A New Cold War, in Cyberspace, Tests U.S. Ties to China

It’s something no one would have imagined; a war in cyberspace… The hacking groups were suspected to be located in the neighborhood in Shanghai, and they’ve stolen more than terabytes of data from American corporations. (http://www.nytimes.com/2013/02/25/world/asia/us-confronts-cyber-cold-war-with-china.html?ref=technology) In someway so called “a new cold war” can be less dangerous, but in the other hand, this cyber-cold war have gotten worse and it’s so complex.

In the article it states that ” President Obama avoided mentioning China by name — or Russia or Iran, the other two countries the president worries most about — when he declared in his State of the Union address that “we know foreign countries and companies swipe our corporate secrets.” He added: “Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions and our air traffic control systems.”

I don’t want to go too detail into politics, but this war needs a solution. The solution of the conservative wars are either agreements between the enemies or either one of the enemies win the battle. This is a new generations of war – new cold war – we are ought to be careful what the future/ the result of this holds.

Advertisements

1 thought on “A New Cold War, in Cyberspace, Tests U.S. Ties to China”

  1. Certainly the inter-contentedness of our networks leaves us even more vulnerable to a cyberattack. One thing that defends our public networks is the fact that a cyber attack against a U.S. military or otherwise Federal, state, or local institution may be considered an act of war, and retaliated against as such. However, a cyber attack against a U.S. company or contractor carries a vague definition of what can be done in retaliation, even if they are a defense industry contractor. I believe that states like China have in fact stolen plans and designs for classified U.S. military, security, and scientific hardware, to be replicated in their country. While a violation of copyright law, it may not be construed as an act of war, and limits what either the U.S. or the company is willing to do in retaliation. This may be further compound if the stolen item is not public knowledge. Admitting something to be stolen that you don’t want to admit exists can be difficult.

Comments are closed.