SlideShare a Scribd company logo
2
It’s About Culture
Cyber + Espionage
A Commentary on Chinese Hacking
It Will Get Worse Before It Gets Better
· David Swan, Executive Vice President, CSCSS Defence and Intelligence Group
CSCSS / Centre for Strategic Cyberspace + Security Science
1
There are a lot of people who are
sick of news stories about Chinese
Hackers. They don't believe that
there is any impact on their world.
The impact of hacking in general, and the
Chinese hacking in particular, has reached
everyday life. Worse, the effects will get
worse before they get better.
The scope of Chinese activity ranges from
stealing ideas from business startups to
stealing plans for jet fighters. Coca-Cola
admitted they were hacked – it cost them the
opportunity to purchase a Chinese beverage
company. An expert Chinese Hacker was
identified – as a professor at a Military
University. Most recently, at least 140
computer attacks against American
companies have been traced to a Chinese
Army Unit. Companies in Silicon Valley, Wall
Street, Bay Street, and rural Saskatchewan
have been hit by Chinese Hackers.
2
The Chinese are one of the oldest cultures on
earth. They have been attacked countless
times, over thousands of years and often the
attackers were successful. The result is a
culture that is concerned about being
attacked again.
This is not about 'rational thought' but a deep
cultural (genetic?) sense that there are many
enemies who want to take what China has.
The result is that the Chinese think differently
at a basic level and therefore behave
differently. When a western company
competes with a Chinese company, they are
competing against the company, plus all the
families of those companies, plus all the
extended relationships, plus a protective
government, PLUS THE CULTURE which
says that China MUST be protected. The
result is like one person trying to play against
an entire football team. The Chinese have
stacked the odds in their favour.
3
Why Chinese Hacking
Will Get Worse
1
What the Chinese have done is apply lessons
from their Master Strategist Sun Tzu. Hacking
to the Chinese is collecting information on the
enemy ( us ), learning our strengths and
weaknesses – and learning our plans. This is
NOT business, this is the application of
thousands of years of history and culture, and
we are the target.
The Chinese understand that in a global
economy they are competing against the
world. Thousands of years of Chinese history
tells them that they WILL be attacked again
and that they must be ready. Chinese Master
Strategist Sun Tzu taught that in order to
protect themselves they must know the plans
of allies and enemies. The easiest way to get
that information is hacking.
The next issue is that the Chinese have not
been “caught”. Most computer security
operators don't have any Intelligence or
forensic investigation training, so they stop at
the end of the electronic trail. Even when the
trail visibly leads to China, no one wants to
lose ( or offend ) the business potential.
The Chinese have never been punished for
hacking. Over thousands of events, mere
hundreds of attacks have been publicized
and few reports have made the mainstream
western media. Few people have any
concept of how rampant the Chinese hacking
efforts are, so the Chinese continue to get
away with claiming they are victims.
Bottom line: the Chinese have been taught
they must collect all information on allies and
enemies alike, hacking has produced superb
results so far with no significant
repercussions. The Chinese will continue to
use hacking as an effective tool of choice.
2
Conclusion
Any person or organization who believes
that they can 'do business' with the Chinese
is ignoring Chinese culture. Its not 'about the
money' its not about business' and it never
will be. Politicians who believe the Chinese
will agree to treaties and conventions, or that
diplomacy can resolve disputes, are ignoring
Chinese history. Any person who believes
that Chinese hacking has had no impact on
their world has not been paying attention.
CSCSS Defence Intelligence Group
For a dedicated briefing by the CSCSS
Defense Intelligence Group regarding
National entities and espionage please
contact us :
· Washington D.C + 571.451.0312
· London, United Kingdom +44 2035141784
· North America +877.436.6746
· Middle East +800.653.407
· Australia +61 2 8003 7553
Email: defintel@cscss.org
www.cscss.org/defence_intelligence.php
The CSCSS Defence Intelligence Group
through its CSCSS subsidiaries has aligned
with defense, civilian and intelligence
agencies providing specific defence
intelligence support to mission-essential
requirements at every stage of the program,
product and business lifecycle. We deliver
mission and technical expertise, delivery of
intelligence products, and a commitment to
client objectives and results at the strategic,
operational and tactical Levels. We
provide specialized defence intelligence
expertise; services and solutions that help
our clients address and achieve their
missions, goals and objectives securely© Center for Strategic Cyberspace + Security Science

More Related Content

Viewers also liked

China india defence expenditure trends – The Gap is growing
China india defence expenditure trends – The Gap is growing China india defence expenditure trends – The Gap is growing
China india defence expenditure trends – The Gap is growing
Security Risks Asia
 
Manohar Parikkar MOD
Manohar Parikkar  MODManohar Parikkar  MOD
Manohar Parikkar MOD
Ajit K Nair
 
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)
infosanitasi
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
Radware
 
