SlideShare una empresa de Scribd logo
1 de 7
CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK
UNITED STATES AND CHINA 2001: PATRIOTIC
HACKING
Lillian Ekwosi-Egbulem
University of Maryland University College, 2011
CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 2
United States and China 2001: Patriotic hacking
INTRODUCTION:
As recorded in Cyberspace and the Changing Nature of Warfare, “practically everything
that happens in the real world is mirrored in cyberspace (Geers, 2008, p.1). On April 1, 2001, a
U.S. navy plane collided with a Chinese fighter jet killing the Chinese Pilot. The U.S. plane
made an emergency landing in Hainan Island and the crew were detained (Schnell, 2001, p.1).
China demanded an apology from the Bush administration but got none. While the diplomatic
resolution of the tension was being negotiated, hackers from China, in protest for domineering
action of America started attacking the US websites. The U.S. hackers on the other hand,
retaliated and thus began the seven day digital battle between the two countries. As expected,
both pro US and Chinese hackers joined the cyberwar until Chinese hackers called the truce.
Cyberspace is a realm where no one can claim superiority and has become the means for
cyberterrorism and cyberwar. Basically, Cyberterrorism is the convergence of terrorism and
cyberspace that results in violence against persons or property, or at least cause enough harm to
generate fear. Cyber war on the other hand is more of government activities (Denning, 2007), or
other types of computer abuse such as (computer crimes, economic espionage, information
warfare, propaganda). The purpose of this paper therefore is to analyze the U.S. & China 2001:
patriotic hacking, delving into the motivation of the attackers, the attack methods used and the
response of the defenders. Finally, it will analyze the vulnerability, hacking techniques and
countermeasure, basic concept of cyberterrorism and how to limit the exposure.
MOTIVATION:
For long now, China has been at the forefront of cyber warfare and other forms of
cyberterrorism. During the U.S. and China 2001: Patriotic hacking, Honkers, the Chinese active
CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 3
hacker group claim they are not hackers but politically motivated patriots driven by the passion
to defend the integrity of their sovereignty. They simple use the cyberspace to get their message
across (Tang, 2001)
Another motivation for the attack is the yearning of the hackers to “increase the honker‟s
influence, strengthen cohesion and promote honker culture and its development” This they plan
to achieve by suggesting that the word honk-ke be standardized and accepted in English as
honker. (Min, 2005)
Yet, another apparent source of motivation is the U.S. “claimed” support that the hackers
received from Chinese government. According to CNN.com, the concentrated attack…and its
great coordination made the United States believe that the Chinese government supported the
attacks. (Tang, 2001). The article further states that the Chinese hackers have their principles
and the government has been recruiting prominent hackers to form an „Internet Army‟ in case
there is a cyber war.
THE ATTACK METHODS:
From all indications, the Chinese attackers take the offensive side. Typically, the attacks
are daily occurrence of web defacements, viruses, worms and Distributed-Denial-of-Service-
attack. (DDoS).“While the impact of those attacks can be serious, they are generally not
regarded as acts of terrorism (Dennigs, 2007). They targeted mainly the U.S. government
organization networks to drive home their message. As reported in Is this World Cyber War 1,
hacker Jia En Zhue of China claims that “It is the U.S. governments that we hate, not the
people." (Delio, 2001). Apparently, their aim is to deface the target homepage and not the
system (CNN.com, 2001).
CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 4
Another method employed by the Chinese hackers is “human-wave” tactics, the same
war tactics used during the Korean War against the United States (Delio, 2001). The article goes
on to explain that this tactics requires building up a huge cyber-attack resource base drawn
from the military, hackers, private companies and Chinese netizens. Interestingly, these people
have a common bond, which is Patriotism. This works in favor of China because of their huge
number of Internet bars also, most of their recreational places are equipped with computers and
the internet.
THE RESPONSE OF THE DEFENDERS:
U.S. hackers in retaliation defaced the Chinese websites and some of them claimed this is
the first time they have hacked with political motivations (Delio, 2001). In contrast to their
counterpart, they limited their attack on web defacement and called for more attackers to defend
the country network by scanning for vulnerability and reporting it to network administrators.
Their tactics was more of “let‟s see which way the Chinese go, then we retaliate”. The United
States by nature does not take an offensive side in times of war. With laws and polices guiding
their every action, it is no surprise that they played a defensive role during this cyber attack. As
recorded in Virtual Defense, the U.S. concept of security has not caught up to the new threat of
