[governance] Report Warns of Chinese Cyber Threat

Jeffrey A. Williams jwkckid1 at ix.netcom.com
Fri Oct 23 16:50:22 EDT 2009


All,

  As an FYI:

(October 22, 2009)
The US-China Economic and security Review Commission this week released
a report titled "Capability of the People's Republic of China to Conduct
Cyber Warfare and Computer Network Exploitation." According to the
report, domination of an adversary's information flow is central to
Chinese military strategy.  It also warns that China will likely conduct
"a long term, sophisticated computer network exploitation campaign."
http://www.scmagazineus.com/Security-report-finds-Chinese-cyberspying-threat-growing/article/156013/
http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf
[Guest Editor's Note (Ed Giorgio, CSIS Commission member): Playing the
devil's advocate, when (uninformed) policy makers read the executive
summary, they will learn:
1. That China has a cyber doctrine very much like ours ("information
dominance", "network centric warfare", etc.) - *boring*
2. They have an espionage program very much like ours - *boring*
3. They can reach out to industry (as we do) to get specialized talent - *boring*
4. They are gradually discouraging hactivism as it is a source of
embarrassment and stuff like defacing whitehouse.gov doesn't achieve a
long term military or economic objective (they are catching up to us on
this policy) - *positive and* *boring*
5. While the case studies and time line are fascinating, I believe they
are only the tip of the iceberg. The (all important) scale on which this
is (apparently) happening (about 3 per year) is not convincing, and
hence *does not require immediate attention*.
***  What is really needed it something we did in the cold war, a *"Net
Assessment"* where we juxtapose operational capabilities (count nukes,
missiles, tests, etc.) and decide if we are winning or losing. Only our
government could make an informed statement of the scale on which this
is currently happening and they would have to declassify a lot of
information to do it; something I think is needed.
(Honan): RAND has just released a whitepaper on Cyber Warfare that I
highly recommend people interested in this topic should read.
http://www.rand.org/pubs/monographs/2009/RAND_MG877.pdf]



Regards,



Jeffrey A. Williams
Spokesman for INEGroup LLA. - (Over 294k members/stakeholders strong!)
"Obedience of the law is the greatest freedom" -
   Abraham Lincoln

"Credit should go with the performance of duty and not with what is very
often the accident of glory" - Theodore Roosevelt

"If the probability be called P; the injury, L; and the burden, B; liability
depends upon whether B is less than L multiplied by
P: i.e., whether B is less than PL."
United States v. Carroll Towing  (159 F.2d 169 [2d Cir. 1947]
===============================================================
Updated 1/26/04
CSO/DIR. Internet Network Eng. SR. Eng. Network data security IDNS. div. of
Information Network Eng.  INEG. INC.
ABA member in good standing member ID 01257402 E-Mail jwkckid1 at ix.netcom.com
Phone: 214-244-4827

____________________________________________________________
You received this message as a subscriber on the list:
     governance at lists.cpsr.org
To be removed from the list, send any message to:
     governance-unsubscribe at lists.cpsr.org

For all list information and functions, see:
     http://lists.cpsr.org/lists/info/governance



More information about the Governance mailing list