Security Experts:

Connect with us

Hi, what are you looking for?



FBI Chief Sees Better Cyber Cooperation From China

FBI Director James Comey said Tuesday he has seen some improvement in cooperation from China in fighting cybercrime following last year’s bilateral agreement on the issue.

FBI Director James Comey said Tuesday he has seen some improvement in cooperation from China in fighting cybercrime following last year’s bilateral agreement on the issue.

Chinese authorities “seem to have an agreed upon framework for what is nation-state action appropriate, that is intelligence collection, and what is theft,” Comey told a cybersecurity event in Washington, when asked about international cooperation on cybercrime.

“There are signs of progress in the Chinese helping us impose costs on active engagement and theft. I’m reasonably optimistic (about China), less so with Russia.”

Comey’s comments were far more upbeat than those from National Security Agency chief Michael Rogers earlier this month on the implementation of last year’s accord between President Barack Obama and his Chinese counterpart Xi Jinping.

The two leaders agreed on principles aimed at stemming what has been seen as a wave of hacking directed against US companies and organizations.

Rogers told Congress earlier this month that Chinese hackers remain “engaged in activity directed against US companies” and that the “jury is still out” on whether China indeed passes intel to the business world.

Comey, speaking at the Georgetown International Conference on Cyber Engagement, said the FBI was ramping up its ability to combat hacking and cybercrime.

“We think we have to be more predictive and less reactive,” he said.

Part of this strategy, he said involves “naming people and shaming them” to demonstrate costs of hacking into US computer systems.

The FBI, he said, wants to “make people feel our breath on the back of their neck — physically ideally, but metaphorically” to deter hacking.

Talking encryption ‘costs’

Comey also reiterated concerns about the impact of strong encryption in the wake of the legal battle over access to the iPhone used by a California attacker.

“I’m very glad that the litigation between the FBI and Apple on San Bernardino has ended, because it really was about getting access to that phone,” Comey said, referring to the court case in which the FBI sought to compel Apple to help unlock the phone used by one of the shooters in last year’s deadly attack.

But Comey said it was still important to have a discussion on the topic because “there is a collision going on between values of all shades between privacy and security.”

Comey said encryption and privacy are important but “there has never been a time in the 240 years of our country when privacy has been absolute.”

He added that he is concerned that defenders of strong encryption, which allows only the users to access data, have failed to consider all the implications.

“We are moving to a place in American life, because we live our lives on these devices, (where they) will be immune to the judicial process,” he said.

“My only request is that we talk about the costs … We should not drift to a place where wide swaths of American life become off limits to the judicial process without a serious, adult conversation.”

Comey had previously expressed concerns about “warrant-proof” spaces that allow criminals to evade detection as he debated Apple and its backers. Apple argued that enabling access would weaken security for all iPhone users and open doors for hackers and others.

The government ended its request after finding a way to access the phone with the help of a third party.

Comey said the FBI has not yet decided whether to tell Apple about how it accessed the data.

Some activists have said the FBI should tell Apple under a US policy aimed at helping tech companies plug security vulnerabilities.

Comey said that “we are in the process of sorting it out, we are close to a resolution but I’m not ready to make news on this.”

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet


Iranian APT Moses Staff is leaking data stolen from Saudi Arabia government ministries under the recently created Abraham's Ax persona


The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...


Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...


A newly identified threat actor tracked as NewsPenguin has been targeting military organizations in Pakistan with sophisticated malware.