Affichage des articles dont le libellé est cyber war. Afficher tous les articles
Affichage des articles dont le libellé est cyber war. Afficher tous les articles

lundi 13 août 2018

Cyber War

While everyone obsesses over Russia, China is stealing our data blind
By Ned Ryun

With all the focus on Russian hacking, Russian ambition, and Russian threats to U.S. national economic security, another Red Threat continues seemingly unabated: China’s ongoing effort to compete as a global economic power equal to, if not exceeding, the United States. 
China has the population and the economic ability to compete, and has made its ambitions crystal clear with its Made in China 2025 plans.
Part of the strategy is being played out now in the battle over tariffs and trade policy, but far more important to the U.S. innovation economy is the ongoing battle over forced technology transfers and Chinese efforts to steal U.S. intellectual property and control as much data online as possible.
Over the past decade, Chinese hackers have launched cyber-attacks, stealing data from the U.S. Congress, the U.S Department of Defense, and the federal Office of Personnel Management, one of the largest data breaches and thefts of American worker identities in history. 
The Chinese have run sustained cyber operations against our oil industry, critical infrastructure and utility industries, and the entertainment industry. 
 With trade tensions running higher, China’s interest in hacking U.S. private businesses for data, trade secrets and intellectual property has only increased.
As noted by Wired magazine, Chinese government-backed hackers are also interested in so-called “command and control” opportunities in the U.S., everything from satellites and main frame computers to in-home laptops and security cameras. 
 Yes, the Chinese are even interested in that nanny cam you may have in your nursery.
For some hackers, dealing with personal, in-home technology is a game to show what they can accomplish. 
But for other hackers, it’s an effort to find new ways to access personal information and find security holes that might allow them to launch far greater cyber-attacks from home networks.
American consumers, while alarmed by such data breaches as the Yahoo email hack in which almost 3 billion consumers had personally identifiable information stolen, or the various retail chain hacks such as Target and Neiman Marcus, still tend to be lax about the security measures they use and fewer than 15 percent utilize security measures like password keepers to secure access to their important web sites and data like bank and investment accounts, health care information and access to their cloud storage, where they upload everything from legal documents, financial information and tax returns, to family photos, music and movies.
The cloud and the access the cloud can enable to home networks is increasingly where consumers should be concerned. 
Most probably aren’t asking where the data from their smart devices is going, or who has access to that data. 
Nor are they asking what the rules and regulations governing 3rd party access to that data are and where is it actually stored.
But they should be.
Most consumers are completely unaware that the smart devices, on which they’ve come to rely for everyday home convenience, transmit data back to a platform that is then stored on “the cloud.” When you go to Walmart or Target and buy a camera-enabled smart TV or a baby cam monitor, you don’t consider that the digital video feed might be transmitted to and stored in a cloud outside the United States and viewed by a hostile, foreign government like the Chinese.
But that is exactly what is happening.
Those smart, internet of things (IoT) devices, which numbered just over 8 billion in 2017, require platforms to “plug into” and a significant amount of those devices have agreements with platforms controlled by Chinese nationals with obvious ties to the Chinese government. 
 That’s right, not kidding: the communist Chinese government has access to your home via those smart devices.
This entire trend of the internet of things and smart devices is only going to accelerate: there are estimates that by 2020 there will be over 20 billion IoT devices, all plugged in to some platform somewhere. 
What retailers are not telling you is that those technological wonders rely on platforms and cloud storage controlled by Chinese – sure it’s in the fine print on page 36 of the disclosures, but when was the last time you actually read all of the fine print? 
 But if you did, would you still buy those phones and cameras that plug into certain platforms?
If consumers start demanding up-front, full disclosure from retailers prior to purchase, they’d likely find consumers drawn to the devices that use the American based platforms, even if those devices cost a dollar or two more. 
We can be assured that the Chinese are going to wage this cyber war. 
 That doesn’t mean American consumers have to help them win.

mardi 28 novembre 2017

Lethal Threat: The Quantum Gap with China

China has ramped up its investment in developing quantum technologies, but few understand the impacts of losing this modern-day space race.
BY THOMAS E. RICKS

China has ramped up its investment in developing quantum technologies, but few understand the impacts of losing this modern-day space race.
Seventy-five years ago, the United States and imperial Japanese navies (IJN) faced off at the Battle of Midway, an engagement that would prove decisive in determining the outcome of World War II in the Pacific. 
The U.S. navy (USN) had devoted tremendous intelligence resources to detecting when and where such a battle might occur. 
They had long known that the IJN’s primary strategic objective was to lure the USN into a decisive fight. 
The IJN planned a surprise attack. 
Why then did the USN take such a risk?
The USN knew it had two critical advantages despite being outgunned and likely years behind in naval readiness than their Japanese counterparts. 
First, it had broken its adversary’s codes and unlocked access to all of imperial Japan’s communications. 
They knew precisely when and where an attack would take place. 
Second, the USN had outclassed its adversary’s fighting platforms with two new and revolutionary technologies, radar and sonar. 
Therefore, not only did the USN know precisely when and where to place its forces to counter the IJN punch, but it also maintained better situational awareness throughout the fight. 
Had the United States not recognized the strategic importance these technologies would play throughout the war it may have cost it victory at Midway and many other points along the way.
U.S. navy aircraft on the deck of the USS Enterprise on the first day of the Battle of Midway. 

