gAtO rEAd – (Reuter) – that Beijing, China will next week conduct its first “digital” technology military exercise, state media said on Wednesday, against growing concern in Washington and elsewhere about Chinese hacking attacks. They will test new types of combat forces including units using digital technology amid efforts to adjust to informationalized war.
So now we have our physical military forces loaded up on technology so back-room generals and politicians can see the takedown of Osama-Bin-Laden- Think about how much technology these foot soldiers had to carry, all this telemetric gear run in cyberspace – live.
Now add digital forces to these conventional forces were we can manipulate the soldiers own wet-ware with typical cyber hacking attacks. Because our new conventional warfare is so digitized digital-forces running with tactical units is the new battlefield-normal.
“It will be the first time a People’s Liberation Army exercise has focused on combat forces including digitalized units, special operations forces, army aviation and electronic counter forces,”
While America has been fighting conventional wars for the last 10 years CHina has been developing digital offensive weapons as we digitized more of the worlds infrastructure. Huawei telecom- backdoors in the firmware would your government use these Chinese vendors. Lot’s of countries are gearing up for digital warfare so that China is showing off it digital prowlless – nothing new – gAtO oUt
US supply chain could be penetrated by China – report Risk of “catastrophic failure” of US networks cited Congress weighing cybersecurity billsBy Jim WolfWASHINGTON, March 8 Reuters – Chinese cyberwarfare would pose a “genuine risk” to the U.S. military in a conflict, for instance over Taiwan or disputes in the South China Sea, according to a report prepared for the U.S. Congress.Operations against computer networks have become fundamental to Beijings military and national development strategies over the past decade, said the 136-page analysis by Northrop Grumman Corp released on Thursday by the U.S.-China Economic and Security Review Commission.
Thus far, Beijing has found little wiggle room to resist the U.S.-E.U.-Saudi common vision that severe sanctions be used to shut down the bulk of Iran’s oil exports by June.
The reality being revealed in this confrontation is that China has much less ability to maneuver independently in the global oil system—whether in the market or in diplomatic and military matters—than most analysts would lead us to believe.
Preface: What are Washington v. Beijing´s strategic objectives here ?
In my assessment, there are clear underlying energy’market security reasons why the U.S. is pursuing this geopolitical path. The U.S. aim is to prevent Iran from projecting greater influence over key Gulf oil-market players Saudi Arabia, Iraq, the UAE, Kuwait and etc. as the U.S. withdraws from its over-extended presence in Iraq and Afghanistan. This draw-down is very important for U.S. strategy globally; but Washington will not accept Iran gaining greater influence over other local OPEC producers and thereby the global oil market (aka, The Global Barrel) as it steps back.
This headline from CNN – “Joint Chiefs Chair: Chinese Hacking Not Necessarily a Hostile Act” – reads like it came from the Onion. But don’t jump into your bunker yet – the reasoning behind this apparently blissfully naive statement by General Martin Dempsey is at least slightly plausible:
Gen. Martin Dempsey, the chairman of the Joint Chiefs of Staff, said he “believe(s) someone in China is hacking into our systems and stealing technology and intellectual property, which at this point is a crime.”
But Dempsey said in testimony to the Senate Armed Services Committee that he cannot attribute the Chinese hacking to China’s military, the People’s Liberation Army (PLA).
Asked by Sen. Lindsey Graham, R-South Carolina, that if it could be proven that the PLA was behind a hacking of the defense infrastructure, whether it would it be considered a “hostile act,” Dempsey said such wasn’t necessarily the case.
Now, you can quibble over the semantics in this. A cyberattack on the United States’ defenses might not come from the Chinese government itself – though one has to wonder how much privacy hackers enjoy, given China’s notoriously censor-happy culture. Moreover, even if a private hacker was good enough to evade the Chinese government’s own crop of cybersecurity experts and bypass our security, it’s fairly obvious that the hacker in question would be able to sell his method for a very high price.
U.S officials have long complained about countries that systematically hack into U.S. computer networks to steal valuable data, but until recently they did not name names.
In the last few months, that has changed. China is now officially one of the cyber bad guys and probably the worst.
“We know and there’s good evidence … of very deliberate, focused cyber espionage to capture very valuable research and development information, or innovative ideas, or source code or business plans for their own advantage,” says Mike McConnell, a former director of national intelligence and before that the director of the National Security Agency.
It’s the Chinese he’s talking about, though other countries also engage in cyber espionage to gain a competitive edge. Russia, for example, but China stands out as especially aggressive.
“China does not care what other people think,” says Richard Bejtlich, the chief security officer at MANDIANT, a company that helps firms deal with cyber intrusions. “Culturally they are very interested in being seen as responsible, but when it comes to their actual work on the ground; if you try kicking them out of your network on a Friday, they’re back on a Monday.”
The increased willingness of the U.S. government to point a finger at the Chinese dates from an official report released last October that identified them “as the world’s most active and persistent perpetrators of economic espionage.”
It is clear that cyber warfare will be part of any future conflict and we must become prepared for that type of combat here on the homeland front.
Two recent NPR stories highlighted the continuing potential for cyber attacks. One focused on the threat that China poses and the other story on what we should be doing in general to legislate cyber defenses for the private sector and our critical infrastructure–the vast majority of which is owned and operated by private business.
It is clear to me that China is actively working to determine the how best to attack our military and industrial complexes. The cyber war of the future has already begun. Going back to my military training let’s consider what it is that they are doing.