{"id":184474,"date":"2015-06-26T06:53:16","date_gmt":"2015-06-26T13:53:16","guid":{"rendered":"http:\/\/chinadigitaltimes.net\/?p=184474"},"modified":"2015-06-26T17:29:13","modified_gmt":"2015-06-27T00:29:13","slug":"u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow","status":"publish","type":"post","link":"https:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/","title":{"rendered":"U.S., China Pledge Cyber “Code of Conduct”"},"content":{"rendered":"

The Wall Street Journal’s Felicia Schwartz reports some signs of cooperation between China and the United States on the long fraught issue of cybersecurity<\/strong><\/a>. This week’s bilateral Strategic and Economic Dialogue took place against the backdrop of a stream of revelations about the extent of allegedly Chinese intrusions into U.S. government computer systems<\/a>.<\/p>\n

\n

U.S. officials said the talks behind closed doors were \u201cfrank,\u201d but public comments Wednesday at the conclusion of the meetings were largely conciliatory. U.S. officials complained about China\u2019s behavior in the South China Sea and cyberspace, while emphasizing steps to narrow differences and find areas of common ground.<\/p>\n

[\u2026] \u201cOur dialogue over the last 2\u00bd days included a very frank discussion of some issues on which we have not always seen eye to eye,\u201d Mr. Kerry said. \u201cThe U.S. is deeply concerned about cyber incursions that have raised security questions and, frankly, harmed American businesses.\u201d<\/p>\n

[\u2026] Mr. Kerry said China had agreed to work with the U.S. to complete a code of conduct on cyber activities. \u201cWe believe very strongly that the U.S. and China should be working together to develop and implement a shared understanding of appropriate state behavior in cyberspace,\u201d Mr. Kerry said. [Source<\/strong><\/a>]<\/p>\n<\/blockquote>\n

The Council on Foreign Relations’ Adam Segal noted that no mention of the code is found<\/strong><\/a> in the State Department’s 127-point list of “specific outcomes and areas for further cooperation<\/a>.” Nevertheless, he wrote, the pledge holds some promise:<\/p>\n

\n

While it was to be expected that official remarks at the conclusion of the meeting would be conciliatory\u2014both sides want President Xi Jinping\u2019s visit to the United States in September to go well\u2014Washington and Beijing made parallel calls for cooperation on cybersecurity that could lay the groundwork for future discussions. At the opening of the dialogue, State Councilor Yang Jiechi stated that China wanted to develop with the United States and other countries an \u201cinternational code of conduct for cyber information sharing.\u201d though no details were offered on what that exactly means. [\u2026]<\/p>\n

[\u2026] Of course, the calls for cooperation may be nothing more than niceties, designed to reduce tensions in the run up to the September visit. From China\u2019s perspective, it has always been open to greater cooperation. When accused of hacking, Chinese officials typically deny the claim, question the motives of the accuser, and then ritualistically invoke the need for international cooperation. But the call for cyber information sharing is new, and Washington should push Beijing to clarify what it means by information and how it would like to see sharing work. Good diplomacy can spin opportunities out of the introduction of new ideas. [Source<\/strong><\/a>]<\/p>\n<\/blockquote>\n

When the hacking of the U.S. government’s Office of Personnel Management was first announced early this month<\/a>, the number of employees affected was said to be around 4 million. With the subsequent discovery of another breach, estimates now reach as high as 18 million, including White House<\/a> and congressional staff<\/a>. Contrary to initial reports, the intruders had access to highly sensitive security clearance data<\/a> for as long as a year. Such information would include “workers’ sexual partners, drug and alcohol abuse, debts, gambling compulsions, marital troubles, and any criminal activity<\/a>,” which at the blunt end of the spectrum might leave them vulnerable to blackmail. More subtly, the data could be used to identify<\/a> and then recruit potential intelligence sources through bribery or flattery<\/a>, while providing a clear map of security clearance procedures and their possible weaknesses<\/a>. Cross-referencing with data from other hacks<\/a> might allow identification of staff who had failed to disclose information<\/a>.<\/p>\n