How does the Battle of Midway relate to the ongoing race to develop quantum technologies? Quantum technologies are those that make use of some of the properties of quantum mechanics. Features such as quantum entanglement, quantum superposition, and quantum tunneling can be applied in new forms of computation, sensing, and cryptography
Many are convinced that whoever masters this esoteric field will gain a similar dominance both in codebreaking and advanced sensors. 
These advantages will tip scales both in the ongoing cyber war being carried out daily over the global internet and in future state-on-state combat.
Given these risks, China’s recent announcement of a $10 billion, four million square foot national quantum laboratory in Hefei should raise alarms. 
Having already demonstrated a head-start in a handful of quantum technology applications — such as its launch of the Micius satellite, the first satellite-to-ground quantum network, and China’s claimed engineering of a quantum radar capable of detecting current stealth technologies — China has proven it wants to maintain its advantage. 
These achievements combined with the massive investment by the Chinese government in quantum research should be a wake-up call to policy-makers and military leaders alike.
China’s increased spending and demonstrated advances in developing quantum technologies will enable advantages both commercially, and militarily, for a handful of reasons. 
The most concerning advantage relates to codebreaking
Today, communication networks pass digital information over public infrastructures, such as fiber optic pathways and wireless airwaves, using encryption to prevent eavesdroppers from reading the content of the message traffic. 
The only thing stopping eavesdroppers from decrypting this traffic is the mathematical complexity of doing so. 
Quantum computers will have the ability to crack these codes in far less time than today’s most advanced conventional computers. 
Furthermore, as quantum computers make linear gains in computational power, they will exponentially decrease the time it takes to break current means of encryption.
Conversely, just as quantum technologies can be used to decrypt traditional security measures, it also can protect information in sophisticated new quantum communication channels. 
One of the more pervasive concerns of relying on public infrastructure to communicate sensitive information comes from eavesdroppers. 
Man-in-the-middle attacks allow eavesdroppers to place sensors along public communication pathways to copy all data passing through these channels and attempt to decrypt it either in real-time or later through brute-force. 
Today, traditional networks have no reliable means to detect when these types of listening apparatus are emplaced. 
Quantum technologies, by design, detect changes at the smallest of scales. 
The extreme sensitivity of quantum technologies enables them to detect anomalies such as when an eavesdropper attempts to copy or siphon off data. 
China has already tested a 2,000km long quantum communication pathway from Beijing to Shanghai that employs this powerful new means of detecting man-in-the-middle eavesdroppers. 
They have already begun to defend their most sensitive networks.
If we return to the lessons learned from the Battle of Midway, the USN realized early on that having better sensors meant providing military leaders better situational awareness in tactical engagements. 
The rise of quantum technologies that enhance sensing will also dramatically change the landscape of military technologies in coming years. 
Quantum metrology technologies enable measurements of minute changes such as gravity upon subatomic particles and other characteristic changes that occur at atomic scales. 
Developments in this arena will have profound effects on a variety of sensors
China claims that it has already created a new form of quantum radar capable of defeating the electromagnetic stealth technologies employed in the $1 trillion F-35 program. 
This would render much of the strategic investments sunk into this platform tragically outdated and call into question the future viability of this already controversial program. 
The announced quantum information sciences laboratory in Hefei would also focus on the development of quantum metrology and appears set to build upon China’s early claims regarding quantum radar successes.
China has demonstrated it wishes to maintain its first mover advantage in this field. 
Given this, what should policy-makers, military leaders, and commercial decision-makers do? 
Just as previous world leaders have made calls for increased scientific spending to bolster national security interests, leaders today must recognize the changing threat landscape imposed by quantum technologies and put some skin in the game. 
To produce a profound increase in opportunities in this field someone must provide incentives for the next generation of researchers and developers. 
The free market may not be enough. 
Recently the U.S. House Science Committee voiced concerns that the United States was falling behind countries such as China that are ramping up research and development in this area.
As policymakers consider what technologies will give their societies and militaries distinct advantages — it is evident quantum technologies should be near the top of their list. 
The value proposition is clear. 
Quantum technologies enable better access to, and protection of, quality information. 
Policy and decision makers live and die by intelligence. 
Just as nations trembled at the prospect of another country owning the ultimate high ground — space — so too should they worry about who dominates the development and application of quantum technologies. 
Today, China has the high ground in quantum technologies.