text
stringlengths 4
429
|
---|
of Its Cyber and Space Warfare Capabilities 2008; Leyden 2007, Tkacik 2007, Almeida |
2006). Sensitive but non-classified data continues to be harvested; items such as emails and |
the |
names and other personal information on more than 1,500 employees |
(Onley and Wait |
2006). Attacks from Chinese ISPs have forced entire networks to be taken offline or |
replaced. In 2005 alone, |
the Pentagon logged more than 79,000 attempted intrusions |
(Reid |
2007). Cyber reconnaissance and attacks from Chinese IP addresses had become so frequent |
and aggressive that US President George W. Bush raised the subject to Chinese President Hu |
Jintao at the APEC summit in 2007. |
The difficulty of attribution in cyber attacks, such as proxies, botnets, non-state-sponsored |
hackers, and a lack of legal framework to pursue them, means these attacks may not have |
come from China; however the accusations alone are evidence that China will want to |
develop a cyber warfare capability. China now has the world |
s largest internet population, so |
in terms of volume, China has the most targets to defend. Chinese officials have stated that |
they are the victim of |
massive and shocking losses of state and military secrets via the |
Internet |
(Leyden 2007). Foreign states wishing to use cyber warfare against the US may |
recognise the focus being placed on China and use Chinese computers to conduct their own |
reconnaissance and attacks by using botnets or proxies based there. Further, denouncements |
by the US may indicate that retaliatory responses are in the works and that the US will use |
allegations of Chinese incursions to bolster support for increasing US cyber warfare |
capability, thereby putting China further behind in military competitiveness. Damage to |
China |
s soft power, particular in relation to ICT, may affect China |
s economy by making |
investors cautious and export controls/legal bureaucracy more stringent. PSYOPS campaigns |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
and media warfare, of the type outlined by the US Information Operations Roadmap |
(discussed above), may help China regain its lost credibility. These are elements of cyber |
warfare, but viewed as less offensive than reconnaissance and direct cyber3 attack. |
Non-US Foreign Allegations |
The US is not alone in accusing China of using cyber warfare. In 2007 and 2008, China was |
publicly accused of hacking into government facilities by officials in Australia, France, |
Germany, India, Japan, New Zealand, South Korea, and the UK (Basu 2008; Goodin 2008; |
Ha 2008; Leyden 2007; Marquand 2007). The number of countries under Chinese attack |
could be far greater as some may not know that they are under attack, may not wish to reveal |
their weakness due to a loss of soft power and consumer confidence, or they do not wish to |
upset China as a valuable trading partner. Hans Elmar Remberg, Vice President of the |
German Office for the Protection of the Constitution (Germany |
s domestic intelligence |
agency) stated that |
across the world the PRC is intensively gathering political, military, |
corporate-strategic and scientific information in order to bridge their technological gaps as |
quickly as possible |
(Tkacik 2007). |
Unlike HUMINT, cyber warfare provides a lack of definitive attribution, makes distance |
nearly irrelevant, allows for the mass accumulation of data in a short span of time, and at a |
small cost in comparison to traditional espionage or military activities. Cyber attacks, such as |
an incident that shut down the UK House of Commons, may only be small scale test runs, |
probing, or reconnaissance blunders, meaning that the true scope of cyber attack has yet to be |
seen (Norton-Taylor 2007). Cyber reconnaissance appears to be the most beneficial tool of |
cyber warfare. Beyond finding exploitation points in the military for future attack, the |
commercial sector allows China the opportunity to skip generations of research and |
development efforts, levelling the playing field in science and technology, and by association |
boosting economic and military might. Chinese hackers have even gone after British |
parliamentiary files on human rights issues, showing a potential interest in relation to soft |
power, globalization, international condemnation, and the legal apparatus. As Unrestricted |
Warfare has shown, there are no boundaries in relation to such military operations. |
4. Case Studies: Estonia, Georgia and Chanology |
The 2007 cyber attacks against Estonia, Georgia and Project Chanology are examples of |
large-scale cyber attacks. The Estonian attacks were the first to show how cyber attack |
against a state provides a debilitating effect at a low cost, a lack of attribution, a lack of legal |
framework in defence, world-wide attention, and may point to a new arm of traditional |
attack. The Russo-Georgian war of August 2008 was even more sophisticated and intense |
than the Estonian case, showing the maturation of the process. Project Chanology reveals |
how the collective masses can use online tools to emerge as a powerful force without a |
central leadership. This can be harnessed by military power through the tactics described in |
IO (Information Operations, see above). And as a matter of internal security, Chanologystyle movements must be carefully observed as they pose a non-traditional threat. Estonia |
and Chanology are an emerging expression of warfare that is fuelled by new powers afforded |
by the internet, but spills over into the real world, not only through financial loss and media |
coverage (soft power), but also in the form of volatile protests, disruption, mob mentality, and |
the capability of drawing governments and militaries into unwanted actions. |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
Estonia |
In 2007, the Estonian government relocated a Soviet-era war memorial and bronze statue in |
Tallinn, stating that the memorial symbolised Soviet occupation. The Russian government |
condemned the relocation, claiming it was a tribute to those who fought in World War II. |
The relocation sparked protests which resulted in 150 injuries, one death, and a month-long |
cyber war campaign. Estonian websites including parliament, banks, ministries, schools, and |
newspaper outlets were attacked with DDoS attacks and web page defacements. Some |
websites also redirected users to images of Soviet soldiers and quotations from Martin Luther |
King about resisting evil. Hackers who hit the ruling Reform Party's website left a fake |
message that the Estonian prime minister and his government were asking for Russian |
forgiveness and promising to return the statue to its original site (The Cyber Raiders Hitting |
Estonia 2007). |
These attacks garnered world-wide attention. The Russian government was directly accused |
by media outlets and the Estonian Prime Minister Andrus Ansip. Russia had the motive and |
the means for such an attack. However, there was no direct evidence to suggest that the |
attacks were state-sponsored. There was evidence that some of the IP addresses used in the |
attacks belonged to Russian government officials, and instructions on how to carry out cyber |
warfare did circulate on Russian websites. However, the source of DDoS attacks could have |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.