In recent years, China has been, on many occasions, linked with cyber-attacks on the United States government and private network systems, by the U.S. intelligent agencies ( Fonseca & Rosen, 2017) . The attacks are believed to be aimed at acquiring critical government information and mapping computer networks that could be used for future attacks in the event that a crisis or conflict arises. China has always maintained that the attacks are conducted by criminals whom the Chinese government has not yet been able to find their whereabouts. Nevertheless, China, in recent times took a pledge to end cyber espionage, emanating from China, on the United States. Recent reports suggest that China has not yet taken any serious measures to curb the situation. Hackers believed to be operating from Beijing are still conducting cyber-attacks on private networks as well as on government networks. Such attacks have cost the government as well as the private firms a lot of finances in trying to recover lost information ( Finklea et al. 2015) . More money has also been put into making government and private networks more secure. While China continues to stall over ending the cyber-attacks, the U.S. government, as well as the American people, are recovering great losses.
In a recent story, a Chinese national was reportedly arrested in connection with cyber-attacks on the United States. Yu Pingan, a thirty-six year old Chinese national, who is believed to have been conspiring with other Chinese nationals to hack networks of certain private companies in the U.S., was arrested a few months ago. The accused was reportedly using a malicious code which was later connected to various attacks on the United States. The code had been used in attacks on the U.S. Government computers and various insurance companies including Anthem. This case report suggests that cyber-attacks emanating from China or Chinese nationals on the United States continue even with the Chinese government pledging to end these attacks.
Delegate your assignment to our experts and they will do the rest.
References
Finklea, K., Christensen, M. D., Fischer, E. A., Lawrence, S. V., & Theohary, C. A. (2015, July). Cyber Intrusion into US Office of personnel management: In brief. Library of Congress Washington Dc Congressional Research Service.
Fonseca, B., & Rosen, J. D. (2017). Cybersecurity in the US: Major Trends and Challenges. In The New US Security Agenda (pp. 87-106). Palgrave Macmillan, Cham.