computer warfare (James, 2001). It is a given that U.S. military prowess cannot be matched but it
can be taken down in the area of digital warfare.
ASSESSING THE VULNERABILITY:
In assessing the vulnerability of the U.S. government agency against cyber terrorism or
cyberwar, it is obvious that there is no strategy for deterrence or legal regime for retaliation
against cyber-attacks. Consequently, countries like China often battle the U.S. with impunity
(James, 2001). This is because the thinking of the U.S. decision makers is still stuck in the
CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 5
cold war, pre-Internet era which stresses more of deterrence strategy.
Though there are speculations by the U.S. government that the Chinese government
supported the hackers, however, one cannot ascertain that fact. Therefore the attack looks more
like an asymmetric warfare where the U.S. and China have different capabilities to wage attacks
against each other. China, viewed as a weaker group with unequal military resources, uses
unconventional weapons and tactics and with little efforts to execute attacks of great potential
effect, full of uncertainly and unpredictability
No formal war was declared between China and the U.S. The attackers are simply a
group of people motivated by some ideologies. As a result, the current defense plans and the
concept of national security available to the U.S. policymakers can only allow them to apply one
of the two approaches to cyberterrorism and cyber warfare namely; deterrence by denial. The
use of deterrence by punishment which is the other approach is currently under debate and
meanwhile, it is really hard to determine at what point a counter attack against a cyber terror
attack becomes an act of war.
LIMITING THE EXPOSURE:
Defense is the best offense and the U.S. has a level of responsibility as far as the
protection of their critical infrastructures is concerned or otherwise will be held accountable for
any successful attacks where they fell to exercise “due diligence” to deter threat agents.
Training and awareness is another way to limit the exposure. Knowing how to use the tools is not
just enough but a combination of good tool, awareness and training is a good defense. Likewise,
information sharing should be limited especially those related to the security of critical
infrastructures. The Internet encourages information sharing and some of the information on the
CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 6
technological advancement that the U.S. puts out there can be very useful to the attacker in
figuring out how the U.S. defends its network.
HCKING TECHNIQUES AND COUNTEMEASURES:
The techniques the attackers used were network scanning which detects vulnerabilities.
Chinese attackers exploited known weaknesses" in Unix networks and Sun Microsystems'
Remote Procedure Call (RPC), a protocol that allows services across a network to communicate
with one another (Delio, 2001). Other hacking techniques include password cracking and
structured query language (SQL) which hinges on an attacker entering an SQL database query
into a dynamic webpage leading to webpage defacement. They also employed Distributed-
Denial-of-Service attack which involves using multiple computers turned into “zombies” to
perform denial of service attack.
Some of the Countermeasures to secure the networks include proper installation and
configuration of firewall to filter traffics between trusted and untrusted networks. Network
Intrusion Detection system (IDS) monitors the network for malicious activity, while the Network
Intrusion Prevention System (IPS) both recognizes and responds to potential threats. Also,
vulnerability management in form of assessment and testing is critical for network defense.
In conclusion, Cyber attack is like a knife, if you use it to cut meat, then it‟s a kitchen
knife, if you use it to chop up people, then it‟ a killer weapon (Tang, 2001). Consequently, it
comes necessary for the U.S. to review its policies that will make it clear when a cyber attack
justifies deterrence by punishment as the best option. Finally, those policies must take into
consideration and keep pace with the changing nature of the digital technology, otherwise the
U.S. will be playing catch up to China and the rest world in general.
References
CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 7
Adams, J. (2001). Virtual defense. Foreign Affairs, 80(3), 98-112. Retrieved from EBSCOhost.
Tang, R. (2001). China-US. Cyber war escalates. Retrieved from
http://archives.cnn.com/2001/WORLD/asiapcf/east/04/27/china.hackers/
Delio, M. (2001) Is this World Cyber War 1. Retrieved fromhttp://www.wired.com/politics/law
/news/2001/05/43443?currentPage=all
Denning, D. (2007). A view of cyberterrorism five years later. Retrieved from
http://faculty.nps.edu/dedennin/publications/Cyberterror 2006.pdf
Geers, K. (2008, August 27). Cyberspace and the changing nature of warfare. Retrieved from
http://www.scmagazineus.com/cyberspace-and-the-changing-nature-of-warfare/
article/115929/
Min, D. (2005). The Passionate Time of Chinese Hackers. Chinascope, 14-25. Retrieved from
EBSCOhost.
Schnell, J. 2011). The Cross-Cultural Rhetoric of Diplomacy in the Case of the U.S. Surveillance
Plane Landing on Hainan Island, China in April, 2001. China Media Research, 7(2), 77-
80. Retrieved from EBSCOhost.

