{"id":811,"date":"2020-04-14T17:03:32","date_gmt":"2020-04-14T15:03:32","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=811"},"modified":"2020-04-14T17:03:34","modified_gmt":"2020-04-14T15:03:34","slug":"china-from-culture-to-conflict-in-the-cyberspace","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/china-from-culture-to-conflict-in-the-cyberspace\/","title":{"rendered":"China: From culture to conflict in the cyberspace"},"content":{"rendered":"\n<p>\nSince\nin 2013 the US cybersecurity consultancy Mandiant published its\nfamous report about APT1, showing its links with different agencies\npresumably associated with the Chinese government, the news about its\nactions in cyberspace has been significantly increased.<\/p>\n\n\n\n<p>\nAmong\nothers, we find APT15, APT27 or Winnti Group (APT41); the US DoJ&#8217;s\nallegations of cyber espionage towards five Chinese military members\nassociated with the APT1 group; the links that the FBI has\nestablished between Zhu Hua and Zhang Shilong and APT10; or the\nalleged link of PLA unit 61398 (People&#8217;s Liberations Army) with APT1.<\/p>\n\n\n\n<p>\nWith\nthe permission of Russia and its popular operation against the DNC,\nChina has become the main actor in cyberspace, developing an\nuncountable number of operations against all kind of sectors as: IT,\nmilitary or naval industries and different governmental\norganizations. Sometimes using more sophisticated malware, and\nsometimes less, but more and more with its own seal linked to its\nextensive tradition.<\/p>\n\n\n\n<p>\nAccording\nto traditional ancient texts, Chinese civilization dates back more\nthan 4,000 years with the first Xia dynasty. Due to the continuity\nand strength of its political and social structure, the protection of\nits historical and cultural legacy and the practically null western\ninfluence until the 19th century, the Chinese Empire is considered\nthe oldest empire that exists.<\/p>\n\n\n\n<p>\nThe\nhistorical endurance of the Chinese empire has not been based solely\non military victories, but on its peculiar way of understanding\nresistance to foreign invasion. As an example, the Qing Dynasty, the\nlast Chinese dynasty that ruled between 1644 and 1912, was founded by\nthe Aisin-Gioro clan of Manchuria (the Manchus are currently an\nethnic minority) and not by the Chinese population as it could be\nthough. Similarly, the Yuan dynasty (1279-1368) was founded by Mongol\ninvaders, heirs to the legacy of Genghis Khan.<\/p>\n\n\n\n<p> Despite this, the language, customs and tradition remained unchanged thanks to the Chinese bureaucratic elites, who offered their services to the invaders with the excuse of the difficulty that would supposed to control a country with such dimensions, and making the only condition to maintain their methods and language. Because of this, the second-generation of invaders would assimilate the culture, coming to be seen as outsiders by their home territories, and finally, ending up defending China&#8217;s national interests.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/04\/mountain-3022908_1920-1024x682.jpg\" alt=\"\" class=\"wp-image-812\" width=\"561\" height=\"372\"\/><\/figure><\/div>\n\n\n\n<p>\nThe\nresistance and adaptability typical of the Chinese character towards\nthe invader is still present, and we have witnessed the\ntransformation of a society that in 1984 was fundamentally\nagricultural (40% of its GDP), and that just 35 years later dominates\nthe technological world scenario with to the United States as well,\nleading the deployment of 5G by the hand of Huawei. Such achievement\nhas occurred not only in terms of competitiveness, but also by making\nits technology an intrinsic part of its legacy and by putting\ntechnological development at the service of the national interest.<\/p>\n\n\n\n<p>\nAs\nthe comparison mentioned by the former head of the Canadian\nIntelligence and Security Service for Asia-Pacific, Michel\nJuneau-Katsua, if Western intelligence had to steal a beach, he would\ngo at night and wait for nobody to see him to steal it. On the other\nhand, if Chinese intelligence had to do it, it would send a thousand\ntourists and on the way back they would shake their towels, day by\nday.<\/p>\n\n\n\n<p>\nHiding\nin broad daylight is a concept associated with Eastern culture,\nbecause, even leaving aside large corporations such as Xiaomi or\nHuawei and the obvious possibility of controlling &#8220;their&#8221;\ndevices, they have managed to install software of all kind on any\ncomputer on the planet. It is not uncommon to find binaries with\nMandarin language resources or drivers signed by Chinese companies,\nwhich could potentially facilitate a campaign directed against any\norganization.<\/p>\n\n\n\n<p>\nWe\nalso have the issue of electronic devices, the global massive sale\nwhich has allowed the worldwide deployment of a potentially\nvulnerable network of video surveillance cameras, loudspeakers or\nsmartbands. Meanwhile, it competes with Google and Amazon for the\ncontrol of the information at home.<\/p>\n\n\n\n<p> However, China is not interested in entering the Thucydides trap through a direct confrontation against the United States, but will use, as it has done in the past, the multipolar geopolitical scenario to achieve its purposes.<br><br><\/p>\n\n\n\n<p><em> If you use the enemy to defeat the enemy, you will be powerful wherever you go.