Information Warfare: November 7, 2002

Archives

The United States is trying to come up with ideas on how to deal with China's formidable army of "hacker irregulars." In the past few years, whenever there is dispute between the U.S. and China, especially one that makes a big splash in the media, young Chinese computer enthusiasts make attacks on American web sites. This first happened after the Chinese embassy in Yugoslavia was accidentally bombed in 1999. Another flurry of attacks occurred after the May, 2001 collision of a Chinese fighter with an American naval patrol aircraft. The Chinese government maintains that it has no control over these patriotic young Chinese hackers. But when May 2002 rolled around, accompanied by months of chat room and email discussion of a first anniversary attack on U.S. web sites, nothing happened. Why? It seems the Chinese government issued a statement a few days before the anniversary suggesting that any hack attacks on U.S. sites would not be a good idea. 

So far, none of the Chinese attacks, as far as anyone can tell, were much more than a nuisance. But year by year, the attackers have shown more skill. Now it is pretty certain that the Chinese are formally organizing some of these "patriotic hackers." By maintaining the myth that these young Internet users are operating independently, the government can unleash these kids on any nation without being tagged as a warmonger. This deception won't stand much scrutiny. American hackers have been able to back track some of the Chinese attacks to Chinese government computers. If the Chinese were on the ball and well organized, they would not have allowed hackers to use government computers. Or at the very least, they would have made sure the hackers knew how to cover their tracks. 

The Chinese have boasted that their official cyberwarrior units have "weapons grade computer viruses." It would be a trivial matter to slip their "volunteers" some of these military grade weapons and let the kids unleash them. A military grade virus is, in theory, one that does not spread wildly, infecting every PC it encounters, but instead hits a more specific target. Whether or not that kind of technology works, the Chinese have already shown that the "hacker volunteers" gambit already does. 



 


Article Archive

Information Warfare: Current 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 


X

ad
0
20

Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close