vesicles
Colonel
@vesicles
It is commonly acknowledged that cyber is an offensive dominated environment, where it is far easier to penetrate an opposing network than it is to defend your own.
There are always bugs in the code, so cyber-security experts have acknowledged that it impossible to create a secure cyber-perimeter around an organisational network, and that intrusion detection has to operate by detecting anomalous actions or data flows.
It is possible that there are false flag operations, but you only have to look at the OPM hack of security clearance files as an example of lax security.
True! However, once the US agents realized the data has been stolen, they could mount their own attacks to destroyed the stolen data? Could that happen? Unlike other kinds of intelligence, these detailed tech data need a long time to be properly analyzed and digested. The US could find where the stolen data is stored and destroyed them before the Chinese have a chance to analyze the data? the Chinese would be similarly defenseless against such attacks...
My point is that the US and China should be at least similarly capable in these cyber battles. Who know... there might be some agreement between the two countries. I don't attack you if you don't attack me. I will mess you up as much as you can mess me up. So back off!