Más contenido relacionado

La actualidad más candente

Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informaticsmali chum
 
NSA Journal of Information Warfare
NSA Journal of Information WarfareNSA Journal of Information Warfare
NSA Journal of Information WarfareDavid Sweigert
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?Melissa Andrews
 
Annotated bibliography
Annotated bibliographyAnnotated bibliography
Annotated bibliographyJerica Knox
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy makerDoing What I Do
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense David Sweigert
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumCrossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumJonathan Meyer
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesChikere Uchegbu
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseAnonDownload
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomDoing What I Do
 

La actualidad más candente (20)

Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informatics
 
Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
NSA Journal of Information Warfare
NSA Journal of Information WarfareNSA Journal of Information Warfare
NSA Journal of Information Warfare
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?
 
Annotated bibliography
Annotated bibliographyAnnotated bibliography
Annotated bibliography
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumCrossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
 
Haaretz
HaaretzHaaretz
Haaretz
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Drones in Discourse
Drones in DiscourseDrones in Discourse
Drones in Discourse
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whom
 

Similar a U.S.-China 2001 Cyber Conflict

CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDiCJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDiVinaOconner450
 
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...James Creamer III
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Kate Neal
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxShiraPrater50
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxadkinspaige22
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docxfelicidaddinwoodie
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterJulie Davis
 
AMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docx
AMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docxAMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docx
AMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docxnettletondevon
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxtawnyataylor528
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?Crystal Miller
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Kate Neal
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation OllieShoresna
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Pranav Gupta
 

Similar a U.S.-China 2001 Cyber Conflict (20)

CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDiCJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
 
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
Terrorism
TerrorismTerrorism
Terrorism
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
AMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docx
AMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docxAMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docx
AMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docx
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
POLITICAL SCIENCE
POLITICAL SCIENCEPOLITICAL SCIENCE
POLITICAL SCIENCE
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docx
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism
 

Último

57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 

Último (13)

