The Hundred-Year Marathon: China’s Secret Strategy to Replace America as the Global Superpower

Rating: 
Amazon Price: $9.99 (as of July 4, 2020 05:19 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

One of the U.S. government's leading China experts reveals the hidden strategy fueling that country's rise – and how Americans have been seduced into helping China overtake us as the world's leading superpower.

For more than forty years, the United States has played an indispensable role helping the Chinese government build a booming economy, develop its scientific and military capabilities, and take its place on the world stage, in the belief that China's rise will bring us cooperation, diplomacy, and free trade. But what if the "China Dream" is to replace us, just as America replaced the British Empire, without firing a shot?
Continue reading “The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower”

Surviving Cyberwar

Surviving CyberwarMilitary and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks.

 

Price: $65.00

Click here to buy from Amazon

Tiger Trap: America’s Secret Spy War with China

Rating: 
Amazon Price: $14.39 (as of July 4, 2020 10:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

For decades, while America obsessed over Soviet spies, China quietly penetrated the highest levels of government. Now, for the first time, based on numerous interviews with key insiders at the FBI and CIA as well as with Chinese agents and people close to them, David Wise tells the full story of China’s many victories and defeats in its American spy wars.Two key cases interweave throughout: Katrina Leung, code-named Parlor Maid, worked for the FBI for years, even after she became a secret double agent for China, aided by love affairs with both of her FBI handlers. Here, too, is the inside story of the case, code-named Tiger Trap, of a key Chinese-American scientist suspected of stealing nuclear weapons secrets. These two cases led to many others, involving famous names from Wen Ho Lee to Richard Nixon, stunning national security leaks, and sophisticated cyberspying. The story takes us up to the present, with a West Coast spy ring whose members were sentenced in 2010—but it surely will continue for years to come, as China faces off against America. David Wise’s history of China’s spy wars in America is packed with eye-popping revelations.

National Defense Strategy – United States of America

National Defense Strategy - United States of AmericaThe United States, our allies, and our partners face a spectrum of challenges, including violent transnational extremist networks, hostile states armed with weapons of mass destruction, rising regional powers, emerging space and cyber threats, natural and pandemic disasters, and a growing competition for resources. The Department of Defense must respond to these challenges while anticipating and preparing for those of tomorrow. We must balance strategic risk across our responses, making the best use of the tools at hand within the U.S. Government and among our international partners. To succeed, we must harness and integrate all aspects of national power and work closely with a wide range of allies, friends and partners. We cannot prevail if we act alone.

As noted in the 2006 QDR, state actors no longer have a monopoly over the catastrophic use of violence. Small groups or individuals can harness chemical, biological, or even crude radiological or nuclear devices to cause extensive damage and harm. Similarly, they can attack vulnerable points in cyberspace and disrupt commerce and daily life in the United States, causing economic damage, compromising sensitive information and materials, and interrupting critical services such as power and information networks. National security and domestic resources may be at risk, and the Department must help respond to protect lives and national assets. The Department will continue to be both bulwark and active protector in these areas. Yet, in the long run the Department of Defense is neither the best source of resources and capabilities nor the appropriate authority to shoulder these tasks. The comparative advantage, and applicable authorities, for action reside elsewhere in the U.S. Government, at other levels of government, in the private sector, and with partner nations. DoD should expect and plan to play a key supporting role in an interagency effort to combat these threats, and to help develop new capacities and capabilities, while protecting its own vulnerabilities.

In the contemporary strategic environment, the challenge is one of deterring or dissuading a range of potential adversaries from taking a variety of actions against the U.S. and our allies and interests. These adversaries could be states or non-state actors; they could use nuclear, conventional, or unconventional weapons; and they could exploit terrorism, electronic, cyber and other forms of warfare. Economic interdependence and the growth of global communications further complicate the situation. Not only do they blur the types of threats, they also exacerbate sensitivity to the effects of attacks and in some cases make it more difficult to attribute or trace them. Finally, the number of potential adversaries, the breadth of their capabilities, and the need to design approaches to deterrence for each, create new challenges.

An underlying assumption in our understanding of the strategic environment is that the predominant near-term challenges to the United States will come from state and non-state actors using irregular and catastrophic capabilities. Although our advanced space and cyber-space assets give us unparalleled advantages on the traditional battlefield, they also entail vulnerabilities.

China is developing technologies to disrupt our traditional advantages. Examples include development of anti-satellite capabilities and cyber warfare. Other actors, particularly non-state actors, are developing asymmetric tactics, techniques, and procedures that seek to avoid situations where our advantages come into play.

Download National Defense Strategy – United States of America

Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat

Rating: 
Amazon Price: $30.00 $21.63 You save: $8.37 (28%) (as of July 4, 2020 05:15 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The inside story of how America's enemies launched a cyber war against us-and how we've learned to fight back

With each passing year, the internet-linked attacks on America's interests have grown in both frequency and severity. Overmatched by our military, countries like North Korea, China, Iran, and Russia have found us vulnerable in cyberspace. The "Code War" is upon us.
Continue reading “Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat”