recommended reading

China, its Hackers, and the American Media

Vasilius/Shutterstock.com

The New York Timesrevelation that Unit 61398 of China's People's Liberation Army (PLA) systematically hacked into U.S. computer networks has emerged as the latest salvo in the increasingly contentious Sino-American rivalry. While the story presented fresh evidence of Chinese hacking -- in stunning detail -- the aftermath presents more questions than answers. 

Who, exactly, authorized the attacks carried out by Unit 61398?

On the surface, this question seems fatuous and unnecessary -- the Chinese political system, like the American one, places the military under civilian leadership. However, the PLA has consistently operated with great autonomy, and there are occasionally rumors that China's political leaders don't always know what the military is doing. James Lewis, a senior fellow at the Center for Strategic and International Studies and an expert on Chinese cyber-security, put it this way: "The first time some parts of the Chinese government probably encountered this story was through reading The New York Times." Could Unit 61398 have been reporting to military, rather than political, superiors? 

Read the entire story at The Atlantic.

(Image via Vasilius/Shutterstock.com)

Threatwatch Alert

Software vulnerability

Malware Has a New Hiding Place: Subtitles

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.