A common concern of anyone with a personal computer is that of viruses. Viruses can cause harm to the computer and steal information. But, are government and military systems vulnerable as well? What might be stolen? Could cyber-attacks be used to cause physical damage? What other vulnerabilities might be exploited in a cyber-attack? Could an attack disrupt infrastructure such as power grids? All these questions and more are answered in the FAQ below.
It is difficult to concisely define a cyber-attack. Not only is there a wide range of possible methods, but each method delivers the attack differently, with various speeds and types of destruction. According to the FBI, "the term was coined in the 1980s by Barry Collin who discussed this dynamic of terrorism as transcendence from the physical to the virtual realm and 'the intersection, the convergence of these two worlds.'" More broadly, a cyber-attack could be described as attack performed within the realm of cyberspace.
A cyber-attack is not a specific weapon; rather, it can be thought of as a strategy. As will be seen later, a cyber-attack is capable of performing a variety of functions, from stealing information and dispersing false information, to destroying a very limited amount of machinery and even causing large-scale blackouts. The former of these two ranges is more commonly referred to as cyber-espionage while the latter is called hostile attacks. The graph below depicts the startling escalation in the number of cyber-attacks.
Simpler, less harmful types of cyber-attacks are, however, part of the everyday life of the majority of the United States population. Anyone who regularly connects to the Internet is exposed to various types of malware (malicious software) including viruses, spyware, worms, trojan horses, SQL injections (typically associated with “hacking”), etc. Such threats can become harmful attacks by simply clicking on unwanted pop-up advertisements or opening the wrong email or attachment. These can suddenly delete computer files, steal personal information or completely destroy a computer. These malicious pieces of software are spread through email, USB drives, downloads, networks and more.
Access: a method to get inside or gain access to a network or system
Vulnerability: some part of the system that the attacker can take advantage of or manipulate
Payload: the purpose of the attack, namely, what exactly is the target and how significant will the damage be
A safe cracker, for instance, must know where the safe is and how to get into it. The vulnerability would require knowledge of the safe, its locking mechanism and what aspects may be exploited. The payload, in this case, would be a bag full of money. Given these three aspects, prior intelligence is needed to understand what access is available and what vulnerability can be exploited in order to attack precise targets.
A standard computer virus, probably the most common form of a cyber-attack, may gain initial access to a computer or system in two ways: remotely or proximately. Some viruses, such as Conficker, spread through a network of computers (remote access) by exploiting holes in the network security or by attaching an infected USB drive to a computer. Such a virus is not only capable of ruining services on the computer itself, but also of blocking certain websites that might enable the user to eliminate the virus. A virus, Trojan, worm, etc. is primarily the means of carrying out a cyber-attack (see chart above), while the real attack is the virus’ payload.
There are many other forms cyber-attacks may take. A denial of service attack occurs when “an attacker attempts to prevent legitimate users from accessing information or services.” This is typically accomplished when the attacker overloads a system with requests to view information. This would be an example of a remote attack. By extension, a distributed denial of service (DDoS) occurs when multiple computers are involved in a denial of service attack causing an even larger amount of traffic on the target website. This is the same concept as we’ve all experienced with cell phone disruption due to high usage.
Spearphishing is another simple method by which an attack may gain access to a computer system or network. Once some information about a target is acquired, an email is sent purporting to be from a legitimate company asking for information such as usernames and passwords to banking websites or network logins.
Backdoors, or hooks, are placed inside a computer or network in order to create a vulnerability that can be exploited later on.
If direct access is possible, tampering with basic electronics is a simple type of cyber-attack. It is also possible that such software or even hardware could be installed into electronics by the original manufacturer. Some fear that this is what is being done in Chinese-produced microchips for various American computer companies.
Here’s a look at how fast the number of threats have been rising this decade:
As cyber-attacks encompass a wide range of methods, they are also capable of affecting a very wide range of targets. Cyber-attacks can affect anything that is connected to a computer or a computer network. This would include not only single computers and network-connected computers but also USB storage devices and even machinery controlled by computer or network equipment. Due to the great diversity of possible targets for cyber-attacks, the next few sections will present several examples of cyber-attacks that have happened in the past.
Despite fear over cyber-attacks on airline services or nuclear facilities, the most common and arguably the most dangerous are attacks on critical infrastructure, as shown here:
2007 saw the emergence of a Trojan-type virus that goes by the name Zeus. Zeus infects a computer through an email attachment attacking both personal computers and businesses. When opened, the virus installs itself on the computer and is able to log username and password information. As a user fills in information on private websites such as online banking, Zeus copies the entered information and sends it back to a designated location on the Internet. Not only has Zeus been responsible for the theft of $70 million as of 2010, it is still being developed to allow for new functionality and is available for sale around the Internet in “underground” circles. Zeus and other cyber-attacks like it are a large part of the reason that the United States has the most cyber-attacks of any nation.
While causing problems for businesses and individuals, there are other threats capable of compromising our national security. The United States now strongly relies on the Internet across the board, including storing even the most sensitive military documents and technologies. According to an article in the Armed Forces Journal, published in 2008, “the Pentagon uses more than 5 million computers on 100,000 networks at as many as 1,500 sites in at least 65 countries worldwide.” With such a great reliance on this massive network, cyber-attacks have become increasingly useful as a weapon against the United States and any country relying heavily on integrated networks.
In 2008 and 2009, while investigating claims of China spying on institutions in Tibet, a vast and complex network of cyber-spionage was discovered. Dubbed GhostNet, this virus had infected at least 1295 computers in 103 countries and had even gained access to government computers from multiple nations. The virus spread inside an email attachment that appeared to be a valid file. Once inside a computer it provided full control of that computer to an outside source allowing searching and downloading of files from the computer.
In 2007 a coordinated experiment called Aurora, was run between the Idaho National Laboratories and the Department of Homeland Security. A cyber-team was given the task of breaking into a simulated electric generation control system and destroying a generator using only a computer and the Internet. In the end the team of hackers was able to bypass the security protocols of the generators safety system, instruct the generator to exceed its safety limits and, quite literally, tear itself apart.
Here’s a list of significant attacks just during July 2011:
In summary, anything relying on computer systems, even the most sensitive data, is capable of being attacked whether remotely over an Internet connection or in proximity through removable devices such as a USB drive.
4. What are the implications of a cyber-attack?
In the case of both cyber- and conventional espionage, plans can be discovered, strategies compromised and secrets stolen. During hostile attacks, systems can be shut down, communications cut off and infrastructure destroyed. An analysis of the many different types of attacks can be found here. Below is a chart showing which systems are the most dangerous and innovative:
Contrary to conventional warfare where the identity of the attacker is often known immediately or can easily be discovered, a cyber-attacker is much harder to discover. The Internet can easily provide an impenetrable shield for the attacker’s identity. Due to the size of certain computer networks, it can also be almost impossible to determine that a network is clean. This just adds further complication.
The following video is a controlled exercise demonstrating a cyber-attack on a chemical facility. The participants were divided into two teams: one to protect the replica chemical plant and one to attack it. In the end, the defending team was left with chemical contamination and no power.
The next video is a report of the Aurora experiment discussed above.
With results similar to those of an EMP attack, a large-scale cyber-attack could shut down a large percentage of the nation’s power grid, leaving entire cities in the dark and unable to carry out a large majority of normal business. Depending on the specific target of the attack within the power grid and the payload, power could be out in these locations for months.
Outside of controlled experiments there have been numerous real attacks that have given us an idea of what might be done in the future.
Estonia, like all modernized nations, relies almost entirely on the Internet for many of the most fundamental functions of business and government. Estonia has a government which, according to the following video, transacts all business online and a population who conducts 99% of banking transactions electronically. In 2007, protesting the relocation of a Soviet war memorial in Estonia, groups of Russian hackers devised and carried out plans creating a denial of service in all Estonian networks. The attacks began by shutting down the websites for the country’s president and parliament. The banking networks were also shut down for multiple days essentially cutting off communication of the Estonian banking system from the rest of the world.
In January of 2012, in response to the shutdown of file sharing websites by the United States and New Zealand governments, a hacker group named Anonymous used DDoS attacks to shutdown multiple government, copyright, music and film industry websites including the U.S. Justice Department’s website.
PlayStation was attacked in April 2011. Many of its online users had credit card information stolen. Following refusal to enable their customers to donate to WikiLeaks, MasterCard and Visa were both shut down by irritated hackers. Google was hacked in 2010. Personal password information and access to accounts was revealed. There is speculation that the Chinese government carried it out in order to access the accounts of government dissidents. Predictably, there are countless more examples of this, but these are some of the highest profile attacks in recent years.
In 2010, the most innovative and physically destructive virus the world has known was unleashed. It was discovered that a virus had been “in the wild” (this refers to a virus being accessible on the world-wide, unsecured Internet) since mid-2009 but had for some reason remained inactive. Closer examination of this virus, Stuxnet, revealed that, while it was reporting back information about the systems it had infected, damage being done to the infected computer was unseen. Stuxnet spread, not through email or infected websites, but with proximity means either through local networks or USB drives. Stuxnet’s target was programmable logic controllers (PLCs) produced by Siemens that control the mechanical operation of many different items worldwide. Specifically, Stuxnet’s targeted the PLCs controlling the uranium enrichment centrifuges at the Natanz nuclear facility in Iran. Once inside the computer networks of Natanz, the virus spread to the PLCs. It instructed the PLCs to increase the rotation speed of the enrichment centrifuges far past operationally safe levels. While this happened, it intercepted warning signals from the controller, silenced alarms, and reported that all was well. Reports of the damage vary but anywhere from 10% to 20% of the centrifuges at Natanz were destroyed.
As was said before, the implications of a cyber-attack vary as widely as the payload it carries, from simple annoyances, to the theft of private or classified information, to the physical destruction of infrastructure.
5. Who has the capability of doing this?
Almost anybody has the ability to deliver a cyber-attack and they generally focus on the places with the most Internet users and most money:
Technically speaking, the only requirement for the execution of a cyber-attack is access to a computer with an Internet connection. Using the Internet for hostile operations, whether against “soft targets,” like individuals or businesses, or against government and military targets, is of great strategic interest to any country. But this is of particular interest to attackers wishing to remain anonymous. Manipulating the route of the attack makes the point of origin very difficult to determine. Further, unlike in conventional warfare, cyber-attacks can be carried out not only remotely but also by small, scattered groups or even individuals. Featured in Wired magazine, a small Romanian town, fittingly nicknamed “Hackerville,” is home to some of the world’s best solo hackers. Though posing a small threat to governments, they have successfully stolen millions of dollars from individuals and businesses around the world.
Attacks against individuals and small targets can be accomplished much more easily than those against high profile, government targets. They most commonly are carried out through email.
Through more difficult, attacks against the United States government yield a much greater reward. Here’s a brief overview of some of the cyber-attack history between the United States and other nations:
For more than a decade China has been working toward a full modernization of its military. The goal of this modernization is for China to become a force capable of conflicts not only in air, land, sea and space, but also in the cyber-realm, or “fifth domain.” As part of electronic warfare, the People’s Liberation Army (PLA) of China is devoting resources and personnel (“cyber-warriors”) that enable it to protect its own networks and also carry out cyber-attacks against foreign adversaries.
Coordinating cyber-attacks with traditional warfare could include theft of strategic information from command centers, theft of technological secrets, sabotage of the defense system, etc. Some argue that China’s efforts in cyber war are “the single largest, most intensive foreign intelligence gathering effort since the Cold War,” and that “Chinese espionage in the United States, which now comprises the single greatest threat to U.S. technology, is straining the U.S. counterintelligence establishment. This illicit activity significantly contributes to China’s military modernization and acquisition of new capabilities.”
Russia's investment in and malicious use of the Cyber domain are not as extensive. However, the destructive abilities certainly do exist. The previously discussed denial of service attacks on Estonia as well as similar attacks on Georgia during the 2008 military invasion have both been attributed to Russia. However, further investigation suggested these attacks may not have been orchestrated by the Kremlin, but rather by groups of Russians working on their own. Notwithstanding, Russia appears to be making further efforts to develop the capacity for national “information warfare.” While Russia sees the benefit of espionage in cyber-attacks, it also sees the primary use of “informational warfare” as a political weapon that, rather than being used to steal information or destroy infrastructure, can be used to destabilize government and ruin general trust.
According to intelligence officials, both Russia and China have been able to infiltrate United States infrastructure, including the electrical grid. While it appears that no damage was done, successful penetration into such a system provides an opportunity for an attacker to plant a backdoor. Backdoors allow the attacker to return to the system at some point in the future.
Iran has had its share of dealing with cyber-attacks in the past, particularly with the attack by Stuxnet. Recently, Iran has invested $1 billion in new technology and personnel for use in cyber warfare and cyber defense. They have also been actively recruiting new members for a “cyber-army.” According to the Iranian government, the country is preparing for a full scale cyber war between Iran and Israel. It claims to have the capabilities for counter attacks against both the U.S. and Israel.
North Korea has shown its ability to carry out cyber-attacks in the past. In 2009, North Korea was able to shut down the U.S. Treasury Department, Secret Service, Federal Trade Commission and Transportation Department websites as well as sites in South Korea. Far from being short outages, some of these sites were incapacitated for 24 hours or more, with the Transportation Department’s site being offline for 48 hours. According to North Korea, 100 world class hackers are trained every year to deliver cyber-terrorism operations particularly with the intent of causing chaos in South Korea. However, this claim by North Korea is believed to be an exaggeration.
In late 2008, a signal was discovered attempting to reach an outside network from inside the US Central Command (CentCom). Given CentCom’s connection with all things pertaining to the wars in Afghanistan and Iraq, this raised great concern. The malware, later named Agent.btz, had also infected networks used by the United States to transmit top-secret information to U.S. officials around the world. Networks for this purpose as well as command networks like CentCom are usually “air gapped,” meaning they are completely isolated from the rest of the Internet. However, this does not mean they are not susceptible to attacks. Agent.btz likely entered these networks through proximity access from an infected USB drive that had been used in an unsecured computer. But critical information was not transmitted to outside computers. This attack led to the creation of a new division of the US Department of Defense, Cyber Command (CyberCom), to centralize the protection of the United States information security.
On the other hand it is argued that the integrity of information and critical infrastructure is vital to national defense, and that therefore sufficient efforts and funds must be allocated to its protection.
The efforts businesses should put into effect are much the same as the efforts discussed regarding national defense. Unfortunately, given the high costs advanced security systems are often impractical for small businesses. Specifically the FCC outlines 10 important tips for businesses:
Train employees in security principles
Protect information, computers and networks from viruses, spyware and other malicious code
Provide firewall security for your Internet connection
Download and install software updates for your operating systems and applications as they become available
Make backup copies of important business data and information
Control physical access to your computers and network components
Secure your Wi-Fi networks – if you have a Wi-Fi network for your workplace, make sure it is secure and hidden
Require individual user accounts for each employee
Limit employee access to data and information, and limit authority to install software
Regularly change passwords
Though not always as useful or convenient as regular networks, networks with critical or confidential information are better secured on air-gapped systems. When critical infrastructure was built, the notion of cyber-attacks was unheard of, let alone a problem. But as the Internet became more widespread, these systems became integrated to enable remote operation. However, this led to vulnerabilities in their systems. Due to the great value and importance of these systems, it is necessary for utility companies like electric and water, to air-gap their networks and controlling systems.
The primary protections against attacks on personal computers are antivirus software and protections built into the computer's operating system (Windows, Mac OS, Linux etc.). Both your operating system and likely your antivirus software will contain firewalls which should always be active. Firewalls essentially serve as a barrier to incoming and outgoing network traffic through your computer.
Conscientiousness is another very important means of keeping personal computers safe.
Do not open suspicious emails and attachments or emails from unknown senders.
Do not click links on the Internet that seem “too good to be true”.
Update your software regularly.
Do not provide personal information including usernames and passwords unless it is certain that the website is legitimate and secure.
Moreover, use discretion even for established websites.
Avoid dealing with companies that have a history of poor cyber-defense.
But what about attacks on infrastructure and military information? Awareness of the issue is important in a discussion of cyber-attacks. Many people have heard about the risks of a cyber-attack on military information, and most have basic antivirus software installed on their personal computer. But too many are unaware of the most important risk to the proper functioning of the nation: critical infrastructure. While there is currently funding for cyber security within the military, such protections, as part of national defense, may need to be perpetuated in the face of budget cuts in order to protect the vital systems holding sensitive military intelligence.
Personal information, while held on personal computers is also held by many companies. Banks, credit card companies, online stores, and more all hold personal information. Because of this, the security of these companies can directly affect the consumer. It is of advantage to every consumer to do business with the more secure companies.
"Just as the philosopher Confucius sought in ancient times to promote mutual understanding between cultures, China is stepping up efforts to do the same today. Over the past five years, the Beijing-based non-profit Confucius Institute has established nearly 300 centers in 87 countries around the world.
The goal: to offer local communities opportunities to learn Chinese language and...
"The year 2012 will see a stream of new books in the patented Thomas Friedman 'Oh My God the Chinese Are Eating Our Lunch with Environmentally Friendly Chopsticks' mold. Some will be more worthwhile than others. One book in particular, however, is sure to stand out, if only for the title: 'Becoming China's Bitch: And Nine More Catastrophes We Must Avoid Right Now.'"
"In part because the United States is asserting its presence in Asia, Chinese scholars have begun voicing opposition to the government's decades-long policy of non-alignment, which they think is outdated and unsuited to a rising great power."
"The credibility of the Obama administration's 'pivot' to China is also being tested, and Washington must decide how to respond to Beijing's growing assertiveness. To simply leave far weaker neighboring states to face China alone risks surrendering U.S. influence in Asia and making conflict more likely."
"China executes around 4,000 people a year, the most in the world but half the number it did before ordering Supreme Court reviews of all death penalty cases in 2007, a U.S. human rights group said Tuesday.
Chinese officials revealed the decline in executions during a seminar with United Nations officials and international experts in the eastern city of Hangzhou earlier this month, the...
"The World Trade Organisation (WTO), like many clubs, denies patrons the right of automatic readmission. Having quit the organisation’s predecessor shortly after the Communist revolution of 1949, China had to wait 15 long years to gain entry after reapplying in the 1980s. The doors finally opened on December 11th 2001, ten years ago this week."
"Say what you will about the death penalty, this is a pretty embarrassing list to be on.
Amnesty's 2010 Death Penalty Report named China as the top executor with thousands of executions. Iran came in second with 252 executions, followed by North Korea at 60, Yemen at 52, USA at 46, Saudi Arabia at 27, Libya at 18 and Syria at 17."
"The bitter intellectual property dispute between an American technology company and one of China's biggest wind turbine makers has escalated to China's Supreme Court, heightening commercial tensions between the world's largest and second-largest economies."
"Outgoing Chinese president Hu Jintao is keeping the nation and the rest of the world guessing over whether he will seek to hang on as armed forces chief, sources said, highlighting a potentially serious weakness in Beijing's succession planning."
"It is time -- well past time, in my view -- for the United States to cease its Cold War-style reliance on nuclear weapons as a foreign-policy tool. At the risk of appearing simplistic and provocative, I would characterize current U.S. nuclear weapons policy as immoral, illegal, militarily unnecessary, and dreadfully dangerous. The risk of an accidental or inadvertent nuclear launch is...
"No nation state has ever been definitively linked to an act of cyber warfare, but the internet is certainly being used as a battlefield. Even though governments are not owning up to it, two recent events make state involvement look more likely than ever."
In this brief introduction, Erika Lee tells stories depicting the struggle some Chinese people had in attempts to immigrate to America. She goes on to explain some of the details of the Chinese Exclusion Laws. For a more thorough look, check out the full book.
"Bright young graduates in China are being recruited to come teach in the United States as volunteers. Ideally they should have excellent Chinese language skills, a friendly manner, be able to sing, play an instrument, and have good grades. Oh, and they're not allowed to believe in Falun Gong.
The discriminatory hiring policy applies to all Chinese who would volunteer at Confucius...
"Over the past two years, countries in Southeast Asia – and in some other parts of the world – increasingly have noticed sharp changes in Chinese foreign policy. These have been most evident regarding disputes over the South China Sea, contested territories with Japan, and other hot spots, but a new, more aggressive foreign policy is noticeable even in some of the most minor bilateral issues with China. Yet often China's new, more proactive foreign policy actually seems to be backfiring, costing Beijing many of the gains it made in winning Asian nations' trust during the late 1990s and early 2000s."
Twenty years ago, on June 5, 1989, following weeks of huge protests in Beijing and a crackdown that resulted in the deaths of hundreds, a lone man stepped in front of a column of tanks rumbling past Tiananmen Square.
"China may abandon its long-held policy of avoiding foreign alliances for fear of alienating members of the Association of Southeast Asian Nations (ASEAN), which failed to agree on a code of conduct for territorial disputes in the resource-rich South China Sea at a summit last month, the Financial Times reported recently."
In a speech Wednesday ..., Gen. Chen Bingde ... said China's economic rise and recent military-modernization efforts had 'unfortunately aroused unfounded suspicion and exaggeration of China's defense and military development.'
"A new innovation has the U.S. clean-energy business buzzing, one with big political risks and potentially bigger economic and environmental rewards. It isn't a wind turbine, or a solar panel, or an electric car. It's Chinese cash."
"Canada's Prime Minister Stephen Harper has just completed his seventh annual foray to the Arctic. The PM's annual northern tours have traditionally focused on a combination of announcements affecting economic development, environmental protection, and defense readiness. The ever-shrinking ice cap is bringing new challenges to Canadian policy makers, particularly with regard to the...
"The U.S. trade deficit with China continues to grow even as the rest of the world runs a trade surplus with Beijing, potentially exacerbating a political problem for President Barack Obama as this year's campaign debate unfolds."
"It's a problem for U.S. retailers when Communist China makes fake designer handbags and illegal copies of our music CDs, but it's a much bigger problem when the fakes are chips installed in our military weapons. The American people are starting to discover that counterfeit computer components bought from the Chinese are used in our warplanes, ships and communication networks."
"With its economic and political might firmly established, once-insular China has spent the better part of the past decade putting on a charm offensive, spending hundreds of millions of dollars to try to shape the way the country is perceived around the world.
This ambitious effort to gain friends and influence – building its so-called soft power – has targeted students first and...
"This week, as Hurricane Sandy swept the U.S. east coast, China's state media have carried out intensive reports on the disaster, stirring up debate over the reasons and necessity of such massive coverage in China. Chinese media expert He Hui sees the coverage of Sandy as an important opportunity to implement the 'going out' strategy."
"The Chinese navy may be developing a brand new class of guided-missile destroyer, the Type 052D, and would be producing several hulls to reinforce China's naval capabilities, according to a Global Times report.
In recent weeks, Chinese military websites have been buzzing with news that a series of blurry pictures portray the 052D, which military watchers are comparing to the Aegis-...
"China's top leaders have asked policy think-tanks to draw up their most ambitious economic reform proposals in decades that could curb the power of state firms and give more freedom to the setting of interest rates and the yuan currency."
"China urged the United States to cancel a scheduled meeting between President Barack Obama and exiled Tibetan spiritual leader the Dalai Lama at the White House on Saturday, saying such a meeting would harm US-China relations.
The White House announced on Friday that Obama would speak with the Dalai Lama about Tibet in their first meeting in more than a year. The announcement upset...
"A fight over alleged corporate espionage goes before China's highest court Friday, in a test case watched by U.S. companies for signs of whether China is willing to rein in what they see as unfair behavior."
China faces a dilemma. They have opened up their economy and reaped huge benefits, perhaps the largest advance in human well-being in the history of the world — as the editors of Global Times defiantly argue.
"China's military will deploy unmanned aerial vehicles (UAV), or drones, to conduct maritime surveillance missions over coastal provinces, state-run media reported Thursday.
The military is currently conducting trial missions that are slated to end within a day or so, according to Global Times, a Chinese communist party mouthpiece overseen by People's Daily. The drones will be involved...
"A Chinese frigate grounded in disputed waters close to the Philippines was refloated on Sunday and headed back home, averting a possible standoff with the Philippines navy amid rising tensions in the strategically key South China Sea."
"China is circumventing international sanctions against Iran by enlisting North Korea’s help in providing the Islamic state with its most advanced intercontinental ballistic missiles and the technical expertise to make those nuclear warhead-capable missiles operational. And now the Communist giant is threatening to come to Iran’s defense should the missile or nuclear sites be attacked."
"The number of unsafe consumer products removed from the European market increased by more than half last year  and China remained the biggest source of potentially dangerous toys, appliances and other merchandise, according to a European Union report."
"Chinese state media lashed out at U.S. Secretary of State Hillary Clinton on Friday in the midst of her six-nation African tour, illustrating the struggle for influence between the U.S. and China over the resource-rich region."
"A senior cyber-security official in China said recently that the country wants to work with other nations to improve cyber security. Yet along with this pledge came another example of the back and forth between nation-states that has become a common feature of many public discussions about security. This time however, it was China pointing fingers at the United States."
"China's Communist Party concluded a generational shake-up of its military top brass Sunday when state media announced the appointment of an army general and a former air-force commander as vice chairmen of its Central Military Commission—the body that controls the armed forces."
"The statement by the China Chamber of Commerce for Import and Export of Machinery and Electronic Products on Thursday was the latest salvo in an escalating battle between China and the U.S. over trade in the renewable-energy sector. Over the past three weeks, each side has accused the other of providing illegal subsidies to prop up its sector."
"The Chinese government has announced retaliatory measures over a planned sale of advanced US weaponry to Taiwan. China's defence ministry said it would suspend military exchanges with the US, impose sanctions on companies selling arms to Taiwan and review wider co-operation on international issues. The confrontation over the $6.3bn (£4bn) arms sale to Taiwan – a self-governing island that...
"China has declared its one-party political system to be unshakeable and redoubled a campaign to suppress human rights in the wake of the award of the Nobel peace prize to Liu Xiaobo, the democracy activist."
"China appears to be within two years of deploying submarine-launched nuclear weapons, adding a new leg to its nuclear arsenal that should lead to arms-reduction talks, a draft report by a congressionally mandated U.S. commission says."
In 2009, despite no cap-and-trade law, no carbon tax and no major reductions mandated by our EPA, U.S. carbon dioxide emissions dropped by 7.1%, more than in any year since they began tracking emissions in 1949.
"According to the State Oceanic Administration, 11 unmanned aerial vehicle bases will be built in 11 coastal provinces and regions to monitor the country's vast water areas, Legal Daily reported on Aug 27.
Unmanned aerial vehicles can fly in set routes, recording and sending back timely remote sensing data, improving China's capacity in water monitoring, said Yu Qingsong, director of...
President Obama's goal of creating American jobs has thrust the Chinese currency onto center stage in Washington, where an undervalued renminbi is blamed for the trade deficit with China, and the deficit is blamed for U.S. job losses.
"China's government said it will 'proactively' invest in energy projects abroad to secure reliable supplies for its expanding economy, a day after the announcement of two overseas acquisitions for $16.6 billion."
"Terming the South China Sea as a disputed region, China has warned India to refrain from undertaking oil exploration in the resource-rich Vietnamese blocks in order to ensure 'peace and stability' in the area."
"In a tit-for-tat move, China Wednesday warned that it will probe illegal EU subsidies to counter Brussels' reported decision to launch anti-dumping cases against Chinese telecom firms for receiving subsidies.
With the European Union reportedly poised to launch trade cases against telecom equipment makers in China, accusing them of getting subsidies, Beijing is investigating if the EU...
"The United States is shifting its focus from the Atlantic across to the Pacific. However, if an Arctic century is on the horizon, then China is at the forefront of it. While Washington enhances its relationships across the Asia-Pacific basin, Beijing is busy engaging Arctic Ocean coastal states en masse. The Middle Kingdom is apparently interested in the commercial viability of new shipping...
"There's been an interesting new development in China's use of cyber space as an element in its intelligence and security operations. The People's Liberation Army (PLA) is reportedly funding a vast complex of part-time cyber-devotees to supplement and compliment the official structure of cyber interception and invasion.
Equally as interesting is the willingness of the Chinese...
China’s published defense budget does not include large categories of expenditure, including expenses for strategic forces, foreign acquisitions, military-related research and development, and China’s paramilitary forces.
"It is evident when China's aircraft carrier carves it way through the waters of the Yellow Sea. It is written between the lines of its growth statistics. It is built into the gleaming walls of the African Union headquarters half a world away. As the country's might increases, China's maxim of 'keeping a low profile' looks increasingly irrelevant, even absurd, to many."
"Researchers in Toronto have released a document that describes what may be the first real evidence of a government-operated cyber-espionage network in action. In a ten-month investigation, the team documented the operation of what they dubbed GhostNet, and its various worldwide infection."
"China's military spending has been rapidly spiraling upward, and the growing amounts are unnerving Beijing's Asian neighbors and policy planners in the Pentagon, who are openly wary about the country's long-term intentions."
"In just 35 years, China's ruling Communist Party has transformed the country from economic back-water to economic giant. Most Chinese have accepted its authoritarian and often brutal rule because they have grown richer and have seen their country's prestige restored. But as the Party prepares for a major leadership change, can such a rigid political system deliver the reforms China needs to move to the next stage of development?"
"Is the world's most populous nation about to get more crowded? Reports surfaced in international media last week that in an effort to slow the rapid graying of the workforce, couples in Shanghai — the country's most populous city — would be encouraged to have two kids if the parents are themselves only children. Shanghai officials have since denied any policy shift, saying this caveat is...
"Such image building in the nationalistic discourse of modern Chinese foreign relations is a lot further from the truth than the victimization depicted in Chinese discourse. China was oppressed by various powers for much of the 19th and 20th centuries. In contrast, the evidence of a moral, principled, and benign approach has been the exception rather than the rule in the zig-zags of the often...
"I was recently invited to lecture at several Chinese universities about 'soft power'—the ability to get what one wants by attraction and persuasion rather than coercion or payment. Since the 1990s, thousands of essays and articles have been published in China on the topic, and the lectures drew large crowds."
"In the last year, America has sought to refocus its diplomatic and military attention to East, rather than Middle East. This reflects both the growing power of Asian economies, as well as the growth in military strength of China, especially through gains in what is known as anti-access and area denial (A2/AD) capabilities."
"Nationalist leader Chiang Kai-shek withdrew to Taiwan, with two million refugees, vowing the reclaim the mainland.
With the influx of so many refugees, resentment grew between the millions of native Taiwanese and the mainland newcomers. The conflict reached such a point that Chiang imposed a 'perpetual' martial law over the island for the next 38 years. Thousands of opponents were...
China and Taiwan, while in practice maintaining a fragile 'status quo' relationship, periodically grow impatient with the diplomatic patchwork that has kept the island separate from the Communist mainland since 1949.
"China should complete its transition to a market economy -- through enterprise, land, labor, and financial sector reforms -- strengthen its private sector, open its markets to greater competition and innovation, and ensure equality of opportunity to help achieve its goal of a new structure for economic growth."
"China is full of contradictions. The booming economy has lifted several hundred million people out of poverty, yet inequality has worsened and labor abuses are rampant. Rapid economic growth has made China a serious global competitor with the United States. Yet that economic success has also produced severe environmental problems, including a sharp rise in energy consumption. There is now a...
"NO MATTER how often China has emphasised the idea of a peaceful rise, the pace and nature of its military modernisation inevitably cause alarm. As America and the big European powers reduce their defence spending, China looks likely to maintain the past decade's increases of about 12% a year. Even though its defence budget is less than a quarter the size of America's today, China's generals...
"In recent years, 'public opinion' in China has been accredited more and more often as a force driving China's foreign policy. For example, analysts inside and outside China have attributed Beijing's rising assertiveness in international relations in part to the need of the government to cater to rising nationalism at home. The logic of many of these analysts is that expressions of Chinese...
"The Chinese government reported its lowest quarterly GDP growth in three years, with second-quarter GDP growth at an annual rate of 7.6 percent. Even while the U.S. feels the economic headwinds from the European crisis across the Atlantic, this slowdown creates yet another weight on the American economy from the other side of the world."
"A Chinese-born engineer was convicted Thursday of stealing trade secrets critical to the U.S. space program in the nation's first economic espionage trial.
A federal judge found former Boeing Co. engineer Dongfan 'Greg' Chung guilty of six counts of economic espionage and other charges for taking 300,000 pages of sensitive documents that included information about the U.S. space...
"U.S. Secretary of State Hillary Clinton urged China and Southeast Asian nations to keep negotiating to resolve disputes in the South China Sea, despite Chinese efforts to keep the issue off the table in international talks."
"The unexpectedly rapid expansion of China's Confucius Institutes since their inception in 2004 has prompted many to consider them a soft power success story.
But such a quick rise is bound to lead to a certain amount of scrutiny which, combined with the general apprehension surrounding China's increasing economic and political clout, has brought about a something of a backlash. Indeed...
"The following article adds to the growing corpus of material related to New Sinology published by China Heritage Quarterly. A crucial aspect of our approach to Chinese Studies is how, in an age of prosperity for China and concomitantly Chinese Studies, diversity of approach and of understanding of 'things Chinese' can be fostered and protected. The present essay highlights issues related to '...
"Here's an updated version of our Cyber Attacks graphic showing a world map and chart illustrating targeted cyber attacks on more than 70 companies, government bodies and organizations the last five years as compiled by software maker McAfee."
"The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. to respond using traditional military force.
The Pentagon's first formal cyber strategy, unclassified portions of which are expected to become public next month, represents an early attempt to grapple with a changing...
"When will China emerge as a military threat to the U.S.? In most respects the answer is: not anytime soon—China doesn’t even contemplate a time it might challenge America directly. But one significant threat already exists: cyberwar. Attacks—not just from China but from Russia and elsewhere—on America’s electronic networks cost millions of dollars and could in the extreme cause the collapse...
"The digital terrestrial television (DTTV) network will cover all of China in three years according to Jiang Wenbo, president of the Academy of Broadcasting Planning under the State Administration of Radio Film and Television (SARFT), speaking at a recent broadcast forum.
DTTV deployment will be in two phases. The first phase will see HDTV and SDTV programmes being delivered to 37 major...
"Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.
The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven't sought...
"It is time for policymakers in the United States and other countries to begin responding to today's reality for Chinese mercantilism represents a fundamental threat to not only the U.S. economy, but to the entire system of market and rules-based globalization."
"Hackers have attacked America’s defense establishment, as well as companies from Google to Morgan Stanley to security giant RSA, and fingers point to China as the culprit. The author gets an exclusive look at the raging cyber-war—Operation Aurora! Operation Shady rat!—and learns why Washington has been slow to fight back."
"Both parties have placed America's relations with the Asia-Pacific region at the center of their foreign policy priorities, with clear expectations that China's economic weight, strategic intentions, and military capabilities will increasingly impact on U.S. policy choices."
"For at least five years, a high-level hacking campaign—dubbed Operation Shady rat—has infiltrated the computer systems of national governments, global corporations, nonprofits, and other organizations, with more than 70 victims in 14 countries. Lifted from these highly secure servers, among other sensitive property: countless government secrets, e-mail archives, legal contracts, and design...
"As the fastest growing global super-power, China commands attention by all the super-powers and especially by the middle powers all over the world. Pundits ask whether Islamic Banking, which China looks upon favorably, will be a new challenge to Wall Street. Islamic banking will not pose a quantitative challenge in terms of nominal assets during our lifetime, but it has the potential to...
"As NASA retreats from an ambitious human spaceflight program for the foreseeable future, foreign countries are moving ahead with their own multibillion-dollar plans to go to the moon, build space stations and even take the long voyage to Mars.
Although most of the world still lags far behind the United States in space technology and engineering know-how, other nations are engaging in a...
"A Chinese woman who came to Canada to teach Chinese language at McMaster University in Hamilton says she was required to sign a statement promising not to practice Falun Gong in order to obtain her position.
Sonia Zhao says she was warned she would face punishment if she breached the agreement, which she said all volunteer teachers at Confucius Institutes are required to sign before...
"Cyber spies have once again hacked into a major US system – the target this time being the $300 billion joint strike fighter programme of the US forces and the British Royal Navy, which is aimed at homogenising the air defence needs of the two armed forces. The spy ring, widely dubbed GhostNet, is reported to be based in China, though the Chinese government has denied any involvement."
"The following graphic lists the ten most/least corrupt countries based on Transparency International’s Corruption Perceptions Index for 2011. The Corruption Perception Index assigns countries and territories with scores between 0 (highly corrupt) and 10 (very clean). New Zealand tops the list as the least corrupt country, while North Korea and Somalia are all the way at the bottom."
"Google moved quickly to announce that it would stop censoring its Chinese service after realising dissidents were at risk from attempts to use the company's technology for political surveillance, according to a source with direct knowledge of the internet giant's most senior management.
As the US intervened in Google's challenge to Beijing, the source told the Guardian the company's...
"Hackers seeking source code from Google, Adobe and dozens of other high-profile companies used unprecedented tactics that combined encryption, stealth programming and an unknown hole in Internet Explorer, according to new details released by the anti-virus firm McAfee."
"So from EU and American perspectives, China’s position on Iran has been neither as unhelpful nor as principled as feared. With the Communist Party’s ten-yearly leadership transition looming in the autumn, its leaders’ preoccupations lie at home. They do not want to find China caught in the middle of a huge international crisis. They have a genuine interest in maintaining peace, and will not...
"MUSCATINE, Iowa—This small city on the Mississippi River has long boasted that Mark Twain briefly called it home in 1854. Now, residents realize they have a more unusual bragging point: Muscatine played a minor but memorable role in the ascent of Xi Jinping, the man expected to become China's top leader this fall.
Twenty-seven years ago, Mr. Xi, then an up-and-coming official in a pig-...
"American companies should avoid doing business with China's two leading technology firms because they pose a national security threat to the United States, the House Intelligence Committee is warning in a report to be issued Monday."
"China's economy, after prolonged signs of weakness, now appears to be stabilizing. Good news? That is not clear, because it is stabilizing at a lower rate of growth. The great, big boom years—14.2 percent growth at their rosiest, in 2007—may be over. This is important news for all of us and not necessarily what we want to hear."
"The U.S. debt was more than $14.3 trillion during the so-called debt crisis of 2011, when the level of borrowing reached its statutory limit and the president warned of a potential default if the cap wasn't raised.
So who owns all that U.S. debt?
About 32 cents for every dollar of U.S. debt, or $4.6 trillion, is owned by the federal government in trust funds, for Social Security...
"India is being pulled into a complex and increasingly tense territorial dispute in the South China Sea, with China repeatedly warning ONGC, the Indian state oil company, that its joint exploration plans with Vietnam amount to a violation of Chinese sovereignty."
"China is the future, as you may have heard. But that future has not quite yet arrived. And the fact is, in 20 years China won't be quite like any country in the West -- no matter how China evolves, it's not going to be some neophyte version of a stable Western country. It'll be a behemoth quite unlike any other developed nation in the world."
"INS encouraged relatively free and open immigration during the eighteenth and early nineteenth centuries, and did not question that policy until the late 1830s. After certain states passed immigration laws following the Civil War, the Supreme Court in 1875 declared that regulation of immigration is a Federal responsibility. Thus, as the number of immigrants rose in the 1880s and economic...
"The impending cyber threat requires the immediate attention of Congress, according to a top intelligence official who singled out China, Russia and a failure of policy keeping up with the speed of technology as top threats to the nation’s critical networks."
"As China's economy and exchanges with the world have seen rapid growth, there has also been a sharp increase in the world's demands for Chinese learning. Benefiting from the UK, France, Germany and Spain's experience in promoting their national languages, China began its own exploration through establishing non-profit public institutions which aim to promote Chinese language and culture in...
"The foundation of Iran’s nuclear program can be traced to extensive Chinese and Russian cooperation in the 1990s, according to a former U.S. intelligence official who specialized on Tehran’s program."
"As has been widely reported, Mallesons partners voted last Wednesday to approve the merger with Chinese firm King & Wood. Not that we thought they’d do otherwise, despite our controversial editorial to the contrary."
"The Cold War taught us that inefficient planned economies can execute priority projects well. Think Sputnik, the Moscow Olympics, and Russian nuclear physics. Although its output never reached half that of the U.S., the Soviet Union held us to rough military parity until the end of the Cold War. China will choose a new leadership in 2012, culminating a power struggle between reformists and...
It may seem like the country that used to make everything is on the brink of making nothing. In January, 207,000 U.S. manufacturing jobs vanished in the largest one-month drop since October 1982 (see chart above).
"The call to get tough with China came as Xi Jinping, the Chinese leader-in-waiting and the man Mr Romney would deal with if he elected in November, made a high-profile visit to the US.
