Because it is an election year and because the sun is coming up over the horizon the latest FBI director is testifying in Washington to say China could (was and is) attack(ing) us using cyber.
Christopher Wray, FBI director, testifies on the growing threat of Chinese cyberattacks against the U.S. before the House Select Committee on the Chinese Communist Party. Other top intelligence and cyber officials testifying at the hearing include: General Paul Nakasone, Commander of the United States Cyber Command; Jen Easterly, director of Cybersecurity and Infrastructure Security Agency; and Harry Coker, Jr., director at the Office of the National Cyber Director.
For a variety of reasons China has determined to overtake the US in power politics of the world. If you agree that is their goal and you want to learn your adversary (like we used to learn Russian language against the USSR/Soviets – during the cold war), then it is wise to understand their tactics among other things.
In Sun Tzu the “Art of War” One uses the weaknesses of your enemy against them. Also the interesting part of the Art of War is that the part that everyone sees is just a small section of various books of conflict or war in Chinese history.
What we need to study is all the classics.
Including “Military Strategy Classics of Ancient China” (which includes Art of War and 36 stratagems).
The 36 Stratagems are listed here: http://changingminds.org/disciplines/warfare/36_strategems/36_stratagems.htm
From 36. Run away (I.e. run away from enemy) or
31. “Use a Woman to ensnare a man” it is clear that each one of these is a strategy to outwit and trick your opponent.
I like #14 “Raise a Corpse from the Dead” or otherwise reuse an old method and try it again. I.e. do not forget an old method/tactic as it may work again.
Each strategem is a version of a trick or sleight of hand, using old tricks, new items, or others. But generally these are all ways for gaining an advantage by using espionage among other methods.
Winning using any means is the theme.
As long as you keep in mind this general theme (winning using any means). Using methods with the least amount of cost is desirable of course.
This is just the beginning of many reviews of how Chinese ingenuity and knowledge is using our weaknesses (including cybersecurity issues) to further their ends – this includes stealing intellectual property, secrets, and just a general theft of money and resources.
Part -1 February 2024
Here is a post on CyberScoop on how Chinese hackers are infiltrating USA critical infrastructure.
Contact Us to discuss.