text
stringlengths 4
429
|
---|
delivery trucks create online invoices sent and received by the service station. Assuming |
they are able to maintain the fuel for their trucks, they would be forced to adapt to old |
methods of interaction and record keeping. A store |
s stock might also suffer shortages from |
hoarding of products due to panic in the community. |
These systems could be attacked solely online, or operatives could be placed into the store to |
learn the system |
s weaknesses and install malware directly. Operations could be expanded |
beyond a service station to attack grocery and a wide range of retail outlets. Rather than |
going after the transport of goods, it may be easier to disrupt them online at their point of |
sale. The effects would radiate outward, knocking down additional infrastructure unable to |
handle the increased stress. A service station is only one example of weak commercial |
infrastructure that relies on computers to operate. If China could gain market dominance in |
the point of sale software industry, or in the registers used for sales, it would gain an even |
greater access to disruption. This disruption could be used as a deterrent, as blackmail, or as |
a force multiplier in traditional warfare. |
Market Dominance |
China may seek to establish market dominance in the production of ICT software and |
hardware as a means of increasing its cyber warfare capability. On an infrastructure level, |
China could seek to control ownership of submarine cable infrastructure allowing it further |
access to cyber reconnaissance or the option of shutting down portions of internet |
connectivity during times of war (Whitney 2008; Of Cables and Conspiracies 2008). Further, |
if China could unseat Microsoft as the industry standard in software, it could install |
backdoors, latent viruses, or remotely triggered ex-filtration devices. This type of tactic was |
examined in section 3, above (Cyber Reconnaissance and Attack), with Sony BMG |
s use of |
rootkits. China used legal and financial prowess to convince Microsoft to teach its software |
engineers how to insert their own software into Window |
s applications. As a part of the |
Chinese argument for doing so, was an insistence that Microsoft Windows was a secret tool |
of the US government. By providing China with |
skeleton keys |
to the Windows Operating |
System, inadvertently China was given advanced knowledge on how to infiltrate foreign |
computers and craft advanced exploits (Marsal 2008; Tkacik 2007). |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
US concerns over Chinese market dominance have begun to surface. In 2006, the State |
Department banned the purchase of computers from the Lenovo Group, the Chinese firm that |
acquired the IBM personal computing division, following penetrations using a zero-day flaw |
in Microsoft software. China is also growing in the field of microchips, something other |
states need for defence related electronics. Not only could China embed exploits, but also |
dominance in this field gives it access to critical individuals and information through |
partnership, such as a chance to liaise with industry insiders, come close to sensitive |
information and hardware, and conduct social engineering or HUMINT. In 2003, the Huawei |
Shenzhen Technology Company was charged with stealing secrets and wholesale pirating of |
Cisco software, a US company. In 2007, Huawei then attempted to buy 3Com, a US |
company which supplies the US government with security software, routers, and servers. |
India turned down a $60 million Huawei investment deal in 2005 after concerns over cyber |
reconnaissance, noting that Huawei is the same company that conducts sweeping and |
debugging of the Chinese embassy. India |
s Defence Ministry stated |
the choice was between |
cheap Chinese equipment and national security |
(Tkacik 2007). |
China consistently reverse engineers ICT hardware and software in an attempt to maintain a |
stronghold on its own markets. This can be seen with the reverse engineering of Skype |
Protocol and Voice over Internet Protocol (VoIP), and |
knock offs |
of the iPhone (VoIP |
WkiBlog 2006). The One Laptop Per Child (OLPC) project, which has the potential to |
rapidly spread internet connectivity to China |
s remaining population, uses an open source |
operating system and software, helping to free China from US owned Microsoft. Yet China |
has denounced the sale of OLPC, promoting instead various domestic versions that were |
reversed engineered from the OLPC model. |
Further, the Chinese have secured |
manufacturing rights to produce OLPC within China even though they do not intend to |
promote OLPC sales domestically (O |
Brien 2008). China also has a history of reverse |
engineering websites that become popular and profitable in the Western world; examples |
include clones of YouTube, Google, MySpace, Facebook, Wikipedia, and eBay being |
YoQoo, Baidu, Baidu Space, Xiaonei/Zhanzuo, Baidu Baike/Hoodong, and Taobao |
respectively (Marshall 2008; Wei 2008; Burns 2006). |
Peacetime Operations |
During peacetime, China is likely to rely on cyber reconnaissance to gather information and |
catalogue exploits/weaknesses in the US military and infrastructure. Automobile companies, |
food services, oil companies, financial institutions, and telecommunications all play a vital |
role in supporting military operations, as well as housing technological advances, expertise, |
and inside information which could prove useful for leapfrogging (Winkler 2005). |
Technology transfer allows China to skip years of costly research and development, and it |
removes the competitive edge of foreign militaries and companies (Tkacik 2007). In |
unrestricted fashion, China may also seek advantage during peacetime to battle military |
export restrictions of the EU, purchase vital capital in the US financial system, and help |
shape the international legal structure being developed for cyber warfare. Cyber |
reconnaissance against US military logistics networks could reveal force deployment |
information, such as the names of ships deployed, readiness status of various units, timing |
and destination of deployments, and rendezvous schedules. It could also reveal the details of |
weaponry sold to Taiwan. |
China has repeatedly shown interest in the US Unclassified but Sensitive Internet Protocol |
Router Network (NIPRNet) (China |
s Proliferation Practices, and the Development of Its |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
Cyber and Space Warfare Capabilities 2008). NIPRNet is used to exchange unclassified but |
sensitive information between internal users. The network is connected to the broader |
internet to improve collaboration between scientists and officers located in different |
organizations and in remote locations. This means it can provide intruders with data such as |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.