- ISRAEL: Not A Good Sign
- SUPPORT: MOUT For The 21st Century
- ATTRITION: Internet Geeks Have More Choices
- ON POINT: Spy Novels and Whodunnit: North Korea's Criminal Reality Is Intolerable
- PHOTO: Over The Philippine Sea
- BOOK REVIEW: The Campaigns of Sargon II, King of Assyria, 721-705 B.C. (Campaigns and Commanders Series)
- IRAN: Pride, Prejudice and Persecution
- AIR DEFENSE: No Quick Fix For SHORAD
- SPECIAL OPERATIONS: Benghazi Aftermath
- PHOTO: Birds Of A Feather Flock Together
- KOREA: Purging The Dynasty
- INFANTRY: Tech Takes its Toll
- INFORMATION WARFARE: HVIs Wanted Dead Or Alive
- CIC: The Duel of the Two Men, the Two Horses, and the Two Dogs
- PHOTO: Old And New Friends
- BOOK REVIEW: Franklin D. Roosevelt. Vol. II, The War Years, 1939-1945
- BOOK REVIEW: Franklin D. Roosevel, Vol I, Road to the New Deal, 1882-1939
A recent worldwide survey of Internet based hacking attacks discovered that about a fifth of them are directed at stealing data. That’s espionage and over 90 percent of these attacks are from China. Most of the criminal Internet activity is still all about making money (via spam or outright theft).
What is interesting about the data stealing activity is that more and more of it is counter-intelligence (attacking enemy intelligence collecting) work. For example, more and more Chinese hacking is an effort to find out how Western media is finding out details of corruption inside China. Western media has published some very embarrassing data about corruption by the families of senior Chinese leaders. Chinese hackers are trying to find out who the sources in China are, so they can be silenced. The Chinese are also trying to find information about informants working for Western intelligence agencies.
While military organizations are usually very careful about guarding the identities of these informants, if you can grab enough lower-level communications within military intelligence agencies you can probably figure out who the sources within China are. The Chinese also use these techniques to discover key people in Western corporations who are developing new products or markets for existing products. Chinese firms have a big advantage knowing this sort of thing. It’s all about information and who has it. If you know what the enemy knows and they don’t know what you are all about you have a major advantage in war and peace.