Think! Evidence

What Lies behind Chinese Cyber Warfare

Show simple item record

dc.creator Gabi Siboni
dc.creator Y. R.
dc.date 2012-09-01T00:00:00Z
dc.date.accessioned 2015-07-20T20:09:25Z
dc.date.available 2015-07-20T20:09:25Z
dc.identifier 2307-793X
dc.identifier 2307-8634
dc.identifier https://doaj.org/article/48c4222dd2e647d09e69c89f5e09fbec
dc.identifier.uri http://evidence.thinkportal.org/handle/123456789/8968
dc.identifier.uri https://doaj.org/article/48c4222dd2e647d09e69c89f5e09fbec
dc.description Over the past several years China has been developing operational capabilities in the field of cyberspace warfare. A cyber attack may be defined as the unauthorized penetration of computer and communications systems belonging to individuals or organizations for the purpose of espionage and information theft, in order thereby to damage or disrupt the functioning of these systems or to damage other systems dependent on them, even to a point of causing actual physical damage. Despite denials by the Chinese government, researchers posit that China is behind a string of cyber attacks against the United States, Japan, France, Australia, and other Western nations. This essay argues that an analysis of the publicly available information about the more recent attacks makes it possible to establish that China does in fact stand behind these attacks and also makes it possible to identify the link between China’s cyberspace warfare strategy and its choice of targets. The analysis includes an examination of the companies attacked to identify possible motives for the attacks. The motives for these attacks are presumably to steal capabilities and conduct industrial espionage against nations and commercial competitors. Attacking companies and organizations in the financial and even political sectors allows access to valuable intelligence in these fields. By contrast, the intelligence value for immediate use in attacking companies providing critical infrastructures and communications services is usually relatively low. Rather, gaining access, if only to some providers of communications and internet services in the West and the United States, is liable to give attackers the ability to damage these services.
dc.language English
dc.publisher Institute for National Security Studies
dc.relation http://d26e8pvoto2x3r.cloudfront.net/uploadimages/systemfiles/masa4-2eng%204%20(2)_siboni.pdf
dc.relation https://doaj.org/toc/2307-793X
dc.relation https://doaj.org/toc/2307-8634
dc.rights CC BY
dc.source Military and Strategic Affairs, Vol 4, Iss 2, Pp 49-64 (2012)
dc.subject China
dc.subject cyberspace
dc.subject cyber
dc.subject technology
dc.subject cyber attack
dc.subject hacker
dc.subject networks
dc.subject Operation Nirto
dc.subject Operation Aurora
dc.subject RSA
dc.subject infrastructure
dc.subject warfare
dc.subject Military Science
dc.subject U
dc.subject DOAJ:Military Science
dc.subject DOAJ:Technology and Engineering
dc.subject Military Science
dc.subject U
dc.subject DOAJ:Military Science
dc.subject DOAJ:Technology and Engineering
dc.subject Military Science
dc.subject U
dc.subject Military Science
dc.subject U
dc.subject Military Science
dc.subject U
dc.title What Lies behind Chinese Cyber Warfare
dc.type Article


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Think! Evidence


Browse

My Account