Skip to main content

Casualties of Cyber Warfare

That the United States and China have engaged in skirmishes in the cyber domain is no secret. Since the beginning of the 21st century, targeted cyberattacks, often with signs of Chinese origin, have attempted to penetrate the computer networks of U.S. corporations and government agencies in search of potentially valuable information. In response to this new strategic threat, the U.S. Military’s Strategic Command commissioned the creation of a sub-unified Cyber Command in 2009, with one of its stated objectives being the “defense of specified Department of Defense information networks.”
U.S. President Barack Obama very clearly defined the threat that cyberattacks pose to the economy, in both the public and private sectors, when he said that the “cyber threat is one of the most serious economic and national security challenges we face as a nation.” Indeed, conflict in the cyber domain is still having some serious repercussions for the business world.
Civilian Involvement in Cyber Warfare
The characteristic of cyber warfare that makes it so uniquely dangerous to the corporate sector is that military power in the cyber domain must be extended through computer networks provided and maintained by non-governmental bodies. The use of these networks for cyberattacks or defense requires the conscription or cooperation of civilian resources. This creates extreme liabilities for the corporations that provide these networks, as they will quickly become the targets of suspicion and possible retaliation from the enemy state. In recent years, both Chinese and American companies have been caught in just this situation.
On October 8, 2012, the U.S. House of Representatives’ intelligence committee released a report that warned of potential national security threats posed by Chinese telecommunication giants Huawei and ZTE. After conducting a year-long investigation of the suspect companies, the intelligence committee found serious vulnerabilities caused by hidden “backdoors” worked into the companies’ technologies that would allow access to U.S. government and business networks. The report advised against the purchase of products manufactured by Huawei or ZTE, and suggested that policymakers block any mergers between either of the two companies and U.S. telecommunication corporations. These accusations have seriously hurt consumer confidence in the two companies, to the extent that in December of 2013, Huawei’s executive vice president dramatically declared “we are not interested in the U.S. market anymore.” While Huawei has managed to hold on to a small market share in America, the company’s association with Chinese state-sponsored cyberattacks has devastated its ability to operate in the United States.
It became clear last year, though, that the United States was a perpetrator of cyberattacks as well as a victim. In June 2013, former U.S. National Security Agency contractor Edward Snowden provided the world with a look into the intelligence apparatus of the NSA, releasing thousands of classified documents to the media. The released documents revealed that the U.S., like China, was using domestic tech firms (in many cases without their knowledge or consent) as conduits for intelligence gathering cyberattacks. In May 2014, the Chinese government announced that it would no longer purchase or use two of Microsoft’s main products, the Windows 8 operating system and the Microsoft Office 365 Suite. Then, in late July and early August, Chinese officials from the State Administration for Industry and Commerce (SAIC) raided multiple offices owned by Microsoft and its contractors in China. While vague statements about an anti-monopoly probe were made, the company’s decision to end support for the Windows XP operating system – a move that would expose the many Chinese computers that use the operating system to security risks – was also cited as a factor in the raids. While it is likely that the ban and subsequent raids were also intended to  pave the way for new operating system technologies created in China, the Snowden revelations allowed potential U.S. espionage activities to be cited as a justification. Just as Huawei and ZTE suffered for their association with espionage activities of the Chinese government, Microsoft took a major hit because of the provocative actions of its government.

Ref
http://thediplomat.com/2014/08/casualties-of-cyber-warfare/

Comments

Popular posts from this blog

LIC Buys Double as Prices Dive - 10 Aug 2011

http://licreddy.com/Content/information/insurancenews_details.asp?NewsCode=4872 LIC Buys Double as Prices Dive 10-Aug-2011 Life Insurance Corp of India, the government's institution of choice to stabilise the stock market whenever it gets wobbly, has more than doubled stock purchases in the past three days as the global debt worry-triggered selloff made valuations attractive. LIC, the country's biggest investor with stakes in L&T, Axis Bank and Grasim, will raise its secondary market purchases this fiscal as IPOs dry up with promoters not keen to sell shares at lower valuations. "We have been buying in the past few days,'' said a LIC executive involved in decisionmaking. "With the market correcting and not many public issues coming up, we would be investing more in secondary market," said the person who did not want to be identified. LIC to Invest . 50k Cr More LIC, which had been buying stocks for an average of . 120 crore in the first four...

Best IELTS and English language training institutions in Hyderabad

IELTS stands for International English Language Testing System. As the name implies it is basically an English test for testing the proficiency of the language in an individual.  Training for IELTS can be taken to pass the IELTS exam or to develop good english language skills. I am giving the training institute addresses for Hyderabad. The test system is jointly managed by the British Council,IDP education ltd and University of Cambridge ESOL Examinations and more than 1 million candidates are taking the exam all over the world. The test has two versions : 1. Academic 2. General training Academic  version is for people who plan to continue their higher education by enrolling in universities in countries like US,UK,Australia,Canada,New Zealand etc.The academic institutions in these countries consider the IELTS score as a criteria for the admission process. General training is mostly for immigration purposes in countries like Australia,New Zealand,Canada etc. It may ...

How to use home loans most effectively for tax benefits

1) Deduction on interest: If you are paying EMIs for a home loan you took to buy a house, the interest component in the EMI can be claimed as deduction. You must be both an owner and a co-borrower (in the loan) to claim tax benefits. This deduction can be claimed starting the year in which the construction of the house is completed. Suppose the construction of your house was completed on August 30, 2014, you can claim deduction for interest for the entire 12 months in financial year 2014-15. So every year a maximum of Rs. 2 lakh can be claimed for a house that you use for your own residence. If your house is rented, the entire interest for the year can be claimed as deduction. The interest payments for the year shall result in a loss under the head 'income from house property'. This loss can be adjusted against in the same year against other heads of income in your income tax return including salary. Therefore, it reduces your total taxable income and the tax you pay thereon. A...