SecurityCertified

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, September 30, 2010

Why Russia and China Think We're Fighting Cyberwar Now

Posted on 10:07 AM by Unknown
Thanks to the Team Cymru news feed for pointing me to Emerging Cyberthreats and Russian Views on Information Warfare and Information Operations by Roland Heickerö of the Swedish Defence Research Agency. I found this content in pages 23-24, "Differences and similarities between Russian, US and Chinese views on IW," to be really interesting:

In order to understand the Russian view in a wider context, a comparison has been made with Russia’s most important competitors – the USA and China – and their approach to information operations...

All three countries agree on the important role information has in today’s conflicts. Over time its importance will grow. The USA has influenced the mindsets of the others, especially regarding ideas about information superiority and information dominance, as well as command and control warfare. Information adds a new dimension to warfare and IW weapons could be used offensively and defensively to protect a country’s own information resources and systems.

Russia and China take a broader view of the essence of information warfare than the USA in the sense that in their approach covers both peacetime and wartime situations, while the US definition is more narrow and related to times of crisis or conflict.

The Chinese view is based on four parameters: pre-emptive strike capability, asymmetric warfare (inferior versus superior), high-tech local war and people’s war. In some documents the term ‘unlimited warfare’ has been mentioned as being a core part of a Chinese view of IW, but the term is disputed by several analysts.

The Chinese concept originates from Sun Tzu’s 36 stratagems, described in his Art of War from 500 BC. One of the most important key factors in the Chinese concept is deception.

The [Chinese] IW perspective covers a long period of time and is not limited to a specific moment, period or conflict. Chinese experts criticize the US doctrine for being much too technology-driven and for not considering the strategic dimension sufficiently.

Moreover it [American doctrine] is too focused on the information and information system of the opponent and does not consider the softer, psychological factors. In the Chinese conceptual framework, cognitive elements are added, such as the opponent’s will and capability to fight. It has a clear political dimension. According to Sun Tzu:

‘To win the war without the fight is the greatest victory’.

In the Chinese approach IO is a component of IW, contrary to the US view. For American experts IO is a way to fight while the Chinese think that IW is the fight itself and is ongoing on many different levels and dimensions over the years.

The Russian view is more closely related to the Chinese where the information-psychological impact of IW is concerned, as well as in the idea that IW is conducted in both peacetime, in the prelude to a conflict, and in wartime and more or less constantly; and on the strategic level as well as the operational and tactical.


I couldn't agree more with this. Here's the Cliff Notes summary:

  • US cyberwar doctrine is too narrow, focused on technology and on information itself, ignoring the will of the population, and confined to "crisis or conflict" over short periods of time. Americans also think cyberwar is a "way to fight."

  • Russian and especially Chinese cyberwar doctrine is more expansive, including the will of the population, and is constant and enduring, happening during what others call "peacetime." The Chinese especially think cyberwar is "the fight itself."


This is why I believe the US is fighting a cyberwar now. The Russians and Chinese would agree with me, but other Americans probably don't.
Tweet
Email ThisBlogThis!Share to XShare to Facebook
Posted in cyberwar | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DojoCon Videos Online
    Props to Marcus Carey for live streaming talks from DojoCon . I appeared in my keynote , plus panels on incident response and cloud secur...
  • Bejtlich Speaking at TechTarget Emerging Threats Events in Seattle and New York
    I will be speaking at two events organized by TechTarget , for whom I used to write my Snort Report and Traffic Talk articles. The one-da...
  • SANS WhatWorks Summit in Forensics and Incident Response
    I wanted to remind everyone about the SANS WhatWorks Summit in Forensics and Incident Response in DC, 8-9 July 2010. The Agenda looks gre...
  • Sguil 0.7.0 on Ubuntu 9.10
    Today I installed a Sguil client on a fresh installation of Ubuntu 9.10. It was really easy with the exception of one issue I had to troubl...
  • Microsoft Updates MS09-048 to Show XP Vulnerable to 2 of 3 CVEs
    Microsoft published a Major Revision of MS09-048 to show that Windows XP Service Pack 2 and Windows XP Service Pack 3* are now Affected So...
  • BeyondTrust Report on Removing Administrator: Correct?
    Last week BeyondTrust published a report titled BeyondTrust 2009 Microsoft Vulnerability Analysis . The report offers several interesting ...
  • Human Language as the New Programming Language
    If you've read the blog for a while you know I promote threat-centric security in addition to vulnerability-centric security. I think ...
  • DNI Blair Leads with APT as a "Wake-Up Call"
    AFP is one of the few news outlets that correctly focused on the key aspect of testimony by US Director of National Intelligence Dennis Bla...
  • SANS Forensics and Incident Response 2009
    The agenda for the second SANS WhatWorks Summit in Forensics and Incident Response has been posted. I am really happy to see I am speakin...
  • NYCBSDCon 2010 Registration Open
    Registration for NYCBSDCon 2010 is now open. As usual George and friends have assembled a great schedule ! If you're in the New York...

