The United States holds 30-nation extortion summit: to build a new geopolitical arena

The National Security Council of the White House launched the International Anti-ransomware Summit this week, with more than 30 countries participating. The purpose of this gathering is to increase the resilience of the global network, solve the problem of illegal use of cryptocurrency, and enhance law enforcement cooperation and diplomatic efforts.

At yesterday’s pre-conference press conference, a senior government official said: “In the first round of discussions, we did not invite Russia to participate for many reasons, including various restrictions.”

The conference will be held from Thursday to Friday. Senior officials and ministers from the following countries or jurisdictions will participate: Australia, Brazil, Bulgaria, Canada, Czech Republic, Dominican Republic, Estonia, European Union, France, Germany, India, Ireland , Israel, Italy, Japan, Kenya, Lithuania, Mexico, Netherlands, New Zealand, Nigeria, Poland, South Korea, Romania, Singapore, South Africa, Sweden, Switzerland, Ukraine, United Arab Emirates and United Kingdom.

China and Russia did not attend this meeting.

According to NPR, at the public meeting that started the summit on Thursday, US National Security Adviser Jack Sullivan called for more cooperation and said that the summit brought together “like-minded countries” that “recognized the urgency of combating ransomware.”

According to the same NPR report, General Karel Ehka, director of the Czech Republic’s National Office of Network and Information Security, stated on Thursday that ransomware can no longer be considered a criminal activity.

According to a report from National Public Radio, Estonia’s Minister of Entrepreneurship and Information Technology Andres Sutt called for the establishment of a cyber security funding benchmark—similar to NATO’s defense spending commitments.

Agenda

This week’s conference includes four specific meetings: one on national resilience, led by Indian officials; one on combating illegal financing, led by the United Kingdom; one on law enforcement led by Australia; and one on Diplomatic, led by Germany.

Anti-ransomware work is divided into four tasks:

Destroying ransomware infrastructure and participants: The government is making full use of the ability of the US government to sabotage ransomware participants, facilitators, networks, and financial infrastructure;

Increase resilience against ransomware attacks: The government calls on the private sector to increase investment and focus on cyber defense to respond to threats. The government also outlined the expected cybersecurity thresholds for critical infrastructure and introduced cybersecurity requirements for critical infrastructure in transportation;

Solve the problem of misuse of virtual currency for ransom payment: Virtual currency is subject to the anti-money laundering and counter-terrorism financing (AML/CFT) control measures applicable to legal tender, and these control measures and laws must be implemented.The government is using existing capabilities and acquiring innovative capabilities to track and block the proceeds of ransomware; and

Use international cooperation to disrupt the ransomware ecosystem and solve the problem of safe harbor for ransomware criminals: A responsible country does not allow criminals to operate in their borders with impunity. We are working with international partners to disrupt ransomware networks and improve the ability of partners to detect and respond to such activities within their borders, including imposing consequences and holding accountable countries that allow criminals to operate within their jurisdiction.

In the fact sheet about the gathering issued by the White House, the US government pointed out its progress in each area. This includes:

The Ministry of Justice has established a task force to coordinate and unify law enforcement and prosecution measures;

The U.S. Treasury Department imposed sanctions on the Russian virtual currency exchange Suex for the first time, which allegedly helped ransomware attackers;

The State Council’s Judicial Reward Program provides US$10 million in rewards for information on planning malicious online activities at the request of foreign governments;

The White House’s Voluntary Industrial Control System Cybersecurity Initiative has led more than 150 power companies representing nearly 90 million customers to deploy or commit to deploy enhanced cybersecurity technologies;

The Department of Homeland Security and the Department of Justice established “StopRansomware.gov” to assist private and public organizations in mitigating related risks;

The Transportation Security Administration issued a notice requiring key pipeline owners and operators to support two security directives for their cyber defense;

Biden met with technology leaders in the private sector in August to discuss a “national” effort to address cybersecurity issues-resulting in ambitious commitments from large technology companies;

The United States is implementing anti-money laundering/fighting terrorism financing requirements for virtual currency businesses and activities;

The Ministry of Finance is taking the lead in efforts to implement international standards on the financial transparency of virtual assets.

China and Russia did not participate

The White House specifically accused Russia of being one of the countries harboring ransomware criminals, excluding the country from the summit of more than 30 countries held this week.

Regarding Russia’s absence, the senior government official at the beginning of the article said: “We are working with Russians[通过美国-克里姆林宫勒索软件专家组]Have active discussions. But in this particular forum, they were not invited to participate, but this does not rule out the opportunity for them to participate in the future. “

Despite Russia’s absence, the senior official said: “I can report that we had frank and professional exchanges in the expert group, and we conveyed… expectations[解决勒索软件]. We also shared information with Russia about criminal ransomware activities carried out on its territory. “We have seen some measures taken by the Russian government and hope to see follow-up actions,” the official continued.

Earlier we reported that the head of the National Security Agency of the United States made predictions about ransomware. Paul Nakasone, Director of the National Security Agency and head of the US Cyber ​​Command, once stated: “Ransomware is a national security issue. I firmly believe this.” , The intelligence agency he leads will “emerge” to combat cyber threats.

Comment: This is an international cybersecurity cooperation summit, but China and Russia are not invited. Looking at the essence through the phenomenon, the United States continues to turn cyber disputes into major conflicts between countries. This time it is a new geopolitical arena forcibly built by the United States. It will continue to accuse China and Russia, and draw allies together to make China and Russia a symbol of “darkness” in the world’s network power, and increase the ease of mobilizing allies and even broader forces to jointly suppress China and Russia.

But in essence, the United States cannot use these smears to strike China in a substantive way. If it takes radical actions, implements national-level cyber attacks on Chinese targets, or imposes so-called sanctions on China, we, China, will definitely counter it.

The Links:   KDE2405PFB1-8 NL10276BC2421L

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *