Return to Winter: Russia, China, and the New Cold War Against America (48 page)

BOOK: Return to Winter: Russia, China, and the New Cold War Against America
11.04Mb size Format: txt, pdf, ePub

35
. Peter Foster, “China Stealth Fighter a ‘Masterpiece’ of Homegrown Technology,”
The Telegraph
, January 25, 2011,
http://www.telegraph.co.uk/news/worldnews/asia/china/8280707/China-stealth-fighter-a-masterpiece-of-homegrown-technology.html
.

36
. Dave Mujumdar, “J-20 a ‘Wake-Up Call,’ Former Intel Chief Says,”
Air Force Times
, February 13, 2011,
http://www.airforcetimes.com/news/2011/02/air-force-deptula-calls-j20-a-wake-up-call-021311w/
.

37
. Sibhan Gorman, August Cole, and Yochi Dreazen, “Computer Spies Breach Fighter-Jet Project,”
Wall Street Journal
, April 21, 2009,
http://online.wsj.com/article/SB124027491029837401.html
.

38
. Ibid.

39
. Ann Scott Tyson and Dana Hedgpeth, “Officials Say Hackers Didn’t Steal Critical Data About New Fighter Jet,”
Washington Post
, April 22, 2009,
http://www.washingtonpost.com/wp-dyn/content/article/2009/04/21/AR2009042103938.html
.

40
. Gorman, Cole, and Dreazen, “Computer Spies.”

41
. “Security Experts Admit China Stole Secret Fighter Jet Plans,”
The Australian
, May 12, 2012,
http://www.theaustralian.com.au/news/world/security-experts-admit-china-stole-secret-fighter-jet-plans/story-fnb64oi6-1226296400154
.

42
. Edward Wong, “Hacking U.S. Secrets, China Pushes for Drones,”
New York Times
, September 20, 2013,
http://www.nytimes.com/2013/09/21/world/asia/hacking-us-secrets-china-pushes-for-drones.html
.

43
. Ibid.

44
. Ibid.

45
. Rogin, “The Top 10 Chinese Cyber Attacks.”

46
. Ariana Eunjung Cha and Ellen Nakashima, “Google Attack Part of Vast Campaign,”
Washington Post
, January 14, 2010,
http://articles.washingtonpost.com/2010-01-14/news/36876544_1_cyber-intrusion-that-google-attributes-computer-attacks-china
.

47
. David E. Sanger and Nicole Perlroth, “Hackers From China Resume Attacks on U.S. Targets,”
New York Times
, May 19, 2013,
http://www.nytimes.com/2013/05/20/world/asia/chinese-hackers-resume-attacks-on-us-targets.html
.

48
. Nicole Perlroth, “Hackers in China Attacked The Times for Last 4 Months,”
New York Times
, January 30, 2013,
http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html
.

49
. David Barboza, “Billions in Hidden Riches for Family of Chinese Leader,”
New York Times
, October 25, 2012,
http://www.nytimes.com/2012/10/26/business/global/family-of-wen-jiabao-holds-a-hidden-fortune-in-china.html
.

50
. Perlroth, “Hackers in China Attacked The Times.”

51
. Andrew Wong, “US and China Accuse Each Other of Cyber Warfare,” RT, February 20, 2013,
http://rt.com/usa/cyber-china-war-unit-604/
.

52
. David E. Sanger, David Barboza, and Nicole Perlroth, “Chinese Army Unit Is Seen as Tied to Hacking Against U.S.,”
New York Times
, February 18, 2013,
http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
.

53
. Sanger and Perlroth, “Hackers From China Resume Attacks.”

54
. Fred Kaplan, “The Art of Cyber War,”
Slate
, February 20, 2013,
http://www.slate.com/articles/news_and_politics/war_stories/2013/02/chinese_military_cyberwarfare_how_would_beijing_threaten_the_united_states.single.html
.

55
. Adam Rawnsley, “Fishy Chips: Spies Want to Hack-Proof Circuits,”
Wired
, June 24, 2011,
http://www.wired.com/dangerroom/2011/06/chips-oy-spies-want-to-hack-proof-circuits/#more-49990
.

56
. Stephen Northcutt, “Security Laboratory: Methods of Attack Series: Logic Bombs, Trojan Horses, and Trap Doors,” SANS Technology Institute, May 2, 2007,
http://www.sans.edu/research/security-laboratory/article/log-bmb-trp-door
.

57
. Sebastian Anthony, “Rakshasa: The Hardware Backdoor That China Could Embed in Every Computer,”
ExtremeTech
, August 1, 2012,
http://www.extremetech.com/computing/133773-rakshasa-the-hardware-backdoor-that-china-could-embed-in-every-computer
.

58
. Steven Musil, “Experts Dispute the Threat Posed by Backdoor Found in Chinese Chip,” CNET, May 29, 2012,
http://news.cnet.com/8301-1009_3-57443293-83/experts-dispute-threat-posed-by-backdoor-found-in-chinese-chip/
.