China denies any part in the attacks<\/a>. But Michael Hayden, a former head of the National Security Agency and Central Intelligence Agency, has described the OPM’s data as “a legitimate foreign intelligence target<\/a>,” adding that “this is not ‘shame on China.’ This is ‘shame on us’ for not protecting that kind of information.”<\/p>\n

The OPM’s director offered a different interpretation during sustained congressional grilling over security failures at the agency<\/strong><\/a>. From Lisa Rein at The Washington Post:<\/p>\n

\n

\u201cWe have legacy systems that are very old,\u201d Katherine Archuleta, director of the Office of Personnel Management, told Senate lawmakers at a hearing on the intrusion. \u201cIt\u2019s an enterprise-wide problem. I don\u2019t believe anyone is personally responsible.\u201d<\/p>\n

She then told Sen. Jerry Moran (R-Kan.), who pressed her repeatedly to take responsibility for failing to shore up the agency\u2019s computer security, that the attackers are the ones to blame.<\/p>\n

[\u2026] Archuleta said she is \u201cworking very hard on correcting decades of inattention\u201d to weak computer security at her agency, and credited her efforts to add new security defenses for discovering the breach in the first place. But the OPM\u2019s inspector general described a history of failures by the agency to take basic security steps.<\/p>\n

[\u2026] Michael Esser, assistant inspector general for audit, testified that numerous recommendations to modernize aging systems and improve the security of modern ones have not been followed. He noted that a number of the systems that were breached in the hack disclosed in June were actually not \u201clegacy systems,\u201d but modern ones. [Source<\/strong><\/a>]<\/p>\n<\/blockquote>\n

The agency’s initial efforts to notify affected employees also attracted criticism for encouraging behavior that could facilitate further attacks<\/a>. Lax security at the OPM<\/a> and beyond is described in detail<\/a> in recent posts by Ars Technica’s Sean Gallagher<\/a>, who noted that some OPM contractors hired Chinese nationals<\/a>. At least one of these, said to have had “direct access to every row of data in every database,” was actually based in China.<\/p>\n

Security failings at the OPM are hardly unique<\/strong><\/a>, The New York Times’ David E. Sanger, Nicole Perlroth and Michael D. Shear reported last weekend:<\/p>\n

\n

The administration is urgently working to determine what other agencies are storing similarly sensitive information with weak protections. Officials would not identify their top concerns, but an audit issued early last year, before the Chinese attacks, harshly criticized lax security at the Internal Revenue Service, the Nuclear Regulatory Commission, the Energy Department, the Securities and Exchange Commission \u2014 and the Department of Homeland Security, which has responsibility for securing the nation\u2019s critical networks.<\/p>\n

At the Nuclear Regulatory Commission, which regulates nuclear facilities, information about crucial components was left on unsecured network drives, and the agency lost track of laptops with critical data.<\/p>\n

Computers at the I.R.S. allowed employees to use weak passwords like \u201cpassword.\u201d One report detailed 7,329 \u201cpotential vulnerabilities\u201d because software patches had not been installed. Auditors at the Department of Education, which stores information from millions of student loan applicants, were able to connect \u201crogue\u201d computers and hardware to the network without being noticed. And at the Securities and Exchange Commission, part of the network had no firewall or intrusion protection for months. [Source<\/strong><\/a>]<\/p>\n<\/blockquote>\n

CIA-linked data mining firm Recorded Future reported this week that it found login details for employees of 47 different government agencies posted online<\/a>, and that 12 of these organizations failed to use two-factor authentication as an additional layer of security. Meanwhile, traces of malware that struck the OPM have been discovered on computers at the National Archives<\/a>. ACLU technologist Christopher Soghoian commented:<\/p>\n

https:\/\/twitter.com\/csoghoian\/status\/613114074168045568<\/p>\n

The intrusions may go much deeper. As the OPM story developed, The Sunday Times reported anonymous British officials’ claims<\/a> that documents leaked by former NSA contractor Edward Snowden had fallen into Russian and Chinese hands. The article was immediately<\/a> and widely<\/a> mauled<\/a>, particularly after its author told CNN<\/a> that none of its specifics could be verified and that “we just publish what we believe to be the position of the British government at the moment<\/a>.” At Wired, security technologist Bruce Schneier wrote that Snowden’s actions were probably beside the point anyway<\/strong><\/a>:<\/p>\n

