Feeds

Obama faces off China's prez: We can't be pals with all this cyber-theft

'No doubt about what is going on here'

Reducing security risks from open source software

US President Barack Obama took his Chinese counterpart Xi Jinping to task over the weekend for the Communist state's alleged swiping of American intellectual property.

White House national security advisor Thomas Donilon told reporters that the president had gone over the issue of cyber-espionage and the digital theft of technology designs "in some detail" with the Chinese leader.

"The President… asked the Chinese government to engage on this issue and understand that it is - if it's not addressed, if it continues to be this direct theft of United States' property, that this was going to be a very difficult problem in the economic relationship and was going to be an inhibitor to the relationship really reaching its full potential," he said.

Xi told a news conference with Obama on Friday that China was a victim of cyber-attacks itself, but that it wanted to work with the US to develop a common approach, while state councillor Yang Jiechi told reporters in Beijing the same thing.

"Cybersecurity should not become the root cause of mutual suspicion and friction, rather it should be a new bright spot in our cooperation," Yang said, according to Reuters.

Donilon said that cybersecurity was now "really at the centre of the relationship".

"We've undertaken, as you know, a systematic effort with respect to this issue. We have had conversations with the Chinese about it over the course of the last year or so," he said. "And we have had increasingly direct conversations with the Chinese through the various dialogues that we've set up.

"It is not an adjunct issue, it's an issue that is very much on the table at this point."

He also said that Obama had told President Xi that the US "did not have any doubt about what is going on here".

The US has increasingly and openly blame China for hacking attacks on American organisations - especially those in which sensitive blueprints are swiped - and accused the country of large-scale intellectual property theft.

Meanwhile, the Obama administration told US government agencies to list countries and other entities as targets for cyber-attack, if such action would benefit the American national interest, according to a report leaked last week. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.