Logo

American Security Council Foundation

Back to main site

Alan W. Dowd is a Senior Fellow with the American Security Council Foundation, where he writes on the full range of topics relating to national defense, foreign policy and international security. Dowd’s commentaries and essays have appeared in Policy Review, Parameters, Military Officer, The American Legion Magazine, The Journal of Diplomacy and International Relations, The Claremont Review of Books, World Politics Review, The Wall Street Journal Europe, The Jerusalem Post, The Financial Times Deutschland, The Washington Times, The Baltimore Sun, The Washington Examiner, The Detroit News, The Sacramento Bee, The Vancouver Sun, The National Post, The Landing Zone, Current, The World & I, The American Enterprise, Fraser Forum, American Outlook, The American and the online editions of Weekly Standard, National Review and American Interest. Beyond his work in opinion journalism, Dowd has served as an adjunct professor and university lecturer; congressional aide; and administrator, researcher and writer at leading think tanks, including the Hudson Institute, Sagamore Institute and Fraser Institute. An award-winning writer, Dowd has been interviewed by Fox News Channel, Cox News Service, The Washington Times, The National Post, the Australian Broadcasting Corporation and numerous radio programs across North America. In addition, his work has been quoted by and/or reprinted in The Guardian, CBS News, BBC News and the Council on Foreign Relations. Dowd holds degrees from Butler University and Indiana University. Follow him at twitter.com/alanwdowd.

ASCF News

Scott Tilley is a Senior Fellow at the American Security Council Foundation, where he writes the “Technical Power” column, focusing on the societal and national security implications of advanced technology in cybersecurity, space, and foreign relations.

He is an emeritus professor at the Florida Institute of Technology. Previously, he was with the University of California, Riverside, Carnegie Mellon University’s Software Engineering Institute, and IBM. His research and teaching were in the areas of computer science, software & systems engineering, educational technology, the design of communication, and business information systems.

He is president and founder of the Center for Technology & Society, president and co-founder of Big Data Florida, past president of INCOSE Space Coast, and a Space Coast Writers’ Guild Fellow.

He has authored over 150 academic papers and has published 28 books (technical and non-technical), most recently Systems Analysis & Design (Cengage, 2020), SPACE (Anthology Alliance, 2019), and Technical Justice (CTS Press, 2019). He wrote the “Technology Today” column for FLORIDA TODAY from 2010 to 2018.

He is a popular public speaker, having delivered numerous keynote presentations and “Tech Talks” for a general audience. Recent examples include the role of big data in the space program, a four-part series on machine learning, and a four-part series on fake news.

He holds a Ph.D. in computer science from the University of Victoria (1995).

Contact him at stilley@cts.today.

Australia, New Zealand, and Allies Say China Behind Malicious Cyber Activity

Tuesday, July 20, 2021

Categories: ASCF News Cyber Security

Comments: 0

Source: https://www.theepochtimes.com/australia-new-zealand-and-allies-say-china-behind-malicious-cyber-activity_3907564.html

CYBERWAR: The Chinese Communist Party has been developing cyberwarfare capabilities since the late 1990s. Beijing has been accused of by U.S and its allies of hiring hackers to regularly carry out cyber-espionage against Western governments and businesses. (Courtesy of U.S. Department of Defence)

Australia and New Zealand (NZ) have joined the United States in attributing malicious cyber activity to China’s Ministry of State Security and said they are deeply disturbed by Beijing using criminal contract hackers to back its state-run cyberattacks against targets worldwide.

In media releases issued late Monday night, both the Australian and New Zealand governments called out the Chinese regime for its exploitation of vulnerabilities in the Microsoft Exchange software, which affected thousands of computers and networks worldwide, including in Australia and New Zealand.

“These actions have undermined international stability and security by opening the door to a range of other actors, including cybercriminals, who continue to exploit this vulnerability for illicit gain,” Australian Foreign Minister Marise Payne, Home Affairs Minister Karen Andrews, and Defence Minister Peter Dutton said in a joint statement.

Australia also called on China to adhere to the commitments it made in the G20, and bilaterally “refrain from cyber-enabled theft of intellectual property, trade secrets and confidential business information with the intent of obtaining competitive advantage.”

The sentiments were echoed by Andrew Little, the NZ Minister responsible for the Government Communications Security Bureau (GCSB), who said: “We call for an end to this type of malicious activity, which undermines global stability and security, and we urge China to take appropriate action in relation to such activity emanating from its territory.”

Little noted that the GCSB had worked through a robust technical attribution process concerning this issue and that it had confirmed, independently, that Chinese state-sponsored actors were responsible for the exploitation of Microsoft Exchange vulnerabilities in New Zealand in early 2021.

Both countries also condemned the Chinese Communist Party’s (CCP) Ministry of State Security (MSS) for engaging in malicious cyber activity and hiring contract hackers who have carried out cyber-enabled intellectual property theft for personal gain and commercial advantage the Chinese regime.

The United Kingdom, Canada, Japan, the European Union, and NATO joined the United States, Australia and New Zealand in expressing their concerns.

The comments by the two governments come after the Biden Administration called out Beijing over its state-sponsored malicious cyber campaign that has seen hackers working for the MSS engaged in ransomware attacks, cyber-enabled extortion, crypto-jacking, and rank theft from victims around the world, all for financial gain.

In a media release on July 19, The White House said the United States had long been concerned about Beijing’s irresponsible and destabilizing behaviour in cyberspace.

“Today, the United States and our allies and partners are exposing further details of the PRC’s pattern of malicious cyber activity and taking further action to counter it, as it poses a major threat to U.S. and allies’ economic and national security,” the statement said, using the acronym for the country’s official name, the People’s Republic of China.

“Countries around the world are making it clear that concerns regarding the PRC’s malicious cyber activities are bringing them together to call out those activities, promote network defence and cybersecurity, and act to disrupt threats to our economies and national security.”

Meanwhile, the United States has charged four Chinese nationals who were working with China’s top intelligence agency in a global hacking campaign that targeted foreign governments and entities in key sectors, including maritime, aviation, defence, education, and healthcare.

They also worked towards the theft of research on the Ebola virus vaccine, trade secrets, and confidential business information on critical public health information, the Biden administration said.

CCP mouthpiece The Global Times has responded to the accusations, stating that it is a huge lie, and accused the Biden administration and their allies of trying to frame China, News.com.au reported.

“The U.S. cannot exploit these smears to substantively attack China. If the US takes aggressive measures, carries out national-level cyber attacks on China, or imposes so-called sanctions on China, we will retaliate,” the Global Times editorial reads.

Comments RSS feed for comments on this page

There are no comments yet. Be the first to add a comment by using the form below.