\"datePublished\":\"2013-03-28T03:15:25+00:00\",\"dateModified\":\"2013-03-28T19:53:03+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/chinadigitaltimes.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Former U.S. Defense Chief: Time for Quiet Diplomacy on Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#website\",\"url\":\"https:\/\/chinadigitaltimes.net\/\",\"name\":\"China Digital Times (CDT)\",\"description\":\"Covering China from Cyberspace\",\"publisher\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/chinadigitaltimes.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#organization\",\"name\":\"China Digital Times\",\"url\":\"https:\/\/chinadigitaltimes.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg\",\"contentUrl\":\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg\",\"width\":186,\"height\":177,\"caption\":\"China Digital Times\"},\"image\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ChinaDigitalTimes\",\"https:\/\/x.com\/cdt\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/4b33a6e88a49d3a6787f02f798de0d8e\",\"name\":\"Samuel Wade\",\"description\":\"Samuel Wade (@samuel_wade@mstdn.ca) is Executive Editor for CDT English, and is based in Vancouver.\",\"sameAs\":[\"http:\/\/samuelwa.de\"],\"url\":\"https:\/\/chinadigitaltimes.net\/author\/samuelwade\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Former U.S. Defense Chief: Time for Quiet Diplomacy on Cyberattacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Former U.S. Defense Chief: Time for Quiet Diplomacy on Cyberattacks","og_description":"As accusations of hacking take an increasingly prominent role in Sino-U.S. relations, former U.S. Defense Secretary William Cohen argues that a quieter approach will yield better results than “megaphone diplomacy”. From Bob Davis at China Real Time Report: While the publicity given to China\u2019s alleged hacking of U.S. companies has put the spotlight on the […]","og_url":"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/","og_site_name":"China Digital Times (CDT)","article_publisher":"https:\/\/www.facebook.com\/ChinaDigitalTimes","article_published_time":"2013-03-28T03:15:25+00:00","article_modified_time":"2013-03-28T19:53:03+00:00","og_image":[{"width":186,"height":177,"url":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.png","type":"image\/png"}],"author":"Samuel Wade","twitter_card":"summary_large_image","twitter_creator":"@cdt","twitter_site":"@cdt","twitter_misc":{"Written by":"Samuel Wade","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/#article","isPartOf":{"@id":"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/"},"author":{"name":"Samuel Wade","@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/4b33a6e88a49d3a6787f02f798de0d8e"},"headline":"Former U.S. Defense Chief: Time for Quiet Diplomacy on Cyberattacks","datePublished":"2013-03-28T03:15:25+00:00","dateModified":"2013-03-28T19:53:03+00:00","mainEntityOfPage":{"@id":"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/"},"wordCount":693,"publisher":{"@id":"https:\/\/chinadigitaltimes.net\/#organization"},"keywords":["cybersecurity","diplomacy","hackers","hacking","United States"],"articleSection":["China & the World","Information Revolution","Level 2 Article","Level 3 Article","Level 4 Article","Politics","Sci-Tech","Top Article"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/","url":"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/","name":"Former U.S. Defense Chief: Time for Quiet Diplomacy on Cyberattacks","isPartOf":{"@id":"https:\/\/chinadigitaltimes.net\/#website"},"datePublished":"2013-03-28T03:15:25+00:00","dateModified":"2013-03-28T19:53:03+00:00","breadcrumb":{"@id":"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/chinadigitaltimes.net\/2013\/03\/former-u-s-defense-chief-time-for-quiet-diplomacy-on-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chinadigitaltimes.net\/"},{"@type":"ListItem","position":2,"name":"Former U.S. Defense Chief: Time for Quiet Diplomacy on Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/chinadigitaltimes.net\/#website","url":"https:\/\/chinadigitaltimes.net\/","name":"China Digital Times (CDT)","description":"Covering China from Cyberspace","publisher":{"@id":"https:\/\/chinadigitaltimes.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chinadigitaltimes.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chinadigitaltimes.net\/#organization","name":"China Digital Times","url":"https:\/\/chinadigitaltimes.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/","url":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg","contentUrl":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg","width":186,"height":177,"caption":"China Digital Times"},"image":{"@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ChinaDigitalTimes","https:\/\/x.com\/cdt"]},{"@type":"Person","@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/4b33a6e88a49d3a6787f02f798de0d8e","name":"Samuel Wade","description":"Samuel Wade (@samuel_wade@mstdn.ca) is Executive Editor for CDT English, and is based in Vancouver.","sameAs":["http:\/\/samuelwa.de"],"url":"https:\/\/chinadigitaltimes.net\/author\/samuelwade\/"}]}},"_links":{"self":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/posts\/153667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/users\/962"}],"replies":[{"embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/comments?post=153667"}],"version-history":[{"count":0,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/posts\/153667\/revisions"}],"wp:attachment":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/media?parent=153667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/categories?post=153667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/tags?post=153667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}