Civil-military strategy for cyber-attacks Chinese dominance.

The war of the future will be conducted in cyberspace. The cyber-warriors will no longer meet in the physical world, but to enforce the will of their leaders with digital attacks. The goal of these attacks will not be the physical destruction, but the critical infrastructure. Attacked are the lifeblood of modern society: energy networks, financial systems, military information networks and security systems.

"The cyber-attackers are sitting in the People's Republic of China and fulfill the political, economic and patriotic standards of their masters of the Communist Party of China." With these hypotheses, the former lieutenant colonel opened in the U.S. Marines and today's IT security consultant Bill Hagestad his book on "21st Century Chinese Cyberwarfare" (Chinese cyber-war in the 21st century). The Middle Kingdom would rise to a new world's dominant superpower, which - according to their age-old tradition - can never be recaptured or colonized by foreign powers. To achieve this goal, China strive for information dominance, which in turn allows economic superiority or strategic military advantage. This approach will support state-developed military and partly civil executed.

Protect U.S. networks will cost $ 8.3 billion

The fully understood, it is not a cyber-war science fiction. Each year, giving it more cyber-attacks. Hagestad results for the year 2008, 56,000 cyber attacks on the networks of the U.S. Department of Defense. But already in the first three months of the following year it had been nearly 44,000. The U.S. military had to spend in the first half of 2009 more than 100 million U.S. dollars for repairs to cyber-attacks. Just for the Pentagon for this 90,000 are active, responsible for 15,000 networks with seven million computers. The American government had to protect their networks planned $ 8.3 billion in 2011.

This effort is driven with good reason. Many major hacker attack, the tracks lead to China - although there is no irrefutable evidence. Hagestad calls and analyzed: "Titan Rain", the military research units pried has, "GhostNet", in which more than 1,200 networks around the world - including Germany - attacked with regard to Tibet and the Dalai Lama was, "Night Dragon" in which international oil multinationals were targeted. In addition, the manufacturer of the new U.S. fighter jet F-35 as well as Google and its users from the Chinese dissident scene. The head of British intelligence MI5 even sent an urgent letter to 300 companies to warn of the Chinese cyber attacks.

China denies everything and says that is threatening the Middle Kingdom instead of cyber-attacks. The established in the People's Liberation Army "Blue Army" had only the task of protecting China's networks. Hagestad, but according to Chinese cyber-doctrine goes far beyond security and characterizes today central to the future strategies of the Chinese Communist Party (CCP): between military and civilian sector is not distinguished, but only the protection and enforcement of the military, economic and political interests China, so the CCP, are the focus.

Civil-military cyber attacks

For this purpose the Chinese Ministry of cooperating national security and the cyber-warriors in uniform, at the 3rd and 4 Department of the General Staff are located. They also rely on civilian hackers, the hacker known as militia, and the IT institutes of universities that were already identified as the origin of cyber attacks. State-owned or state-affiliated companies - such as information technology giant Huawei or the computer manufacturer Lenovo - are also included in this calculation. In western military mistrust is high that are included in China's computers components, were implemented in the secret back door for Chinese hackers.

Hagestad shown by the analysis of Chinese policy documents that are already developed since the mid-1990s, the broad lines of the cyber war. The success of U.S. troops in the 1st Gulf War, who had managed to paralyze the Iraqi communications, had impressed the Chinese very much. In addition, the context of already formulated by Mao Tse-Tung guerilla tactics came in the war. The Bottom Line: Cyber-attacks are to be used as an asymmetric guarantee of success. It is important to strike with inferior features a superior opponent. The fight hand-to-man not to erringende victory is to be obtained in cyberspace.

The strategic considerations of the Chinese leadership were still influenced by this ancient base stations. On the one hand, by Sun Tzu 2500 years old "Art of War", which celebrates the victory without a fight and the other, the "36 stratagems". Which include: "Hide your dagger behind a smile." That explains, according to Hagestad, as can be steadily increased in China, the military budget, its own cyber-army is set up, civil and economic espionage has been perfected, invaded infrastructure networks and laid claim to the resources of other countries, while other high-ranking military affirm: "China has always been involved in the development of China's peaceful development and is in no way a threat"

The day as a consultant for Cyber-Security working Hagestad leads to a whole set of measures that organizations, governments, government agencies and companies can increase the security of the data on their networks. But he also makes clear soberly: "You can not defuse every time any Chinese cyber-threat."

Published by:

siavash's picture

Name
siavash

Country
NL