<\/em><br><br><\/p>\n\n\n\n<p>\nAbout\nto end the Korean War, Mao managed to gain a foothold on the\ninternational scene through a strategy very much in the line with the\nclassic strategist Sun Tzu. In a world in which two great\nsuperpowers, the United States and the Soviet Union, fought for world\nhegemony, he managed to see them as equals.<\/p>\n\n\n\n<p>\nIt\nfaced the United States in the Taiwan Strait conflict and, almost at\nthe same time, ideologically and geopolitically dissociated itself\nfrom the communist bloc. This position was based on the fact that\nnone of the powers would allow the launching of nuclear weapons on\nMandarin territory, and the maintenance of a public position that\nclaimed to have no fear of such weapons. As Mao himself stated,\n\u201cChina has 600 million inhabitants in an area of \u200b\u200b9.6 million\nsquare kilometers. The United States cannot annihilate China with a\nsimple pile of atomic bombs. &#8220;<\/p>\n\n\n\n<p>\nExercising\nan active position, Mao ended up being part of the international\nbalance with an independent voice, exerting psychological pressure on\nboth sides through the conflicts in the Taiwan Strait and his\nintervention in the Vietnam War.<\/p>\n\n\n\n<p>\nThe\ncurrent world offers very good opportunities for these puppeteer\nperformances, as the attribution of a hostile act in cyberspace is\ntruly complex, as evidenced by the false flag operation reported by\nKaspersky on OlympicDestroyer. During the 2018 South Korea Winter\nOlympics, the OlympicDestroyer malware paralyzed IT systems, caused\noutages, and brought down the organization&#8217;s websites.<\/p>\n\n\n\n<p>\nWhat\nis relevant about these actions is that, as detailed in the report,\nthe tactics, techniques and procedures (TTP) were those commonly used\nby the Lazarous group, associated with North Korea. However,\neverything indicated that intentional errors had been made in order\nto facilitate the detection of such TTPs, stirring the international\nstage with a campaign with mediatic overtones. This makes more sense\nif we take into account that in February 2018 North Korea was\nsurrounded by sanctions derived from its nuclear plan, specifically\nresolutions 2371, 2375 and 2397 adopted in 2017, which fundamentally\ndamaged its relationship with China.<\/p>\n\n\n\n<p>\nLooking\nto the future, everything indicates that China will continue to bet\non conflict resolution through operations in cyberspace, limiting its\nmilitary interventions to what is strictly necessary or for\npropaganda purposes.<\/p>\n\n\n\n<p>\nThe\nconflict in cyberspace allows, to a certain extent, to abandon\nClausewitz&#8217;s theses and the understanding of confrontation as battles\nthat begin and end, and where the enemies are defined and tangible\nunits. The new era embraces Suntzunian theses, promoting flexibility\nin battle or the use of time as a weapon, concepts that are rather\nforeign to Western tradition.<\/p>\n\n\n\n<p>\nWhile\ntradition in the West has fostered heroism and the coup in the\ndecisive moment, Chinese ideals are based on patience, subtle harm\nand the accumulation of advantages in a gradual way, concepts that\nmatches perfectly in a conflict in Internet.<\/p>\n\n\n\n<p> Thus, China is comfortable with the new approach to the multinational conflict, a world whose rules play in favor of concealment, indefiniteness and confusion. Actually, its rules.<br><br><br><br><br><\/p>\n\n\n\n<p> References<br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2013\/02\/mandiant-exposes-apt1-chinas-cyber-espionage-units.html\">https:\/\/www.fireeye.com\/blog\/threat-research\/2013\/02\/mandiant-exposes-apt1-chinas-cyber-espionage-units.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.elmundo.es\/internacional\/2015\/11\/25\/5654c172268e3eaa7e8b460f.html\">https:\/\/www.elmundo.es\/internacional\/2015\/11\/25\/5654c172268e3eaa7e8b460f.html<\/a><\/p>\n\n\n\n<p>\nOn China \u2013\nHenry Kissinger<\/p>\n\n\n\n<p>\nPrinciples of\nWar for Cyberspace \u2013 Steven E. Cahanin<\/p>\n\n\n\n<p><a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2018_the-olympic-false-flag\">https:\/\/www.kaspersky.com\/about\/press-releases\/2018_the-olympic-false-flag<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since in 2013 the US cybersecurity consultancy Mandiant published its famous report about APT1, showing its links with different agencies presumably associated with the Chinese government, the news about its actions in cyberspace has been significantly increased. Among others, we find APT15, APT27 or Winnti Group (APT41); the US DoJ&#8217;s allegations of cyber espionage towards [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":822,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-811","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorised","8":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/04\/mountain-3022908_1920-1-600x400.jpg","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/04\/mountain-3022908_1920-1-600x600.jpg","author_info":{"display_name":"w0lfvan","author_link":"https:\/\/lab52.io\/blog\/author\/w0lfvan\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/811"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=811"}],"version-history":[{"count":9,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/811\/revisions"}],"predecessor-version":[{"id":821,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/811\/revisions\/821"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/822"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}