59
. Mike Rodger and Dutch Ruppersberger, “Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE,” U.S. House of Representatives, October 8, 2012,
http://goo.gl/1ECJrn
.

60
. “The Company That Spooked the World,”
The Economist
, August 2, 2012,
http://www.economist.com/node/21559929
.

61
. Ibid.

62
. F. Michael Maloof, “China Tech Company Brags: We Hacked U.S. Telecoms,”
WND
, June 14, 2012,
http://www.wnd.com/2012/06/china-tech-company-admits-hacking-u-s-telecoms/
.

63
. Naomi Rovnick, “Are China’s Economic Ambitions the Reason Why Cyber-Attacks From China Are Rising?” Yahoo! Finance, January 24, 2013,
http://finance.yahoo.com/news/china-economic-ambitions-reason-why-054722424.html
.

64
. Clarke and Knake,
Cyber War
, 183.

65
. Ron Rosenbaum, “Richard Clarke on Who Was Behind the Stuxnet Attack,”
Smithsonian
, April 2012,
http://www.smithsonianmag.com/history/richard-clarke-on-who-was-behind-the-stuxnet-attack-160630516/
.

66
. Michael J. de la Merced, “Accusations of Chinese Hacking in Coke’s Failed Big Deal,”
New York Times/Dealbook
, February 19, 2013,
http://dealbook.nytimes.com/2013/02/19/accusations-of-hacking-in-cokes-failed-big-deal/
.

67
. Sanger, Barboza, and Perlroth, “Chinese Army Is Seen as Tied to Hacking.”

68
. Liat Clark, “Eric Schmidt: Chinese Hacking Culture Will Leave US Disadvantaged Economically,”
Wired
, February 4, 2013,
http://www.wired.co.uk/news/archive/2013-02/04/schmidt-china-hacking
.

69
. Cha and Nakashima, “Google Attack Part of Vast Campaign.”

70
. David Goldman, “Google Stops Censoring in China,” CNN Money, March 22, 2010,
http://money.cnn.com/2010/03/22/technology/google_china/index.htm
.

71
. David Goldman, “Massive Gmail Phishing Attack Hits Top U.S. Officials,” CNN Money, June 2, 2011,
http://money.cnn.com/2011/06/01/technology/gmail_hack/
.

72
. Hibah Yousef, “Google May Leave China After Cyber Attack,” CNN Money, January 13, 2010,
http://money.cnn.com/2010/01/12/technology/Google_China/index.htm
.

73
. Rogin, “The Top 10 Chinese Cyber Attacks.”

74
. Steven Lee Myers, “Cyberattack on Estonia Stirs Fear of ‘Virtual War,’”
New York Times
, May 18, 2007,
http://www.nytimes.com/2007/05/18/world/europe/18iht-estonia.4.5774234.html
.

75
. Ibid.

76
. Ibid.

77
. John Markoff, “Before the Gunfire, Cyberattacks,”
New York Times
, August 12, 2008,
http://www.nytimes.com/2008/08/13/technology/13cyber.html
.

78
. Matthew J. Schwartz, “Operation Red October Attackers Wielded Spear Phishing,”
Information Week
, January 18, 2013,
http://www.informationweek.com/attacks/operation-red-october-attackers-wielded-spear-phishing/d/d-id/1108272
.

79
. Ibid.

80
. Ibid.

81
. John Reed, “Hunting Red October: Who Done It?”
Foreign Policy
, January 17, 2013,
http://killerapps.foreignpolicy.com/posts/2013/01/17/hunting_red_october_who_done_it
.

82
. Mark Clayton, “‘Project Blitzkrieg’: Are Russian Cybercriminals About to Invade US Banks?”
Christian Science Monitor
, December 13, 2012,
http://www.csmonitor.com/USA/2012/1213/Project-Blitzkrieg-Are-Russian-cybercriminals-about-to-invade-US-banks
.

83
. Pam Benson, “Looming Cyber Attack Threatens Major Banks,”
Security Clearance
(blog), CNN, December 13, 2012,
http://security.blogs.cnn.com/2012/12/13/firm-cyberattack-threatens-major-banks/
.

84
. Clayton, “‘Project Blitzkrieg.’”

85
. Ibid.

86
. “International Collegiate Programming Contest, Results 2013,”
http://icpc.baylor.edu/worldfinals/results
.

87
. “U.S. Defense Secrets Stolen in Cyber Attacks,”
Washington Post
, Post TV, July 14, 2011,
http://www.washingtonpost.com/national/national-security/us-defense-secrets-stolen-in-cyber-attacks/2011/07/14/gIQAgjV2EI_video.html
.

88
. Clarke and Knake,
Cyber War
, 43.

89
. Ibid.

90
. Loren Thompson, “U.S. Headed for Cyberwar Showdown With China in 2012,”
Forbes
, December 22, 2011,
http://www.forbes.com/sites/lorenthompson/2011/12/22/u-s-headed-for-cyberwar-showdown-with-china-in-2012/
.

91
. Markoff, “Before the Gunfire, Cyberattacks.”

