James Marinero
Page: Chinese Cyberwar Activities

Home
Free Thriller Book
My Novels
   Sword of Allah
   Cause of All Causes
   Sicilian Channel
   Gate of Tears
   Susan's Brother
Character Gallery
   Steve Baldwin
   Ellie Williams (aka Helena)
   Maruska Pavkovic
Research Articles
   Computing Articles
   Chinese Internet Attacks
   Code Breaking Attacks
   Military Articles
   Israeli Defence Force Navy
   The World Aircraft Carrier Fleet
   Aircraft Carriers
   Shi Lang - Chinese Aircraft Carrier
   Politics and Society Articles
   Chinese Cyberwar Activities
   The History of Patents
   Science Articles
   Thiovulum Aureus
   Travel and Geography
   The Sicilian Channel
   Yacht Cruising North Africa
Research Pictures
My Book Covers
   Cause of All Causes - Full Book Cover
   Gate of Tears Book Cover
   Sicilian Channel Book Cover
   Sword of Allah - Full Book Cover
Thriller Novels
   Best Thrillers - My Picks
   Finding a Thriller You'll Like
   Anatomy Of Thriller Novels
   History of Thriller Novels
   Best Thriller Books Authors
   Spy Novels Secrets
   Action Thriller Novels
   The Bourne Identity
   Drama Thriller Novels
   Espionage Thriller Novels
   Best Spy Novels
   Classic Espionage Thrillers
   Tinker Tailor Soldier Spy
   The Ipcress File
   Political Thriller Novels
   Hunt For Red October
   Supernatural Thriller Novels
   The Haunting of Hill House
   Sixth Sense
Short Stories
   The Visitors
   Hotrod
Reviews
   Gate of Tears Reviews
   Susan's Brother Reviews
On Writing
   Suspending Disbelief
   Fact Checking: How To Write Novels
   How To Write Novels
   New Novel Themes
   Location Research
   Thriller Plot Development
   Pulp Fiction Lessons?
   Short Stories Compendium
   Discovering Words
Testimonials
My Blog
Favourite Poetry
   The Horses by Edwin Muir
   The Donkey by G K Chesterton
   Mending Wall by Robert Frost
   The Young British Soldier by Rudyard Kipling
Interviews & Podcasts
   Interview Steve Baldwin
Video Trailers
   Video Trailer Gate of Tears
   Video Trailer Sicilian Channel
   How to Make a Book Video Trailer
Press Releases
   Susans Brother Book Deal
Press Cuttings File
   Evening Post Dec-03-2011
   Llanelli Star Dec-10-2011
   Evening Post Aug-19-2011
   Lymington Times Sep-17-2011
Publishing News
Book Marketing Activity
   Sharing The Word
Admin Stuff
   About
   Contact
Books Read
Cover Roughs

article feature
Back |  Print  |  Bookmark
Chinese Cyberwar Activities
 
A massive program of intrusion


Most developed countries are engaged in internet attacks - electronic spying on other countries - but also in preparing for cyber warfare - both offensively and defensively. In the early 1990’s, as part of its plan to become a military, industrial and financial superpower and emerge from what was still in many respects (even under Chairman Mao) a mediaeval society, China instigated a series of programs, the results of which are becoming obvious today.

In the Chinese global intelligence infrastructure operations, a major component of the military and economic/political intelligence gathering is the so-called ‘deep water fishes’. The term goes back to 1983, and relates to the 10,000 or so agents that China has in place in 170 cities around the world. However, its internet intelligence gathering and cyberwar preparations are even more insidious and pervasive.

Under the direction of President Jiang Zemin, an army of so-called cyberwarriors was set up by General Dai Qingmin to engage in infowar. The cyberwarriors design spam, malware and viruses to penetrate and paralyse their enemy in a war situation, they control the internet in China (and ultimately forced Google to pull out), and run the so-called ‘Golden Shield’ program which monitors e-mails, chat and mobile phone SMS.

Recently, there have been massive and well-coordinated cyberattacks on commercial websites. Many commentators believe that China is behind some of these attacks, though those in the Western intelligence services who know the truth are keeping quiet. Undoubtedly, there are some in commercial computer security companies who also know the truth, but they will not ‘go public’ with their knowledge - they may of course wish to keep commercially secret their analytical capabilities (or serve as consultants to governments).

Certainly, any country which is preparing for warfare of any kind has to test its weapons, and the Chinese are not the only culprits here. Cyberwarfare is underway right now, from simple intelligence gathering by hacking military, political and commercial databases, right through to offensive use for destructive purposes, including by Western governments.

One such example is the use of malevolent software - ‘malware’. Insidious, dangerous and highly effective, and illustrated very clearly by the Stuxnet worm thought by some to have been developed jointly by Israel and the USA. The worm circulated freely around the internet and apparently had several authors on several continents - the trail was well disguised and hard to follow, but clearly bogus. Eventually, in 2010, Stuxnet found its way into the Siemens control programs for the gas centrifuges used in the Iranian uranium enrichment program. Many centrifuges spun uncontrolled and about twenty percent were wrecked. This reputedly delayed the Iranian quest for a nuclear bomb by several years.

Wherever there was conflict in the 20th century, there was infowar (Churchill said that ‘truth is the first casualty of war’), from false news broadcasts to propaganda leaflets dropped from planes. Now in the 21st century, wherever there is conflict there is cyberwar, and arguably, the Chinese army of cyberwarriors is the largest and most active such army in the world.

© 2011 James Marinero

James Marinero
August 7, 2011

James Marinero writes thrillers revolving around the sea, espionage, action and technology in the 21st century.

 

 ↑ Back to Top

 


Home
My Novels
Sword of Allah
Cause of All Causes
Sicilian Channel
Gate of Tears
Susan's Brother
Character Gallery
Research Articles
Research Pictures
Susan's Brother Book Cover
Reviews
Gate of Tears Reviews
Susan's Brother Reviews
On Writing
Location Research
Pulp Fiction Lessons?
Short Stories Compendium
How to Make a Book Video Trailer
Admin Stuff
About
Contact
Privacy and Cookie Policy