Will the Mandiant Report Raise Public Awareness?

W
  1. Challenges Policy Makers face to Counter Cybercrime
  2. Cybercrime vs Traditional Crime
  3. Risks, Threats and Vulnerabilities
  4. Security Policies
  5. Cost and Challenges with E-Government
  6. Cultural Values and Moral Legitimacy
  7. One audit standard fits all?
  8. Mobile Security
  9. Will the Mandiant Report Raise Public Awareness?
  10. Ethical vs Non-Ethical Hackers
  11. Motivation and Intent of Hackers
  12. Hacking as an Addiction
  13. Online Anonymity: Good or Bad?
  14. Identity Theft and Inexperienced Internet Users
  15. Regulation vs Innovation
  16. 3D Printing, Copyright and Legal Matters
  17. Software Piracy on an International Scale
  18. Workplace Monitoring and Blocking Software

The Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the past few weeks.  The report was originally released to show evidence that a specific Chinese military unit has been behind many major Advanced Persistent Threats (APTs) within the United States.  While the Chinese military have denied the accusations in the report, comprehensive information has been collected for six years showing where Mandiant worked with victims computers to monitor where the attacks where coming from, which pointed back to the Chinese government.

NTD Television broadcasted a program that discussed the implications of the report and what types of future actions we could possibly see emerge because of this.  (Mandiant and Chinese Hacking Strategy, 2013).  It was acknowledged that while the Mandiant report has no doubt risen public awareness of what APTs are and the seriousness of these types of attacks, it is very difficult to shift mass opinion, which is a slow process.

The Mandiant report may not show evidence of an immediate adjustment of organizational actions resulting in reducing or eliminating APTs, however it is hoped that this will serve as another building block in changing attitudes and preventing similar attacks.  There have been media coverage in the past highlighting some of China’s ‘shady’ business practices, including findings published by Muddy Waters in 2011.  While at the time it was reported that this had caused Chinese companies harm (Barboza & Azam, 2011), these types of stories in the US media tend to have a short life and are often forgotten quickly.  As the NDT program alluded, this report will contribute to the overall challenge of raising awareness of the seriousness of these types of threats, however much will need to be done both in terms of US laws and regulations, and the strategies adopted by the private sector.

References:

  1. Barboza, D., & Ahmed, A. (2011).  Muddy Waters Research Is a Thorn to Some Chinese Companies. (n.d.). DealBook. Retrieved from http://dealbook.nytimes.com/2011/06/09/muddy-waters-research-is-a-thorn-to-some-chinese-companies/
  2. Mandiant. (2013). APT1 Exposing one of China’s cyber espionage units. Retrieved from http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
  3. Mandiant and Chinese Hacking Strategy.  (2013).  NDT Television.  Retrieved from http://ntdtv.org/en/news/china/china-focus/2013-02-25/mandiant-and-china-s-hacking-strategy.html

About the author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me