About

Download

  • A free mini-guide on how to blog a conference in detail, by Ethan Zuckerman and Bruno Giussani.

Search LoIP

  • Web LoIP

Get LoIP per email

  • Enter your email address:

Non-profit

Books by Bruno Giussani

« Home truths about telecoms | Main | links for 2007-06-13 »

June 13, 2007

TrackBack

TrackBack URL for this entry:
http://www.typepad.com/services/trackback/6a00d834517e6e69e200e008c457158834

Listed below are links to weblogs that reference China's cyberwar strategy: first-strike:

Comments

Indeed, China has been thinking of CNOs for a long time now and is even rumoured to have run a "ground test" of its cyberwar abilities on Taiwan's ATM networks in 1999. The other field of any major cyberattack is space since major military communications would use satellites. And, again, it is telling that China's APL has started the year with a full antisatellite attack test. But to me, the most important point you made in your article is in its title: "first-strike" is critical to understand the new nature of cyberwar. In the ancient art of war, there was a natural advantage to defensive posture vs. offensive posture in terms of ressources required. The mechanized war of the XXth has started to shift the balance. The cyberwar of the XXI may totally obliterate this old-time balance. But this in effect will have profound and possibly desastrous effect on diplomatical equilibrium - since it will put new emphases on preventive war doctrines.

For about a year now the former Chief Strategist of Netscape has been warning everyone through his articles that this was a huge threat and actually identified several strategies and tactics that if used would compromise the information infrastructure in the U.S. and globally. Why is it our intelligence services are just waking up to this threat? Why is it throughout history we ignore or dismiss the experts until it is too late! I just did a Google search (Kevin Coleman Cyber Attack) and found over 13,000 references. With that much intelligence we should be much further along in protecting and defending against cyber attacks that we are today!

The comments to this entry are closed.

Upcoming conferences