Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Afterbytes: Chinese Academics Paper on Cyberwar Sets Off Alarms in U.S.

The article: Chinese Academics Paper on Cyberwar Sets Off Alarms in U.S.:

Larry M. Wortzel, a military strategist and China specialist, told the House Foreign Affairs Committee on March 10 that it should be concerned because "Chinese researchers at the Institute of Systems Engineering of Dalian University of Technology published a paper on how to attack a small U.S. power grid sub-network in a way that would cause a cascading failure of the entire U.S."
If you've been following the China cyberwar hype, you need to read the article referenced above. It offers some deep insight into how the hype-meisters spin the "facts" to increase the apparent magnitude of the threats. If you want to read some of the "fully spun" material, you should read Northrop Grumman's paper entitled: "Capability of the People's Republic of China to Conduct Cyberwarfare and Computer Network Exploitation". As a pretty serious amateur military historian, I'm fascinated by such documents because they illustrate the bizarre gyrations of the military/industrial complex's group-think. They seem so - rational - when you read them, but when you ask yourself "what does this mean?" you realize that it's an attempt to justify insanity. "One of the chief strategies driving the process of informatization in the PLA is the coordinated use of CNO, electronic warfare (EW) and kinetic strikes designed to strike an enemy's networked information systems, creating "blind spots" that various PLA forces could exploit at predetermined times or as the tactical situation warranted."


Got that? Strip away the DoD-ese and they are saying that we should be worried that the Chinese are ready to blow up ("kinetic strikes") our networks because they may decide it's time to get into a shooting war with their biggest trade partner and debtor. This is how militarists think, and it's exactly why we need to keep their hands away from the steering wheel. I have news for all the aeron-chair commandos out there: a shooting war with China is not on anyone's "to do" list. Not theirs, anyway. The problem with the militarist mind-set is that they create self-fulfilling threats. Why is Iran so desperate to get nuclear weapons? Because they have seen that the U.S. will trump up a cockamamie story and attempt regime change against smaller non-nuclear powers but we are willing to pay North Korea because they have a credible deterrent. Militarism causes proliferation - in the name of non-proliferation. That's why this cyberwar hype is so important. You can be sure it has the Chinese scratching their heads and wondering if we're maybe projecting a bit of our own plans to "coordinate the use of EW and kinetic weapons." The militarist mind-set does not think reciprocally because it's mired in infantile nationalist perspective. If you actually start flipping some of the problems around and looking at it from the other guy's poing of view, things look very different. Imagine this scenario:

The Chinese Government publicly discloses that they have arranged with all the major wireless telephone companies in China to collect citizen's traffic, particularly targeting citizens that call outside of the country. The Chinese Government publicly passes laws requiring that major email service providers be able to hand over to the secret police, at any time, information about who sent email to whom, as well as contents. And, last but not least, public hearings are held in which Chinese cyberwar experts brag on television about how they could crash the entire Internet in 30 minutes. Finally, the Chinese have a massive industry surrounding finding exploitable flaws in commercial software, including a lively market in which such information is developed and sold to the highest bidder. The government sponsors annual conferences at which these attack-tool generators exchange tips and techniques. A massive training institution, of which the Chinese Government is a major customer, teaches the next generation of cyberwarriors how to "pen test" target networks, how malware works, and how to evade intrusion detection systems.
Got all that? Of course I'm not talking about China. I'm talking about the U.S. It's the U.S. Government that made deals under the table to get access to its citizens' phone call data, then rewrote the laws to indemnify the companies and agencies involved. It's the U.S. Government that requires ISPs to maintain email logs and turn them over with a flimsy warrant presented in a secret court. It's the U.S. Government that has televised congressional hearings on CSPAN, where Mudge famously claims pwn0rship of the Internet. It's companies in the U.S. that primarily develop tools like Core Impact and Metasploit. DEFCON is held in Las Vegas, Nevada, and always has a significant government recruiting effort. SANS teaches "pen testing" - attack techniques - with a sly wink and a nudge, saying "don't try this at home, kids..." Get the point? We have met the enemy, and they are indistinguishable from us. As a student of The Cold War, I had a field day when a lot of the 1960s-era Soviet material was finally declassified and released. What did we discover from it? That the Soviets were pretty sure that we were preparing a first strike, that we were commanded by dangerous crazies like Gen Curtis LeMay, and that the Cuban Missile Crisis was an attempt by the Soviets to restore a balance of terror after the U.S. stationed secret medium-range ballistic nukes in Turkey. If you read the history of The Cold War you'll realize that the militarist idiots on our side of the fence were constantly tweaking the militarist idiots on their side of the fence, in some bizarre kind of "tit for tat" playground antics. There were just billions of lives in the balance. Now, go back to the paragraph from the Northrop Grumman report and think hard about what they mean by "kinetic strikes" and be afraid when you hear beltway bandits hyping cyberwar as "WMD-like capability." It would be bitterly ironic but not particularly surprising if, 50 years from now, we find that China first began preparing for cyberwar when they saw Mudge on CSPAN. 

mjr.

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training