\n

I believe that both China and Russia had access to all the files that Snowden took well before Snowden took them because they\u2019ve penetrated the NSA networks where those files reside. After all, the NSA has been a prime target for decades.<\/p>\n

[\u2026] In general, it\u2019s far easier to attack a network than it is to defend the same network. This isn\u2019t a statement about willpower or budget; it\u2019s how computer and network security work today. A former NSA deputy director recently said that if we were to score cyber the way we score soccer, the tally would be 462\u2013456 twenty minutes into the game. In other words, it\u2019s all offense and no defense.<\/p>\n

In this kind of environment, we simply have to assume that even our classified networks have been penetrated. Remember that Snowden was able to wander through the NSA\u2019s networks with impunity, and that the agency had so few controls in place that the only way they can guess what has been taken is to extrapolate based on what has been published. Does anyone believe that Snowden was the first to take advantage of that lax security? I don\u2019t.<\/p>\n

[\u2026] I am reminded of a comment made to me in confidence by a US intelligence official. I asked him what he was most worried about, and he replied: \u201cI know how deep we are in our enemies\u2019 networks without them having any idea that we\u2019re there. I\u2019m worried that our networks are penetrated just as deeply.\u201d [Source<\/strong><\/a>]<\/p>\n<\/blockquote>\n

While most have focused on the need for better defenses, some argue<\/a> for counterattacks<\/a>. Prospective Republican presidential candidate Mike Huckabee, for example, wrote that<\/strong><\/a>:<\/p>\n

\n

The response and retaliation to this behavior is simple-America should hack the Chinese government. We should hack the cell phones of some prominent Communist party leaders, hack the bank accounts of intelligence officials, publicly humiliate Chinese families for political corruption, or wipe-out a few critical Chinese computer systems. [Source<\/strong><\/a>]<\/p>\n<\/blockquote>\n

UCLA’s Kristen Eichensehr, examining the OPM breach in light of the Department of Defense’s newly released Law of War Manual<\/strong><\/a>, wrote last week at Just Security that such bellicose rhetoric is unrealistic:<\/p>\n

\n

Debates are raging over just how damaging the two OPM hacks are. In the first of what are sure to be many congressional hearings on the breaches, Rep. Carolyn Maloney (D-NY) asserted that she \u201cconsider[s] this attack \u2026 a far more serious one to the national security\u201d of the United States than the 9\/11 attacks. Others have called the hacks the long-warned-about cyber 9\/11 or cyber Pearl Harbor. But other commentators have pushed back. Robert Knake of CFR noted that he is \u201ca bit blas\u00e9\u201d about the hack because \u201cif the Chinese government is indeed behind it, it\u2019s not by any stretch the most dastardly thing they have done in cyberspace.\u201d [Knake listed five worse cases attributed to China<\/a> in a blog post at CFR.] Prof. Henry Farrell on the Washington Post\u2018s Monkey Cage blog similarly explained that “hacking into information on U.S. government employees, however sensitive, is not a Pearl Harbor attack,” but rather “an (extremely worrying) exercise in espionage.”<\/p>\n

[\u2026] Despite the debate over exactly how bad the OPM hacks are for national security, there is no doubt that they are a blow, the magnitude of which will become clearer over time. Where any US claim to the legal or moral high ground would be shaky at best, we should assume that spies are going to spy and act accordingly. This means that the government must better secure its sensitive information going forward and take steps to protect the individuals already put at risk. Beyond such responses, allusions to 9\/11 and Pearl Harbor are misplaced and tend to frame these hacks in terms countenanced neither by realism in international relations nor by the rules of international law. [Source<\/strong><\/a>]<\/p>\n<\/blockquote>\n

In any case, it remains unproven that China is the real culprit. The OPM hacks are thought to be the work of “Deep Panda,”<\/a> an outfit associated with China’s Ministry of Public Security<\/a>. But when Director of National Intelligence James Clapper said this week that China is “the leading suspect,”<\/a> it was the strongest such statement to date by a serving U.S. official on the record. Michael Rogers, NSA director and commander of U.S. Cyber Command, has emphasized the enduring uncertainty<\/strong><\/a> about attribution of the attacks. From Patrick Tucker at Defense One:<\/p>\n

