Join Free! | Login    
   Popular! Books, Stories, Articles, Poetry
Where Authors and Readers come together!


Featured Authors:  Arthur Jackson, iJ.S. Bradford, iSandi Schraut, iAnthony Dalton, iMichael Csizmadia, iM. Andrew Sprong, iJean-Pierre Gregoire, i

  Home > Action/Thriller > Articles Popular: Books, Stories, Articles, Poetry     

James Marinero

· + Follow Me
· Contact Me
· Books
· Articles
· News
· 4 Titles
· Save to My Library
· Share with Friends!
Member Since: Aug, 2011

James Marinero, click here to update your pages on AuthorsDen.

Featured Book
Rome, my sibling, my empress
by Albert Russo

ROME, MY SIBLING, MY EMPRESS This is my fourth photobook on Rome, after 'Italia Nostra', 'Expressive Romans' and 'Seven living Splendors'; this book includes poe..  
BookAds by Silver
Gold and Platinum Members

Chinese Cyberwar Oragnanistion
by James Marinero   
Rated "G" by the Author.
Last edited: Monday, August 08, 2011
Posted: Monday, August 08, 2011

  Print   Save    Follow    Share 

Recent articles by
James Marinero

Do Your Readers Suspend Belief?
           >> View all

An overview of the preparations China has made for cyberwar - the Golden Shield strategy, techniques and personnel.

Most developed countries are engaged in internet attacks - hacking the information systems of other countries. They are also testing weapons for cyber warfare – both offensive and defensive. In the early 1990’s, as part of its strategic objective of becoming a military, industrial and financial superpower and emerge from what was still in many respects (even under Chairman Mao) a mediaeval society, China instigated a series of programs, the results of which are making the news on a regular basis.

Deep Water Fishes

In the Chinese worldwide intelligence infrastructure organisation, the foundation of the military and economic/political intelligence ’vacuum cleaner’ as they call it is the so-called ‘deep water fishes’. The term goes back to 1983, and refers to the 10,000 or so agents that the country has in place in nearly two hundred cities across the world. China’s internet intelligence gathering and cyberwar operations are even more insidious and pervasive.

The Cyberwarrior Army

Under the direction of the then President Jiang Zemin, a vast army of so-called cyberwarriors was set up by General Dai Qingmin to engage in cyberwar. The cyberwarriors design spam, malware, distributed denial of service and viruses to penetrate and paralyse their enemy in a war situation. They also control the internet in China (and ultimately forced Google to pull out), and run the so-called  ‘Golden Shield’ program which monitors e-mails, chat and mobile phone SMS within its borders.

Current Attacks

Recently, there have been massive and well-coordinated cyberattackscyberassualts on commercial websites. Many observers believe that China is behind some of these attacks, though those in the Western intelligence services who know the truth are keeping their own counsel. Undoubtedly, there are experts in commercial computer security companies who also know the truth, but they will not ‘go public’ with their knowledge.

Weapons Testing

Certainly, any country which prepares for warfare of any kind has to test its weapons, and the Chinese are not the only culprits here. Cyberwarfare is underway right now, from simple intelligence gathering by hacking military and commercial databases, right through to offensive use for destructive purposes, including by Western governments.

Stuxnet and Iran

One such example of a software assault is – ‘malware’. Insidious, dangerous and highly effective, and illustrated very clearly by the Stuxnet worm. This is thought by some to have been developed jointly by Israel and the USA. The worm circulated freely on the web and apparently had multiple authors on several continents – the trail was designed to confuse and hard to trace back, but clearly false. Eventually, in 2010, Stuxnet found its way into the German company Siemens’s control programs for the gas centrifuges used in the Iranian uranium enrichment program. Many centrifuges spun out of control and about twenty percent were wrecked. This critical assault reputedly delayed the Iranian quest for a nuclear bomb by several years.

Truth is a Casualty

Wherever there was conflict in the 20th century, there was infowar (Winston Churchill said that ‘truth is the first casualty of war’), from misleading and false news broadcasts to propaganda leaflets dropped from planes. Now in the 21st century, wherever there is conflict there is cyberwar, and very probably, the Chinese army of cyberwarriors is the largest and most active force of its kind in the world.

(c) 2011 James Marinero

Web Site: James Marinero

Want to review or comment on this article?
Click here to login!

Need a FREE Reader Membership?
Click here for your Membership!

Popular Action/Thriller Articles
  1. Independence and Unity Balance as Qualit
  2. Narcissists, Social Media, and Porn
  3. An Open Letter to Warren Buffett
  4. A New Thriller Novella - Jailbait by Barba
  5. Justifiable Homicide
  6. Good Mourning, Knees
  7. Hidden Impact book review
  8. Great Speaks
  9. If You Don't Like How I Write, PLEASE DON'
  10. Fog From A Sailor's Perspective

Pacific Odyssey - Lane's Story by Michael Harrington

Pacific Odyssey - Lane's Story is something of a travelogue with a deal of adventure thrown in. Also, it is a multi-faceted love story. It is set in the Far East, somewhere around ..  
BookAds by Silver, Gold and Platinum Members

Severed Threads by Kaylin

From award-winning author, Kaylin McFarren, comes an action-adventure romance guaranteed to capture your imagination and leave you craving more. ..  
BookAds by Silver, Gold and Platinum Members

Authors alphabetically: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Featured Authors | New to AuthorsDen? | Add AuthorsDen to your Site
Share AD with your friends | Need Help? | About us

Problem with this page?   Report it to AuthorsDen
AuthorsDen, Inc. All rights reserved.