Feeds

Obama faces off China's prez: We can't be pals with all this cyber-theft

'No doubt about what is going on here'

Maximizing your infrastructure through virtualization

US President Barack Obama took his Chinese counterpart Xi Jinping to task over the weekend for the Communist state's alleged swiping of American intellectual property.

White House national security advisor Thomas Donilon told reporters that the president had gone over the issue of cyber-espionage and the digital theft of technology designs "in some detail" with the Chinese leader.

"The President… asked the Chinese government to engage on this issue and understand that it is - if it's not addressed, if it continues to be this direct theft of United States' property, that this was going to be a very difficult problem in the economic relationship and was going to be an inhibitor to the relationship really reaching its full potential," he said.

Xi told a news conference with Obama on Friday that China was a victim of cyber-attacks itself, but that it wanted to work with the US to develop a common approach, while state councillor Yang Jiechi told reporters in Beijing the same thing.

"Cybersecurity should not become the root cause of mutual suspicion and friction, rather it should be a new bright spot in our cooperation," Yang said, according to Reuters.

Donilon said that cybersecurity was now "really at the centre of the relationship".

"We've undertaken, as you know, a systematic effort with respect to this issue. We have had conversations with the Chinese about it over the course of the last year or so," he said. "And we have had increasingly direct conversations with the Chinese through the various dialogues that we've set up.

"It is not an adjunct issue, it's an issue that is very much on the table at this point."

He also said that Obama had told President Xi that the US "did not have any doubt about what is going on here".

The US has increasingly and openly blame China for hacking attacks on American organisations - especially those in which sensitive blueprints are swiped - and accused the country of large-scale intellectual property theft.

Meanwhile, the Obama administration told US government agencies to list countries and other entities as targets for cyber-attack, if such action would benefit the American national interest, according to a report leaked last week. ®

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.