\n

Rogers spoke in response to a question about how the National Security Agency was going about attributing the breach to the Chinese government. \u201cYou\u2019ve put an assumption in your question,\u201d he said. \u201cI\u2019m not going to get into the specifics of attribution. It\u2019s a process that\u2019s ongoing.\u201d<\/p>\n

[\u2026] The cybersecurity group FireEye says it\u2019s \u201chighly confident\u201d that Chinese hackers did it, based on the kind of cables and telecommunications equipment involved, the type of data stolen, and the specific backdoors that the thieves used. \u201cThese backdoors, they\u2019re commonly used by Chinese threat actors,\u201d Michael Oppenheim, the intelligence operations manager at FireEye, told Defense One.<\/p>\n

Oppenheim stopped short of formally accusing the Chinese government but added, \u201cWe believe that this aligns with Chinese interests.\u201d<\/p>\n

Oppenheim said that he was sympathetic to Rogers\u2019s reluctance to formally attribute the breach to the Chinese government. \u201cFor someone in his position, you want to be 100-percent sure,\u201d he said. [Source<\/strong><\/a>]<\/p>\n<\/blockquote>\n

Another recent hacking case showed attackers leaving false tracks meant to implicate China. Russian security company Kaspersky revealed this month that it had discovered malware dubbed “Duqu 2” within its own systems<\/a>. The firm’s technical paper on the intrusion refrained from explicit attribution<\/strong><\/a> (PDF), but noted:<\/p>\n

\n

[\u2026 T]he attackers have tried to include several false flags throughout the code, designed to send researchers in the wrong direction. For instance, one of the drivers contains the string \u201cugly.gorilla\u201d, which obviously refers to Wang Dong, a Chinese hacker believed to be associated with the APT1\/Comment Crew. The usage of the Camellia cypher in the MSI VFSes, previously seen in APT1-associated Poison Ivy samples is another false flag planted by the attackers to make researchers believe they are dealing with APT1 related malware. [\u2026]<\/p>\n

Nevertheless, such false flags are relatively easy to spot, especially when the attacker is extremely careful not to make any other mistakes. [Source<\/strong><\/a> (PDF)]<\/p>\n<\/blockquote>\n

The attackers also used a digital certificate apparently stolen from Taiwan-based Foxconn<\/strong><\/a>, possibly for similar reasons. From Kim Zetter at Wired:<\/p>\n

\n

The Taiwanese firm makes hardware for most of the major tech players, including Apple, Dell, Google, and Microsoft, manufacturing the likes of iPhones, iPads and PlayStation 4s. Taiwanese companies have been fruitful for this hacking group, who many believe to be Israeli: This marks at least the fourth time they have used a digital certificate taken from a Taiwan-based firm to get their malware successfully onto systems.<\/p>\n

It\u2019s unclear why the attackers focus on digital certificates from Taiwanese companies, but it may be to plant a false flag and misdirect investigators into thinking China is behind the malware attacks, says Costin Raiu, director of Kaspersky\u2019s Global Research and Analysis Team.<\/p>\n

The strategy of stealing and corrupting otherwise-legitimate certificates is particularly galling to the security community because it undermines one of the crucial means for authenticating legitimate software. [Source<\/strong><\/a>]<\/p>\n<\/blockquote>\n

Kaspersky found that Duqu 2 had been used to infiltrate hotels hosting Iran nuclear talks<\/a>, allowing access to security cameras, microphones, Wi-Fi networks, phone communications, and hotel records. Coincidentally, reports last week indicated that the U.S. State Department will no longer use the Waldorf Astoria as a New York base for its staff<\/a> following its acquisition by the Beijing-based Anbang Insurance Group last year.<\/p>\n","protected":false},"excerpt":{"rendered":"

