Read Return to Winter: Russia, China, and the New Cold War Against America Online
Authors: Douglas E. Schoen,Melik Kaylan
35
. Peter Foster, “China Stealth Fighter a ‘Masterpiece’ of Homegrown Technology,”
The Telegraph
, January 25, 2011,
http://www.telegraph.co.uk/news/worldnews/asia/china/8280707/China-stealth-fighter-a-masterpiece-of-homegrown-technology.html
.
36
. Dave Mujumdar, “J-20 a ‘Wake-Up Call,’ Former Intel Chief Says,”
Air Force Times
, February 13, 2011,
http://www.airforcetimes.com/news/2011/02/air-force-deptula-calls-j20-a-wake-up-call-021311w/
.
37
. Sibhan Gorman, August Cole, and Yochi Dreazen, “Computer Spies Breach Fighter-Jet Project,”
Wall Street Journal
, April 21, 2009,
http://online.wsj.com/article/SB124027491029837401.html
.
38
. Ibid.
39
. Ann Scott Tyson and Dana Hedgpeth, “Officials Say Hackers Didn’t Steal Critical Data About New Fighter Jet,”
Washington Post
, April 22, 2009,
http://www.washingtonpost.com/wp-dyn/content/article/2009/04/21/AR2009042103938.html
.
40
. Gorman, Cole, and Dreazen, “Computer Spies.”
41
. “Security Experts Admit China Stole Secret Fighter Jet Plans,”
The Australian
, May 12, 2012,
http://www.theaustralian.com.au/news/world/security-experts-admit-china-stole-secret-fighter-jet-plans/story-fnb64oi6-1226296400154
.
42
. Edward Wong, “Hacking U.S. Secrets, China Pushes for Drones,”
New York Times
, September 20, 2013,
http://www.nytimes.com/2013/09/21/world/asia/hacking-us-secrets-china-pushes-for-drones.html
.
43
. Ibid.
44
. Ibid.
45
. Rogin, “The Top 10 Chinese Cyber Attacks.”
46
. Ariana Eunjung Cha and Ellen Nakashima, “Google Attack Part of Vast Campaign,”
Washington Post
, January 14, 2010,
http://articles.washingtonpost.com/2010-01-14/news/36876544_1_cyber-intrusion-that-google-attributes-computer-attacks-china
.
47
. David E. Sanger and Nicole Perlroth, “Hackers From China Resume Attacks on U.S. Targets,”
New York Times
, May 19, 2013,
http://www.nytimes.com/2013/05/20/world/asia/chinese-hackers-resume-attacks-on-us-targets.html
.
48
. Nicole Perlroth, “Hackers in China Attacked The Times for Last 4 Months,”
New York Times
, January 30, 2013,
http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html
.
49
. David Barboza, “Billions in Hidden Riches for Family of Chinese Leader,”
New York Times
, October 25, 2012,
http://www.nytimes.com/2012/10/26/business/global/family-of-wen-jiabao-holds-a-hidden-fortune-in-china.html
.
50
. Perlroth, “Hackers in China Attacked The Times.”
51
. Andrew Wong, “US and China Accuse Each Other of Cyber Warfare,” RT, February 20, 2013,
http://rt.com/usa/cyber-china-war-unit-604/
.
52
. David E. Sanger, David Barboza, and Nicole Perlroth, “Chinese Army Unit Is Seen as Tied to Hacking Against U.S.,”
New York Times
, February 18, 2013,
http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
.
53
. Sanger and Perlroth, “Hackers From China Resume Attacks.”
54
. Fred Kaplan, “The Art of Cyber War,”
Slate
, February 20, 2013,
http://www.slate.com/articles/news_and_politics/war_stories/2013/02/chinese_military_cyberwarfare_how_would_beijing_threaten_the_united_states.single.html
.
55
. Adam Rawnsley, “Fishy Chips: Spies Want to Hack-Proof Circuits,”
Wired
, June 24, 2011,
http://www.wired.com/dangerroom/2011/06/chips-oy-spies-want-to-hack-proof-circuits/#more-49990
.
56
. Stephen Northcutt, “Security Laboratory: Methods of Attack Series: Logic Bombs, Trojan Horses, and Trap Doors,” SANS Technology Institute, May 2, 2007,
http://www.sans.edu/research/security-laboratory/article/log-bmb-trp-door
.
57
. Sebastian Anthony, “Rakshasa: The Hardware Backdoor That China Could Embed in Every Computer,”
ExtremeTech
, August 1, 2012,
http://www.extremetech.com/computing/133773-rakshasa-the-hardware-backdoor-that-china-could-embed-in-every-computer
.
58
. Steven Musil, “Experts Dispute the Threat Posed by Backdoor Found in Chinese Chip,” CNET, May 29, 2012,
http://news.cnet.com/8301-1009_3-57443293-83/experts-dispute-threat-posed-by-backdoor-found-in-chinese-chip/
.
