One thing that COULD make sense is the Chinese telling us when they hack
power plants and find someone else they don't recognize on critical
systems.

(But you might need a watermarking system for that to actually work. :)
ANNOYING LINK REPOST:
http://cybersecpolitics.blogspot.com/2016/03/a-technical-scheme-for-watermarking.html

But to bring it back to your point: If Wikileaks were getting the
majority of its funding from China, would you expect the Chinese to
block that? We all have very different understandings of what
constitutes a cyber capability, or undesirable activity on the Internet.

-dave
(Also, as a side note: posts to the list don't show up in the queue if
you are not subscribed from that address)

On 5/18/2016 3:48 PM, Adam M. Segal wrote:
> There was, as you can imagine, a certain amount of politics involved in 
> co-writing this with a Chinese author, and things were often not fleshed out 
> because they quickly ran into political realities. I can't speak for Tang, 
> but I was not thinking export controls. I was thinking more disrupting the 
> infrastructure of the groups to find, use, develop these capabilities through 
> other means-shared intel leading to kinetic, financial or other ops. All not 
> likely given strategic mistrust between the two sides
>
> -----Original Message-----
> From: dave aitel [mailto:[email protected]] 
> Sent: Wednesday, May 18, 2016 3:35 PM
> To: Adam M. Segal <[email protected]>; [email protected]
> Subject: Where the nuclear metaphors all breakdown.
>
> http://www.nbr.org/publications/specialreport/pdf/Free/06192016/SR57_US-China_April2016.pdf
>
> Reading down into the cyber section...
> """
> Beijing and Washington share an interest in preventing extremist groups and 
> other third parties from attacking critical infrastructure and should discuss 
> joint measures to stop the proliferation of capabilities to nonstate actors.
> """
>
> That's the kind of sentence that only makes sense if you're thinking about 
> export control actually working as if "Cyber Capabilities" were something 
> more than "code" and "information". But what else could you be thinking about 
> here? What does this actually MEAN?
>
> -dave
>
>
>
>
>
>
>

_______________________________________________
Dailydave mailing list
[email protected]
https://lists.immunityinc.com/mailman/listinfo/dailydave

Reply via email to