超限战 – “Warfare without Bounds”; China’s Hacking of the US February 24, 2020
Posted by Chris Mark in cyberespionage, cybersecurity, Politics, weapons and tactics.Tags: AT&T, china, Chris Mark, cybercrime, espionage, hacking, PLA, Unlimited, Unrestricted, Warfare
add a comment
“Pleased to meet you…hope you guessed my name…But what’s puzzling you is the nature of my game.”
– The Rolling Stones; Sympathy for the Devil
UPDATE: On Feb 10, 2020 The US Government charged 4 Chinese Military Officers with hacking in the 2017 Equifax breach. On January 28th, the FBI arrested a Harvard professor of lying about ties to a Chinese recruitment effort and receiving payment from the US Government. The attacks, subterfuge and efforts continue against the US. Why? Read the original post form 2016 and learn about Unlimited Warfare.
Original post from 2016: More recently, the With the recent US Government’s acknowledgement of China’s hacking of numerous government websites and networks, many are likely wondering why China would have an interest in stealing employee data? To answer this question, we need to look back at the 1991 Gulf War. You can read my 2013 Article (WorldCyberwar) in the Counter Terrorist Magazine on this subject.
In 1991, a coalition led by the United States invaded Iraq in defense of Kuwait. At the time Iraq had the 5th largest standing army in the world. The US led coalition defeated the Iraqi army in resounding fashion in only 96 hours. For those in the United States the victory was impressive but the average American civilian did not have an appreciation for how this victory was accomplished.
The Gulf War was the first real use of what is known as C4I. In short, C4I is an acronym for Command, Control, Communications, Computers, and Intelligence. The Gulf War was the first use of a new technology known as Global Positioning Systems (GPS). The Battle of Medina Ridge was a decisive tank battle in Iraq fought on February 26, 1991 and the first to use GPS. In this 40 minute battle, the US 1st Armored Division fought the 2nd Brigade of the Iraqi Republican Guard and won decisively. While the US lost 4 tanks and had 2 people killed, the Iraqis suffered a loss of 186 tanks, 127 Infantry Fighting Vehicles and 839 soldiers captured. The Chinese watched the Gulf War closely and came away with an understanding that a conventional ‘linear’ war against the United States was unwinnable.
After the Gulf War the Chinese People’s Liberation Army tasked two PLA colonels (Qiao Liang and Wang Xiangsui) with redefining the concept of warfare. From this effort came a new model of Warfare that is published in the book “Unrestricted Warfare” or “Warfare without Bounds”. Unrestricted Warfare is just what it sound like. The idea that ‘pseudo-wars’ can be fought against an enemy. Information warfare, PR efforts and other tactics are used to undermine and enemy without engaging in kinetic, linear battle. Below is a quote from the book:
“If we acknowledge that the new principles of war are no longer “using armed force to compel the enemy to submit to one’s will,” but rather are “using all means including armed force and non-armed force, military and non-military, lethal and non-lethal means to compel the enemy to accept one’s interests.”
“As we see it, a single man-made stock-market crash, a single computer virus invasion, or a single rumor or scandal that results in a fluctuation in the enemy country’s exchange rates or exposes the leaders of an enemy country on the Internet, all can be included in the ranks of new-concept weapons.”
It further stated: “… a single rumor or scandal that results in fluctuation in the enemy country’s exchange rates…can be included in the ranks of new concept weapons.”
On April 15, 2011, the US Congressional Subcommittee on Oversight and Investigations conducted a hearing on Chinese cyber-espionage. The hearing revealed the US government’s awareness of Chinese cyberattacks. In describing the situation in his opening remarks, subcommittee chairperman Dana Rohrbacher* astutely stated:
“[The]United States is under attack.”
“The Communist Chinese Government has defined us as the enemy. It is buying, building and stealing whatever it takes to contain and destroy us. Again, the Chinese Government has defined us as the enemy.”
Given the Chinese perspective on Unlimited Warfare, it becomes much more clear that what we are seeing with the compromises are examples of ‘pseudo wars’ being fought by the Chinese. It will be interesting to see how or if the US responds.
*thank you to the reader who corrected my referencing Mr. Rohrbacher as a female. My apologies to Chairman Rohrbacher!
Chris Mark Speaking at OpenEdge 2016 Partner Advisory Board May 27, 2016
Posted by Chris Mark in cyberespionage, cybersecurity, Uncategorized.Tags: Chris Mark, cybersecurity, dark web, data breach, Global Payments, KeyNote, OpenEdge
add a comment
I am honored to have been asked to present as the keynote speaker at the OpenEdge 2016 Partner Advisory Board on June 6th, in Chicago, Il. I will be speaking on the state of cybercrime today and provide a live demonstration of the Dark Web as well as a description of how cyber thieves steal and use payment card data. It should be a fun event for everyone! If you are an OpenEdge Partner please consider attending!
“The United States is Under Attack” – CyberWar Article May 23, 2016
Posted by Chris Mark in cyberespionage, cybersecurity, Uncategorized.Tags: Breach, china, cyber, espionage, hack, Intellectual Property, IP Theft
add a comment
The title was a comment made in 2011 by the US House of Representatives.
In cleaning out my house for an impending move I found a copy of The Counter Terorist Magazine for which I had written an article in 2013 titled “CyberWar”.While the article is 3 years old, it still provides some valuable information and valuable lessons on the current state of Cyber War. The US Congress has has several sessions and working groups to discuss “The Chinese Problem” related to cyber espionage and Cyber War. You can learn more by reading my article!
Update on Blogging and New Articles in TransactionWorld March 8, 2013
Posted by Chris Mark in cyberespionage, cybersecurity, Industry News.Tags: AT&T, Chris Mark, cyber security, data breach, Heather Mark, Network Exchange Blog, PCI, PCI DSS, requirements
add a comment
I want to apologize for not blogging as frequently. My new job has me hopping at the moment and I am writing extensively for AT&T’s Networking Exchange Blog. You can check out my blog posts at AT&T’s Networking Exchange Blog . In addition to my own articles, there are a number of other valable posts from other contributors. Finally, Heather Mark and I both have articles in the March edition of TransactionWorld Magazine. You can read Heather’s article here and Chris’ article here.
Chris Mark’s Article in “The Counter Terrorist Magazine” January 28, 2013
Posted by Chris Mark in cyberespionage, cybersecurity.Tags: china, Chris Mark, cyber espionage, cybersecurity, Duqu, Flame, security, The Counter Terrorist, Unlimted warfare
add a comment
I received my copy of February/March 2013 International edition of The Counter Terrorist Magazine and imagine my surprise when I am the cover article! I have written for a number of publications but I have to say my favorite is The Counter Terrorist. It is a great periodical for anyone interested in World affairs, Terrorism, and Counter Terrorism. My article is titled “World Cyber War”. In the article I talk about the differences in the perspectives of war between the East and the West, as well as provide examples of how cyber operations have already been used to further national interests. China is highlighted for their interpretations of war and warfare in “Unlimited War”, as well as Russia, and a few others. Overall, I think it is one of my better articles. To read The Counter Terrorist, you must subscribe either online or in print. Check out…The Counter Terrorist Magazine.