59
. Mike Rodger and Dutch Ruppersberger, “Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE,” U.S. House of Representatives, October 8, 2012,
http://goo.gl/1ECJrn
.
60
. “The Company That Spooked the World,”
The Economist
, August 2, 2012,
http://www.economist.com/node/21559929
.
61
. Ibid.
62
. F. Michael Maloof, “China Tech Company Brags: We Hacked U.S. Telecoms,”
WND
, June 14, 2012,
http://www.wnd.com/2012/06/china-tech-company-admits-hacking-u-s-telecoms/
.
63
. Naomi Rovnick, “Are China’s Economic Ambitions the Reason Why Cyber-Attacks From China Are Rising?” Yahoo! Finance, January 24, 2013,
http://finance.yahoo.com/news/china-economic-ambitions-reason-why-054722424.html
.
64
. Clarke and Knake,
Cyber War
, 183.
65
. Ron Rosenbaum, “Richard Clarke on Who Was Behind the Stuxnet Attack,”
Smithsonian
, April 2012,
http://www.smithsonianmag.com/history/richard-clarke-on-who-was-behind-the-stuxnet-attack-160630516/
.
66
. Michael J. de la Merced, “Accusations of Chinese Hacking in Coke’s Failed Big Deal,”
New York Times/Dealbook
, February 19, 2013,
http://dealbook.nytimes.com/2013/02/19/accusations-of-hacking-in-cokes-failed-big-deal/
.
67
. Sanger, Barboza, and Perlroth, “Chinese Army Is Seen as Tied to Hacking.”
68
. Liat Clark, “Eric Schmidt: Chinese Hacking Culture Will Leave US Disadvantaged Economically,”
Wired
, February 4, 2013,
http://www.wired.co.uk/news/archive/2013-02/04/schmidt-china-hacking
.
69
. Cha and Nakashima, “Google Attack Part of Vast Campaign.”
70
. David Goldman, “Google Stops Censoring in China,” CNN Money, March 22, 2010,
http://money.cnn.com/2010/03/22/technology/google_china/index.htm
.
71
. David Goldman, “Massive Gmail Phishing Attack Hits Top U.S. Officials,” CNN Money, June 2, 2011,
http://money.cnn.com/2011/06/01/technology/gmail_hack/
.
72
. Hibah Yousef, “Google May Leave China After Cyber Attack,” CNN Money, January 13, 2010,
http://money.cnn.com/2010/01/12/technology/Google_China/index.htm
.
73
. Rogin, “The Top 10 Chinese Cyber Attacks.”
74
. Steven Lee Myers, “Cyberattack on Estonia Stirs Fear of ‘Virtual War,’”
New York Times
, May 18, 2007,
http://www.nytimes.com/2007/05/18/world/europe/18iht-estonia.4.5774234.html
.
75
. Ibid.
76
. Ibid.
77
. John Markoff, “Before the Gunfire, Cyberattacks,”
New York Times
, August 12, 2008,
http://www.nytimes.com/2008/08/13/technology/13cyber.html
.
78
. Matthew J. Schwartz, “Operation Red October Attackers Wielded Spear Phishing,”
Information Week
, January 18, 2013,
http://www.informationweek.com/attacks/operation-red-october-attackers-wielded-spear-phishing/d/d-id/1108272
.
79
. Ibid.
80
. Ibid.
81
. John Reed, “Hunting Red October: Who Done It?”
Foreign Policy
, January 17, 2013,
http://killerapps.foreignpolicy.com/posts/2013/01/17/hunting_red_october_who_done_it
.
82
. Mark Clayton, “‘Project Blitzkrieg’: Are Russian Cybercriminals About to Invade US Banks?”
Christian Science Monitor
, December 13, 2012,
http://www.csmonitor.com/USA/2012/1213/Project-Blitzkrieg-Are-Russian-cybercriminals-about-to-invade-US-banks
.
83
. Pam Benson, “Looming Cyber Attack Threatens Major Banks,”
Security Clearance
(blog), CNN, December 13, 2012,
http://security.blogs.cnn.com/2012/12/13/firm-cyberattack-threatens-major-banks/
.
84
. Clayton, “‘Project Blitzkrieg.’”
85
. Ibid.
86
. “International Collegiate Programming Contest, Results 2013,”
http://icpc.baylor.edu/worldfinals/results
.
87
. “U.S. Defense Secrets Stolen in Cyber Attacks,”
Washington Post
, Post TV, July 14, 2011,
http://www.washingtonpost.com/national/national-security/us-defense-secrets-stolen-in-cyber-attacks/2011/07/14/gIQAgjV2EI_video.html
.
88
. Clarke and Knake,
Cyber War
, 43.
89
. Ibid.
