text
stringlengths 4
429
|
---|
protested throughout 100 cities in 14 countries. Protesters wore Guy Fawkes masks from the |
V for Vendetta film, and made Rick Astley's pop single "Never Gonna Give You Up", a |
theme song for the protests against Scientology. The seemingly bizarre and childish |
behaviour of Anonymous is a part of their cohesion, a subculture of memes, slang, and |
humour. A second series of protests began on March 15, 2008, with approximately 7,000 to |
8,000 protestors throughout 100 cities in 10 countries. CoS has not released an official |
estimate of the financial damage caused by Project Chanology. However, they have publicly |
stated that they were forced to increase online security, hired off-duty police officers to |
provide physical security at their churches, and have suffered increasing negative press and |
scrutiny from the US Federal Bureau of Investigation. CoS has denounced Anonymous as |
cyber terrorists and Anonymous has since switched its campaign to go after Scientology |
tax-exempt status. |
China could use online operatives to incite this type of internet based |
. It could be used |
constructively within China, such as undermining the Falun Gong, or destructively against an |
enemy country, such as inciting protests against pro-democracy Taiwanese leadership. |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
Additionally, these online communities pose a security threat, and should therefore be |
examined if only as a means of deterrence. As mentioned in IO, this sort of emergent mob is |
not one that can be quickly understood. To be used as a military tool, China would need a |
deep understanding of the asset |
s culture. In the case of Anonymous, this equates to a heavy |
reliance on inside jokes, slang, internet and pop culture. Anonymous uses humour to unite |
and to obfuscate logic and responsibility. Credence within the group may come from inside |
jokes and creativity, rather than sound information |
they even revel in their own failure. |
Internet communities can lack a centre of command, and be composed of serious, moderate, |
and casual participants, all of whom may change their level of participation on a whim. |
Assassin |
s Mace |
Assassin |
s Mace, or shashoujian, is used in Chinese military writings to describe a weapon or |
tactic |
which can deliver decisive blows in carefully calculated surprise moves and change |
the balance of power |
(Johnston 2002). Similar concepts can be seen throughout China |
history, from Sun Zi |
s (tr. 1963) The Art of War to Mao Zedong |
s (tr. 2000) On Guerrilla |
Warfare. An assassin |
s mace gains strength by ignoring pre-established rules of conduct. It |
has many similarities to asymmetric warfare, such as being a novel way to level the playing |
field, but it differs in that it is a decisive weapon, aimed at incapacitating an enemy, |
suddenly and totally |
(Navrozov 2005). China possesses several asymmetric, highly |
devastating weapons, such as a limited but modernising nuclear weapons capacity, China |
ASAT capability, and its electromagnetic pulse (EMP) capability. However each of these has |
considerable drawbacks. For example, human rights and environmental concerns have |
relegated nuclear weapons to the role of deterrent and introduced limited warfare. By using |
cyber warfare, China could achieve the same asymmetric destructive power while bypassing |
the drawbacks. |
It is unlikely that China would use kinetic kill weaponry, such as its direct ascent ASAT, in |
an attempt to disrupt US space based assets. To disrupt US satellite dominance would require |
a massive sky clearing operation, because the US has constellations of satellites with multiple |
redundancy. The US GPS provides tactical communication and precision navigation, making |
it a desirable target |
however, the GPS uses at least five space satellite constellations. When |
one is destroyed, others can be manoeuvred to fill holes in the net. Not all of these satellites |
are within striking range at any given time. This means a sky clearing operation would take a |
significant amount of time, thereby revealing Beijing |
s intentions. This would cause |
international dispute due to space debris, and allow the US to manoeuvre its other satellites |
out of harm |
s way. It would risk retaliation in which China would be at a disadvantage. |
Additionally, there is no guarantee an attempt would be successful, as each launch requires |
precise targeting, and China |
s ASAT has only been tested once. It is more likely China |
would attempt to knock out the corresponding relay stations on Earth by using a cyber attack. |
Chinese tacticians have focused on neutralising the uplinks and downlinks of the space-based |
systems through diverse forms of cyber attack including simple DoS attack. This gives the |
advantages of deniability and low cost. It would remove distance from the equation, allowing |
multiple targets to be taken out simultaneously regardless of location, and it would remove |
international condemnation and/or involvement (Waterman 2008; Tellis 2007; International |
Assessment and Strategy Center 2005). |
China could destroy a vast majority of US electronics, including computers, cars, phones, and |
the power grid, using EMP weaponry. This is something of which all nuclear armed states |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
are capable by means of high altitude nuclear explosions, taking as few as three to blanket the |
continental US (Electromagnetic Pulse 2005). Open source materials have shown the US, |
China, France, and Russia all using an EMP burst as a surprise first strike in war games |
(China |
s Proliferation Practices, and the Development of Its Cyber and Space Warfare |
Capabilities 2008; Winn 2008; Nock and Lizun 2007; Qian and Wang 1999). However, it is |
unlikely China would use such brute-force tactics. Using a high altitude atomic burst would |
cause international outrage as it violates an international treaty, it damages the environment, |
and it indiscriminately disrupts everything in its blast radius. Alternatively, shutting down |
the US power grid, production lines, water utilities, chemical plants, telecommunications, and |
transportation routes is possible through cyber attack, and it would provide the benefit of |
deniability. Details on how such an attack would be conducted are scarce in OSINT as |
governments do not wish to publicize their weaknesses or give away their assets. It is |
important however that they do acknowledge them, since any computer system which is |
connected to the internet is vulnerable to attack. In 2008, the CIA reported that multiple |
cities outside the US had their electrical power shut off by hackers. The reports were vague, |
supposedly due to security concerns; however it was reported that the attacks came from |
online, through the internet, not by physical means (Bridis 2008; McMillan 2008). |
Weapons of Mass Disruption |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.