Last Wednesday, US Secretary of Defense Robert Gates announced the US was finally getting its act together on cyber-warfare. After a couple of false starts and a good deal of bureaucratic infighting, the Pentagon is setting up a unified US Cyber Command to oversee protection of military networks against cyber threats. It will be called USCybercom and will be led by the director of the National Security Agency, Lieutenant General Keith Alexander.
In a memo to the joint chiefs of staff, Gates said he had directed General Kevin Chilton, head of US Strategic Command, to develop implementation plans for the new command, which he wants on his desk by the beginning of September. Gates says that he expects USCybercom to be up and running by October and to have reached “full operating capability” within a year. That is light speed by federal government standards, so you can bet something’s up.
What it signifies is official recognition by the administration of President Barack Obama that the world has embarked on a new arms race. The weapons this time are malicious data-packets of the kind hitherto employed mainly by spammers, malware programmers, phishers, hackers and criminals. But whereas those operators are in business for mischief or private gain, nations will use their cyber-tools to wreak economic havoc and social disruption.
We’ve already had a case study of how it will work. Two years ago, Estonia experienced a sustained cyber-attack. It happened during a period of tension between Estonia and Russia.
“For the first time,” The Economist reported, “a state faced a frontal, anonymous attack that swamped the websites of banks, ministries, newspapers and broadcasters; that hobbled Estonia’s efforts to make its case abroad. Previous bouts of cyber-warfare have been far more limited by comparison: probing another country’s Internet defenses, rather as a reconnaissance plane tests air defenses.”
The onslaught was of a sophistication not seen before, with tactics shifting as weaknesses emerged. Individual “ports” (firewall gates) of mission-critical computers in, for example, Estonia’s telephone exchanges were targeted. The emergency number used to call ambulance and fire services was out of action for more than an hour. And so on.
It was a chilling demonstration of what is now possible, and it made governments sit up and take notice. Estonia is a member of NATO and the alliance responded by setting up a specialist cyber-warfare base in the country. Its code name is K5 and British reporter Bobbie Johnson visited it this year.
Johnson recounts what one of the staff told him about how NATO would react to another cyber-strike: “Overwhelming response: a single, gigantic counterstrike that cripples the target and warns anyone else off launching a future cyber-war. He isn’t sure what it would look like, but the show of force he envisages is so severe that the only thing he can compare it to is a nuclear attack.”
Hyperbole maybe, but all military establishments are tooling up. Last Thursday, British Prime Minister Gordon Brown revealed that his government had set up a “strategic” unit within the Government Communications Headquarters (GCHQ). Lord West, the retired admiral drafted in to the Home Office to look after security, told the BBC that “the government had developed the capability to strike back at cyber attacks,” though he declined to say if it had ever been used.
If Chinese, Russian, Israeli and Iranian ministers were free to speak on the subject, the message would be much the same.
If you’re not worried, you have not been paying attention. Almost without realizing it, our societies have become hugely dependent on a functioning, reliable Internet.
Life would go on without it, but most people would be shocked by how difficult much of the routine business of living would become. It would be like being teleported back to the 1970s. Even a minor conflict could slow the global Internet to a crawl. So cyber-war is a bit like nuclear war, in that even a minor outbreak threatens everyone’s life and welfare.
In those circumstances, isn’t it time we thought about devising treaties to regulate it? We need something analogous to the 1925 Geneva Protocol to the Hague Convention, which prohibited chemical and biological weapons. And we need to start now.
Chinese agents often target Taiwanese officials who are motivated by financial gain rather than ideology, while people who are found guilty of spying face lenient punishments in Taiwan, a researcher said on Tuesday. While the law says that foreign agents can be sentenced to death, people who are convicted of spying for Beijing often serve less than nine months in prison because Taiwan does not formally recognize China as a foreign nation, Institute for National Defense and Security Research fellow Su Tzu-yun (蘇紫雲) said. Many officials and military personnel sell information to China believing it to be of little value, unaware that
Before 1945, the most widely spoken language in Taiwan was Tai-gi (also known as Taiwanese, Taiwanese Hokkien or Hoklo). However, due to almost a century of language repression policies, many Taiwanese believe that Tai-gi is at risk of disappearing. To understand this crisis, I interviewed academics and activists about Taiwan’s history of language repression, the major challenges of revitalizing Tai-gi and their policy recommendations. Although Taiwanese were pressured to speak Japanese when Taiwan became a Japanese colony in 1895, most managed to keep their heritage languages alive in their homes. However, starting in 1949, when the Chinese Nationalist Party (KMT) enacted martial law
“Si ambulat loquitur tetrissitatque sicut anas, anas est” is, in customary international law, the three-part test of anatine ambulation, articulation and tetrissitation. And it is essential to Taiwan’s existence. Apocryphally, it can be traced as far back as Suetonius (蘇埃托尼烏斯) in late first-century Rome. Alas, Suetonius was only talking about ducks (anas). But this self-evident principle was codified as a four-part test at the Montevideo Convention in 1934, to which the United States is a party. Article One: “The state as a person of international law should possess the following qualifications: a) a permanent population; b) a defined territory; c) government;
The central bank and the US Department of the Treasury on Friday issued a joint statement that both sides agreed to avoid currency manipulation and the use of exchange rates to gain a competitive advantage, and would only intervene in foreign-exchange markets to combat excess volatility and disorderly movements. The central bank also agreed to disclose its foreign-exchange intervention amounts quarterly rather than every six months, starting from next month. It emphasized that the joint statement is unrelated to tariff negotiations between Taipei and Washington, and that the US never requested the appreciation of the New Taiwan dollar during the