Espionage
EspionageEspionage
Espionage
Tom Clowers
 
PAKISTAN ARMED FORCES
PAKISTAN ARMED FORCESPAKISTAN ARMED FORCES
PAKISTAN ARMED FORCES
AAMIR CHAUDHARY
 
DEFENSE SYSTEM OF PAKISTAN.
DEFENSE SYSTEM OF PAKISTAN.DEFENSE SYSTEM OF PAKISTAN.
DEFENSE SYSTEM OF PAKISTAN.
Muhammad UL Islam
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
IntelCollab.com
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
Nora A. Rahim
 
Defence of pakistan
Defence of pakistanDefence of pakistan
Defence of pakistan
Riaz Gul Sheikh
 

Viewers also liked (10)

China india defence expenditure trends – The Gap is growing
China india defence expenditure trends – The Gap is growing China india defence expenditure trends – The Gap is growing
China india defence expenditure trends – The Gap is growing
 
Manohar Parikkar MOD
Manohar Parikkar  MODManohar Parikkar  MOD
Manohar Parikkar MOD
 
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)
Operasi dan pemeliharaan unit Instalasi Pengolahan Lumpur Tinja (IPLT)
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
Espionage
EspionageEspionage
Espionage
 
PAKISTAN ARMED FORCES
PAKISTAN ARMED FORCESPAKISTAN ARMED FORCES
PAKISTAN ARMED FORCES
 
DEFENSE SYSTEM OF PAKISTAN.
DEFENSE SYSTEM OF PAKISTAN.DEFENSE SYSTEM OF PAKISTAN.
DEFENSE SYSTEM OF PAKISTAN.
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Defence of pakistan
Defence of pakistanDefence of pakistan
Defence of pakistan
 

Similar to CSCSS Defence Intelligence Group Commentary China Hacking

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
Brett L. Scott
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Dr. Lydia Kostopoulos
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
Dharani Adusumalli
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
Kate Neal
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
Christina Ramirez
 
52 china ruthlessly besieging america
52 china ruthlessly besieging america52 china ruthlessly besieging america
52 china ruthlessly besieging america
Gerald Furnkranz
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
Felipe Prado
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
Kati Mccarthy
 
The China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith KrachThe China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith Krach
Keith Krach
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Esam Abulkhirat
 
2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future
Robert David Steele Vivas
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.ppt
Johnny Schaefer
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
oreo10
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
Nicole Fields
 
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyRand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Internet Law Center
 
Cracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media CommunicationsCracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media Communications
Scott Rickard
 
Unforgettable Rough Draft Essay Thatsnotus.pdfUnforgettable Rough Draft Essa...
Unforgettable Rough Draft Essay  Thatsnotus.pdfUnforgettable Rough Draft Essa...Unforgettable Rough Draft Essay  Thatsnotus.pdfUnforgettable Rough Draft Essa...
Unforgettable Rough Draft Essay Thatsnotus.pdfUnforgettable Rough Draft Essa...
Elizabeth Kennedy
 

Similar to CSCSS Defence Intelligence Group Commentary China Hacking (18)

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
52 china ruthlessly besieging america
52 china ruthlessly besieging america52 china ruthlessly besieging america
52 china ruthlessly besieging america
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
The China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith KrachThe China Challenge: Senate Commerce Committee, Keith Krach
The China Challenge: Senate Commerce Committee, Keith Krach
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.ppt
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyRand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
 
Cracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media CommunicationsCracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media Communications
 
Unforgettable Rough Draft Essay Thatsnotus.pdfUnforgettable Rough Draft Essa...
Unforgettable Rough Draft Essay  Thatsnotus.pdfUnforgettable Rough Draft Essa...Unforgettable Rough Draft Essay  Thatsnotus.pdfUnforgettable Rough Draft Essa...
Unforgettable Rough Draft Essay Thatsnotus.pdfUnforgettable Rough Draft Essa...
 

More from Centre for Strategic Cyberspace + Security Science

CSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICESCSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICES
Centre for Strategic Cyberspace + Security Science
 
CSCSS Report: Game Netorks, Terrorism and Hacking
CSCSS Report:  Game Netorks, Terrorism and HackingCSCSS Report:  Game Netorks, Terrorism and Hacking
CSCSS Report: Game Netorks, Terrorism and Hacking
Centre for Strategic Cyberspace + Security Science
 
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS OverviewCentre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science
 
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
Centre for Strategic Cyberspace + Security Science
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
Centre for Strategic Cyberspace + Security Science
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
Centre for Strategic Cyberspace + Security Science
 
CSCSS Case Study - Peoples Republic of China- Anatomy of a Breach
CSCSS Case Study - Peoples Republic of China- Anatomy of a BreachCSCSS Case Study - Peoples Republic of China- Anatomy of a Breach
CSCSS Case Study - Peoples Republic of China- Anatomy of a Breach
Centre for Strategic Cyberspace + Security Science
 