Categories

  • afcert
  • Air Force
  • analysis
  • announcement
  • apt
  • attribution
  • bestbook
  • blackhat
  • books
  • breakers
  • bro
  • bruins
  • certification
  • china
  • cisco
  • cissp
  • cloud
  • clowns
  • commodore
  • conferences
  • controls
  • correlation
  • counterintelligence
  • cybercommand
  • cyberwar
  • dfm
  • education
  • engineering
  • feds
  • fisma
  • freebsd
  • GE
  • ge-cirt
  • hakin9
  • history
  • impressions
  • information warfare
  • ipv6
  • law
  • leadership
  • malware
  • mandiant
  • microsoft
  • mssp
  • nsm
  • offense
  • oisf
  • packetstash
  • philosophy
  • pirates
  • powerpoint
  • press
  • psirt
  • reading
  • redteam
  • reviews
  • russia
  • sans
  • sec
  • sguil
  • snorby
  • spying
  • threat model
  • threats
  • Traffic Talk
  • training
  • tufte
  • tv
  • ubuntu
  • usenix
  • verizon
  • vulnerabilities
  • wisdom
  • writing

Blog Archive

  • ►  2013 (16)
    • ►  September (1)
    • ►  August (1)
    • ►  June (2)
    • ►  April (2)
    • ►  March (1)
    • ►  February (3)
    • ►  January (6)
  • ►  2012 (60)
    • ►  December (4)
    • ►  November (5)
    • ►  October (3)
    • ►  September (10)
    • ►  August (2)
    • ►  July (6)
    • ►  June (6)
    • ►  May (4)
    • ►  April (2)
    • ►  March (9)
    • ►  February (6)
    • ►  January (3)
  • ►  2011 (108)
    • ►  December (3)
    • ►  November (7)
    • ►  October (11)
    • ►  September (9)
    • ►  August (18)
    • ►  July (10)
    • ►  June (5)
    • ►  May (4)
    • ►  April (13)
    • ►  March (17)
    • ►  February (2)
    • ►  January (9)
  • ▼  2010 (193)
    • ►  December (14)
    • ►  November (11)
    • ►  October (6)
    • ▼  September (16)
      • Why Neither the US Nor China Admits Cyberwar
      • On the Other Side of an Advanced Persistent Threat
      • Why Russia and China Think We're Fighting Cyberwar...
      • Kundra IPv6 Memo
      • Five Reasons "dot-secure" Will Fail
      • Thoughts on "Cyber Weapons"
      • Bejtlich Speaking at TechTarget Emerging Threats E...
      • NYCBSDCon 2010 Registration Open
      • Someone Is Not Paying Attention
      • NetWitness Minidecoder in Action
      • DualComm Port Mirroring Switch
      • A Book for the Korean Cyber Armies
      • India v China
      • One Page to Share with Your Management
      • The Inside Scoop on DoD Thinking
      • Review of Hacking Exposed: Wireless, 2nd Ed Posted
    • ►  August (15)
    • ►  July (26)
    • ►  June (15)
    • ►  May (15)
    • ►  April (15)
    • ►  March (16)
    • ►  February (19)
    • ►  January (25)
  • ►  2009 (123)
    • ►  December (10)
    • ►  November (17)
    • ►  October (21)
    • ►  September (13)
    • ►  August (20)
    • ►  July (21)
    • ►  June (21)
Powered by Blogger.

About Me

Unknown
View my complete profile