The conflict between Google and China is no run-of-the-mill business dispute. The corporate leviathan and national behemoth have come to blows in a serious skirmish whose outcome remains unpredictable. While mere mortals should be concerned if not afraid when rivals like these clash, the conflict does shine a light on what is going on in the hidden world of cybersecurity.
Without doubt the Chinese are up to no good, but it is hard to feel much sympathy for Google. As Faust, it entered into a pact with China by readily acceding to Beijing’s demand that the company censor its search results on Google.cn in exchange for a 30 percent share of the Chinese market. Do No Evil As Long As It Doesn’t Interfere With Your Business Plan. Well, Mephistopheles has now claimed his first payment, and Faust wants to pull out of the deal.
This is not the first time China has tried to steal a march on its commercial competitors. Hundreds of US and other foreign firms fear that companies or government agencies from China have penetrated their computer systems in search of design blueprints and other intelligence.
In the wake of the Google revelations, however, the administration of US President Barack Obama has accused the Chinese of violating freedom of speech and human rights. It has further charged Beijing with perpetrating industrial espionage because the attacks appear to have probed for the secrets of the search engine and Gmail.
The presidency has never gone so public with criticism of China’s human rights policy and its disregard for intellectual copyright law. However, that’s not the reason why it has become so involved in the controversy. Google is the most powerful presence on the Internet, with the largest repository of data in the world. And for all its global reach, it’s a US company. The Chinese hack goes well beyond a plot to nick ideas on improving the manufacture of widgets. Attack Google and you attack the US’ critical infrastructure. Washington regards this as a major security issue.
In the past decade, several powers have started to integrate the cyberworld into their defense strategies. Cybersecurity broadly comprises two elements. The first is not new: exploiting advanced technology to improve conventional weapons. The drones that now make most of the battlefield sorties in Afghanistan are steered from Nevada by a computer operator.
The more interesting sphere concerns critical infrastructure: water, energy, banking, communications, air traffic control and almost all military systems are dependent on the smooth running of complex computer systems. If a virus or hacker can provoke a collapse, then water won’t come out of the taps, petrol won’t flow from the pumps, ATMs won’t dispense cash, the phones won’t work — and your missiles won’t launch.
In conventional and even nuclear warfare, your assets are relatively easy to measure against those of your opponent. You have 75 tanks and your opponent has 125, but yours are fitted with better weapons systems — roughly even.
Cyberwarfare is not like that. Your assets consist of your opponents’ vulnerabilities and your ability to exploit them. This means that to defend yourself, you have to breach your opponent’s defenses: Implicit in any cyberdefense strategy is the development of a comprehensive offensive capability.
This was the thinking behind the former US president George W. Bush’s Total Information Office (TIO), created under the Patriot Act, which in effect mandated security agencies and the Pentagon to gather up all information possible about actual or potential enemies, using any means — including probing weaknesses in cyberdefenses. The TIO was disbanded, though most core programs have been spread around departments.
For the most part, however, the Bush administration’s cybersecurity policy was characterized by incompetence and organizational chaos. But Obama has made clear that this is now a strategic priority for the US. The recent appointment of Howard Schmidt — a hardnosed former cop who is extremely tech savvy — to the post of cybercop suggests that Washington means business.
The US and NATO have invested considerable resources in monitoring the defenses of their major rivals, as well as non-state actors suspected of hostile intent. Russia, China, India and Israel have been replying in kind. The Russian FSB’s Department M maintains a close watch on all Internet activity in collusion with the Russian military. China regularly mobilizes its “netizen” army to probe the systems of perceived enemies beyond its borders. And Israel, in comparative terms, has by far the most sophisticated cyberintelligence on the planet. In the military sphere, far from bringing the world closer together, the Internet is underscoring national interests.
There are few rules in this brand new sector of security and warfare. Anybody launching attacks has the ability to disguise their origin, so the potential for double and triple bluff is endless.
One security analyst described this chaotic scramble to me as “like playing a seven-dimensional game of chess in which you’re never sure who the opponent is at any one time.”
Let the games begin.
The government and local industries breathed a sigh of relief after Shin Kong Life Insurance Co last week said it would relinquish surface rights for two plots in Taipei’s Beitou District (北投) to Nvidia Corp. The US chip-design giant’s plan to expand its local presence will be crucial for Taiwan to safeguard its core role in the global artificial intelligence (AI) ecosystem and to advance the nation’s AI development. The land in dispute is owned by the Taipei City Government, which in 2021 sold the rights to develop and use the two plots of land, codenamed T17 and T18, to the
US President Donald Trump has announced his eagerness to meet North Korean leader Kim Jong-un while in South Korea for the APEC summit. That implies a possible revival of US-North Korea talks, frozen since 2019. While some would dismiss such a move as appeasement, renewed US engagement with North Korea could benefit Taiwan’s security interests. The long-standing stalemate between Washington and Pyongyang has allowed Beijing to entrench its dominance in the region, creating a myth that only China can “manage” Kim’s rogue nation. That dynamic has allowed Beijing to present itself as an indispensable power broker: extracting concessions from Washington, Seoul
Donald Trump’s return to the White House has offered Taiwan a paradoxical mix of reassurance and risk. Trump’s visceral hostility toward China could reinforce deterrence in the Taiwan Strait. Yet his disdain for alliances and penchant for transactional bargaining threaten to erode what Taiwan needs most: a reliable US commitment. Taiwan’s security depends less on US power than on US reliability, but Trump is undermining the latter. Deterrence without credibility is a hollow shield. Trump’s China policy in his second term has oscillated wildly between confrontation and conciliation. One day, he threatens Beijing with “massive” tariffs and calls China America’s “greatest geopolitical
Taiwan’s labor force participation rate among people aged 65 or older was only 9.9 percent for 2023 — far lower than in other advanced countries, Ministry of Labor data showed. The rate is 38.3 percent in South Korea, 25.7 percent in Japan and 31.5 percent in Singapore. On the surface, it might look good that more older adults in Taiwan can retire, but in reality, it reflects policies that make it difficult for elderly people to participate in the labor market. Most workplaces lack age-friendly environments, and few offer retraining programs or flexible job arrangements for employees older than 55. As