Should Governments Incentivize Tech Firms to Expose China-Linked Cyber Attacks?
Synopsis
Key Takeaways
New Delhi, Feb 18 (NationPress) A recent report highlights that the failure of technology companies to openly attribute cyber attacks to China undermines deterrence, leaves the public misinformed, and diminishes pressure on governments to address the threat. The Australian Strategic Policy Institute criticized US cybersecurity firm Palo Alto Networks Inc. for its reluctance to publicly link the cyber campaign to China, citing fears of possible backlash against the firm and its clients.
The report pointed out that tech firms often shy away from naming China due to commercial concerns, including market access and the risk of retaliation. It contrasted the actions of two US companies, Google and Palo Alto, where one issued a general warning about a global espionage initiative while the other clearly identified China as a primary source of cyber threats.
Google’s Threat Intelligence Group stated that China leads in cyber threat operations by volume, targeting sectors like defense and emerging technologies such as drones and uncrewed systems.
“Without a patriotic partnership between Western governments and the tech industry, both will continue to view their ties with China as too significant to jeopardize, resulting in the acceptance of security threats due to financial concerns,” the report noted.
“However, prudence and diplomacy should not mean allowing authoritarian states like China to act without consequence while we remain silent,” it emphasized.
The report suggested that governments should collaborate with the industry to reduce incentives for silence and reward companies that demonstrate transparency and support evidence-based attribution through reputational gains and exclusive market access.
It also provided an example, stating that the three AUKUS nations could implement a public policy preventing companies operating in China from participating in advanced-capabilities projects under Pillar Two.
“Governments and industry should work together to examine supply chains for political vulnerabilities,” it said, adding that “identifying malicious state actions is not an escalation but rather a necessary clarification.”
This public identification informs the public, shapes diplomatic signals, and limits plausible deniability, the report noted.
aar/na