The government of the People’s Republic of China (PRC) is a decade into a sweeping military modernisation program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defence posture. This book presents a comprehensive open source assessment of China‘s capability to conduct computer network operations (CNO) both during peacetime and periods of conflict, and will hopefully serve as a useful reference to policymakers, China specialists, and information operations professionals.
Click here to buy from Amazon
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America’s critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks.
Click here to buy from Amazon
Despite its impressive size and population, economic vitality, and drive to upgrade its military capabilities, China remains a vulnerable nation surrounded by powerful rivals and potential foes. The key to understanding China's foreign policy is to grasp these geostrategic challenges, which persist even as the country comes to dominate its neighbors. Andrew J. Nathan and Andrew Scobell analyze China's security concerns on four fronts: at home, with its immediate neighbors, in surrounding regional systems, and in the world beyond Asia. By illuminating the issues driving Chinese policy, they offer new perspective on China's rise and a strategy for balancing Chinese and American interests in Asia.
Though rooted in the present, Nathan and Scobell's study makes ample use of the past, reaching back into history to contextualize the people and institutions shaping Chinese strategy. They examine Chinese views of the United States; explain why China is so concerned about Japan; and uncover China's interests in such trouble spots as North Korea, Iran, and the Sudan. The authors probe recent troubles in Tibet and Xinjiang and establish links to forces beyond China's borders. They consider the tactics deployed by both sides of mainland China and Taiwan's complicated relationship, as Taiwan seeks to maintain autonomy while China tries to move toward unification, and they evaluate the strengths and weaknesses of China's three main power resources — economic power, military power, and soft power. The book concludes with recommendations for the United States as it seeks to manage China's rise. Chinese policymakers understand that the nation's prosperity, stability, and security depend on cooperation with the U.S, and if handled wisely, relations between the two countries could produce mutually beneficial outcomes in Asia and throughout the world.
The United States is under attack. Cyber-attack and cyber-espionage traced backed to China have been dramatically increasing every year. What kind of damage is being done? How is our national security being compromised?
The Office of the Secretary of Defense in their 2010 annual report to Congress, which was the "Military and Security Developments Involving the People's Republic of China [PRC]"; outlined this challenge:
"The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology."
Chapters: Wikileaks, Whistleblower Week in Washington, Murder in Samarkand, Touch All Policy, the Ridenhour Prizes. Source: Wikipedia. Pages: 41. Not illustrated. Free updates online. Purchase includes a free trial membership in the publisher’s book club where you can select from more than a million books without charge. Excerpt: Wikileaks is a Sweden-based organization that publishes anonymous submissions and leaks of sensitive documents from governments and other organizations, while preserving the anonymity of their sources. Its website, launched in 2006, is run by The Sunshine Press. The organization has stated it was founded by Chinese dissidents, as well as journalists, mathematicians, and start-up company technologists from the U.S., Taiwan, Europe, Australia, and South Africa. Newspaper articles describe Julian Assange, an Australian journalist and Internet activist, as its director. Within a year of its launch, the site said its database had grown to more than 1.2 million documents. It has won a number of new media awards for its reports. Citing fundraising problems, Wikileaks temporarily suspended all operations other than submission of material in December 2009. Material that was previously published is no longer available, although some can still be accessed on unofficial mirrors. Wikileaks said it would resume full operation once the operational costs were covered, and on 3 February 2010 it announced that its minimum fundraising goal had been achieved. The site’s archive came back online in May 2010. Wikileaks went public in January 2007, when it first appeared on the web. The site states that it was “founded by Chinese dissidents, journalists, mathematicians and start-up company technologists, from the US, Taiwan, Europe, Australia and South Africa”. The creators of Wikileaks were unidentified as of January 2007, although it has been represented in public since January 2007.
Click here to buy from Amazon