57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 

U.S.-China 2001 Cyber Conflict

  • 1. CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK UNITED STATES AND CHINA 2001: PATRIOTIC HACKING Lillian Ekwosi-Egbulem University of Maryland University College, 2011
  • 2. CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 2 United States and China 2001: Patriotic hacking INTRODUCTION: As recorded in Cyberspace and the Changing Nature of Warfare, “practically everything that happens in the real world is mirrored in cyberspace (Geers, 2008, p.1). On April 1, 2001, a U.S. navy plane collided with a Chinese fighter jet killing the Chinese Pilot. The U.S. plane made an emergency landing in Hainan Island and the crew were detained (Schnell, 2001, p.1). China demanded an apology from the Bush administration but got none. While the diplomatic resolution of the tension was being negotiated, hackers from China, in protest for domineering action of America started attacking the US websites. The U.S. hackers on the other hand, retaliated and thus began the seven day digital battle between the two countries. As expected, both pro US and Chinese hackers joined the cyberwar until Chinese hackers called the truce. Cyberspace is a realm where no one can claim superiority and has become the means for cyberterrorism and cyberwar. Basically, Cyberterrorism is the convergence of terrorism and cyberspace that results in violence against persons or property, or at least cause enough harm to generate fear. Cyber war on the other hand is more of government activities (Denning, 2007), or other types of computer abuse such as (computer crimes, economic espionage, information warfare, propaganda). The purpose of this paper therefore is to analyze the U.S. & China 2001: patriotic hacking, delving into the motivation of the attackers, the attack methods used and the response of the defenders. Finally, it will analyze the vulnerability, hacking techniques and countermeasure, basic concept of cyberterrorism and how to limit the exposure. MOTIVATION: For long now, China has been at the forefront of cyber warfare and other forms of cyberterrorism. During the U.S. and China 2001: Patriotic hacking, Honkers, the Chinese active
  • 3. CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 3 hacker group claim they are not hackers but politically motivated patriots driven by the passion to defend the integrity of their sovereignty. They simple use the cyberspace to get their message across (Tang, 2001) Another motivation for the attack is the yearning of the hackers to “increase the honker‟s influence, strengthen cohesion and promote honker culture and its development” This they plan to achieve by suggesting that the word honk-ke be standardized and accepted in English as honker. (Min, 2005) Yet, another apparent source of motivation is the U.S. “claimed” support that the hackers received from Chinese government. According to CNN.com, the concentrated attack…and its great coordination made the United States believe that the Chinese government supported the attacks. (Tang, 2001). The article further states that the Chinese hackers have their principles and the government has been recruiting prominent hackers to form an „Internet Army‟ in case there is a cyber war. THE ATTACK METHODS: From all indications, the Chinese attackers take the offensive side. Typically, the attacks are daily occurrence of web defacements, viruses, worms and Distributed-Denial-of-Service- attack. (DDoS).“While the impact of those attacks can be serious, they are generally not regarded as acts of terrorism (Dennigs, 2007). They targeted mainly the U.S. government organization networks to drive home their message. As reported in Is this World Cyber War 1, hacker Jia En Zhue of China claims that “It is the U.S. governments that we hate, not the people." (Delio, 2001). Apparently, their aim is to deface the target homepage and not the system (CNN.com, 2001).
  • 4. CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 4 Another method employed by the Chinese hackers is “human-wave” tactics, the same war tactics used during the Korean War against the United States (Delio, 2001). The article goes on to explain that this tactics requires building up a huge cyber-attack resource base drawn from the military, hackers, private companies and Chinese netizens. Interestingly, these people have a common bond, which is Patriotism. This works in favor of China because of their huge number of Internet bars also, most of their recreational places are equipped with computers and the internet. THE RESPONSE OF THE DEFENDERS: U.S. hackers in retaliation defaced the Chinese websites and some of them claimed this is the first time they have hacked with political motivations (Delio, 2001). In contrast to their counterpart, they limited their attack on web defacement and called for more attackers to defend the country network by scanning for vulnerability and reporting it to network administrators. Their tactics was more of “let‟s see which way the Chinese go, then we retaliate”. The United States by nature does not take an offensive side in times of war. With laws and polices guiding their every action, it is no surprise that they played a defensive role during this cyber attack. As recorded in Virtual Defense, the U.S. concept of security has not caught up to the new threat of computer warfare (James, 2001). It is a given that U.S. military prowess cannot be matched but it can be taken down in the area of digital warfare. ASSESSING THE VULNERABILITY: In assessing the vulnerability of the U.S. government agency against cyber terrorism or cyberwar, it is obvious that there is no strategy for deterrence or legal regime for retaliation against cyber-attacks. Consequently, countries like China often battle the U.S. with impunity (James, 2001). This is because the thinking of the U.S. decision makers is still stuck in the
