'What if?' scenario: Cyberwar between US and China in 2020

March 23, 2011

As Iran's nuclear plant attack and Chinese-based hackers attacking Morgan Stanley demonstrate how the Internet can wreak havoc on business and governments, a new paper by a fellow at Rice University's Baker Institute for Public Policy hypothesizes what an all-out cyberwar between the U.S. and China might look like.

To date, the cyberattacks in East Asia have been relatively benign, said Christopher Bronk, author of "Blown to Bits: China's War in Cyberspace, August–September 2020," published this month in the U.S. Air Force journal Strategic Studies Quarterly. Bronk is a fellow in information technology policy at the Baker Institute and a former U.S. State Department diplomat.

"Web pages are defaced, allegations of espionage are leveled and, generally, a status quo of sorts is maintained. The threat politics of the cyberdomain, however, do not stand still," Bronk said. " has been deeply impressed by U.S. information dominance since the 1991 Gulf War. China has produced a considerable literature of strategic studies for cyberoperations while developing a national firewall system that shields the country from a considerable portion of Web content.

"The United States, too, has made strategic moves in and is in the process of building a Department of Defense cybercommand that will manage the efforts of thousands of civilian and military 'cyberwarriors,'" Bronk said.

With an increasing number of countries around the globe developing military cybercapabilities, Bronk chose to consider how a conflict with major cybercomponents might appear. "Basically, many in the information-security community have been saying either, 'We're in a cyberwar with China' or 'It's time to prepare for a cyberwar with China.' The points I'm trying to make are, first, that cyberwar is not a substitute for real warfare but instead may be a component of conventional or unconventional military action, and second, that there's a great deal of very conventional thinking on this very unconventional topic."

Explore further: Baker Institute policy report looks at cybersecurity

More information: To read the complete paper and the fictitious scenario, visit www.au.af.mil/au/ssq/2011/spring/bronk.pdf

Related Stories

Baker Institute policy report looks at cybersecurity

February 24, 2011

A new article written by a fellow at Rice University's Baker Institute for Public Policy calls on the intelligence community to jointly create a policy on cybersecurity and determine the degree to which the U.S. should protect ...

Scientist urges new look at government 'Web-tapping'

December 2, 2008

The technology of government surveillance has changed dramatically, and the rules governing surveillance should be changed accordingly. Chris Bronk, a fellow in technology, society and public policy at Rice University's Baker ...

Diplopedia a success at US Department of State

May 20, 2010

A new study released today by Rice University and the U.S. Department of State's (DOS) Office of eDiplomacy looks at the five-year history of creating and implementing Diplopedia, DOS' use of the Wikipedia-style diplomacy ...

China Telecom denies US web hijack allegations

November 18, 2010

State-owned China Telecom on Thursday rejected US claims that its servers "hijacked" highly sensitive Internet traffic on American government and military websites earlier this year.

Recommended for you

A not-quite-random walk demystifies the algorithm

December 15, 2017

The algorithm is having a cultural moment. Originally a math and computer science term, algorithms are now used to account for everything from military drone strikes and financial market forecasts to Google search results.

FCC votes along party lines to end 'net neutrality' (Update)

December 14, 2017

The Federal Communications Commission repealed the Obama-era "net neutrality" rules Thursday, giving internet service providers like Verizon, Comcast and AT&T a free hand to slow or block websites and apps as they see fit ...

US faces moment of truth on 'net neutrality'

December 14, 2017

The acrimonious battle over "net neutrality" in America comes to a head Thursday with a US agency set to vote to roll back rules enacted two years earlier aimed at preventing a "two-speed" internet.

The wet road to fast and stable batteries

December 14, 2017

An international team of scientists—including several researchers from the U.S. Department of Energy's (DOE) Argonne National Laboratory—has discovered an anode battery material with superfast charging and stable operation ...


Adjust slider to filter visible comments by rank

Display comments: newest first

not rated yet Mar 23, 2011
Didn't really see a scenario anywhere is this article? Would have been better if it was a little longer with some more predictions on what might happen.. overall ..... 2 maybe even a 1 i juss feel a little generous today.
not rated yet Mar 23, 2011
Maybe people may want to read the blogs on this Physorg.com article titled "China plugging holes in 'Great Firewall'" to see how some are so very ignorant

not rated yet Mar 23, 2011
I'm sorry but my conventional thinking is that the main purpose of this paper is to present the name of Mr. Bronk to conventional thinkers as an authority and potential study grant recipient.
not rated yet Mar 23, 2011
Get linux.
not rated yet Mar 23, 2011
The way i see it is thus:

If you want a computer to be fully protected from Cyber Terror, there is no firewall in the world that will stop a savvy hacker or group. The ONLY way to ensure protection for sensitive data and systems is to completely remove access to and from those computers over the internet.

No workable system will ever be able to stop those who are determined to break in. What we need to do is really look at why sensitive data and systems are accessible via the internet.
5 / 5 (2) Mar 23, 2011
i mean yah, there are abstract ways of getting meaning out of this article but i was pulled in under the belief that i was about to read a serious what if scenario... that i did not get.
4 / 5 (1) Mar 23, 2011
I had hoped there would be a scenario played out in this article as well. There is little information beyond.. "China and USA could have a Cyberwar sometime in the future.. be afraid"
not rated yet Mar 24, 2011
and kaas yah linux is nice i run it too, but same issue their except for the fact that the hacker is just brute forcing his way into your box and then ruining you day. lol
not rated yet Mar 24, 2011
Your version of linux is probably ordinary, and not even SELinux.
not rated yet Mar 24, 2011
no, im just saying it can still be hacked into. No matter what custom modifications you make to your system.
not rated yet Mar 24, 2011
Only if you are at the computer itself, have lots of time and have the source code of that particular version of linux.

Conclusion, its impossible, unless you have developed it and put some backdoor in it.
not rated yet Mar 24, 2011
A secure custom linux kernel is *VERY* difficult to hack into. With proper setup, and what not, one can make it virtually impossible.

If the proper steps are taken with BIOS and Physical Security (lock on door, security guards, live montiored cameras) it is possible to reduce the possibility of a system being hacked to virtually zero.

Most hacking jobs are done using Social Engineering techniques which involve tricking you into giving away your password, or by breaking a simpler system to gain a password you use on multiple systems (hacking your MSN acct to get your password which is the same you use for your bank, etc).

When REAL hacking is done, the target is USUALLY WIN or MAC based, and even then it's usually a matter of taking advantage of a program installed on the OS not a hole in the OS it's self (using ActiveX or Flash for instance).

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.