Welcome To The Future: Google Confronts China’s “Three Warfares”

Republicans might want to tag Wikileaks as a terrorist organisation? ..but when papers like this are revealed it gives us a great peek into the near future as China continues to try and access other people’s secrets and especially economic ones.


Here at HOB we suggest that it’s not long before the PRC authorities see that the security systems of international law firms provide a great deal of useful information – that is of course if it hasn’t already happened and nobody knows or nobody’s telling.

In the meantime this piece Google Confronts China?s ?Three Warfares? by TIMOTHY L. THOMAS an analyst at the Foreign Military Studies Office at Fort Leavenworth, Kansas, and the author of three books on Chinese information warfare? starts to open the can of worms

http://www.carlisle.army.mil/usawc/Parameters/Articles/2010summer/Thomas.pdf

?

He writes…

Why America Has Had Enough
Journalist Josh Rogin recently listed ten computer incidents that are commonly known in the United States through press releases and government
agency briefings. All parties damaged by the attacks suspect that the Chinese are behind these incursions.

The ten events are:
? 2004: Titan Rain, Federal Bureau of Investigation name for a group of hackers from Guangdong province who stole information from US military labs, the National Aeronautics and Space Administration, the World Bank, and others.
? 2006: A US State Department official in East Asia opens an e-mail that allows hackers to break into computers at US embassies all over
the region.
? 2006: US Representative Frank Wolf?s office is attacked. He is an outspoken lawmaker on Chinese human-rights issues and suspects the Chinese in the attack.
? 2006: The US Commerce Department had to discard all of its computers
due to targeted attacks originating from China.
? 2006: The US Naval War College took all of its computers
offline after a major cyber attack in which China emerged as the main culprit.
? 2007: Secretary of Commerce Carlos Gutierrez finds spy software on his computer following a trade mission trip to China.
? 2008: The presidential campaigns of both President-elect Barack Obama and Senator John McCain are attacked by Chinese cyber spies.
? 2009: Senator Bill Nelson revealed attacks against his computer had been traced to China.
? 2009: Toronto researchers find a massive cyber espionage ring using
Chinese malware they call Ghostnet. The attacks penetrated 103 countries,
and their origin was China.
? 2009: Lockheed Martin?s F-35 program is hacked and China emerges as the main suspect.2
This list obviously does not include the hundreds of thousands of ?pings? (purpose unknown) that US Web sites have received from China over the years, nor does it mention other specific incidents. And then along comes Google.