  • 5. CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 5 cold war, pre-Internet era which stresses more of deterrence strategy. Though there are speculations by the U.S. government that the Chinese government supported the hackers, however, one cannot ascertain that fact. Therefore the attack looks more like an asymmetric warfare where the U.S. and China have different capabilities to wage attacks against each other. China, viewed as a weaker group with unequal military resources, uses unconventional weapons and tactics and with little efforts to execute attacks of great potential effect, full of uncertainly and unpredictability No formal war was declared between China and the U.S. The attackers are simply a group of people motivated by some ideologies. As a result, the current defense plans and the concept of national security available to the U.S. policymakers can only allow them to apply one of the two approaches to cyberterrorism and cyber warfare namely; deterrence by denial. The use of deterrence by punishment which is the other approach is currently under debate and meanwhile, it is really hard to determine at what point a counter attack against a cyber terror attack becomes an act of war. LIMITING THE EXPOSURE: Defense is the best offense and the U.S. has a level of responsibility as far as the protection of their critical infrastructures is concerned or otherwise will be held accountable for any successful attacks where they fell to exercise “due diligence” to deter threat agents. Training and awareness is another way to limit the exposure. Knowing how to use the tools is not just enough but a combination of good tool, awareness and training is a good defense. Likewise, information sharing should be limited especially those related to the security of critical infrastructures. The Internet encourages information sharing and some of the information on the
  • 6. CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 6 technological advancement that the U.S. puts out there can be very useful to the attacker in figuring out how the U.S. defends its network. HCKING TECHNIQUES AND COUNTEMEASURES: The techniques the attackers used were network scanning which detects vulnerabilities. Chinese attackers exploited known weaknesses" in Unix networks and Sun Microsystems' Remote Procedure Call (RPC), a protocol that allows services across a network to communicate with one another (Delio, 2001). Other hacking techniques include password cracking and structured query language (SQL) which hinges on an attacker entering an SQL database query into a dynamic webpage leading to webpage defacement. They also employed Distributed- Denial-of-Service attack which involves using multiple computers turned into “zombies” to perform denial of service attack. Some of the Countermeasures to secure the networks include proper installation and configuration of firewall to filter traffics between trusted and untrusted networks. Network Intrusion Detection system (IDS) monitors the network for malicious activity, while the Network Intrusion Prevention System (IPS) both recognizes and responds to potential threats. Also, vulnerability management in form of assessment and testing is critical for network defense. In conclusion, Cyber attack is like a knife, if you use it to cut meat, then it‟s a kitchen knife, if you use it to chop up people, then it‟ a killer weapon (Tang, 2001). Consequently, it comes necessary for the U.S. to review its policies that will make it clear when a cyber attack justifies deterrence by punishment as the best option. Finally, those policies must take into consideration and keep pace with the changing nature of the digital technology, otherwise the U.S. will be playing catch up to China and the rest world in general. References
  • 7. CASE STUDY ANALYSIS OF U.S. & CHINA HISTORIC CYBER ATTACK 7 Adams, J. (2001). Virtual defense. Foreign Affairs, 80(3), 98-112. Retrieved from EBSCOhost. Tang, R. (2001). China-US. Cyber war escalates. Retrieved from http://archives.cnn.com/2001/WORLD/asiapcf/east/04/27/china.hackers/ Delio, M. (2001) Is this World Cyber War 1. Retrieved fromhttp://www.wired.com/politics/law /news/2001/05/43443?currentPage=all Denning, D. (2007). A view of cyberterrorism five years later. Retrieved from http://faculty.nps.edu/dedennin/publications/Cyberterror 2006.pdf Geers, K. (2008, August 27). Cyberspace and the changing nature of warfare. Retrieved from http://www.scmagazineus.com/cyberspace-and-the-changing-nature-of-warfare/ article/115929/ Min, D. (2005). The Passionate Time of Chinese Hackers. Chinascope, 14-25. Retrieved from EBSCOhost. Schnell, J. 2011). The Cross-Cultural Rhetoric of Diplomacy in the Case of the U.S. Surveillance Plane Landing on Hainan Island, China in April, 2001. China Media Research, 7(2), 77- 80. Retrieved from EBSCOhost.