'We can't base our policy on some theory about how we might be able to influence what goes on in China. We have to base it on the balance of power and what our interests are,' said Aaron Friedberg, a...
"An exclusive preview of an economic report on China, prepared by the World Bank and government insiders considered to have the ear of the nation's leaders, offers a surprising prescription: China could face an economic crisis unless it implements deep reforms, including scaling back its vast state-owned enterprises and making them operate more like commercial firms."
"In the latest step in its naval modernization and expansion, China recently announced that it is accelerating serial production of an advanced destroyer. This will tilt the regional balance of power at sea in its favor and put it in a stronger position to enforce its sovereignty claims over Taiwan and in the South and East China Seas."
"Newt Gingrich isn’t the only politician who’s freaked out by China and Russia’s online spying. But the new Republican presidential frontrunner may be the highest-profile political figure all but openly calling for cyberwar with Moscow and Beijing.
'I think that we have to treat state-based covert activities as the equivalent of acts of war,' Gingrich said in response to a question...
"For decades, Beijing has maintained that the Dalai Lama is a separatist, but Tibet's exiled spiritual leader once had a special relationship with the father of Xi Jinping, the man in line to become China's next president.
Few people know what Xi, whose ascent to the leadership is likely to be approved at a Communist Party congress later this year, thinks of Tibet or the Dalai Lama....
"The ability to visit a foreign country without the cost and hassle of obtaining a visa is a welcome bonus for any traveller. It is also a barometer of a country's international alliances and relations. A report released on August 25th by Henley & Partners, a consultancy, shows that Britons have the fewest visa restrictions of the 190-odd countries (and territories) for which data are...
"Only the Chinese government knows how many nuclear weapons China has. As in most other nuclear weapon states, the number is a closely held secret. Even so, it is possible to make best estimates of the approximate size that benefit the public debate.
A recent example of how not to make an estimate is the study recently published by the Asia Arms Control Project at Georgetown University...
"President Barack Obama declared Thursday that the United States will take an expanded role in shaping the Asian Pacific region, with an increased military presence one step of that policy.
'Our enduring interests in the region demand our enduring presence in this region,' Obama said in a speech to the Australian Parliament. 'The United States is a Pacific power, and we are here to stay...
"Asia's return to the center of world affairs is the great power shift of the twenty-first century. In 1750, Asia had roughly three-fifths of the world's population and accounted for three-fifths of global output. By 1900, after the Industrial Revolution in Europe and America, Asia's share of global output had shrunk to one-fifth. By 2050, Asia will be well on its way back to where it was 300...
"Hackers who appear to be based in China have conducted a 'coordinated, covert and targeted' campaign of cyber espionage against major Western energy firms, according to a report expected to be issued Thursday by cybersecurity firm McAfee Inc."
"For decades, American manufacturers of everything from blue jeans to semiconductors have searched the world for the cheapest labor they could find.
It may have cost hundreds of thousands of American jobs, but it's made American products more affordable. Now, some of the most familiar companies -ones we deal with every day - are moving a whole new class of jobs overseas.
"Americans encouraged relatively free and open immigration during the eighteenth and early nineteenth centuries, and did not question that policy until the late 1800s. After certain states passed immigration laws following the Civil War, the Supreme Court in 1875 declared that regulation of immigration is a Federal responsibility. Thus, as the number of immigrants rose in the 1880s and...
"The president of the Philippines made a direct pitch to the White House Friday to help bolster his country's relatively weak defenses as the island nation increasingly finds itself tangled in territorial conflicts with China."
"India's massive power outages last week shocked many people who thought that India was on course to become a new economic super power, like China, where such outages are unheard of. NPR's Julie McCarthy and Frank Langfitt join guest host Linda Wertheimer to discuss attitudes toward infrastructure in the two emerging economies."
"As the 2012 State of the Union approaches, the public continues to give the highest priority to economic issues. Fully 86% say that strengthening the economy should be a top priority for the president and Congress this year, and 82% rate improving the job situation as a top priority. None of the other 20 issues tested in this annual survey rate as a top priority for more than 70% of Americans...
"The announcement that China's Cnooc Ltd. intends to buy Canadian energy producer Nexen for $15.1 billion invites many questions. One surprisingly likely to be overlooked is whether this deal makes business sense for China. To get the ball rolling, we'll start with something more basic still: Why does Cnooc exist?"
"A WEEK before President Hu Jintao's visit to America on January 18th the appearance of a giant bronze statue of Confucius on the east side of Tiananmen Square caused a stir in the Chinese capital. He is the first non-revolutionary to be commemorated on the hallowed ground of Chinese communism. The party, having once vilified the ancient sage, now depends on him in its attempts at global...
"A decade after its entry into the World Trade Organization (WTO), China has become the United States' fastest-growing export market and one of the nation's largest trading partners. The past ten years have witnessed significant progress in China, including strengthening its global cooperation, enhancing its integration into the world economy, and rapidly increasing its participation in...
"Hackers in China are the world’s 'most active and persistent perpetrators' of economic cyber espionage, and Russian spy agencies are actively seeking to steal U.S. technology, according to a report released by American intelligence services on Thursday.
The 2011 report by the Office of the National Counterintelligence Executive (ONCIX) included a focus on cyber threats for the first...
"By one well-known (if fictitious) criterion, the purpose of a space programme is to boldly go where no man has gone before. China, however, has a different plan: to boldly go back where men have already been. Specifically, with the release on December 29th of an official space-policy paper, it has said it wants to send people to the moon."
"RSA has traced the attack against its network, resulting in the compromise of sensitive information relating to its two-factor SecurID authentication system, to two groups, working for one nation state."
"It was the week before Christmas, and D.A. Henderson was alarmed about germs. He isn't easily rattled: Dr. Henderson led the successful worldwide effort to eradicate smallpox in the 1970s, and he directed the U.S. Office of Public Health Emergency Preparedness after the deadly anthrax letter attacks and the destruction of the World Trade Center in 2001. But recently not just one but two...
"China's efforts to assert its claims to the disputed South China Sea got a boost as regional talks to resolve the issue broke down despite U.S. support, even as Beijing made fresh moves that underscore its increasing presence in the region."
"Security experts say Google, along with dozens of other major companies, was the victim of a concerted espionage effort that they say came from within China and exploited flaws in e-mail attachments to get into networks of major financial and technology firms.
At least 34 companies, including Adobe, Symantec, Yahoo and Dow Chemical, were attacked, according to industry sources. On...
"A massive advanced persistent threat (APT)-type attack campaign has been ongoing worldwide for five years that has stolen intellectual property from 70 government agencies, international corporations, nonprofits, and others in 14 countries, according to a new published report in Vanity Fair.
The so-called 'Operation Shady Rat,' which is detailed in a new report by McAfee, has mostly...
"On Thursday, the U.S. Commerce Department issued a preliminary decision levying steep tariffs against Chinese solar manufacturers, finding they illegally dumped cheap photovoltaic cells on the American market."
"From democratic Mongolia to once-hostile Vietnam and long-isolated Laos, Secretary of State Hillary Rodham Clinton this week faced governments eager to embrace the United States as a strategic counterweight to China's expanding military and economic dominance of the region, while still lukewarm about American demands for greater democracy and rule of law."
"The U.S. Department of State is backing down from its insistence that 600 Chinese-language schoolteachers affiliated with university-based Confucius Institutes leave the country by the end of June because of visa problems. ...
The State Department issued a policy directive a week ago to the roughly 80 American universities that host Confucius Institutes, the Chinese-government-...
"More than a decade and a half after the Cold War ended, the world's combined stockpile of nuclear warheads remain at a very high level: more than 20,500. Of these, some 4,800 warheads are considered operational, of which nearly 2,000 U.S. and Russian warheads are on high alert, ready for use on short notice."
"More malware is now coming out of China than from any other country, according to a new report from Symantec.
The United States still leads the world in the number of malware attacks sent from mail servers. Symantec's report found U.S. mail servers responsible for distributing 36.6 percent of all global malware in March, followed by China at 17.8 percent and Romania at 16.5 percent....
This article reports on the aerial attacks ending a nominal truce in the Syrian conflict. Different international views on the Syrian regime have kept the U.N. from imposing tougher sanctions on the region.
"Throughout the nineteenth century, China's emperors had watched as foreigners encroached further and further upon their land. Time and again, foreigners forced China to make humiliating concessions. Foreign regiments, armed with modern weapons, consistently defeated entire imperial armies. Now, as a new century was about to begin, Tsu Hsi, empress dowager of the Ch'ing Dynasty, searched for a...
"China may have no intentions of using its growing military might, but that is of little comfort for Western countries. From the World Trade Organization to the United Nations, Beijing is happy to use its soft power to get what it wants -- and it is wrong-footing the West at every turn."
"AT A meeting of South-East Asian nations in 2010, China's foreign minister Yang Jiechi, facing a barrage of complaints about his country's behaviour in the region, blurted out the sort of thing polite leaders usually prefer to leave unsaid. 'China is a big country,' he pointed out, 'and other countries are small countries and that is just a fact.' Indeed it is, and China is big not merely in terms of territory and population, but also military might."
"IF EVER a clash was inevitable between one country's commercial law and another's business culture, it would be between America's Foreign Corrupt Practices Act (FCPA), which seeks to punish firms that bribe government officials, and China, where many businesses are owned by the government and bribery is endemic."
"The International Finance Corporation (IFC), the private sector arm of the World Bank Group, has signed an agreement with ACCION International, a US-based nonprofit organization, to invest USD 1 million in ACCION’s Chinese affiliate, ACCION Microfinance China (AMC). The investment will enable AMC to expand financial services in its primary region of operation, inner Mongolia, with loans...
"'The week that changed the world,' as President Nixon called his historic 1972 visit to China, made for a eight-day television extravaganza — and a public relations coup for hosts and guests alike. For eight days and nights, American television audiences tuned in to a spectacular parade of images from China, the first they had seen in more than twenty years."
The United States began to implement a more open policy with China in the 19th century. This was particularly the case in the realm of trade. Though immigration between the two nations was still minimal, the trade agreements help strengthen diplomatic ties.
"When China’s president, Hu Jintao, visits here next week, the exchange rate between Chinese and American currency will inevitably become a big topic of conversation.
China has been holding down the value of its currency, the renminbi, for years, making Chinese exports to the United States cheaper and American exports to China more expensive. The renminbi’s recent rise has been too...
"Pakistan and India are upgrading their Cyber War capabilities, partly by calling on allies for help. India has become a big customer of Israeli military equipment, and this now includes assistance in protecting themselves from Cyber War threats, especially from Pakistan. Meanwhile, Pakistan has found China to be a useful source of Cyber War technology. While Israel has some of the best...
"Since World War II, despite the costly flare-ups in Korea and Vietnam, the United States has proved to be the essential guarantor of stability in the Asian-Pacific region, even as the power cycle shifted from Japan to the Soviet Union and most recently to China. The benefits of our involvement are one of the great success stories of American and Asian history, providing the so-called second...
"Throughout history new technologies have revolutionised warfare, sometimes abruptly, sometimes only gradually: think of the chariot, gunpowder, aircraft, radar and nuclear fission. So it has been with information technology. Computers and the internet have transformed economies and given Western armies great advantages, such as the ability to send remotely piloted aircraft across the world to...
Rock music icon Bob Dylan avoided controversy Wednesday in his first-ever appearance in Communist-led China, eschewing the 1960s protest anthems that defined a generation and sticking to a song list that government censors say they preapproved....
"The latest U.S. trade figures contain some good news for the U.S., in the short term at least. In 2010, the U.S. trade deficit was $497.8 billion, which is up from $374.9 billion in 2009 but still almost 30 percent below the 2008 trade deficit of $698.8 billion. The 2010 trade balance comprised a trade in goods deficit of $646.5 billion and a trade in services surplus of $148.7 billion. While exports of goods were up $222.1 billion over 2009, imports were up $352.4 billion. Exports of services were also up $40.5 billion in 2010 compared to the increase in services imports of $23.8 billion."
"Back in January, we featured a post where we looked at who are the largest holders of the U.S. national debt. Since that time, the U.S. Treasury has revised their data, specifically to identify who the real foreign owners of the U.S. national debt are."
The moral issue in the U.S.-China crisis is being widely ignored. There should be no mistake about the ultimate responsibility for the collision between the American reconnaissance plane and the Chinese jet fighter.
"A hole in the ground means different things to different people. But what about a complex network of caverns more than 3,000 miles in length, deep underground, wide enough for two or three train cars, and used to keep nuclear weapons?
Prompted by a recent report by a Georgetown University professor, a debate has emerged among academics and arms control policy wonks about what that...
"Solar companies Suntech Power Holdings Co Ltd (STP.N) and Trina Solar Ltd (TSL.N) said their first-quarter margins were squeezed as they set aside money to offset anti-dumping tariffs imposed by the U.S. government on solar panel imports from China.
The U.S. Commerce Department set punitive tariffs last Thursday after ruling in favor of the local firms that said Chinese exporters were...
The two countries are holding a Strategic and Economic Dialogue (S&ED) in Beijing, and U.S. Secretary of State Hillary Clinton said they would cover many of the contentious commercial and foreign policy issues between the countries.
"The United States seeks to build a positive, cooperative, and comprehensive relationship with China by expanding areas of cooperation and addressing areas of disagreement, such as human rights. The United States welcomes a strong, peaceful, and prosperous China playing a greater role in world affairs and seeks to advance practical cooperation with China in order to build a partnership based...
"China almost certainly would mount a cyberattack on the U.S. in the event of a conflict, and the U.S. has no clear policy to determine how to respond appropriately, a congressional advisory panel is set to warn on Thursday."
"A White House letter promising the U.S. would give 'serious consideration' to selling Taiwan new F-16 fighter jets has reopened the sensitive topic of weapons sales to the island ahead of top-level U.S.-China meetings next week."
"China and the U.S. made little visible progress in resolving thorny diplomatic disputes during a visit by Secretary of State Hillary Clinton on Wednesday, as both sides stuck to long-standing positions on issues from regional territorial claims to violence in Syria.
Meanwhile, the Chinese government stayed silent on why Vice President Xi Jinping unexpectedly pulled out of a planned...
"The U.S. government should block a bid by China's state oil company CNOOC for Canadian oil company Nexen until China's government provides fair access for U.S. companies that want to invest in China, a top Democratic senator plans to tell Treasury Secretary Timothy Geithner on Friday."
"While Beijing pushed for Pyongyang to open up to foreign investors, Washington announced new sanctions that would inevitably impede such plans. Beijing is concerned that North Korea’s deep economic crisis will compound the political instability surrounding any handover of power. According to the Chinese media, discussions between Kim and Chinese leaders focussed on Beijing’s demand for...
China must be given a seat at the top-table of world economic affairs, the US treasury secretary, Timothy Geithner, said yesterday as he moved to reassure China that its investments in the US dollar were safe.
"In the recent past, China has defended its investment in US Treasury bonds. Meanwhile, there is concern that its position as the biggest investor in US debt may become political as well as economic. Treasury bonds are how the US - and all governments for that matter - borrow money: they issue government securities, which other countries and institutions buy. So, the US national debt is owned...
"A vast electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world, including those of the Dalai Lama, Canadian researchers have concluded.
In a report to be issued this weekend, the researchers said that the system was being controlled from computers based almost exclusively in China, but that they...
"Operation Aurora, the moniker given to the attacks on Google and several others, has developed into a security nightmare and political chess game. With so many questions left unanswered, there is still no clear proof that Aurora was a government attack. In truth, public information points not to a sanctioned attack by the Chinese government, but Malware kits and criminals keeping with...
"In reality, any threat from China will take a far less antiquated [atomic bomb] form. Just as it is already a world leader in future technologies - such as solar panels - so it has invested deeply in cyberwarfare, which it routinely uses to steal sensitive industrial materials such as blueprints.
If it ever clashed with the US (and a naval conflict in the North Pacific is the most...
Investors and pundits alike have shown unbounded excitement, and some anxiety, about China’s economic growth. Extrapolating current trends, some forecasters predict that China’s economy will vault ahead of America’s in 15 years.
"Xi Jinping, ethnic Han, native of Fuping, Shaanxi Province, born in June 1953. Joined the CPC in January 1974 and began working in January 1969. Graduated from the School of Humanities and Social Sciences of Tsinghua University, majoring in Marxist theory and ideological education. With an on-the-job postgraduate education. LLD.
Member of the Standing Committee of the Political Bureau...
"In 1978, after years of state control of all productive assets, the government of China embarked on a major program of economic reform. In an effort to awaken a dormant economic giant, it encouraged the formation of rural enterprises and private businesses, liberalized foreign trade and investment, relaxed state control over some prices, and invested in industrial production and the education of its workforce. By nearly all accounts, the strategy has worked spectacularly."
"In November 2011, President Obama stood before the Australian Parliament and issued a veiled challenge to China's ambitions in Asia: 'As a Pacific nation, the United States will play a larger and long-term role in shaping this region and its future.'"
The military branch in charge of China’s nuclear arsenal has acknowledged building a network of tunnels more than 3,000 miles long. For the past three years, a team of Georgetown University students has studied those tunnels, led by their professor, a former senior Pentagon strategist.
With its wealth spread among roughly 1.4 billion people, per capita income in China remains low at around $4,200 — representing an immense potential for the country to extend development to its poorer regions.
"The following graphic lists the ten most/least corrupt countries based on Transparency International’s Corruption Perceptions Index for 2011. The Corruption Perception Index assigns countries and territories with scores between 0 (highly corrupt) and 10 (very clean)."
This index, based on indicators from electricity generation to passenger traffic, is more timely than the official GDP figure. It is also more volatile, perhaps because China’s official data tend to smooth things out.
"Operation Shady RAT shares many similarities with the Operation Aurora and Night Dragon large-scale compromises also uncovered by researchers at the security firm, most notably in that Chinese hackers are again the prime suspects."
"A vast electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world, including those of the Dalai Lama, Canadian researchers have concluded."
"Back in January, we featured a post where we looked at who are the largest holders of the U.S. national debt. Since that time, the U.S. Treasury has revised their data, specifically to identify who the real foreign owners of the U.S. national debt are."
Using slightly different data than the AP article, the chart above shows U.S. Manufacturing Output (Gross Value) from The Federal Reserve, and U.S. Manufacturing Payroll Employment from the BLS (via Economagic), monthly from 1972-2009.
"Analysis of projections made by the U.S. intelligence community during the past decade for the growth in Chinese ICBM warheads shows that they have so far been too much too soon (see figure ... [above])."
"This Report sets forth the Commission’s analysis of the U.S.-China relationship in the topical areas designated by the Commission’s Congressional mandate; these are the areas the Commission is to consider, and about which it is to make recommendations to the Congress."
"The United States has done much over the last 30 years to encourage and facilitate China’s national development and its integration into the international system. However, much uncertainty surrounds China’s future course, particularly regarding how its expanding military power might be used."
"Shanghai officials have since denied any policy shift, saying this caveat is nothing new, but the contradictory reports are another manifestation of ongoing rumors that Beijing is rethinking the controversial one-child policy that has for the past three decades helped spur economic growth — but exacted a heavy social cost along the way."
The annual Asian Development Outlook provides a comprehensive analysis of economic performance for the past year and offers forecasts for the next 2 years for the 45 Asian economies that make up developing Asia.
"USTR's Office of China Affairs is responsible for managing the formulation and implementation of U.S. trade policy for China, Hong Kong, Macao, Taiwan and Mongolia, with the goal of increasing access for U.S. products and services in these markets and ensuring that the World Trade Organization (WTO) and other commitments are enforced."
China possesses nuclear weapons, a range of ballistic missile capabilities, and the ability to develop chemical and biological weapons. A key uncertainty is how current military modernization efforts will ultimately reshape China's strategic nuclear capabilities.
"There is real risk to both the bilateral relationship and to China’s relations with the rest of the world. The issue is not war, but cyber espionage. Cyber espionage exacerbates tensions and the situation will get worse until this changes."
"On April 8, a front page article was published in the Wall Street Journal on the dangers posed by cyberspies to the U.S. electrical grid. According to senior intelligence officers who spoke with the Journal, 'Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system.'"
"The American military faces a growing threat of potentially fatal equipment failure—and even foreign espionage—because of counterfeit computer components used in warplanes, ships, and communication networks."
"The rise of China poses grave challenges to U.S. security. Beijing implements a mercantilist trade policy and artificially sets a low value on its currency to promote exports, thus creating a large U.S. trade deficit with China year after year."
"Hackers have attacked America’s defense establishment, as well as companies from Google to Morgan Stanley to security giant RSA, and fingers point to China as the culprit. The author gets an exclusive look at the raging cyber-war—Operation Aurora! Operation Shady rat!—and learns why Washington has been slow to fight back."
This paper explores the view that there are situations in which people in business must confront the possibility that they must compromise some of their important principles or values in order to protect other ones.
"The present essay is an effort to clear away some of the underbrush surrounding the problem of the effects of imperialism in China, in the hope of helping to make discussion of this important issue as sophisticated and empirical as the present state of research allows."
"The United States is in Asia to stay. The graphics that follow help to demonstrate why. A quick glance is enough to demonstrate the dynamism of the region. Asia is home to more than half the world’s population. Freedom and tyranny live side by side across the region, as do economic opportunity and poverty. East and South Asia have some of the best places in the world to do business, but they...
"On January 14, 2010 McAfee Labs identified a zero-day vulnerability in Microsoft Internet Explorer that was used as an entry point for Operation Aurora to exploit Google and at least 20 other companies. Microsoft has since issued a security bulletin and patch."
Robert Kaplan, correspondent for The Atlantic and author of Monsoon: The Indian Ocean and the Future of American Power, is interviewed by Foreign Affairs on China and how America's relations with it might look in the near future.
"...I have often been asked by our worldwide customers if they should worry about such sophisticated penetrations themselves or if that is a concern only for government agencies, defense contractors, and perhaps Google . My answer in almost all cases has been unequivocal: absolutely."
As a fight against Communism, the Korean War caused friction between the United States and Communist China. This military history article describes the engagement between these two countries in the early 1950s.
"By outsourcing some aspects of operations, U.S. businesses and multinational corporations have been able to increase the amount of value built into products compared to the same dollars expended domestically and have further been able to diversify market holdings in Asia after reaching saturation points in U.S. and European markets."
"Computer network exploitation represents the leading edge of signals intelligence in the information age. The proliferation of computer systems throughout governments, businesses, and civic organizations represents a boon for would-be cyber spies."
"As we face one of the worst recessions in recent memory, protecting a company’s critical information assets like intellectual property and sensitive data has never been more important, yet challenging. A single breach or loss can cause irreparable ﬁnancial damage to a company’s reputation, its share price and customer conﬁdence."
"In this address, Bruce examined the future of cyber war and cyber security. Mr. Schneier explored the current debate on the threat of cyber war, asking whether or not the threat had been over-stated. He then explored the range of attacks that have taken place, including the Latvian DOS attack and the Stuxnet worm. The address concluded with an exploration of the future of international...
Sen. Wyden (OR-R) and the Senate Intelligence Committee, ask an intelligence panel about Iran's nuclear threat and U.S. terrorists threats, particularly with regard to the theft of 'intellectual property' and 'economic secrets.' Bottom line: US. must expand intelligence and military agency policies to prevent 'corporate espionage.'
"It isn't easy, running China, with its 1.3 billion people and 56 officially recognized ethnic nationalities. It's a vast mix of languages, living standards, beliefs and customs. Run it successfully, and you have a prosperous, innovative, powerful empire to rival any the world has seen. Make mistakes, and the chaos will be vast and terrible.
"China's women have always been under pressure: from men, from family, from work. Now more and more are under new pressure -- from themselves -- to take control of their lives; to get an education; to have a career; to marry for love. It's a slow, difficult process, and it is changing China.
Mass migration from the countryside to the cities is increasing prosperity, but fracturing...
"China is trying to feed 20 percent of the world's population on 7 percent of the world's arable land. A third of the world uses water from China's rivers. But rapid industrialization and climate change have led to bad air, polluted rivers and drought. Environmental activists, Party officials, academics and scientists are in a daily struggle over the damage to nature in China.
"How free are the Chinese people? How free to worship as they please? To learn the truth from the media? To hear the truth from the Communist Party and the government? How can people with a grievance negotiate with the state?
Tibetan Buddhism has long been feared as a rallying point and cover for Tibetan independence. Worship is permitted on the Party's strict terms -- neither...
In late 2011, the Asian Arms Control Project at Georgetown University released a report on the nature of China's underground tunnels. Declaring these tunnels to be a "key component of ... [China's] burgeoning nuclear deterrence infrastructure," this video uses a variety of Chinese video footage to explain the historical development of the tunnels and China's missile program.
“When Chairman Mao died in 1976, he left China in chaos and poverty. He was succeeded by Deng Xiaoping, who overturned Maoism and taught the Chinese to love capitalism, creating special investment zones for the West. But Deng's crash course in capitalism went wrong when inflation grew and workers lost jobs.
By 1989, China faced disaster. Now, 20 years after the tragic events in...
"The U.S. government is about to declare a new war, but this time the enemy is a virtual one. A string of attacks on government websites by hackers has driven American policy-makers into a state of high-alert over a so-called terrorist threat. But some doubt the danger even exists, as RT's Lucy Kafanov reports."
The Senate and House of Representatives of the United States of America in Congress approved an act banned transportation of 'coolies' in ships that were either owned or not owned by citizens of the United States of America.
The Senate and House Representations of the United States of America in Congress approved a law stating that any immigration of Chinese, Japanese, or any Asian country, to the United States must be free and voluntary.
"REFORM--DUBBED CHINA'S 'SECOND REVOLUTION'--was one of the most common terms in China's political vocabulary in the 1980s. Reform of the Chinese Communist Party and its political activities, reform of government organization, reform of the economy, military reforms, cultural and artistic reforms, indeed, China's post-Mao Zedong leaders called for reform of every part of Chinese society. The...
"The gathering and the distribution of news have long since ceased to be a local and individual occupation. They have become identified with great organizations have their representatives in all parts of the country and their publications in every important center. This service could only be performed by a mutual exchange of the most inclusive nature. How rapid and complete has been the growth...
"USTR's Office of China Affairs is responsible for managing the formulation and implementation of U.S. trade policy for China, Hong Kong, Macao, Taiwan and Mongolia, with the goal of increasing access for U.S. products and services in these markets and ensuring that the World Trade Organization (WTO) and other commitments are enforced.
It also includes working closely with USTR's Office...
"Although there is no authoritative statement of policy from the Chinese government on the Arctic, scientists and academics in China are increasingly showing interest in the region, and suggesting policies and actions for the nation. Given that the United States is an Arctic littoral state* with interests in the region, this memo seeks to provide an overview of Chinese environmental, energy,...
"This report is prepared annually to provide Congress with official, unclassified, quantitative data on conventional arms transfers to developing nations by the United States and foreign countries for the preceding eight calendar years for use in its policy oversight functions. All agreement and delivery data in this report for the United States are government-to-government Foreign Military...
"Cyberwarfare raises issues of growing national interest and concern. Cyberwarfare can be used to describe various aspects of defending and attacking information and computer networks in cyberspace, as well as denying an adversary's ability to do the same. Some major problems encountered with cyber attacks, in particular, are the difficulty in determining the origin and nature of the attack...
"The final thing, a subject that I want to open up personally before we go to the questions, is merely the Korean question.
I wrote a letter to Mr. Rhee in which I earnestly tried to express what is my understanding and, I believe, the American understanding of how we got into that war, what we were trying to achieve, where we are now, and what we are trying to do. In no case have we...
Mr. Chairman and distinguished Members of the Commission, it is my pleasure to have the opportunity to discuss China’s efforts in the realm of human rights, the rule of law and the environment and the prospects for U.S.-China cooperation on this critical issue.
"The House Permanent Select Committee on Intelligence (herein referred to as 'the Committee') initiated this investigation in November 2011 to inquire into the counterintelligence and security threat posed by Chinese telecommunications companies doing business in the United States."
United States senator J. William Fulbright of Arkansas supported the 1964 Gulf of Tonkin Resolution, which allowed President Lyndon Johnson to expand U.S. military involvement in the Vietnam War (1959-1975).
President Richard Nixon of the United States of America visited the People's Republic of China at the invitation of Premier Chou Enlai of the People's Republic of China from February 21 to February 28, 1972.
The 'Manifesto of the Communist Party' was written by Marx and Engels as the Communist League’s programme on the instruction of its Second Congress ..., which signified a victory for the followers of a new proletarian line during the discussion of the programme questions.
An unfortunate accident in 1927 between an American naval ship and a Chinese boat resulted in the death of a Chinese citizen. This document seeks to make amends for the incident in the form of a $500 payment.
China has made great progress in its pursuit of economic growth and development, which has allowed China to achieve higher living standards for the Chinese people and has increased China’s international profile.
China’s rapid rise as a regional political and economic power with global aspirations is an important element of today’s strategic environment – one that has significant implications for the region and the world.
"China’s rapid rise as a regional political and economic power with global aspirations is an important element of today’s strategic environment – one that has significant implications for the region and the world. The United States welcomes the rise of a peaceful and prosperous China, and it encourages China to participate as a responsible international stakeholder by taking on a greater share...
"People's Republic of China (PRC) leaders have outlined national strategic objectives in a series of 'white papers' on China's foreign policy, national defense, and arms control. However, such documents offer only limited insights on the motivations behind the objectives, or the specific strategies to achieve them. The linkages between the occasional strategic pronouncement and actual policy...
"The Philippine Government faces threats from several groups, some of which are on the US Government's Foreign Terrorist Organization list. Manila has waged a decades-long struggle against ethnic Moro insurgencies in the southern Philippines, which has led to a peace accord with the Moro National Liberation Front and on-again/off-again peace talks with the Moro Islamic Liberation Front. The decades-long Maoist-inspired New People's Army insurgency also operates through much of the country. The Philippines faces increased tension with China over disputed territorial claims in the South China Sea."
This testimony notes the details in regard to China's acceptance into the World Trade Organization in 2001. Freeman then goes on to describe how Chinese imports to countries such as the U.S. have increased since then.
"Good morning. Laura and I are pleased to welcome President Hu Jintao and his wife, Madame Liu, to the White House. (Applause.)
The United States and China are two nations divided by a vast ocean -- yet connected through a global economy that has created opportunity for both our peoples. The United States welcomes the emergence of a China that is peaceful and prosperous, and that...
In the Fall of 1964, "Communist China exploded a nuclear device on an isolated test site in Sinkiang." President Johnson condemned the incident, declaring that China's "nuclear pretensions are both expensive and cruel to its people.
Commenting on his discussion with the president of China, President Clinton expressed a desire to be friendly with the nation, but only if they agreed to address some serious issues such as human rights and other common concerns.
In the Spring of 2001, an American aircraft landed in China and was unwillingly detained for 11 days. ... This document contains President Bush's remarks after the crew had been released by the Chinese government.
"I would like to thank Cambodia for hosting this meeting of the ASEAN Regional Forum. This institution has matured in recent years, emerging as a cornerstone of an increasingly effective regional architecture for the Asia-Pacific. Today is an opportunity for all of us to gather in one place and grapple with the most important challenges to our common security and prosperity. I would like to briefly touch on three of these issues and then say a few words about the future of this body."
This speech describes the opening and expansion of Chinese sea ports due to a treaty between England and China. President John Tyler hoped to capitalize on these developments to achieve more trade between China and America.
In an attempt to formulate better relations between America and China, President Nixon made the suggestions in this document. One of the initiatives is the authorization of "direct imports of designated items from China."
"In 1979, official U.S. relations with Taiwan (the Republic of China) became a casualty of the American decision to recognize the government of the People's Republic of China (PRC) as China's sole legitimate government. Since then, U.S. unofficial relations with Taiwan have been built on the framework of the Taiwan Relations Act (P.L. 96-8) and shaped by three U.S.-China communiqués. Under...
The appeal involves a consideration of the validity of the Act of Congress of October 1, 1888, prohibiting Chinese laborers from entering the United States who had departed before its passage, having a certificate issued under the act of 1882.
As a result of our wartime alliance with China, this act was passed by the U.S. Congress to repeal the ... Chinese Exclusion Act of 1882 and subsequent acts, allowing for the first time in 60 years the legal immigration of Chinese into the U.S.
One of the most remarkable achievements of the foreign policy of the United States was not to appear until seventy-six years after the promulgation of the famous Monroe Doctrine. It was the Open-Door Policy.
The Wangxia treaty sought to establish "a perfect, permanent, and universal peace and a sincere and cordial amity between the United States of America on the one part, and the Ta-Tsing Empire on the other part.
"The U.S. officials announced meaningful progress on key elements of the U.S.-China trade relationship, but also underscored that much more work remains to be done to open China's market to U.S. exports and investment."
"In 1979, the United States changed its diplomatic recognition from Taipei to Beijing. In the U.S.-P.R.C. Joint Communique that announced the change, the United States recognized the Government of the People's Republic of China as the sole legal government of China and acknowledged the Chinese position that there is but one China and Taiwan is part of China. The Joint Communique also stated that within this context the people of the United States will maintain cultural, commercial, and other unofficial relations with the people on Taiwan."
This CRS Report, updated as warranted, discusses the agreement on civilian nuclear cooperation with the People’s Republic of China (PRC) by focusing on congressional roles in crafting and carrying out the agreement.
We are here today to share some good news with each other. With the four agreements that we are about to sign, the normalization of relations between the United States of America and the People's Republic of China is at last complete.
One of the most important actions you and your colleagues can take to help us protect our intellectual property rights in China is to continue to call attention to the Chinese authorities that you consider the theft of US intellectual property a high priority.
"With the Chinese Exclusion Act of 1882, Chinese laborers became the first group in American history to be excluded from the United States on the basis of their race and class. This landmark law changed the course of U.S. immigration history, but we know little about its consequences for the Chinese in America or for the United States as a nation of immigrants. At America's Gatesis the first...
"Zagoria presents perspectives from Washington, Beijing, and Taipei on cross-strait tensions, exploring ways to break the current standoff. Tensions between China and Taiwan are not likely to abate in the foreseeable future. The question of Taiwan's sovereignty is the major point of friction, and the continuing impasse between China and Taiwan is worrisome. Should critical political...
"This updated text introduces students to China's foreign policy - past and present - and the factors that may influence the country's future policy agenda. Exploring the new dynamics of China's regional and international roles, the authors outline the political, security, economic, and social issues the country faces in the emerging 21st century."
"Despite its increasingly secure place in the world, the People's Republic of China remains dissatisfied with its global status. Its growing material power has simultaneously led to both greater influence and unsettling questions about its international intentions. China also has found itself in a constant struggle to balance its aspirations abroad with a daunting domestic agenda. This...
"The 1996 deployment of two U.S. carrier battle groups to the waters off Taiwan in response to the firing of Chinese missiles close to Taiwan's shores brought home suddenly the genuine danger of a military clash between the United States and China over the Taiwan issue. In this timely book, distinguished analyst Ralph N. Clough assesses the intractable differences between Beijing and Taipei...
"Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he warns us of another threat, silent but equally dangerous. Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. This is the first book about the war of the future -- cyber war -- and a...
"Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber...
"Hedieh Nasheri investigates the current state of industrial espionage, revealing the far-reaching effects of advances in computing and wireless communications, in view of the recent revolution in information technology. Synthesizing perspectives from leading national and international authorities, Nasheri analyzes the historical and conceptual foundations of economic espionage, trade secret...
"Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world use the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone,...
Charts Western influence and national development Beginning with the mid-19th century, when China encountered the West and began to enter the modern age, this encyclopedia offers an overview of the world's largest and most populous nation.
"Sixty years ago, China was one of the poorest countries in the world, populated mostly by rural peasants, and still suffering from more than a century of internal turmoil and international humiliation. Today, China is a rapidly modernizing economic dynamo with growing global influence. Politics in China is an authoritative introduction to how this transformation occurred, and how China is...
"For centuries, various great powers have both exploited and benefited Taiwan, their designs for this island frequently clashing with the desire of local inhabitants to control their own destiny. Such conflicts have shaped Taiwan's multiple, and frequently contradictory, identities. Denny Roy contends that Taiwan's political history is best understood as a continuous struggle for security....
Beijing presents a clear and gathering threat to Washington—but not for the reasons you think. China’s challenge to the West stems from its transformative brand of capitalism and an entirely different conception of the international community.
This is the first book to provide a panoramic view of the origins of the Boxer War. Comprehensively examining this historical conundrum of the 20th century from a detached perspective, the book is based on ten years of exhaustive research of both unpublished and published materials from all nine countries involved.
Could cyber-attacks be used to cause physical damage? What other vulnerabilities might be exploited in a cyber-attack? Could an attack disrupt infrastructure such as power grids? All these questions and more are answered in the FAQ below.
Is the threat of an EMP a legitimate concern? What kind of infrastructural damage is an EMP capable of? How long would the consequences of such an attack last? All these questions and more will be answered in this FAQ.
One of the most serious threats to national security, individual privacy, and protection of one's assets comes from Intellectual Property (I.P.) espionage. What kind of information may be stolen? Who is or has the capability of engaging in effective I.P. espionage? Has this already happened? What can the United States do? All these questions and more are answered in this FAQ.
Missile defense. It's been talked about for decades, some of us even grew up watching Patriot missiles shoot down Iraqi Scud missiles in the first Gulf War. But where do things stand today? Is it still needed? Should I care? Those questions and more are answered in the FAQ below.
"The Ottawa Declaration of 1996 formally established the Arctic Council as a high level intergovernmental forum to provide a means for promoting cooperation, coordination and interaction among the Arctic States, with the involvement of the Arctic Indigenous communities and other Arctic inhabitants on common Arctic issues, in particular issues of sustainable development and environmental...
"As set out in the ASEAN Declaration, the aims and purposes of ASEAN are:
To accelerate the economic growth, social progress and cultural development in the region through joint endeavours in the spirit of equality and partnership in order to strengthen the foundation for a prosperous and peaceful community of Southeast Asian Nations;
China and the United States: From Hostility to Engagement, 1960-1998 publishes together for the first time recent unclassified and newly declassified documents pertaining to the formulation and implementation of the United States' policies toward the People's Republic of China and Taiwan over the last four decades, indexed for maximum accessibility.
"To formulate and implement strategies of national economic and social development, annual plans, medium and long-term development plans; to coordinate economic and social development; to carry out research and analysis on domestic and international economic situation; to put forward targets and policies concerning the development of the national economy, the regulation of the overall price level and the optimization of major economic structures, and to make recommendations on the employment of various economic instruments and policies; to submit the plan for national economic and social development to the National People's Congress on behalf of the State Council."
"The World Factbook provides information on the history, people, government, economy, geography, communications, transportation, military, and transnational issues for 267 world entities. Our Reference tab includes: maps of the major world regions, as well as Flags of the World, a Physical Map of the World, a Political Map of the World, and a Standard Time Zones of the World map."
"The Group is China's largest producer of offshore crude oil and natural gas and one of the largest independent oil and gas exploration and production companies in the world. The Group mainly engages in exploration, development, production and sales of oil and natural gas."
"Gov.cn, the official web portal of the Central People's Government of the People's Republic of China, has been built under the guidance of top Chinese leaders, and with the authorization of the National Informationization Leadership Group.
As an essential part of e-government initiative, Gov.cn is a gateway to all Chinese government information and services, and an interactive channel...
"As the world's first not-for-profit comprehensive global public-private partnership against cyber threats, the International Multilateral Partnership Against Cyber Threats (IMPACT) is the cybersecurity executing arm of the United Nations' specialised agency - the International Telecommunication Union (ITU). As the world's first comprehensive alliance against cyber threats, IMPACT brings...
President Nixon's trip to China in 1972 ended twenty-five years of isolation between the United States and the People's Republic of China (PRC) and resulted in establishment of diplomatic relations between the two countries in 1979.
"The Association for Diplomatic Studies and Training (ADST) is an independent nonprofit organization founded in 1986. Located in an historic Sears-style cottage at the State Department's George P. Shultz National Foreign Affairs Training Center (NFATC) in Arlington, Virginia, ADST advances knowledge of American diplomacy and supports training of foreign affairs personnel at the NFATC's Foreign...
"We provide information on every country in the world. For each country, you will find information like the location of the U.S. embassy and any consular offices; whether you need a visa; crime and security information; health and medical conditions; drug penalties; and localized hot spots."
The governmental agency purposed to "Advance freedom for the benefit of the American people and the international community by helping to build and sustain a more democratic, secure, and prosperous world composed of well-governed states that respond to the needs of their people, reduce widespread poverty, and act responsibly within the international system.