Taiwan

Sign in to your account.

Status Brief
History/Origins:

Developmental Milestones/Developments to Date:

Current Assessment/State of the Field:

Problems/Challenges:

Proposals:

2010

Markoff, John, “Google Asks Spy Agency for Help With Inquiry Into Cyberattacks” February 5, 2010, New York Times, http://www.nytimes.com/2010/02/05/science/05google.html. last checked 12/10/11

  1. ”Google has turned to the National Security Agency for technical assistance to learn more about the computer network attackers who breached the company’s cybersecurity defenses last year, a person with direct knowledge of the agreement said Thursday.”
  2. ”By turning to the N.S.A., which has no statutory authority to investigate domestic criminal acts, instead of the Department of Homeland Security, which does have such authority, Google is clearly seeking to avoid having its search engine, e-mail and other Web services regulated as part of the nation’s “critical infrastructure.”
  3. ”Systems designated as critical infrastructure are increasingly being held to tighter regulatory standards.”
  4. ”On Jan. 12, Google announced a ‘new approach to China,’ stating that the attacks were ‘highly sophisticated’ and came from China.”
  5. ”At the time, it gave few details about the attacks other than to say that a theft of its intellectual property had occurred and that a primary goal of the attackers had been to gain access to the Gmail accounts of Chinese human rights activists.”
  6. ”A number of computer security consultants who worked with other companies that experienced attacks similar to those of Google have stated that the surveillance system was controlled from a series of compromised server computers based in Taiwan.”
  7. ”An N.S.A. spokeswoman said, ‘N.S.A. is not able to comment on specific relationships we may or may not have with U.S. companies,’ but added, the agency worked with “a broad range of commercial partners’ to ensure security of information systems.’
  8. ”’This is the other side of N.S.A. — this is the security service that does defensive measures,’ said the specialist, James A. Lewis, a director at the Center for Strategic and International Studies. ‘It’s not unusual for people to go to N.S.A. and say ‘please take a look at my code.’ ‘ ”
  9. ”On Thursday, the organization [Electronic Privacy Information Center] filed a lawsuit against the N.S.A., calling for the release of information about the agency’s role as it was set out in National Security Presidential Directive 54/Homeland Security Presidential Directive 23 , a classified 2008 order issued by President George W. Bush dealing with cybersecurity and surveillance.”
  10. ”The relationship that the N.S.A. has struck with Google is known as a cooperative research and development agreement, …. These were created as part of the Federal Technology Transfer Act of 1986 and are essentially a written agreement between a private company and a government agency to work together on a specific project.”
  11. ”In addition to the N.S.A., Google has been working with the F.B.I. on the attack inquiry,…”

Cybersecurity, BioHacker, Law Enforcement, China, Taiwan, Classified, Law, Homeland Security