The Wall Street Journal’s Felicia Schwartz reports some signs of cooperation between China and the United States on the long fraught issue of cybersecurity. This week’s bilateral Strategic and Economic Dialogue took place against the backdrop of a stream of revelations about the extent of allegedly Chinese intrusions into U.S. government computer systems. U.S. officials […]<\/p>\n","protected":false},"author":962,"featured_media":152757,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[116,7,14744,14745,14746,100,6,5,1051],"tags":[16035,197,16808,15037,14683,16169,319,596,597,14943,5844,6379],"class_list":["post-184474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-world","category-information-revolution","category-level-2-article","category-level-3-article","category-level-4-article","category-politics","category-sci-tech","category-society","category-top-article","tag-blackmail","tag-cia","tag-cyberattacks","tag-cyberespionage","tag-cybersecurity","tag-edward-snowden","tag-espionage","tag-hackers","tag-hacking","tag-national-security-agency","tag-us-intelligence","tag-united-states","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"\nU.S., China Pledge Cyber "Code of Conduct"<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"U.S., China Pledge Cyber "Code of Conduct"\" \/>\n<meta property=\"og:description\" content=\"The Wall Street Journal’s Felicia Schwartz reports some signs of cooperation between China and the United States on the long fraught issue of cybersecurity. This week’s bilateral Strategic and Economic Dialogue took place against the backdrop of a stream of revelations about the extent of allegedly Chinese intrusions into U.S. government computer systems. U.S. officials […]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/\" \/>\n<meta property=\"og:site_name\" content=\"China Digital Times (CDT)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ChinaDigitalTimes\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-26T13:53:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-06-27T00:29:13+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2013\/03\/images15.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"402\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Samuel Wade\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cdt\" \/>\n<meta name=\"twitter:site\" content=\"@cdt\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Samuel Wade\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/\"},\"author\":{\"name\":\"Samuel Wade\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/4b33a6e88a49d3a6787f02f798de0d8e\"},\"headline\":\"U.S., China Pledge Cyber “Code of Conduct”\",\"datePublished\":\"2015-06-26T13:53:16+00:00\",\"dateModified\":\"2015-06-27T00:29:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/\"},\"wordCount\":2571,\"publisher\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#organization\"},\"image\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2013\/03\/images15.jpg\",\"keywords\":[\"blackmail\",\"CIA\",\"cyberattacks\",\"cyberespionage\",\"cybersecurity\",\"Edward Snowden\",\"espionage\",\"hackers\",\"hacking\",\"National Security Agency\",\"U.S. intelligence\",\"United States\"],\"articleSection\":[\"China & the World\",\"Information Revolution\",\"Level 2 Article\",\"Level 3 Article\",\"Level 4 Article\",\"Politics\",\"Sci-Tech\",\"Society\",\"Top Article\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/\",\"url\":\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/\",\"name\":\"U.S., China Pledge Cyber \\\"Code of Conduct\\\"\",\"isPartOf\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2013\/03\/images15.jpg\",\"datePublished\":\"2015-06-26T13:53:16+00:00\",\"dateModified\":\"2015-06-27T00:29:13+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#primaryimage\",\"url\":\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2013\/03\/images15.jpg\",\"contentUrl\":\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2013\/03\/images15.jpg\",\"width\":600,\"height\":402},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/chinadigitaltimes.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"U.S., China Pledge Cyber “Code of Conduct”\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#website\",\"url\":\"https:\/\/chinadigitaltimes.net\/\",\"name\":\"China Digital Times (CDT)\",\"description\":\"Covering China from Cyberspace\",\"publisher\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/chinadigitaltimes.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#organization\",\"name\":\"China Digital Times\",\"url\":\"https:\/\/chinadigitaltimes.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg\",\"contentUrl\":\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg\",\"width\":186,\"height\":177,\"caption\":\"China Digital Times\"},\"image\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ChinaDigitalTimes\",\"https:\/\/x.com\/cdt\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/4b33a6e88a49d3a6787f02f798de0d8e\",\"name\":\"Samuel Wade\",\"description\":\"Samuel Wade (@samuel_wade@mstdn.ca) is Executive Editor for CDT English, and is based in Vancouver.