For decades, while America obsessed over Soviet spies, China quietly penetrated the highest levels of government. Now, for the first time, based on numerous interviews with key insiders at the FBI and CIA as well as with Chinese agents and people close to them, David Wise tells the full story of China’s many victories and defeats in its American spy wars.Two key cases interweave throughout: Katrina Leung, code-named Parlor Maid, worked for the FBI for years, even after she became a secret double agent for China, aided by love affairs with both of her FBI handlers. Here, too, is the inside story of the case, code-named Tiger Trap, of a key Chinese-American scientist suspected of stealing nuclear weapons secrets. These two cases led to many others, involving famous names from Wen Ho Lee to Richard Nixon, stunning national security leaks, and sophisticated cyberspying. The story takes us up to the present, with a West Coast spy ring whose members were sentenced in 2010—but it surely will continue for years to come, as China faces off against America. David Wise’s history of China’s spy wars in America is packed with eye-popping revelations.
Internet users in the People's Republic of China may not enjoy the same World Wide Web as the rest of the world, but their web viewing experience is edging closer to reality. The government of China is not the only administration to exercise the practice of internet censorship, but it is among the most notorious. Internet censorship in China is a complicated process that is constantly changing. This study found that it is still common for sensitive material to be unavailable in China but the severity of censorship is lessening. It was conducted in order to test the extent of control which the Chinese government has over what its internet users' view on the internet. Through the longevity of this study and evaluations to past studies, it can be said the internet in China is becoming less controlled. The Great Firewall of China could be falling down. This could be leading to a better informed and more connected Chinese society.
Chinese Cyber Nationalism offers the first comprehensive examination of the social and ideological movement that mixes Confucian cultural traditions and advanced media technology. Over the past decade, the Internet has increasingly become a communication center, organizational platform, and channel of execution by which Chinese nationalistic causes have been promoted throughout the world.
- Power and Conflict in the Cyber Age (World Politics Review Special Reports) (tobem.com)
- Islam in the Digital Age: E-Jihad, Online Fatwas and Cyber Islamic Environme (Critical Studies on Islam) (tobem.com)
The government of the People's Republic of China (PRC) is a decade into a sweeping military modernisation program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defence posture. This book presents a comprehensive open source assessment of China‘s capability to conduct computer network operations (CNO) both during peacetime and periods of conflict, and will hopefully serve as a useful reference to policymakers, China specialists, and information operations professionals.
A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon‘s secret communications systems.
Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a “glass house,” all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.
Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.
The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.
In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.
- Hybrid and Cyber War As Consequences of the Asymmetry: A Comprehensive Approach Answering Hybrid Actors and Activities in Cyberspace (tobem.com)
- Inside Cyber Warfare: Mapping the Cyber Underworld (tobem.com)
- National Defense Strategy – United States of America (tobem.com)