90
. Loren Thompson, “U.S. Headed for Cyberwar Showdown With China in 2012,”
Forbes
, December 22, 2011,
http://www.forbes.com/sites/lorenthompson/2011/12/22/u-s-headed-for-cyberwar-showdown-with-china-in-2012/
.
91
. Markoff, “Before the Gunfire, Cyberattacks.”
92
. Kaplan, “The Art of Cyber War.”
93
. David E. Sanger, “In Cyberspace, New Cold War,”
New York Times
, February 24, 2013,
http://www.nytimes.com/2013/02/25/world/asia/us-confronts-cyber-cold-war-with-china.html
.
CHAPTER 4: MILITARY SUPREMACY
1
. Hannah Beech, “How China Sees the World,”
Time
, June 17, 2013,
http://www.time.com/time/magazine/article/0,9171,2145062,00.html
.
2
. Vladimir Putin, opening speech at a meeting with the command personnel of the Russian Armed Forces, October 2, 2003, via Isabelle Falcon, “The Modernization of the Russian Military: The Ambitions & Ambiguities of Vladimir Putin” (paper, Conflict Studies Research Center, August 2005),
http://www.da.mod.uk/colleges/arag/document-listings/russian/05(19E)-IF.pdf/view
.
3
. Alan Caruba, “A Military in Decline,”
Warning Signs
(blog), August 3, 2013,
http://factsnotfantasy.blogspot.com/2013/08/a-military-in-decline.html
.
4
. Newt Gingrich, “Losing the War,” Gingrich Productions, August 4, 2013,
http://www.gingrichproductions.com/2013/08/losing-the-war-2/
.
5
. Jane Perlez, “China and Russia, in a Display of Unity, Hold Naval Exercises,”
New York Times
, July 10, 2013,
http://www.nytimes.com/2013/07/11/world/asia/china-and-russia-in-a-display-of-unity-hold-naval-exercises.html
.
6
. “China, Russia Conclude Joint Naval Drills,” Xinhua, July 11, 2013,
http://news.xinhuanet.com/english/china/2013-07/11/c_132533183.htm
.
7
. Perlez, “China and Russia, in a Display of Unity.”
8
. Ibid.
9
. Ibid.
10
. Ibid.
11
. Ronald O’Rourke, “China Naval Modernization: Implications for U.S. Navy Capabilities—Background and Issues for Congress” (report for Congress, Congressional Research Service, September 5, 2013),
http://www.fas.org/sgp/crs/row/RL33153.pdf
.
12
. Kimberly A. Strassel, “The Obama Jobs Sequester,”
Wall Street Journal
, August 2, 2012,
http://online.wsj.com/article/SB10000872396390444320704577565483190017286.html
.
13
. “Hagel Warns Congress to Stop Defense Budget Cuts,”
U.S. News and World Report
, July 10, 2013,
http://www.usnews.com/news/politics/articles/2013/07/10/hagel-warns-congress-to-stop-defense-budget-cuts
.
14
. “Bearing the Burden of Global Leadership: Does U.S. Leadership Have a Future?” Council on Foreign Relations panel, April 23, 2014,
http://www.cfr.org/united-states/does-us-leadership-have-future/p32854
.
15
. Christopher J. Griffin, “FPI Analysis: No Way to Run the Defense Department” (report, Foreign Policy Initiative, August 1, 2013),
http://www.foreignpolicyi.org/content/fpi-analysis-no-way-run-defense-department
.
16
. Jacob Siegel, “The Government Shutdown’s Hidden Cost to the U.S. Military,”
Daily Beast
, October 7, 2013,
http://www.thedailybeast.com/the-hero-project/articles/2013/10/07/the-government-shutdown-s-hidden-cost-to-the-u-s-military.html
.
17
. Keith B. Richburg, “China Military Spending to Top $100 Billion, Alarming Neighbors,”
Washington Post
, March 4, 2012,
http://www.washingtonpost.com/world/china-military-spending-to-top-100-billion-this-year/2012/03/04/gIQAJRnypR_story.html
.
18
. “Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2012” (report, U.S. Department of Defense, Office of the Secretary of Defense, May 2012), 6,
http://www.defense.gov/pubs/pdfs/2012_CMPR_Final.pdf.
19
. Ibid.
20
. O’Rourke, “China Naval Modernization.”
21
. “Annual Report to Congress, Military and Security Developments Involving the People’s Republic of China 2010” (report, U.S. Department of Defense, Office of the Secretary of Defense, May 2010), 42,
http://www.defense.gov/pubs/pdfs/2010_cmpr_final.pdf
.
22
. Figures from the SIPRI Military Expenditure Database, the Stockholm International Peace Research Institute,
http://www.sipri.org/research/armaments/milex/milex_database
.
23
. Bill Gertz, “China Conducts First Test of New Ultra-High-Speed Missile Vehicle,”
Washington Free Beacon
, January 13, 2014,
http://freebeacon.com/china-conducts-first-test-of-new-ultra-high-speed-missile-vehicle/
.