More from Centre for Strategic Cyberspace + Security Science (8)

CSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICESCSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICES
 
CSCSS Report: Game Netorks, Terrorism and Hacking
CSCSS Report:  Game Netorks, Terrorism and HackingCSCSS Report:  Game Netorks, Terrorism and Hacking
CSCSS Report: Game Netorks, Terrorism and Hacking
 
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS OverviewCentre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
 
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
CSCSS Case Study - Peoples Republic of China- Anatomy of a Breach
CSCSS Case Study - Peoples Republic of China- Anatomy of a BreachCSCSS Case Study - Peoples Republic of China- Anatomy of a Breach
CSCSS Case Study - Peoples Republic of China- Anatomy of a Breach
 

Recently uploaded

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 

Recently uploaded (20)

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 

CSCSS Defence Intelligence Group Commentary China Hacking

  • 1. 2 It’s About Culture Cyber + Espionage A Commentary on Chinese Hacking It Will Get Worse Before It Gets Better · David Swan, Executive Vice President, CSCSS Defence and Intelligence Group CSCSS / Centre for Strategic Cyberspace + Security Science 1 There are a lot of people who are sick of news stories about Chinese Hackers. They don't believe that there is any impact on their world. The impact of hacking in general, and the Chinese hacking in particular, has reached everyday life. Worse, the effects will get worse before they get better. The scope of Chinese activity ranges from stealing ideas from business startups to stealing plans for jet fighters. Coca-Cola admitted they were hacked – it cost them the opportunity to purchase a Chinese beverage company. An expert Chinese Hacker was identified – as a professor at a Military University. Most recently, at least 140 computer attacks against American companies have been traced to a Chinese Army Unit. Companies in Silicon Valley, Wall Street, Bay Street, and rural Saskatchewan have been hit by Chinese Hackers. 2 The Chinese are one of the oldest cultures on earth. They have been attacked countless times, over thousands of years and often the attackers were successful. The result is a culture that is concerned about being attacked again. This is not about 'rational thought' but a deep cultural (genetic?) sense that there are many enemies who want to take what China has. The result is that the Chinese think differently at a basic level and therefore behave differently. When a western company competes with a Chinese company, they are competing against the company, plus all the families of those companies, plus all the extended relationships, plus a protective government, PLUS THE CULTURE which says that China MUST be protected. The result is like one person trying to play against an entire football team. The Chinese have stacked the odds in their favour.
  • 2. 3 Why Chinese Hacking Will Get Worse 1 What the Chinese have done is apply lessons from their Master Strategist Sun Tzu. Hacking to the Chinese is collecting information on the enemy ( us ), learning our strengths and weaknesses – and learning our plans. This is NOT business, this is the application of thousands of years of history and culture, and we are the target. The Chinese understand that in a global economy they are competing against the world. Thousands of years of Chinese history tells them that they WILL be attacked again and that they must be ready. Chinese Master Strategist Sun Tzu taught that in order to protect themselves they must know the plans of allies and enemies. The easiest way to get that information is hacking. The next issue is that the Chinese have not been “caught”. Most computer security operators don't have any Intelligence or forensic investigation training, so they stop at the end of the electronic trail. Even when the trail visibly leads to China, no one wants to lose ( or offend ) the business potential. The Chinese have never been punished for hacking. Over thousands of events, mere hundreds of attacks have been publicized and few reports have made the mainstream western media. Few people have any concept of how rampant the Chinese hacking efforts are, so the Chinese continue to get away with claiming they are victims. Bottom line: the Chinese have been taught they must collect all information on allies and enemies alike, hacking has produced superb results so far with no significant repercussions. The Chinese will continue to use hacking as an effective tool of choice. 2 Conclusion Any person or organization who believes that they can 'do business' with the Chinese is ignoring Chinese culture. Its not 'about the money' its not about business' and it never will be. Politicians who believe the Chinese will agree to treaties and conventions, or that diplomacy can resolve disputes, are ignoring Chinese history. Any person who believes that Chinese hacking has had no impact on their world has not been paying attention. CSCSS Defence Intelligence Group For a dedicated briefing by the CSCSS Defense Intelligence Group regarding National entities and espionage please contact us : · Washington D.C + 571.451.0312 · London, United Kingdom +44 2035141784 · North America +877.436.6746 · Middle East +800.653.407 · Australia +61 2 8003 7553 Email: defintel@cscss.org www.cscss.org/defence_intelligence.php The CSCSS Defence Intelligence Group through its CSCSS subsidiaries has aligned with defense, civilian and intelligence agencies providing specific defence intelligence support to mission-essential requirements at every stage of the program, product and business lifecycle. We deliver mission and technical expertise, delivery of intelligence products, and a commitment to client objectives and results at the strategic, operational and tactical Levels. We provide specialized defence intelligence expertise; services and solutions that help our clients address and achieve their missions, goals and objectives securely© Center for Strategic Cyberspace + Security Science