92
. Kaplan, “The Art of Cyber War.”

93
. David E. Sanger, “In Cyberspace, New Cold War,”
New York Times
, February 24, 2013,
http://www.nytimes.com/2013/02/25/world/asia/us-confronts-cyber-cold-war-with-china.html
.

CHAPTER 4: MILITARY SUPREMACY

1
. Hannah Beech, “How China Sees the World,”
Time
, June 17, 2013,
http://www.time.com/time/magazine/article/0,9171,2145062,00.html
.

2
. Vladimir Putin, opening speech at a meeting with the command personnel of the Russian Armed Forces, October 2, 2003, via Isabelle Falcon, “The Modernization of the Russian Military: The Ambitions & Ambiguities of Vladimir Putin” (paper, Conflict Studies Research Center, August 2005),
http://www.da.mod.uk/colleges/arag/document-listings/russian/05(19E)-IF.pdf/view
.

3
. Alan Caruba, “A Military in Decline,”
Warning Signs
(blog), August 3, 2013,
http://factsnotfantasy.blogspot.com/2013/08/a-military-in-decline.html
.

4
. Newt Gingrich, “Losing the War,” Gingrich Productions, August 4, 2013,
http://www.gingrichproductions.com/2013/08/losing-the-war-2/
.

5
. Jane Perlez, “China and Russia, in a Display of Unity, Hold Naval Exercises,”
New York Times
, July 10, 2013,
http://www.nytimes.com/2013/07/11/world/asia/china-and-russia-in-a-display-of-unity-hold-naval-exercises.html
.

6
. “China, Russia Conclude Joint Naval Drills,” Xinhua, July 11, 2013,
http://news.xinhuanet.com/english/china/2013-07/11/c_132533183.htm
.

7
. Perlez, “China and Russia, in a Display of Unity.”

8
. Ibid.

9
. Ibid.

10
. Ibid.

11
. Ronald O’Rourke, “China Naval Modernization: Implications for U.S. Navy Capabilities—Background and Issues for Congress” (report for Congress, Congressional Research Service, September 5, 2013),
http://www.fas.org/sgp/crs/row/RL33153.pdf
.

12
. Kimberly A. Strassel, “The Obama Jobs Sequester,”
Wall Street Journal
, August 2, 2012,
http://online.wsj.com/article/SB10000872396390444320704577565483190017286.html
.

13
. “Hagel Warns Congress to Stop Defense Budget Cuts,”
U.S. News and World Report
, July 10, 2013,
http://www.usnews.com/news/politics/articles/2013/07/10/hagel-warns-congress-to-stop-defense-budget-cuts
.

14
. “Bearing the Burden of Global Leadership: Does U.S. Leadership Have a Future?” Council on Foreign Relations panel, April 23, 2014,
http://www.cfr.org/united-states/does-us-leadership-have-future/p32854
.

15
. Christopher J. Griffin, “FPI Analysis: No Way to Run the Defense Department” (report, Foreign Policy Initiative, August 1, 2013),
http://www.foreignpolicyi.org/content/fpi-analysis-no-way-run-defense-department
.

16
. Jacob Siegel, “The Government Shutdown’s Hidden Cost to the U.S. Military,”
Daily Beast
, October 7, 2013,
http://www.thedailybeast.com/the-hero-project/articles/2013/10/07/the-government-shutdown-s-hidden-cost-to-the-u-s-military.html
.

17
. Keith B. Richburg, “China Military Spending to Top $100 Billion, Alarming Neighbors,”
Washington Post
, March 4, 2012,
http://www.washingtonpost.com/world/china-military-spending-to-top-100-billion-this-year/2012/03/04/gIQAJRnypR_story.html
.

18
. “Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2012” (report, U.S. Department of Defense, Office of the Secretary of Defense, May 2012), 6,
http://www.defense.gov/pubs/pdfs/2012_CMPR_Final.pdf.

19
. Ibid.

20
. O’Rourke, “China Naval Modernization.”

21
. “Annual Report to Congress, Military and Security Developments Involving the People’s Republic of China 2010” (report, U.S. Department of Defense, Office of the Secretary of Defense, May 2010), 42,
http://www.defense.gov/pubs/pdfs/2010_cmpr_final.pdf
.

22
. Figures from the SIPRI Military Expenditure Database, the Stockholm International Peace Research Institute,
http://www.sipri.org/research/armaments/milex/milex_database
.

23
. Bill Gertz, “China Conducts First Test of New Ultra-High-Speed Missile Vehicle,”
Washington Free Beacon
, January 13, 2014,
http://freebeacon.com/china-conducts-first-test-of-new-ultra-high-speed-missile-vehicle/
.

Other books

The Kukulkan Manuscript by James Steimle
Fatal Care by Leonard Goldberg
Trigger Snappy by Camilla Chafer
Eat the Document by Dana Spiotta
Katerina's Wish by Jeannie Mobley
the Biafra Story (1969) by Forsyth, Frederick
Eureka Man: A Novel by Patrick Middleton