(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Cyberchange We Can All Believe In?

leave a comment »

I would instead say “China’s Master Plan to Subjugate America”

In 1999, two Chinese colonels of the People’s Liberation Army wrote Warfare beyond Bounds, a 228-page analysis of the transformation of modern warfare. More specifically, the book critiques how the US military apparatus has conducted battle in the past and suggests various means of exploiting the weaknesses of a “technologically superior opponent” that “views revolution in military thought solely in terms of technology.”

Of several areas that could potentially be exploited, “information warfare” is mentioned as a “semi-warfare, quasi-warfare, and sub-warfare, […] the embryonic form of another kind of warfare.” The book states that network attacks and infiltration are more cost and labor efficient in comparison to traditional means of warfare, potentially having the ability to affect not only electronic government systems, but utility grids, bank transfers and civilian communications. In the same year the book was published, NATO computers were attacked during the Kosovo conflict, and after the Chinese Embassy in Belgrade had been bombed, it was reported that Chinese hackers posted threats such as ‘We won’t stop attacking until the war stops!’ on US government sites.

While the US military refers to cyber- and information warfare as specifically dealing with the online exploitation of critical military and state infrastructure assets, it is distinguished from what senior analysts at NATO have dubbed “iWar,” which consists of “attacks carried out over the internet that target the consumer internet infrastructure.” The definition explains, “While nation states can engage in ‘cyber’ and ‘informationalized’ warfare, iWar can be waged by individuals, corporations, and communities.”

Essentially this type of warfare comes in the form of distributed denial of service attacks (DDOS) which “clogs up” network access and often makes vital websites and other data inaccessible. The cyberattacks on Estonia in May 2007 and Georgia and Azerbaijan in the 2008 South Ossetia conflict are often used as examples of cyberwarfare posing serious threats to both state and commercial institutions.

From US Cybersecurity Woes

I just thought that you all should get a gander at the 228 pages of planning that our Chinese Overlords began in 1999. Seems to me that we are WAY behind the curve here… Anyone else think so? Hell, we had enough trouble conceiving that Iraq was going to turn into a counterinsurgency… No, there will be no counterinsurgents! We will be greeted as liberators!


Written by Krypt3ia

2009/03/19 at 21:42

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: