SlideShare a Scribd company logo
1 of 2
Download to read offline
2
It’s About Culture
Cyber + Espionage
A Commentary on Chinese Hacking
It Will Get Worse Before It Gets Better
· David Swan, Executive Vice President, CSCSS Defence and Intelligence Group
CSCSS / Centre for Strategic Cyberspace + Security Science
1
There are a lot of people who are
sick of news stories about Chinese
Hackers. They don't believe that
there is any impact on their world.
The impact of hacking in general, and the
Chinese hacking in particular, has reached
everyday life. Worse, the effects will get
worse before they get better.
The scope of Chinese activity ranges from
stealing ideas from business startups to
stealing plans for jet fighters. Coca-Cola
admitted they were hacked – it cost them the
opportunity to purchase a Chinese beverage
company. An expert Chinese Hacker was
identified – as a professor at a Military
University. Most recently, at least 140
computer attacks against American
companies have been traced to a Chinese
Army Unit. Companies in Silicon Valley, Wall
Street, Bay Street, and rural Saskatchewan
have been hit by Chinese Hackers.
2
The Chinese are one of the oldest cultures on
earth. They have been attacked countless
times, over thousands of years and often the
attackers were successful. The result is a
culture that is concerned about being
attacked again.
This is not about 'rational thought' but a deep
cultural (genetic?) sense that there are many
enemies who want to take what China has.
The result is that the Chinese think differently
at a basic level and therefore behave
differently. When a western company
competes with a Chinese company, they are
competing against the company, plus all the
families of those companies, plus all the
extended relationships, plus a protective
government, PLUS THE CULTURE which
says that China MUST be protected. The
result is like one person trying to play against
an entire football team. The Chinese have
stacked the odds in their favour.
3
Why Chinese Hacking
Will Get Worse
1
What the Chinese have done is apply lessons
from their Master Strategist Sun Tzu. Hacking
to the Chinese is collecting information on the
enemy ( us ), learning our strengths and
weaknesses – and learning our plans. This is
NOT business, this is the application of
thousands of years of history and culture, and
we are the target.
The Chinese understand that in a global
economy they are competing against the
world. Thousands of years of Chinese history
tells them that they WILL be attacked again
and that they must be ready. Chinese Master
Strategist Sun Tzu taught that in order to
protect themselves they must know the plans
of allies and enemies. The easiest way to get
that information is hacking.
The next issue is that the Chinese have not
been “caught”. Most computer security
operators don't have any Intelligence or
forensic investigation training, so they stop at
the end of the electronic trail. Even when the
trail visibly leads to China, no one wants to
lose ( or offend ) the business potential.
The Chinese have never been punished for
hacking. Over thousands of events, mere
hundreds of attacks have been publicized
and few reports have made the mainstream
western media. Few people have any
concept of how rampant the Chinese hacking
efforts are, so the Chinese continue to get
away with claiming they are victims.
Bottom line: the Chinese have been taught
they must collect all information on allies and
enemies alike, hacking has produced superb
results so far with no significant
repercussions. The Chinese will continue to
use hacking as an effective tool of choice.
2
Conclusion
Any person or organization who believes
that they can 'do business' with the Chinese
is ignoring Chinese culture. Its not 'about the
money' its not about business' and it never
will be. Politicians who believe the Chinese
will agree to treaties and conventions, or that
diplomacy can resolve disputes, are ignoring
Chinese history. Any person who believes
that Chinese hacking has had no impact on
their world has not been paying attention.
CSCSS Defence Intelligence Group
For a dedicated briefing by the CSCSS
Defense Intelligence Group regarding
National entities and espionage please
contact us :
· Washington D.C + 571.451.0312
· London, United Kingdom +44 2035141784
· North America +877.436.6746
· Middle East +800.653.407
· Australia +61 2 8003 7553
Email: defintel@cscss.org
www.cscss.org/defence_intelligence.php
The CSCSS Defence Intelligence Group
through its CSCSS subsidiaries has aligned
with defense, civilian and intelligence
agencies providing specific defence
intelligence support to mission-essential
requirements at every stage of the program,
product and business lifecycle. We deliver
mission and technical expertise, delivery of
intelligence products, and a commitment to
client objectives and results at the strategic,
operational and tactical Levels. We
provide specialized defence intelligence
expertise; services and solutions that help
our clients address and achieve their
missions, goals and objectives securely© Center for Strategic Cyberspace + Security Science

More Related Content

Viewers also liked

China india defence expenditure trends – The Gap is growing
China india defence expenditure trends – The Gap is growing China india defence expenditure trends – The Gap is growing
China india defence expenditure trends – The Gap is growing Security Risks Asia
 
Manohar Parikkar MOD
Manohar Parikkar  MODManohar Parikkar  MOD
Manohar Parikkar MODAjit K Nair
 
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)infosanitasi
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber WarRadware
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...IntelCollab.com
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesNora A. Rahim
 

Viewers also liked (10)

China india defence expenditure trends – The Gap is growing
China india defence expenditure trends – The Gap is growing China india defence expenditure trends – The Gap is growing
China india defence expenditure trends – The Gap is growing
 
Manohar Parikkar MOD
Manohar Parikkar  MODManohar Parikkar  MOD
Manohar Parikkar MOD
 
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
Espionage
EspionageEspionage
Espionage
 
PAKISTAN ARMED FORCES
PAKISTAN ARMED FORCESPAKISTAN ARMED FORCES
PAKISTAN ARMED FORCES
 
DEFENSE SYSTEM OF PAKISTAN.
DEFENSE SYSTEM OF PAKISTAN.DEFENSE SYSTEM OF PAKISTAN.
DEFENSE SYSTEM OF PAKISTAN.
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Defence of pakistan
Defence of pakistanDefence of pakistan
Defence of pakistan
 

Similar to CSCSS Defence Intelligence Group Commentary China Hacking

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Kate Neal
 
52 china ruthlessly besieging america
52 china ruthlessly besieging america52 china ruthlessly besieging america
52 china ruthlessly besieging americaGerald Furnkranz
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsKati Mccarthy
 
The China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith KrachThe China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith KrachKeith Krach
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on futureRobert David Steele Vivas
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.pptJohnny Schaefer
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxoreo10
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816Nicole Fields
 
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyRand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyInternet Law Center
 
Cracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media CommunicationsCracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media CommunicationsScott Rickard
 
Unforgettable Rough Draft Essay Thatsnotus.pdfUnforgettable Rough Draft Essa...
Unforgettable Rough Draft Essay  Thatsnotus.pdfUnforgettable Rough Draft Essa...Unforgettable Rough Draft Essay  Thatsnotus.pdfUnforgettable Rough Draft Essa...
Unforgettable Rough Draft Essay Thatsnotus.pdfUnforgettable Rough Draft Essa...Elizabeth Kennedy
 

Similar to CSCSS Defence Intelligence Group Commentary China Hacking (18)

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
52 china ruthlessly besieging america
52 china ruthlessly besieging america52 china ruthlessly besieging america
52 china ruthlessly besieging america
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
The China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith KrachThe China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith Krach
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.ppt
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyRand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
 
Cracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media CommunicationsCracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media Communications
 
Unforgettable Rough Draft Essay Thatsnotus.pdfUnforgettable Rough Draft Essa...
Unforgettable Rough Draft Essay  Thatsnotus.pdfUnforgettable Rough Draft Essa...Unforgettable Rough Draft Essay  Thatsnotus.pdfUnforgettable Rough Draft Essa...
Unforgettable Rough Draft Essay Thatsnotus.pdfUnforgettable Rough Draft Essa...
 

More from Centre for Strategic Cyberspace + Security Science (8)

CSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICESCSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICES
 
CSCSS Report: Game Netorks, Terrorism and Hacking
CSCSS Report:  Game Netorks, Terrorism and HackingCSCSS Report:  Game Netorks, Terrorism and Hacking
CSCSS Report: Game Netorks, Terrorism and Hacking
 
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS OverviewCentre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
 
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
CSCSS Case Study - Peoples Republic of China- Anatomy of a Breach
CSCSS Case Study - Peoples Republic of China- Anatomy of a BreachCSCSS Case Study - Peoples Republic of China- Anatomy of a Breach
CSCSS Case Study - Peoples Republic of China- Anatomy of a Breach
 

Recently uploaded

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

CSCSS Defence Intelligence Group Commentary China Hacking

  • 1. 2 It’s About Culture Cyber + Espionage A Commentary on Chinese Hacking It Will Get Worse Before It Gets Better · David Swan, Executive Vice President, CSCSS Defence and Intelligence Group CSCSS / Centre for Strategic Cyberspace + Security Science 1 There are a lot of people who are sick of news stories about Chinese Hackers. They don't believe that there is any impact on their world. The impact of hacking in general, and the Chinese hacking in particular, has reached everyday life. Worse, the effects will get worse before they get better. The scope of Chinese activity ranges from stealing ideas from business startups to stealing plans for jet fighters. Coca-Cola admitted they were hacked – it cost them the opportunity to purchase a Chinese beverage company. An expert Chinese Hacker was identified – as a professor at a Military University. Most recently, at least 140 computer attacks against American companies have been traced to a Chinese Army Unit. Companies in Silicon Valley, Wall Street, Bay Street, and rural Saskatchewan have been hit by Chinese Hackers. 2 The Chinese are one of the oldest cultures on earth. They have been attacked countless times, over thousands of years and often the attackers were successful. The result is a culture that is concerned about being attacked again. This is not about 'rational thought' but a deep cultural (genetic?) sense that there are many enemies who want to take what China has. The result is that the Chinese think differently at a basic level and therefore behave differently. When a western company competes with a Chinese company, they are competing against the company, plus all the families of those companies, plus all the extended relationships, plus a protective government, PLUS THE CULTURE which says that China MUST be protected. The result is like one person trying to play against an entire football team. The Chinese have stacked the odds in their favour.
  • 2. 3 Why Chinese Hacking Will Get Worse 1 What the Chinese have done is apply lessons from their Master Strategist Sun Tzu. Hacking to the Chinese is collecting information on the enemy ( us ), learning our strengths and weaknesses – and learning our plans. This is NOT business, this is the application of thousands of years of history and culture, and we are the target. The Chinese understand that in a global economy they are competing against the world. Thousands of years of Chinese history tells them that they WILL be attacked again and that they must be ready. Chinese Master Strategist Sun Tzu taught that in order to protect themselves they must know the plans of allies and enemies. The easiest way to get that information is hacking. The next issue is that the Chinese have not been “caught”. Most computer security operators don't have any Intelligence or forensic investigation training, so they stop at the end of the electronic trail. Even when the trail visibly leads to China, no one wants to lose ( or offend ) the business potential. The Chinese have never been punished for hacking. Over thousands of events, mere hundreds of attacks have been publicized and few reports have made the mainstream western media. Few people have any concept of how rampant the Chinese hacking efforts are, so the Chinese continue to get away with claiming they are victims. Bottom line: the Chinese have been taught they must collect all information on allies and enemies alike, hacking has produced superb results so far with no significant repercussions. The Chinese will continue to use hacking as an effective tool of choice. 2 Conclusion Any person or organization who believes that they can 'do business' with the Chinese is ignoring Chinese culture. Its not 'about the money' its not about business' and it never will be. Politicians who believe the Chinese will agree to treaties and conventions, or that diplomacy can resolve disputes, are ignoring Chinese history. Any person who believes that Chinese hacking has had no impact on their world has not been paying attention. CSCSS Defence Intelligence Group For a dedicated briefing by the CSCSS Defense Intelligence Group regarding National entities and espionage please contact us : · Washington D.C + 571.451.0312 · London, United Kingdom +44 2035141784 · North America +877.436.6746 · Middle East +800.653.407 · Australia +61 2 8003 7553 Email: defintel@cscss.org www.cscss.org/defence_intelligence.php The CSCSS Defence Intelligence Group through its CSCSS subsidiaries has aligned with defense, civilian and intelligence agencies providing specific defence intelligence support to mission-essential requirements at every stage of the program, product and business lifecycle. We deliver mission and technical expertise, delivery of intelligence products, and a commitment to client objectives and results at the strategic, operational and tactical Levels. We provide specialized defence intelligence expertise; services and solutions that help our clients address and achieve their missions, goals and objectives securely© Center for Strategic Cyberspace + Security Science