\",\"sameAs\":[\"http:\/\/samuelwa.de\"],\"url\":\"https:\/\/chinadigitaltimes.net\/author\/samuelwade\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"U.S., China Pledge Cyber \"Code of Conduct\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/","og_locale":"en_US","og_type":"article","og_title":"U.S., China Pledge Cyber \"Code of Conduct\"","og_description":"The Wall Street Journal’s Felicia Schwartz reports some signs of cooperation between China and the United States on the long fraught issue of cybersecurity. This week’s bilateral Strategic and Economic Dialogue took place against the backdrop of a stream of revelations about the extent of allegedly Chinese intrusions into U.S. government computer systems. U.S. officials […]","og_url":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/","og_site_name":"China Digital Times (CDT)","article_publisher":"https:\/\/www.facebook.com\/ChinaDigitalTimes","article_published_time":"2015-06-26T13:53:16+00:00","article_modified_time":"2015-06-27T00:29:13+00:00","og_image":[{"width":600,"height":402,"url":"http:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2013\/03\/images15.jpg","type":"image\/jpeg"}],"author":"Samuel Wade","twitter_card":"summary_large_image","twitter_creator":"@cdt","twitter_site":"@cdt","twitter_misc":{"Written by":"Samuel Wade","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#article","isPartOf":{"@id":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/"},"author":{"name":"Samuel Wade","@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/4b33a6e88a49d3a6787f02f798de0d8e"},"headline":"U.S., China Pledge Cyber “Code of Conduct”","datePublished":"2015-06-26T13:53:16+00:00","dateModified":"2015-06-27T00:29:13+00:00","mainEntityOfPage":{"@id":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/"},"wordCount":2571,"publisher":{"@id":"https:\/\/chinadigitaltimes.net\/#organization"},"image":{"@id":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#primaryimage"},"thumbnailUrl":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2013\/03\/images15.jpg","keywords":["blackmail","CIA","cyberattacks","cyberespionage","cybersecurity","Edward Snowden","espionage","hackers","hacking","National Security Agency","U.S. intelligence","United States"],"articleSection":["China & the World","Information Revolution","Level 2 Article","Level 3 Article","Level 4 Article","Politics","Sci-Tech","Society","Top Article"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/","url":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/","name":"U.S., China Pledge Cyber \"Code of Conduct\"","isPartOf":{"@id":"https:\/\/chinadigitaltimes.net\/#website"},"primaryImageOfPage":{"@id":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#primaryimage"},"image":{"@id":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#primaryimage"},"thumbnailUrl":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2013\/03\/images15.jpg","datePublished":"2015-06-26T13:53:16+00:00","dateModified":"2015-06-27T00:29:13+00:00","breadcrumb":{"@id":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#primaryimage","url":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2013\/03\/images15.jpg","contentUrl":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2013\/03\/images15.jpg","width":600,"height":402},{"@type":"BreadcrumbList","@id":"http:\/\/chinadigitaltimes.net\/2015\/06\/u-s-china-pledge-cyber-code-of-conduct-in-opm-hacks-shadow\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chinadigitaltimes.net\/"},{"@type":"ListItem","position":2,"name":"U.S., China Pledge Cyber “Code of Conduct”"}]},{"@type":"WebSite","@id":"https:\/\/chinadigitaltimes.net\/#website","url":"https:\/\/chinadigitaltimes.net\/","name":"China Digital Times (CDT)","description":"Covering China from Cyberspace","publisher":{"@id":"https:\/\/chinadigitaltimes.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chinadigitaltimes.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chinadigitaltimes.net\/#organization","name":"China Digital Times","url":"https:\/\/chinadigitaltimes.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/","url":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg","contentUrl":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg","width":186,"height":177,"caption":"China Digital Times"},"image":{"@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ChinaDigitalTimes","https:\/\/x.com\/cdt"]},{"@type":"Person","@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/4b33a6e88a49d3a6787f02f798de0d8e","name":"Samuel Wade","description":"Samuel Wade (@samuel_wade@mstdn.ca) is Executive Editor for CDT English, and is based in Vancouver.","sameAs":["http:\/\/samuelwa.de"],"url":"https:\/\/chinadigitaltimes.net\/author\/samuelwade\/"}]}},"_links":{"self":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/posts\/184474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/users\/962"}],"replies":[{"embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/comments?post=184474"}],"version-history":[{"count":0,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/posts\/184474\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/media\/152757"}],"wp:attachment":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/media?parent=184474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/categories?post=184474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/tags?post=184474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}